lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1303254690.20050331221418@Sniff-em.com> Date: Thu Mar 31 21:14:38 2005 From: Thierry at sniff-em.com (Thierry Zoller) Subject: BO in http://rad.msn.com/ADSAdClient31.dll Dear Dan Becker, DB> view the source ... its an img tag I haven't said otherwise. We are speaking about a (yet to be proven) BufferOverflow and you send a string the dll produces t some stage... Scott Edwards asked for "the actual dll" as reply you send a file which in fact is just a string. We (would) need binary here for it to be usefull. -- Thierry Zoller