Firstly sorry if the information in the message is way off target; I have 
little or no experience with buffer overflow situtions.

After seeing the 'vi' buffer overflow incident, I decided to have a look at 
some root processes running a default install on a redhat 7.1 box.  After two 
minutes I found this:

[smackenz@command user]$ /sbin/mingetty `perl -e 'print "A" x 9000'`
Segmentation fault (core dumped)

After running

[... user]$ ps aux |grep root

there were several 'mingetty' processes running by root.  I am at all up on 
buffer overflow situations, therefore this could be nothing, however I 
thought I may be worth reporting it.

The more I think about this I'm realising that it must be nothing exploitable 
however I thought I'd just ask some one who knows what they are talking about 
to make sure.

Would appreciate some feedback.

Here's the gdb output::

[smackenz@command user]$ gdb -q /sbin/mingetty 
(no debugging symbols found)...(gdb) run `perl -e 'print "A" x 9000'`
Starting program: /sbin/mingetty `perl -e 'print "A" x 9000'`

Program received signal SIGSEGV, Segmentation fault.
0x40085106 in _IO_vfprintf (s=0xbfffd320, format=0x80498cb "%s: %s", 
    ap=0xbfffd50c) at ../sysdeps/i386/i486/bits/string.h:530
530     ../sysdeps/i386/i486/bits/string.h: No such file or directory.
        in ../sysdeps/i386/i486/bits/string.h
(gdb) i r
eax            0x41414141       1094795585
ecx            0xbfffd2c8       -1073753400
edx            0x0      0
ebx            0x401589e4       1075153380
esp            0xbfffcc50       0xbfffcc50
ebp            0xbfffd2e8       0xbfffd2e8
esi            0xbfffcdf0       -1073754640
edi            0x0      0
eip            0x40085106       0x40085106
eflags         0x10246  66118
cs             0x23     35
ss             0x2b     43
ds             0x2b     43
es             0x2b     43
fs             0x0      0
gs             0x0      0
fctrl          0x37f    895
fstat          0x0      0
ftag           0xffff   65535
fiseg          0x0      0
fioff          0x0      0
foseg          0x0      0
fooff          0x0      0


Thanks

Scott Mackenzie.
Bradford University.

Reply via email to