Re: [Full-Disclosure] RealVNC server 4.0 remote 'd'dos vulnerabilitywith exploit

2004-08-30 Thread Orhan BAYRAK
Yes it must be just DOS - Original Message - From: KF_lists <[EMAIL PROTECTED]> Date: Mon, 30 Aug 2004 17:39:43 -0400 To: Orhan BAYRAK <[EMAIL PROTECTED]> Subject: Re: [Full-Disclosure] RealVNC server 4.0 remote ddos vulnerabilitywith exploit > And why exactly is

Re: [Full-Disclosure] RealVNC 4.0 remote dos vulnerability with stupid Exploit

2004-08-30 Thread Orhan BAYRAK
i'm working to say that is not ddos it must be just dos.. i hope this mail reach.. - Original Message - From: "Orhan BAYRAK" <[EMAIL PROTECTED]> Date: Tue, 31 Aug 2004 02:58:20 +0800 To: [EMAIL PROTECTED] Subject: [Full-Disclosure] RealVNC 4.0 remote dd

[Full-Disclosure] RealVNC 4.0 remote ddos vulnerability with stupid Exploit

2004-08-30 Thread Orhan BAYRAK
if you try to about 80 or 90 conection request to the VNC server same time.. it gets crash.. i attached a stupid ddos exploit for this hole.. -- __ Check out the latest SMS services @ http://www.linuxmail.org This allows you to send and rece

[Full-Disclosure] RealVNC server 4.0 remote ddos vulnerability with exploit

2004-08-30 Thread Orhan BAYRAK
if you try to connection request about 80 90 times on same time.. it gets a crash.. i attached a ddos exploit to this mail.. -- __ Check out the latest SMS services @ http://www.linuxmail.org This allows you to send and receive SMS through your

[Full-Disclosure] setterm local buffer overflow proof of concept xploit

2004-06-28 Thread Orhan BAYRAK
Hi everybody, there is a buffer overflow in the setterm tool. The bug is in -file argument. the bug is in all setterm versionz. if setterm has 's' perm. the bug may be dangerous. But i did not find any suitable system so that is a proof of concept xploit:p I Attached the code to the this