Gentoo Archives: gentoo-hardened

From: Rumen Yotov <rumen_yotov@×××.bg>
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] pciutils / lspci -vv buffer overflow
Date: Mon, 26 Jul 2004 03:27:52
Message-Id: 1090812454.12890.10.camel@mymach.qrypto.org
In Reply to: [gentoo-hardened] pciutils / lspci -vv buffer overflow by Pascal de Bruijn
1 On пн, 2004-07-26 at 03:56, Pascal de Bruijn wrote:
2 > Hi,
3 >
4 > I have investigated the lspci -vv buffer overflow... This only seemed to
5 > occur on certain installations, this should be on systems which have
6 > AGPx1 and AGPx2 and AGPx4 support.
7 >
8 > For more information:
9 > http://members.home.nl/keizerflipje/hacks/lspci/lspci.txt
10 > http://members.home.nl/keizerflipje/hacks/lspci/lspci.diff
11 >
12 > I really like to get this verified...
13 >
14 > Greets,
15 > Pascal de Bruijn
16 >
17 > --
18 > gentoo-hardened@g.o mailing list
19 >
20 Hi,
21 Can confirm lspci -vv buffer overflow on K7VM2 mobo with following
22 message:
23 ...CUT...
24 0000:00:00.0 Host bridge: VIA Technologies, Inc. VT8375 [KM266/KL266]
25 Host Bridge
26 Subsystem: Unknown device 1849:3156
27 Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop-
28 ParErr- Stepping- SERR- FastB2B-
29 Status: Cap+ 66Mhz+ UDF- FastB2B- ParErr- DEVSEL=medium >TAbort-
30 <TAbort- <MAbort+ >SERR- <PERR-
31 Latency: 8
32 Region 0: Memory at e0000000 (32-bit, prefetchable)
33 Capabilities: [a0] AGP version 2.0
34 Status: RQ=32 Iso- ArqSz=0 Cal=0 SBA+ ITACoh- GART64-
35 HTrans- 64bit- FW+ AGP3-
36 Rate=x1,x2,x4
37 Command: RQ=1 ArqSz=0 Cal=0 SBA- AGP- GART64- 64bit- FW-
38 Rate=<none>
39 lspci: stack smashing attack in function show_agp()
40 ................................^^^^^^^^^^^^^^^^^^^
41 Aborted
42 ...END CUT...
43 Rumen

Attachments

File name MIME type
signature.asc application/pgp-signature

Replies