lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <3EF2F958.7090401@snosoft.com> From: dotslash at snosoft.com (KF) Subject: Apache 1.3.27 Remote Root 0-Day Michael wrote: >Can anyone confirm/dispute? > > Its not the first time I have heard of this... I have not seen the code myself though... Its supposed to be written by a 4 letter group that has in the past put out some pretty nice exploit code. No one has enlightened me about the details either just simply that there is a piece of code floating around. Could be the standard trick a script kiddie trojan as well. -KF