lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <af2a70080802081739p6df9f8c4j9649d6a712d9ff21@mail.gmail.com> Date: Fri, 8 Feb 2008 18:39:31 -0700 From: "Open Phugu" <openphugu@...il.com> To: Full-Disclosure <full-disclosure@...ts.grok.org.uk> Subject: Some Hashes OpenBSD 4.1 sshd remote root exploit (on the default install!): SHA1(screwtheo.tar)=ad1bc1f05afa2cc3ccadb18fabb985394c02ce8d MD5(screwtheo.tar)= cee67df76eaa0706e666cd5c0b8b711c OpenSSH exploit for linux SHA1(screwtheo_linux.tar)=cb6816de43df87193050a497a83cd8f7ab721fbd MD5(screwtheo_linux.tar)=8d65c90d40975556b199a3e1028a5a51 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/