[<prev] [next>] [day] [month] [year] [list]
Message-ID: <F500FA9082772B44AAF40CA747AABF300682741D@exmail02.ago.roadway.com>
From: Tyler.Hudak at roadway.com (Hudak, Tyler)
Subject: RE: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST)
Koec's "exploit" just executes the shell code on your own machine, as
evidenced by this line:
void(*b)()=(void*)shellcode;b();
All the rest of the program does is open a connection to the machine
specified on port 80 and then close it down (as can be safely seen by
removing that line).
I'm not a shellcode expert, so someone else will have to say what it does,
but its probably not pretty.
Unless someone can correct me, I'd avoid running this.
Tyler
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030620/579da0dc/attachment.html
Powered by blists - more mailing lists