lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <699fb6230601150751g411a742x34418180f7108f59@mail.gmail.com>
Date: Sun Jan 15 15:52:04 2006
From: lolhat at gmail.com (Lol Hat)
Subject: Re: [CIRT.DK] Apple QuickTime 7.0.3 and earlier -
	JPG/PICT Buffer Overflow

On 1/11/06, CIRT.DK Advisory <advisory@...t.dk> wrote:
>
> Apple Quicktime are vulnerable to a buffer overflow in the handling of
> .JPG/.PICT files
>
> Read the full advisory
> http://www.cirt.dk/advisories/cirt-41-advisory.pdf

OMG you're a fucking moron. you control eip and still you can't exploit it
This is for you, Dennis "Solosuck" Rand:
http://img243.imageshack.us/img243/6456/sc27fm.jpg
fd is full disclosure not pussy ass whitehat pdf disclosure...
Whitehats write pdf's. Blackhats write exploits!

--
BLACKHATS SUPPORT NON DISCLOSURE!!!!!111omgcunt
LOLHATS UNITE!!!!!omgomgcirt
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060115/8f03180e/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ