Computer Security
[EN] securityvulns.ru no-pyccku


Linux syscall filtering bypass
Published:28.01.2009
Source:
SecurityVulns ID:9628
Type:local
Threat Level:
5/10
Description:32 bit application can use 64 bit syscall and vice versa to bypass syscall filtering, because syscall numbers are different.
Original documentdocumentChris Evans, CESA-2009-001 - rev 1 Linux syscall interception technologies partial bypass (28.01.2009)
 documentChris Evans, Problems with syscall filtering technologies on Linux (28.01.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod