[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAFB=mGBFBPRcX8u7Cr7fwEHqbrFL3pH2UbqFwKTERd7N=heBVg@mail.gmail.com>
Date: Mon, 2 Sep 2013 21:45:12 +0700
From: king cope <isowarez.isowarez.isowarez@...glemail.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
submissions@...ketstormsecurity.com
Subject: Mikrotik RouterOS 5.* and 6.* sshd remote preauth
heap corruption
Hello lists,
here you find the analysis of a vulnerability I recently discovered.
Mikrotik RouterOS 5.* and 6.* sshd remote preauth heap corruption
http://kingcope.wordpress.com/2013/09/02/mikrotik-routeros-5-and-6-sshd-remote-preauth-heap-corruption/
Additionally it includes a way to drop into a development shell for
recent Mikrotik RouterOS versions.
Cheers :>
Kingcope
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists