lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <403F81AF.60302@freebsdchina.org> From: airsupply at freebsdchina.org (airsupply@...ebsdchina.org) Subject: RE: [vulnwatch] Serv-U MDTM Command Buffer Overflow Vulnerability SecMail wrote: >The vuln isn't working on my win2000 adv server sp3 in my test network. >I tried both the exploit and manually inputting the string. >I'm not quite sure what to write that off as. > >Has it worked on anyone? > > > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.netsys.com/full-disclosure-charter.html > > > > hmm,which version of your serv-u? serv-u 5.0.0.4 wont work. others can be expolit.