bladi wrote:
> /*
>
> ircii-4.4 exploit by bladi & aLmUDeNa
Has anyone succeeded in getting this exploit to actually produce a shell?
Pointers & advice appreciated.
Yes, this is a legitimate question: it is further penetration testing on
StackGuard efficacy.
Thanks,
Crispin
-
Crispi
I brought attention to this same vulnerability back in June of 1997. See
http://www.dataguard.no/bugtraq/1997_2/0543.html. It's a shame the
problem still exists. I wouldn't be suprised if other, somewhat newer
clients had the same sort of trouble.
--
/* Derek Callaway <[EMAIL PROTECTED]> : Progra
/*
ircii-4.4 exploit by bladi & aLmUDeNa
buffer overflow in ircii dcc chat's
allow to excute arbitrary
Affected:
ircII-4.4
Patch:
Upgrade to ircII-4.4M
ftp://ircftp.au.eterna.com.au/pub/ircII/ircii-4.4M.tar.gz
Offset:
SuSe 6.x :0xbfffe3ff
Re