Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Fri, 18 Oct 2002 21:53:34 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Fri, 18 Oct 2002 21:53:33 -0400 Received: from pizda.ninka.net ([216.101.162.242]:4301 "EHLO pizda.ninka.net") by vger.kernel.org with ESMTP id ; Fri, 18 Oct 2002 21:53:01 -0400 Date: Fri, 18 Oct 2002 18:51:16 -0700 (PDT) Message-Id: <20021018.185116.128890469.davem@redhat.com> To: breno_silva@bandnet.com.br Cc: linux-kernel@vger.kernel.org Subject: Re: Exploit for the Kernel From: "David S. Miller" In-Reply-To: <000d01c27710$c3a75260$cddea7c8@bsb.virtua.com.br> References: <000d01c27710$c3a75260$cddea7c8@bsb.virtua.com.br> X-FalunGong: Information control. X-Mailer: Mew version 2.1 on Emacs 21.1 / Mule 5.0 (SAKAKI) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 764 Lines: 19 From: "Breno" Date: Fri, 18 Oct 2002 22:42:12 -0300 http://online.securityfocus.com/archive/1/295855/2002-10-15/2002-10-21/1 There is nothing concrete at all about said "exploit". It looks like just a clever way to divert the victim's attention from the real mechanism these guys are using to root peoples boxes. It is nearly impossible for a TCP frag handling exploit to allow a root shell and socket to that shell to be created. So I think the claims are total nonsense. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/