exploit-db-mirror/exploits/hp-ux/local/22231.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

8 lines
No EOL
523 B
Text

source: http://www.securityfocus.com/bid/6800/info
It has been reported that the HPUX wall executable may be prone to a buffer overflow condition. This buffer overflow is alleged to be triggered when an excessive amount of data is redirected into wall as a message intended to be broadcast.
It may be possible for remote attackers to corrupt sensitive regions of memory with attacker-supplied values, possibly resulting in execution of arbitrary code.
perl -e 'print "A" x 9000' > /tmp/out
/usr/sbin/wall /tmp/out