lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030305194707.15514.qmail@www.securityfocus.com>
Date: 5 Mar 2003 19:47:07 -0000
From: Kryptik Logik <kryptiklogik@...hmail.com>
To: bugtraq@...urityfocus.com
Subject: Sendmail exploit released???




Folks:

Refer to this article in ComputerWorld 
http://www.computerworld.com/securitytopics/security/holes/story/0,10801,79
021,00.html about some Russian Hacker site releasing Sendmail exploit 
code. Is it any different than the LSD exploit code or is is a "security-
guru-security-know-all" reporters mistake?!

The reason this caught my attention is that they say that the exploit has 
been tested only on Slackware Linux 8.0 dist just like LSD advisory says 

This article claims that the Russian hackers wrote it and released it on 
the web first... which kinda irks me off :(

<quote from the article>
... "self-proclaimed security experts located in Nizhny Novgorod, Russia, 
actually produced the exploit and posted it on the Web"
<unquote>

Can anybody confirm/deny this?

# klogik


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ