lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20071116155534.C326D22844@mailserver10.hushmail.com> Date: Fri, 16 Nov 2007 16:55:34 +0100 From: <netclown@...hmail.com> To: <full-disclosure@...ts.grok.org.uk> Cc: Subject: dangerous vulnerability Anyone knows if this is being exploited in the wild? This could be the an interesting vector for a lot of shit, sold for a few bucks (wasabiLABIA http://wabisabilabi.blogspot.com/2007/11/focus-on-clamav-remote- code-execution.html ) bye, retroborg -- Click for free info on rehab treatments for drug & alcohol dependency. http://tagline.hushmail.com/fc/Ioyw6h4eH4lRpsMCZBDM4uY0HOjWlgiC2F9TCv5GXlxf8VjLMLD9vq/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/