Vulnerability Development mailing list archives
root@(none)
From: root () SECURITYFOCUS COM (root (none))
Date: Wed, 9 Feb 2000 23:19:42 +1100
hey there !! I was mucking around with my basic host information seeing if it was possible to core dump my settings to detemine if a host can acually fool the the settings for a localhost configuration e.g 127.0.0.1,by putting a heap of characters in the configuration box offcourse you will just core dump and youre original setting will just stay the same rideing the dump but if you then return and do the same but removing 10 to 15 characters and then regenerate this you will core dump but you host configeration will accept the long charateristic commands once it has been accepted no longer will you dns accept 127.0.0.1 or youre host config,also you will no longer be localhost you will just be root@(none). LowteK i'm not shure if this can be missused ! i'm looking into it further !! Feb 6 15:37:09 (none) kernel: ibmtr: register_trdev() returned non-zero. Feb 6 15:37:05 (none) insmod: /lib/modules/2.2.13-4mdk/net/ibmtr.o: init_module: Device or resource busy Feb 6 15:37:06 (none) pppd[270]: bad local IP address 127.0.0.1 Feb 6 15:37:13 (none) pppd[390]: bad local IP address 127.0.0.1 Feb 6 15:37:18 (none) named[420]: Zone "" (file ): No default TTL set using SOA minimum instead Feb 6 15:37:18 (none) named[420]: Zone "0.0.127.in-addr.arpa" (file named.local): No default TTL set using SOA minimum instead Feb 6 15:37:18 (none) named[420]: master zone "0.0.127.in-addr.arpa" (IN) rejected due to errors (serial 2000020601) Feb 6 15:37:18 (none) pppd[425]: bad local IP address 127.0.0.1 Feb 6 15:37:23 (none) pppd[527]: bad local IP address 127.0.0.1 Feb 6 15:37:28 (none) pppd[550]: bad local IP address 127.0.0.1
Current thread:
- root@(none) root (none) (Feb 09)