Yup. Its kinda cute. It overflows its own buffer in the set_ptr function and changes the return address to point into the shellcode. As always the philosophy of BUGTRAQ is 'caveat emptor'. BUGTRAQ's moderation is meant to keep discussion. It's not meant to verify the legitimacy of the information or programs distributed via the list. That is what the community is for. -- Elias Levy SecurityFocus.com http://www.securityfocus.com/ Si vis pacem, para bellum
- Re: That BIND8 "exploit" attacks NAI Max Vision
- Elias Levy
