I'm going through a rough period in my life -- I don't know what to do.
Attached below is a shitty remote that I leaked to the kids last year. Now
is a good time to submit it to Bugtraq. It's incredibly lame code, but why
not get it working, and then go hack some stuff...
Originally it was writt
Mayhem writes..
>
>
> This technique was known years ago by random
>
> people, note that gdb use it to resolve internal
>
> library symbols and put breakpoints on it (since
>
> shared libraries are ET_DYN objects, their
>
> absolute virtual address is not known at the
>
> process lau
-BEGIN PGP SIGNED MESSAGE-
_
SGI Security Advisory
Title: rpc.passwd vulnerability
Number: 20020601-01-P
Date: June 4, 2002
Reference: CA
-BEGIN PGP SIGNED MESSAGE-
CERT Advisory CA-2002-15 Denial-of-Service Vulnerability in ISC BIND 9
Original release date: June 04, 2002
Last revised: --
Source: CERT/CC
A complete revision history can be found at the end of this file.
Systems Affected
* Domain Name S
-BEGIN PGP SIGNED MESSAGE-
Sun Microsystems, Inc. Security Bulletin
Bulletin Number:#00219
Date: June 04, 2002
Cross-Ref: http://www.entercept.com/d
==
Strategic Reconnaissance Team Security Advisory (SRT2002-06-04-1611)
Topic : SCO OpenServer crontab format string vulnerability
Date : June 04, 2002
Credit : KF dotslash[at]snosoft.com
Site : http://www.snosoft.com
===
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Ghostscript command execution vulnerability
Advisory ID: RHSA-2002:083-22
Issue date:2002-05-07
Updated on:2002-06-03
Product:
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated bind packages fix denial of service attack
Advisory ID: RHSA-2002:105-09
Issue date:2002-06-02
Updated on:2002-06-04
Pr
Netric Security Team - http://www.netric.org
by eSDee
SHOUTcast 1.8.9 remote bufferoverflow
Type: Stack Overflow
Priority: 2
[1] Description
[2] Vulnerable
[3] The exploit
[4] Vendor response
[1] Description
Nullsoft's SHOUTcast 1.8.9 contains a bufferoverflow that is remotely
Bennett Todd wrote:
> Do MIME::Tools and/or MIMEDefang know about the punctuation marks
> that some Windows MUAs silently ignore in filename extensions?
MIMEDefang itself doesn't "know" anything, but the sample filter which
comes with it will correctly (?!) reject ".exe." as well as ".exe"
I've
==
Strategic Reconnaissance Team Security Advisory (SRT2002-06-04-1011)
Topic : Slurp news retriever remote format string vulnerability
Date : June 04, 2002
Credit : zillion[at]safemode.org
Site : http://www.snosoft.com
==
That's good research, and good work.
And I agree with the conclusion you implied:
> If you use MIMEDefang (which uses MIME::Tools), you may want to
> unconditionally call action_rebuild in filter_begin(). This
> forces the MIME message to be rebuilt by MIME::Tools, resulting in
> a valid MIME m
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated xchat packages fix /dns vulnerability
Advisory ID: RHSA-2002:097-08
Issue date:2002-05-20
Updated on:2002-06-04
Product
Entercept Ricochet Advisory
Solaris snmpdx Vulnerabilities
http://www.entercept.com/news/uspr/06-03-02.asp
DETAILS
An unchecked buffer in Sun's Solaris SNMP component can be overrun and remotely
exploited, allowing an attacker to execute arbitrary code with root privileges. There
is also a form
Background
--
"LogiSense Corporation is a leading provider of performance software for
service providers and enterprises. We offer a wide range of low-cost
solutions designed to address common client billing and management,
traffic congestion, network scalability, and latency issues."
L
OVERVIEW
Gopher is a protocol developed at the University of Minnesota in the
early 1990's. Gopher servers offer hierarchically organized directories
and files. These form a "gopherspace" which can be thought of as the
predecessor of the World Wide Web. Gopher was mostly abandoned
---
- DAVID EVLIS REIGN SECURITY ADVISORY #11 -
---
- WHAT -
Remotely Exploitable Format string Hole
- WHO -
MSNT squid auth for NtDomains
- DETAILS ON PRODUCT -
This is an authentication module for the Squid proxy
17 matches
Mail list logo