Red Hat 7.0 – man local gid 15 (man) exploit


Author: JT Smith

Help Net Security: “It is possible to insert a pointer into a linked list that will allow
overwriting of any value in memory that is followed by 4 null characters
(a null pointer). one such memory location is the last entry on the GOT
(global offset table). When another item is added to the linked list, the
address of the data (a filename) is inserted over the last value,
effectively redefining the function to the code represented by the


  • Linux