lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BAY23-F15CC71AC1294A69D639F62A9BA0@phx.gbl>
Date: Fri, 26 Nov 2004 06:47:15 +0000
From: "Gyan chawdhary" <gunnu45@...mail.com>
To: bugtraq@...urityfocus.com
Cc: vuln-dev@...urityfocus.com.com, da@...urityfocus.com
Subject: php 4.3.7 memory limit POC exploit

Hi all,

Attached  is an old POC I had written for the php memory limit vuln. It 
works
well on php 4.3.7 with 2.0.49 apache. But its not an elegant solution.

http://www.felinemenace.org/~gyan/phpnolimit.c

have fun,

Gyan

_________________________________________________________________
Choose what you want to read. Protect your mail from spam. 
http://server1.msn.co.in/sp04/hotmailspamcontrol/  Win the war in 9 steps!

View attachment "phpnolimit.c" of type "text/plain" (8110 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ