From mboxrd@z Thu Jan 1 00:00:00 1970 From: Markus Friedl To: 9fans@cse.psu.edu Subject: Re: [9fans] Plan 9 buffer overflow exploit explained in Phrack Volume 0x0b, Issue 0x3e, Phile #0x09 of 0x0f Message-ID: <20030920153514.GA25835@folly> References: <200309201549.32709.vthacker@tp9ug.jp> <5db94a9eccdf9b8a171e87996c71c67a@plan9.bell-labs.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5db94a9eccdf9b8a171e87996c71c67a@plan9.bell-labs.com> User-Agent: Mutt/1.4.1i Date: Sat, 20 Sep 2003 17:35:14 +0200 Topicbox-Message-UUID: 3daa66a0-eacc-11e9-9e20-41e7f4b1d025 AFAIK, phrack 62 is fake, a hoax. On Sat, Sep 20, 2003 at 02:55:37AM -0400, Russ Cox wrote: > He exploited a buffer overrun in his own program. > It would be more interesting if he exploited a buffer > overrun in some system program, preferably one that > listens to the network. But then, he'd still be none. > > Russ