lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: Rik.Bobbaers at cc.kuleuven.ac.be (harry)
Subject: ANOTHER 3L33T3 ADVISO AND NOT ON PHP-CASTOR
 10.3 BETA

Rudolf Polzer wrote:

> I didn't expect that you will actually write that since today is
> nowhere April 1th.
> 
> If you now find a DoS in a Brainf*** interpreter by coding an endless
> loop in Brainf*** you are the first one on my gmail killfile - until
> Mar 31th, 2005. Finding the code for an endless loop in Brainf*** will
> be your own problem.

now it's time to quote you, rudolf... on his (frogman) last 
"vulnerability disclosure" with php's include() function, you wrote:

<quote from divzeroATgmailDOTcom on 07/03/2004 06:19 PM>
So your next advisory will be about a BIGBUG in system() - when badly
used, an attacker can execute arbitrary code on your webserver?
</quote>

as you can see... this froggyman is just a kiddie asking for some 
attention. interesting for other kiddies and beginners, but absolutely 
useless for this list (imho)

-- 
harry
aka Rik Bobbaers

K.U.Leuven - LUDIT             -=- Tel: +32 485 52 71 50
Rik.Bobbaers@...kuleuven.ac.be -=- http://harry.ulyssis.org

"\x41\x20\x63\x6f\x6d\x70\x75\x74\x65\x72\x20\x77\x69\x74\x68\x6f\x75\x74\x20"
"\x57\x69\x6e\x64\x6f\x77\x73\x20\x69\x73\x20\x6c\x69\x6b\x65\x20\x61\x20\x66"
"\x69\x73\x68\x20\x77\x69\x74\x68\x6f\x75\x74\x20\x61\x20\x62\x69\x63\x79\x63"
"\x6c\x65\x0a\x00"


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ