lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <04Apr1.094533cest.118756@fd.hif.hu>
From: adam at hif.hu (Szilveszter Adam)
Subject: April 1st is here (joy). now improved

Kurt Seifried wrote:

> If you're going to pull an Apil 1st hoax it's gotta be a bit less obvious
> then this. Although I have no doubt this will send at least a few list
> members into dizzying heights of excitement (I suppose it's cheaper then a
> subscription to playboy ;).

Well if we are into folly anyway :-)

FEAR!FEAR!FEAR!********!ADVISORY!***********FEAR!FEAR!FEAR!

Security Advisory No 0x454564af

We have discovered a serious security hole after OpenBSD 3.4 default 
install!

After successful installation, we proceeded to the garden. There we 
grabbed a carrot and pulled firmly. And whoa, instant root acess! We 
never thought it would be this easy. Really, these sorts of incidents 
should be prevented.

Due to the very serious nature of this bug, we will not disclose PoC at 
this time, esp because the root has already been consumed.

For details visit our homepage

http://www.iamanidiot.com/

******************************************************


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ