Re: OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow

From: Marcell Fodor (m.fodorat_private)
Date: Sat Apr 20 2002 - 10:29:07 PDT

  • Next message: Filip Maertens: "Remote MS02-18 Patch Checker"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <003201c1e852$7ed5fd00$2a01a8c0at_private>
    
    Sorry, the provider took my page down.
    It will be available soon again. If you intrested
    in the exploit code, drop me a mali.
    Marcell
    
    >Received: (qmail 20105 invoked from network); 20
    Apr 2002 16:45:32 -0000
    >Received: from outgoing3.securityfocus.com (HELO
    outgoing.securityfocus.com) (66.38.151.27)
    >  by mail.securityfocus.com with SMTP; 20 Apr
    2002 16:45:32 -0000
    >Received: from lists.securityfocus.com
    (lists.securityfocus.com [66.38.151.19])
    >
    by outgoing.securityfocus.com (Postfix) with QMQP
    >
    id 69251A30B7; Sat, 20 Apr 2002 10:42:43 -0600 (MDT)
    >Mailing-List: contact
    vuln-dev-helpat_private; run by ezmlm
    >Precedence: bulk
    >List-Id: <vuln-dev.list-id.securityfocus.com>
    >List-Post: <mailto:vuln-devat_private>
    >List-Help: <mailto:vuln-dev-helpat_private>
    >List-Unsubscribe:
    <mailto:vuln-dev-unsubscribeat_private>
    >List-Subscribe:
    <mailto:vuln-dev-subscribeat_private>
    >Delivered-To: mailing list vuln-devat_private
    >Delivered-To: moderator for
    vuln-devat_private
    >Received: (qmail 29663 invoked from network); 20
    Apr 2002 09:59:50 -0000
    >Message-ID: <003201c1e852$7ed5fd00$2a01a8c0@
    



    This archive was generated by hypermail 2b30 : Sat Apr 20 2002 - 11:16:48 PDT