lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20111110164828.GA26262@sivokote.iziade.m$> Date: Thu, 10 Nov 2011 18:48:28 +0200 From: Georgi Guninski <guninski@...inski.com> To: xD 0x41 <secn3t@...il.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Microsoft Windows vulnerability in TCP/IP Could Allow Remote Code Execution (2588516) On Thu, Nov 10, 2011 at 08:46:44AM +1100, xD 0x41 wrote: > You could just google for IRC packs of win2k src ;) > I know i have a copy of it somewhere... acvtually tho, would not be > helpful tho, as it does not affect win2k.. so i guess there would be > some code there but not the code you want. > > @george > and, ideally if 'years' ago existed for this exploit but, it does only > affect v6 and up , this is tested.... so xp/2k/2k3 not affected... > still, i know people are using other ways anyhow , and thats just how > botting is... one way dies, one takes its place :s > i guess we wait for the rls of this.. maybe! > > as in real life, real bugs die (the imaginary case is not clear to me). i suppose "trustworthy computing" doesn't mean "not many bugs still alive". -- j _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists