lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20030406095249.24742.qmail@hackermail.com> From: xploit at hackermail.com (dong-h0un U) Subject: *BSD passlogd remote root exploit. Made out *BSD exploit. It works in OpenBSD 3.0, FreeBSD 4.6.2-RELEASE. For reference, FreeBSD includes passlogd-0.1d port: http://www.freebsd.org/cgi/cvsweb.cgi/ports/net/passlogd/ Proof of Concept exploit: http://x82.inetcop.org/h0me/c0de/0x82-Remote.XxxxBSD_passlogd.xpl.c -- Thank you. -- _______________________________________________ Get your free email from http://www.hackermail.com Powered by Outblaze