-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
doesnt look remote to me since you need to upload the malicious
.forward file in the home, much a local bug allowing remote exec
rather than a remote bug.
kcope wrote:
Look, it's the Sendmail/postfix the Storybook
wtf? remote exploit? you need an user account and all you get is.. a
command executed by the same user account. Isn't easier just to login on
the box?
CtrlAltCa
kcope wrote:
Look, it's the Sendmail/postfix the Storybook
So a kid posts his first found exploit to every mailing list and you are
going to bash him? If you scare him off or discourage him then we wont get
code and screenshots from his future high-risk 0day.
On Dec 15, 2007 7:29 AM, fabio [EMAIL PROTECTED] wrote:
wtf? remote exploit? you need an