lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200310131708.32790.carl@learningshophull.co.uk> From: carl at learningshophull.co.uk (Carl Livitt) Subject: Working proftpd remote root exploit Attached is a remote root, chroot-breaking brute-force exploit for the \n processing bug in ProFTPd 1.2.7 - 1.2.9rc2. It has been tested successfully on SuSE 8.0/8.1 & RedHat 7.2 and 8.0. Note: it is noisy and leaves a lot of mess (ie, bad uploaded text files) on the target server. It is left as an excercise for the reader to remove these or rework the exploit to do the deletion. Cheers, Haggis -------------- next part -------------- A non-text attachment was scrubbed... Name: proft_put_down.c Type: text/x-csrc Size: 20280 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031013/3bf074c9/proft_put_down.bin
Powered by blists - more mailing lists