[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3433.68.209.128.223.1128664940.squirrel@68.209.128.223>
Date: Thu, 6 Oct 2005 23:02:20 -0700 (PDT)
From: advisory@...ecom.org
To: full-disclosure@...ts.grok.org.uk, vuldb@...urityfocus.com,
bugtraq@...urityfocus.com, news@...uriteam.com
Subject: MailEnable W3C Logging Remote Buffer Overflow
Proof of Concept
Attached is a proof of concept for the MailEnable W3C Logging
vulnerability. It features a special type of patching shellcode designed
to quickly and easily secure this vulnerability across your network.
I am releasing this in hopes that other POC writers will follow suit,
releasing exploits that patch the vulnerability rather then exploit it for
a malicious purpose. The reason this is being done is to support the admin
rather then to support the hacker.
View attachment "mailenable.cpp" of type "text/plain" (12469 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists