SECURITY BUG IN INTERACTIVE UNIX SYSV386

Tim Wright tim at dell.co.uk
Wed Feb 13 22:41:05 AEST 1991


In <1991Feb12.020625.6779 at kithrup.COM> sef at kithrup.COM (Sean Eric Fagan) writes:

>In article <1991Feb11.184130.11321 at jwt.UUCP> john at jwt.UUCP (John Temples) writes:
>>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>>Now, the question is, what do we do to protect ourselves in the meantime?

>Get SCO.  It does not have this "feature," and still manages to support
>Weitek coprocessors (the coprocessor the original poster was referring to, I
>believe).  (The Weitek's use memory for registers and, obviously, need to be
>able to write them.  The weitek registers are stuck in the upage, and
>happen, in apparantly every 3.2 save SCO's, to be in the same page as the
>uid stuff.  *Bad*.  *Very* bad.)

Not entirely true. This program fails on Dell UNIX (ISC 2.0.2-derived), with
or without a '387. Segmentation Violation - core dumped. 'Dunno about the
weitek - I don't use F**tran unless forced :-)

Tim
--
Tim Wright, Dell Computer Corp. (UK) | Email address
Bracknell, Berkshire, RG12 1RW       | Domain: tim at dell.co.uk
Tel: +44-344-860456                  | Uucp: ...!ukc!delluk!tim
"What's the problem? You've got an IQ of six thousand, haven't you?"



More information about the Comp.unix.sysv386 mailing list