lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030406095249.24742.qmail@hackermail.com>
From: xploit at hackermail.com (dong-h0un U)
Subject: *BSD passlogd remote root exploit.


Made out *BSD exploit.
It works in OpenBSD 3.0, FreeBSD 4.6.2-RELEASE.

For reference, FreeBSD includes passlogd-0.1d port:
http://www.freebsd.org/cgi/cvsweb.cgi/ports/net/passlogd/

Proof of Concept exploit:
http://x82.inetcop.org/h0me/c0de/0x82-Remote.XxxxBSD_passlogd.xpl.c


--
Thank you.


-- 
_______________________________________________
Get your free email from http://www.hackermail.com

Powered by Outblaze

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ