lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040907062304.20373.qmail@webmail2.aruba.it>
From: dante at alighieri.org (Davide Del Vecchio)
Subject: Re: mpg123 buffer overflow vulnerability

Richard Johnson Scrive: 

> I coded an exploit for that bug for my hacker crew (GOBBLES Security)
> back in 1992 AD. 
> 
> Get with the program, lamer. 
> 
> On Tue, Sep 07, 2004 at 04:16:34AM +0200, Davide Del Vecchio wrote:

that is a different one. Analize it.
Good work, hacker. 

d. 

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Davide Del Vecchio "Dante Alighieri" dante@...ghieri.org ~ dante@...ejack.it
http://www.alighieri.org http://www.bluejack.it http://www.ezln.it
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ