lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 1 Dec 2012 17:42:50 -0500 From: Jeffrey Walton <noloader@...il.com> To: Aris Adamantiadis <aris@...adc0de.be> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique) On Sat, Dec 1, 2012 at 5:07 PM, Aris Adamantiadis <aris@...adc0de.be> wrote: > Hi Kcope > > You're late on this one: > http://seclists.org/fulldisclosure/2010/Aug/132 It seems there is a disconnect or it appears they got the analysis wrong: "Your "request" was examined. This is nothing more than a null pointer deference, which cannot be easily exploited." > Le 1/12/12 22:26, king cope a écrit : >> (see attachment) >> >> Cheerio, >> >> Kingcope _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists