May 14, 2001

Red Hat 7.0 - man local gid 15 (man) exploit

Author: JT Smith

Help Net Security: "It is possible to insert a pointer into a linked list that will allow
overwriting of any value in memory that is followed by 4 null characters
(a null pointer). one such memory location is the last entry on the GOT
(global offset table). When another item is added to the linked list, the
address of the data (a filename) is inserted over the last value,
effectively redefining the function to the code represented by the


  • Linux
Click Here!