lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030617043845.GA731@nag.inorganic.org>
From: full-disclosure at ols.inorganic.org (Roy S. Rapoport)
Subject: ExploitLabs - URGENT 0day Alert!!

On Tue, Jun 17, 2003 at 03:31:25AM +0000, Donnie Weiner wrote:
> ------------------------------------------------------------------
> EXPL-NOTHCKR-A1-31337-2003-00010 exploitlabs.com Advisory 00000010
> ------------------------------------------------------------------
>                 -= How To Make A mIRC Bot =-
[...]

Just to make sure I undersand:

You're claiming there's a vulnerability because a tutorial uses a random
given token, and so an 'attacker' could exploit the stupidity of a user
by using that token and waiting for the user to enter the command,
unmodified, using the default token?  And that this is a problem with
the software? And that this is an URGENT issue?

-roy

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ