So you are saying they can get to the PASE command line interface from
an application. We would not get a CFP message as we would in RPGLE and
have the application stop running. I think I am going to write my own
DNS server in RPGLE. Just think use the native DB to store your DNS
entries. Sounds like a fun project to play with in my spare time.
(Like I have any.)
Chris Bipes
Director of Information Services
CrossCheck, Inc.
-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx
[mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Patrick Botz
Sent: Tuesday, October 23, 2007 8:55 AM
To: Midrange Systems Technical Discussion
Subject: RE: DB2UDB hack
They would have the rights of whatever userID under which the PASE
application being attacked is running. If this profile had *ALLOBJ
security, they could do anything they wanted on the entire system, not
just in the PASE environment (PASE was designed to allow calls to native
i5/OS stuff). But even just using standard Unix file system commands
(e.g. ls, cat, cp, rm, etc...), they could manipulate most of the data
on
the machine.
midrange-l-bounces@xxxxxxxxxxxx wrote on 10/22/2007 06:01:22 PM:
My question is this, if a successful PASE buffer overflow is
accomplished under i5/OS, what can the hacker hope to accomplish?
What
rights would they have to the rest of the system?
As an Amazon Associate we earn from qualifying purchases.