gethostbyname() overflow in glibc
| Summary |
|---|
| Description: | Overflow in glibc gethostbyname() allows overflows in ping, rsh, traceroute, etc. |
| Author: | Wilton Wong - ListMail <listmail@NOVA.BLACKSTAR.NET> |
| Compromise: | root (local) |
| Vulnerable Systems: | Redhat 5, presumably others with glibc (GNU HURD?) |
| Date: | 13 December 1997 |
| Details |
|---|
| More Exploits! |
|---|
The master index of all exploits is available here (Very large file)
Or you can pick your favorite operating system:
| All OS's | Linux | Solaris/SunOS | Micro$oft |
| *BSD | Macintosh | AIX | IRIX |
| ULTRIX/Digital UNIX | HP/UX | SCO | Remote exploits |
This page is part of Fyodor's exploit world. For a free program to automate scanning your network for vulnerable hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources:
