lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: auto94042 at hushmail.com (auto94042@...hmail.com) Subject: Fwd: Re: xbl vulnerabilty -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 holos everyone < this is the last that shy jo and me share the word but he blow me off BIG time(he send me to the /dev/null) and than i see debian make xbl advisery but not thank me for the hard work - - fellows please make notice that i do not make xploit for this one for : A) reason -> xbl is to addditive for my taste, you drop the block in place and rack the points for hiscore -> leads to : B) reason -> nobody makes a baboon out of my sweat to earn the hi score buddy ! gid games is art licnese to f$ck with the hi score file and there is no way my highscores are being hijackered ! ! xploit is giving bullets to the gun when it comes to my highscores . maybe i make some xploit for some such other thign next time you see me - ----- Forwarded Message from auto94042@...hmail.com ----- holos shy jo , any lose frame of time on this one ? i like to get the props but i also like - - - hey let this guy fix the bug ! specialy since i play xbl to much that it is hard to make xploit since distracten is so high ! but not a worry dude i make patienc to wait to see the fix before the props yah i know my english is ASS On Sun, 29 Jun 2003 18:51:01 -0700 Joey Hess <joey@...enet.net> wrote: >auto94042@...hmail.com wrote: >> if ( strcmp(argv[i],"-display")==0 ) >> strcpy(bl.opt.displayname,argv[i+1]) ; >> >> this guy - >> http://ftp.debian.org/debian/pool/main/x/xbl/xbl_1.0k-5.diff.gz >> >> does not to fix it ! !@ >> >> it makes for a monkey biz like this one : >> >> [user@...alhost]$ /usr/X11R6/bin/xbl -display `perl -e 'print >"A" x 1500'` >> Segmentation fault > >You're right, and there are some more of them too. I've fixed those >I >could find and we'll be doing another security announcement, I guess. > >-- >see shy jo > -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.3 wkYEARECAAYFAj8LmDUACgkQarKSBij8yILWfwCfWTsMOzw8gpWkT9XWc/RTNceQCMEA nRtGy39sqTAQTrJXhny7TQb1emzo =zm7Q -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427
Powered by blists - more mailing lists