lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 27 Nov 2012 09:41:09 +0400 From: gremlin@...mlin.ru To: full-disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: Remote Command Execution on Cisco WAG120N On 26-Nov-2012 11:47:37 +0200, Julius Kivim?ki wrote: > Is a privilege escalation vulnerability in Linux not a > vulnerability if it requires authentication? Depends of the ratio between credentials supplied and access gained. Is the `ssh root@...alhost` a vulnerability? -- Alexey V. Vissarionov aka Gremlin from Kremlin <gremlin ПРИ gremlin ТЧК ru> GPG key ID: 0xEF3B1FA8, keyserver: hkp://subkeys.pgp.net GPG key fingerprint: 8832 FE9F A791 F796 8AC9 6E4E 909D AC45 EF3B 1FA8 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists