From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <493a68136ac9c97f514a93649e20ecad@plan9.bell-labs.com> From: David Presotto To: 9fans@cse.psu.edu Subject: Re: [9fans] Plan 9 buffer overflow exploit explained in Phrack Volume 0x0b, Issue 0x3e, Phile #0x09 of 0x0f In-Reply-To: <200309201749.h8KHnuj24873@augusta.math.psu.edu> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="upas-csyifynjsuxxtzxnplliavkqwe" Date: Sat, 20 Sep 2003 16:12:14 -0400 Topicbox-Message-UUID: 3ee12126-eacc-11e9-9e20-41e7f4b1d025 This is a multi-part message in MIME format. --upas-csyifynjsuxxtzxnplliavkqwe Content-Disposition: inline Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Not much code, just syscall space. We can probably nuke most of them. --upas-csyifynjsuxxtzxnplliavkqwe Content-Type: message/rfc822 Content-Disposition: inline Received: from plan9.cs.bell-labs.com ([135.104.9.2]) by plan9; Sat Sep 20 13:50:29 EDT 2003 Received: from mail.cse.psu.edu ([130.203.4.6]) by plan9; Sat Sep 20 13:50:27 EDT 2003 Received: by mail.cse.psu.edu (CSE Mail Server, from userid 60001) id EB1AA19B10; Sat, 20 Sep 2003 13:50:16 -0400 (EDT) Received: from psuvax1.cse.psu.edu (psuvax1.cse.psu.edu [130.203.4.6]) by mail.cse.psu.edu (CSE Mail Server) with ESMTP id 18C9D199D9; Sat, 20 Sep 2003 13:50:13 -0400 (EDT) X-Original-To: 9fans@cse.psu.edu Delivered-To: 9fans@cse.psu.edu Received: by mail.cse.psu.edu (CSE Mail Server, from userid 60001) id 70E9F19B10; Sat, 20 Sep 2003 13:49:57 -0400 (EDT) Received: from math.psu.edu (leibniz.math.psu.edu [146.186.130.2]) by mail.cse.psu.edu (CSE Mail Server) with ESMTP id C085E199D9 for <9fans@cse.psu.edu>; Sat, 20 Sep 2003 13:49:56 -0400 (EDT) Received: from augusta.math.psu.edu (augusta.math.psu.edu [146.186.132.2]) by math.psu.edu (8.9.3/8.9.3) with ESMTP id NAA05984 for <9fans@cse.psu.edu>; Sat, 20 Sep 2003 13:49:56 -0400 (EDT) Received: from augusta.math.psu.edu (localhost [127.0.0.1]) by augusta.math.psu.edu (8.11.6+Sun/8.9.3) with ESMTP id h8KHnuj24873 for <9fans@cse.psu.edu>; Sat, 20 Sep 2003 13:49:56 -0400 (EDT) Message-Id: <200309201749.h8KHnuj24873@augusta.math.psu.edu> To: 9fans@cse.psu.edu Subject: Re: [9fans] Plan 9 buffer overflow exploit explained in Phrack Volume 0x0b, Issue 0x3e, Phile #0x09 of 0x0f In-Reply-To: Your message of "Sat, 20 Sep 2003 13:22:47 EDT." From: Dan Cross Sender: 9fans-admin@cse.psu.edu Errors-To: 9fans-admin@cse.psu.edu X-BeenThere: 9fans@cse.psu.edu X-Mailman-Version: 2.0.11 Precedence: bulk Reply-To: 9fans@cse.psu.edu List-Id: Fans of the OS Plan 9 from Bell Labs <9fans.cse.psu.edu> List-Archive: Date: Sat, 20 Sep 2003 13:49:56 -0400 X-Spam-Status: No, hits=-0.5 required=5.0 tests=IN_REP_TO version=2.55 X-Spam-Level: X-Spam-Checker-Version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp) And presumably the rest are for binary compatibility with older (pre-4e) systems? Hmm.... That's a lot of compatibility to be carrying around. - Dan C. --upas-csyifynjsuxxtzxnplliavkqwe--