lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20031030153721.9B121397C@sitemail.everyone.net>
Date: Thu, 30 Oct 2003 07:37:21 -0800 (PST)
From: Bipin Gautam <door_hUNT3R@...ckcodemail.com>
To: tim-security@...tinelchicken.org
Cc: full-disclosure@...ts.netsys.com, secure@...rosoft.com,
   bugtraq@...urityfocus.com
Subject: Re: Shortcut...... may cause 100% cpu use!!!


hi,
well, dude... Its a similar bug but not the same!!! do you consider every bufferoverflow exploit the same???


see... you didn't read the shit clearly !!! WELL, here [in this discovery] the shortcut is pointing to itself........ 

[ not to a different file...... as you inicated in.......http://www.securityfocus.com/archive/1/315151] ya..... IF YOU MAKE A TWO SHORTCUT THAT POINT TO EACHOTHER, <at the moment i am using winxp> nothing happens......[ i feel its patched]


BUT THE POINT HERE IS....... THE SHORTCUT IS POINTING TO ITSELF  WHICH WILL EVENTUALLY LEAD TO A DOS!!!

PLEASE READ IT BEFORE YOU POST!!!

---------------

>I haven't looked at your shortcut file(s) yet, but it sounds like the
>same as: 
>  http://www.securityfocus.com/archive/1/315151

>If you find something like this on your own, at least do a *little*
>googling before reporting to a list.  Else, sound like a fool.  If you
>re blatantly ripping off other peoples' stuff, well, shame on you.

>tim


_____________________________________________________________
Secure mail ---> http://www.blackcode.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ