[Info-vax] An old VMS vulnerability, was: Re: Calling standards, was: Re: Byte range locking - was Re: Oracle

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Tue Nov 29 09:18:00 EST 2016


In article <o1jurj$mjd$1 at dont-email.me>, Simon Clubley <clubley at remove_me.eisner.decus.org-Earth.UFP> writes:
>On 2016-11-28, VAXman-  @SendSpamHere.ORG <VAXman- at SendSpamHere.ORG> wrote:
>> In article <o1i312$vle$1 at dont-email.me>, Simon Clubley <clubley at remove_me.eisner.decus.org-Earth.UFP> writes:
>>>
>>>When you think about it, that's a clever way to allow code injected
>>>into an address space to survive activation of a privileged image
>>>and to become part of the address space of that privileged image.
>>
>> That's where we differ.  Yes, they did store their code in the memory that is
>> the tranlation of the logical name.  They didn't show an understanding of how
>> one would locate that memory once the code was written there.  Their methods
>> were empirical and kludgy.
>>
>> My demo used a pseudo-terminal to fill the buffer of the INSTALL image with
>> 511 characters and then the "up-arrows" which trigger the execution of the
>> so-called shell code.  I stored my shell code using LIB$PUT_COMMON which has 
>> a well-known location in P1.  That address is written by the pseudo-terminal
>> code as well.
>>
>
>Yes, that's a much better approach.
>
>I hope that sometime over the last 8 years a patch has now made the
>memory area containing that buffer (as well as the logical name table
>memory) no-execute...

<ROLLEYES>


-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

I speak to machines with the voice of humanity.



More information about the Info-vax mailing list