lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 12 Jun 2008 10:30:30 +0200
From: inode <inode@...iaservice.net>
To: bugtraq@...urityfocus.com, pen-test@...urityfocus.com
Subject: SNMPv3 Authentication Bypass - CVE-2008-0960

I just finished testing my latest code, it's a patch for Net-SNMP 
5.4.1.1 that allow you to exploit the CVE-2008-0960 for bypass the HMAC 
validation on SNMP v3 (multiple vendor affected).

You can download it at:
http://lab.mediaservice.net/code.php#snmpv3

inode

-- 
Agazzini Maurizio                    @ Mediaservice.net S.R.L.
0xF574450C - 09C5 E9A5 E481 D70A 708E DC3B 690D 1A36 F574 450C

"C programmers never die. They are just cast into void."

http://mediaservice.net/disclaimer

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ