posted by Eugenia Loli on Sat 30th Aug 2003 11:37 UTC
IconOpenBSD's Todd Miller reports that an improper bounds check in the semget(2) system call can allow a local user to cause a kernel panic. No privilege escalation is possible, the attack simply runs the kernel out of memory. The bug was introduced in OpenBSD 3.3, previous versions of OpenBSD are unaffected. Earlier, Mike Frantzen has committed "Passive operating system fingerprinting" to PF which exposes the source host's OS to the filter language.
e p (0)    7 Comment(s)

Technology White Papers

See More