lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <OFE42D74F2.BDA188AB-ON85256CB8.0056FF82@hq.rapid7.com>
From: Joe_Testa at rapid7.com (Joe Testa)
Subject: Test program for CVS double-free.


Greetings--


    Attached to this e-mail you'll find a Java program which probes a
CVS pserver for the recent double-free() vulnerability.
    I've tested it on a Linux architecture only; it would be much
appreciated if people would mail me back with its performance results
against *BSD, AIX, etc...

    Here is how this tool works:


[jdog@...derland jdog]$ java CVSProber 192.168.1.5 jdog chad0wnzme /cvs
Connecting...connected.
Server responded with 'ok', which means that it is not vulnerable.
Probe completed.
[jdog@...derland jdog]$ java CVSProber 192.168.1.7 anonymous /cvs
Connecting...connected.
Server killed the connection and thus appears to be vulnerable!
Probe completed.
[jdog@...derland jdog]$


    Word.


    - Joe Testa, Rapid 7, Inc.
    http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x02B00839
    A145 B158 2CA7 00A2 BAE8  4A18 57E5 18E0 02B0 0839


(See attached file: CVSProber.tar.gz)(See attached file: CVSProber.tar.gz.sig)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: CVSProber.tar.gz
Type: application/octet-stream
Size: 3778 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030124/3657369e/CVSProber.tar.obj
-------------- next part --------------
A non-text attachment was scrubbed...
Name: CVSProber.tar.gz.sig
Type: application/octet-stream
Size: 65 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030124/3657369e/CVSProber.tar.gz.obj

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ