lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <403BCDEA.7050601@freebsdchina.org>
From: airsupply at freebsdchina.org (airsupply@...ebsdchina.org)
Subject: SHOUTcast Server 1.8.x remote heap overrun
 exploit binary version

Alexander wrote:

>http://www.securitylab.ru/42976.html (in russian!)
>
>shoutdown.01.tar.gz: SHOUTcast 1.9.2 remote heap overrun exploit. Binds
>rootshell on port 26112.
>
>Note: this is binary version. Compiled on Linux/x86 with gcc3.2. Source code
>wont be distributed.
>
>
>
>Autor: D4rkGr3y of m00 Security
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html
>
>
>  
>
our exp source code at  http://www.0x557.org/release/shoutexp.py


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ