aMule Forum

Please login or register.

Login with username, password and session length
Advanced search  

News:

We're back! (IN POG FORM)

Author Topic: 2.1.3-1 vulnerable to code injection?  (Read 1738 times)

dukeofnukem

  • Approved Newbie
  • *
  • Karma: 0
  • Offline Offline
  • Posts: 20
2.1.3-1 vulnerable to code injection?
« on: July 15, 2006, 12:46:19 AM »

Just found this in my syslog, w/o knowing the source code (and without having the time to go stracing and debugging like a madman) I'm just sceptic...

Code: [Select]
Jul 14 18:56:15 localhost kernel: PAX: From 88.72.236.95: execution attempt in: , 08405000-0d9b0000 00000000
Jul 14 18:56:15 localhost kernel: PAX: terminating task: /usr/bin/amule(amule):2312, uid/euid: 1000/1000, PC: 08d385c8, SP: 5f540bac
Jul 14 18:56:15 localhost kernel: PAX: bytes at PC: 00 00 00 00 51 00 00 00 28 11 fb 09 e4 13 4a 30 ff ff ff ff
Jul 14 18:56:15 localhost kernel: PAX: bytes at SP: 2fe5e828 08d385d0 30941398 5f540bd8 30901cb7 00000002 3125d0f8 5f540be8 3079e6ab 08d385d0 0000003f 00000002 30941398 31201760 3079e640 5f540c08 3090bdbf 3120f020 00000004 3125d0f8
Jul 14 18:56:15 localhost kernel: grsec: From 88.72.236.95: denied resource overstep by requesting 4096 for RLIMIT_CORE against limit 0 for /usr/bin/amule[amule:2312] uid/euid:1000/1000 gid/egid:1003/1003, parent /usr/bin/icewm[icewm:22963] uid/euid:1000/1000 gid/egid:1003/1003

Anyone else experiences of that kind or even an explanation?
Logged
CU ;) DoN Mink
aka Netw(o)r King


Drum&Bass is a state of mind