Re: [Full-disclosure] Sendmail/Postfix Storybook

2007-12-15 Thread [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 doesnt look remote to me since you need to upload the malicious .forward file in the home, much a local bug allowing remote exec rather than a remote bug. kcope wrote: Look, it's the Sendmail/postfix the Storybook

Re: [Full-disclosure] Sendmail/Postfix Storybook

2007-12-15 Thread fabio
wtf? remote exploit? you need an user account and all you get is.. a command executed by the same user account. Isn't easier just to login on the box? CtrlAltCa kcope wrote: Look, it's the Sendmail/postfix the Storybook

Re: [Full-disclosure] Sendmail/Postfix Storybook

2007-12-15 Thread reepex
So a kid posts his first found exploit to every mailing list and you are going to bash him? If you scare him off or discourage him then we wont get code and screenshots from his future high-risk 0day. On Dec 15, 2007 7:29 AM, fabio [EMAIL PROTECTED] wrote: wtf? remote exploit? you need an