lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: j at pureftpd.org (Jedi/Sector One)
Subject: /Claimed/ remote root exploit in Pureftpd

On Sat, Jun 14, 2003 at 01:55:01AM +0530, Devdas Bhagat wrote:
> <dilema> PureFTPD (1.x.x) linux/x86 remote ROOT exploit.
> <dilema>
> !PRIVATE!***!PRIVATE!***!PRIVATE!***!PRIVATE!***!PRIVATE!***!PRIVATE!***!PRIVATE!
> <dilema> MUHAHAHAHA
> <dilema> lmao it's an 0-day fizewl
> <dilema> Linux/x86 PureFTPD remote exploit.
> <dilema> usage: ./pure [options]
> <dilema>         -c      remote host to connect to
> <dilema>         -o      remote port to use
> <dilema>         -u      remote username
> <dilema>         -p      remote password
> <dilema>         -i      get the password interactively
> <dilema>         -t      predefined target ("-t list" to list all
> targets)
> <dilema>         -d      writeable directory
> <dilema>         -l      shellcode address
> <dilema>         -v      debug level [0-2]
> <dilema>         -s      seconds to sleep after login (debugging
> purposes)
> <dilema>         -h      display this help

  Unless it is something totally different with exactly the same name and
the same help text, this fake 0 day is at least 6 months old. You can grab
it here : ftp://ftp.fr.pureftpd.org/misc/pureftps-fake.c

  That one relies on things that don't even exist in Pure-FTPd like CWD
globbing. Also as non-printable characters are replaced by underscores, the
shellcode should be at least changed a bit to be credible.

-- 
 __  /*-      Frank DENIS (Jedi/Sector One) <j@...Networks.Com>     -*\  __
 \ '/    <a href="http://www.PureFTPd.Org/"> Secure FTP Server </a>    \' /
  \/  <a href="http://www.Jedi.Claranet.Fr/"> Misc. free software </a>  \/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ