lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <00e001c35524$b8014360$0300a8c0@goliath> From: galiarept at phreaker.net (GaLiaRePt) Subject: Remotely exploitable b/o/f in Apache+mod_mylo > There exists a remotely exploitable buffer overflow in the mod_mylo module for > apache. > > It is a relatively obscure MySQL logging module for Apache that appears not to > be in widespread use at present. However, it is present in the FreeBSD ports > collection so may affect FreeBSD slighly more than Linux systems. > > Advisory + exploit attached. Exploit Sourcecode available at : http://www.security-corporation.com/exploits-20030728-000.html Regards, -- GaLiaRePt