lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.NEB.4.58.0403031614270.24279@sdf.lonestar.org> From: deadbeat at sdf.lonestar.org (Daniel) Subject: Buffer overflow in qmail-qmtpd, yet still qmail much better than windows sooooooooooo close, i reckon you shuold get some that prize fund for finding it though ;) regards, deadbeat On Wed, 3 Mar 2004, Georgi Guninski wrote: > -------------------------------------------------- > [joro@...okote tmp]$ ./qma-qmtpd.pl > qmail-qmtpd buffer overflow. Copyright Georgi Guninski > Cannot be used in vulnerability databases and similar stuff > > <in another terminal> > ps awx > 2080 pts/9 S 0:00 /var/qmail/bin/qmail-qmtpd > gdb attach 2080 > cont > <in first terminal hit enter> > > Program received signal SIGSEGV, Segmentation fault. > 0x0804b096 in alarm () > --------------------------------------------------
Powered by blists - more mailing lists