From: "Laurentiu Matei" <[EMAIL PROTECTED]>
> Iar ultima versiune de la Mandrake zice asa:
> PATCHED: detects small overflow, but crashes (0.9.6e)

Daca te uiti in sursa (openssl-sslv2-master.c) ia uite ce gasesti:

"It is difficult to tell OpenSSL 0.9.6e from vulnerable versions
because the OpenSSL developers chose to kill the process if a buffer
overflow attempt is detected.  Over the network, a crash due to a
buffer overflow and an abrupt, but deliberate process termination look
the same: in both cases, the TCP connection breaks down.  At first
glance, it appears that we are out of luck and cannot detect vulnerable
versions.

However, if we overrun the buffer by only a few bytes, the vulnerable
version (without check) does NOT crash.  This way, we can tell 0.9.6e
from previous, vulnerable versions:

               large overflow  small overflow
    pre-0.9.6e      crash         no crash
        0.9.6e      crash           crash
        0.9.6g      error           error
"
Intr-un cuvint, poti sa dormi linistit.

Grig


---
Pentru dezabonare, trimiteti mail la 
[EMAIL PROTECTED] cu subiectul 'unsubscribe rlug'.
REGULI, arhive si alte informatii: http://www.lug.ro/mlist/


Raspunde prin e-mail lui