lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200502122108.56300.sflist@digitaloffense.net> Date: Sat, 12 Feb 2005 21:08:56 -0600 From: H D Moore <sflist@...italoffense.net> To: bugtraq@...urityfocus.com Cc: cybertronic@....net Subject: Re: BrightStor ARCserve Backup buffer overflow PoC Cybertronic has confirmed that this is not the same vulnerability as the UDP overflow and that it is not addressed by any available patch from CA. A module for the Metasploit Framework is available from metasploit.com: http://metasploit.com/projects/Framework/exploits.html#cabrightstor_disco_servicepc -HD