Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [discuss] Re: MDKSA-2003:110 - Updated kernel packages fix vulnerability
From: Mark Watts (m.wattseris.qinetiq.com)
Date: Thu Dec 04 2003 - 03:50:28 CST
-----BEGIN PGP SIGNED MESSAGE-----
> On Dec 03, 2003, at 16:02, Vincent Danen wrote:
> > On Dec 02, 2003, at 09:16, Mark Watts wrote:
> >> According to the proof of concept code I have been directed to by our
> >> security
> >> guys, the default 9.2 kernel is also vulnerable:
> >> http://www.k-otik.net/exploits/12.02.brk_poc.asm.php
> > Default kernel? Or the one currently in updates? If anyone is
> > running the one that come with 9.2 and not the updated kernel, shame
> > on them.
> > Can you verify this please? The note I saw on full-disclosure had him
> > jump from -10mdk to a vanilla 2.4.3 kernel.
> FWIW, I just tested this in vmware against 22mdk (currently) in updates
> and no problems.
> With 10mdk, I did manage to crash the vm.
> Take this as a reminder to keep up to date on updates.
Would it not be prudent to 'remind' people that vanilla 9.2 _is_ vulnerable?
I'm only mentioning this since the advisory released by Mandrake simply says
'9.2 is not vulnerable', when infact it is.
Senior Systems Engineer
St Andrews Road, Malvern
GPG Public Key ID: 455420ED
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
-----END PGP SIGNATURE-----