lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY124-DAV1669F46E2FFDEB860B8709D9660@phx.gbl>
Date: Thu, 13 Dec 2007 10:02:41 -0800
From: "Morning Wood" <se_cur_ity@...mail.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Re: Microsoft FTP Client Multiple Bufferoverflow
	Vulnerability

im so hurt now... you make me feel so small compared to your great worx 
MrReepass
stfu kthnx


----- Original Message ----- 
From: "reepex" <reepex@...il.com>
To: "Morning Wood" <se_cur_ity@...mail.com>; 
<full-disclosure@...ts.grok.org.uk>
Sent: Wednesday, December 12, 2007 9:01 PM
Subject: Re: [Full-disclosure] Microsoft FTP Client Multiple Bufferoverflow 
Vulnerability


> wow thats quite impressive.. you couldnt exploit a basic overflow and two
> years later someone else did
>
> you must be quite proud. Did you tell your family and co workers about 
> this
> great finding? I hear tipping point and idefense are hiring you should
> forward them this set of emails.
>
> On Dec 12, 2007 2:38 AM, Morning Wood <se_cur_ity@...mail.com> wrote:
>
>> One of my first advisories and was rediscovered later, turned into a
>> viable
>> exploit 2 years after by another researcher.
>>
>>
>> http://framework.metasploit.com/exploits/view/?refname=windows:ftp:netterm_netftpd_user
>>
>>
>> http://metasploit.com:55555/EXPLOITS?MODE=SELECT&MODULE=%6e%65%74%74%65%72%6d%5f%6e%65%74%66%74%70%64%5f%75%73%65%72%5f%6f%76%65%72%66%6c%6f%77
>>
>> *hugz*
>>
>>
>> ----- Original Message -----
>> From: "reepex" <reepex@...il.com>
>> To: "Morning Wood" <se_cur_ity@...mail.com>;
>> <full-disclosure@...ts.grok.org.uk>
>> Sent: Tuesday, December 11, 2007 1:58 PM
>> Subject: Re: [Full-disclosure] Microsoft FTP Client Multiple
>> Bufferoverflow
>> Vulnerability
>>
>>
>> > are you serious?
>> >
>> >
>> http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2003-07/0259.html
>> >
>> > I guess you are a 'brain dead india wannabe sec researcher' also?
>> >
>> >
>> > On Dec 11, 2007 6:22 AM, Morning Wood <se_cur_ity@...mail.com> wrote:
>> >
>> >> advisories like this are typical of brain dead India wannabe sec
>> >> researchers
>> >> nuff said
>> >>
>> >> _______________________________________________
>> >> Full-Disclosure - We believe in it.
>> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> >> Hosted and sponsored by Secunia - http://secunia.com/
>> >>
>> >
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
> 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ