lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu Nov 24 20:51:53 2005 From: Sha0 at badchecksum.com (Sha0lin) Subject: Re: BitchX local root c0ntex writes: > "Presented below is an exploit for BitchX, a linux IRC client. If the > BitchX binary is installed SetUID (to allow SSL access for non root > users for example), an attacker can exploit a stack overflow and gain > root privileges." > > "BitchX local root" > > lies, lies. yes, there is NOT ok this summary, i will request for change it. why this company plagiarized it? well, doesn't matter. thanks
Powered by blists - more mailing lists