many of the "exploits" which comes with libsafe got stopped by it, but not this one (testing as a jailed user):
This program tries to use printf("%n") to overwrite the
return address on the stack.
If you get a /bin/sh prompt, then the exploit has worked.
Press any key to continue...
is it a risk?
it seens the user is still jailed, since when I do "cat /etc/passwd", I don't see all users, but just me...
Libsafe is a dynamically loadable library that intercepts calls to unsafe functions and processes them so that hackers can't hijack the process and run the code of their choice. The most valuable aspect of Libsafe is that it can help you guard your Linux systems against buffer overflow vulnerabilities that have yet to be discovered.