Firstly sorry if the information in the message is way off target; I have little or no experience with buffer overflow situtions.
After seeing the 'vi' buffer overflow incident, I decided to have a look at some root processes running a default install on a redhat 7.1 box. After two minutes I found this: [smackenz@command user]$ /sbin/mingetty `perl -e 'print "A" x 9000'` Segmentation fault (core dumped) After running [... user]$ ps aux |grep root there were several 'mingetty' processes running by root. I am at all up on buffer overflow situations, therefore this could be nothing, however I thought I may be worth reporting it. The more I think about this I'm realising that it must be nothing exploitable however I thought I'd just ask some one who knows what they are talking about to make sure. Would appreciate some feedback. Here's the gdb output:: [smackenz@command user]$ gdb -q /sbin/mingetty (no debugging symbols found)...(gdb) run `perl -e 'print "A" x 9000'` Starting program: /sbin/mingetty `perl -e 'print "A" x 9000'` Program received signal SIGSEGV, Segmentation fault. 0x40085106 in _IO_vfprintf (s=0xbfffd320, format=0x80498cb "%s: %s", ap=0xbfffd50c) at ../sysdeps/i386/i486/bits/string.h:530 530 ../sysdeps/i386/i486/bits/string.h: No such file or directory. in ../sysdeps/i386/i486/bits/string.h (gdb) i r eax 0x41414141 1094795585 ecx 0xbfffd2c8 -1073753400 edx 0x0 0 ebx 0x401589e4 1075153380 esp 0xbfffcc50 0xbfffcc50 ebp 0xbfffd2e8 0xbfffd2e8 esi 0xbfffcdf0 -1073754640 edi 0x0 0 eip 0x40085106 0x40085106 eflags 0x10246 66118 cs 0x23 35 ss 0x2b 43 ds 0x2b 43 es 0x2b 43 fs 0x0 0 gs 0x0 0 fctrl 0x37f 895 fstat 0x0 0 ftag 0xffff 65535 fiseg 0x0 0 fioff 0x0 0 foseg 0x0 0 fooff 0x0 0 Thanks Scott Mackenzie. Bradford University.