On 22 Oct 06, at 04:29, [EMAIL PROTECTED] wrote:
> even if they have ssh access, there is still nothing they can do,
> except
> to create two files in there $HOME directories containing
> expressions from
> paths.h and sysexits.h ?
>
> Why would that be considered a backdoor?
The awk commands
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Sun, 22 Oct 2006 19:50:02 -0500 Dude VanWinkle
<[EMAIL PROTECTED]> wrote:
>On 10/22/06, [EMAIL PROTECTED]
><[EMAIL PROTECTED]> wrote:
>>
>> On Sun, 22 Oct 2006 06:29:35 -0500 [EMAIL PROTECTED] wrote:
>> >even if they have ssh access, there is still
On 10/22/06, K F (lists) <[EMAIL PROTECTED]> wrote:
> Where were the politics? I was simply stating the facts.
> -KF
crap, trolls. I just responded to the same person or one of his
friends who disputed the usage of the word their.. damn
It seems to be trying to get a response with a one liner tha
On 10/22/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
> On Sun, 22 Oct 2006 06:29:35 -0500 [EMAIL PROTECTED] wrote:
> >even if they have ssh access, there is still nothing they can do,
> >except
> You said "there" when it should be "their."
Err, this isnt alt.nitpickers.english, and in fac
Where were the politics? I was simply stating the facts.
-KF
> Politics should be avoided at all costs.
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://
==
AROUNDMe 0.6.9 remonte file inclusion
vendor site: http://barnraiser.org/
vulnerable versions: 0.6.9 (and possibly older)
discovered by: noislet ( http://www.noislet.org/ )
vendor informed: 21.10.2006
published: 22.10.2006
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Sun, 22 Oct 2006 06:29:35 -0500 [EMAIL PROTECTED] wrote:
>even if they have ssh access, there is still nothing they can do,
>except
>to create two files in there $HOME directories containing
>expressions from
>paths.h and sysexits.h ?
>
>Why would
Roman Medina-Heigl Hernandez wrote:
>
> More or less according to HP advisory ("HPSBTU02163 SSRT061223") which
> marks the impact as POTENTIAL ("Potential Security Impact: Local execution
> of arbitrary code")
Don't mind the smoke and mirrors. HP always says that. Even with working
root exploits
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1197-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
October 22nd, 2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Sun, 22 Oct 2006 14:49:22 -0500 "K F (lists)"
<[EMAIL PROTECTED]> wrote:
>Roman Medina-Heigl Hernandez wrote:
>>
>> More or less according to HP advisory ("HPSBTU02163 SSRT061223")
>which
>> marks the impact as POTENTIAL ("Potential Security Impac
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200610-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
I had a look to this bug and it seems NOT to be exploitable.
More or less according to HP advisory ("HPSBTU02163 SSRT061223") which
marks the impact as POTENTIAL ("Potential Security Impact: Local execution
of arbitrary code") but just the opp
even if they have ssh access, there is still nothing they can do, except
to create two files in there $HOME directories containing expressions from
paths.h and sysexits.h ?
Why would that be considered a backdoor?
Regards,
-Nikolay Kichukov
> On 10/22/06, J. Oquendo <[EMAIL PROTECTED]> wrote:
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Fri, 20 Oct 2006 22:09:03 -0500 "Alice Bryson
<[EMAIL PROTECTED]>" <[EMAIL PROTECTED]> wrote:
>It's OK anybody start vulnerability research from script(php or
>perl),
>but it's not good for someone to stay at "script kid" level, huh?
>
>-
>mai
On 10/22/06, J. Oquendo <[EMAIL PROTECTED]> wrote:
>
> Plague is an odd proof of concept backdoor keeping
> tool based on the premise of using existing system
> files and commands to keep and maintain a backdoor
> on Linux systems. I could have modified this for
> BSD, Solaris, etc., but I didn't f
15 matches
Mail list logo