lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200301261727.h0QHRaD21434@netsys.com> From: qobaiashi at gmx.net (qobaiashi) Subject: format strings vulns in /bin/login and /usr/bin/passwd On Sunday 26 January 2003 09:13, you wrote: > Hello while doing a scan for format strings vulns on util-linux package it > came back with the following results. [...] > There is also a few other on other programs but i thought these 2 would be > most important since passwd is suid and login could be exploited remotly. I > am not very experianced in format strings any help/commets would be great. wow i can't belive it. you really did it? i mean _how_ did you find these bugs? ...back to your implied question: no i will not write an auto-exploit0r script that gives you woot_woot_root on all systems... -q > Would these be able to get exploited? > > Regards > > Faulty@....net > > www.b0f.net >
Powered by blists - more mailing lists