Full Disclosure mailing list archives
Re: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST)
From: Gareth Bromley <gbromley () intstar com>
Date: Fri, 20 Jun 2003 18:19:14 +0100 (BST)
On Fri, 20 Jun 2003 koec () hushmail com wrote:
..... SNIP buffer[512 + 1024 + 1] = '\0'; void(*b)()=(void*)shellcode;b(); ..... SNIP
Why post this lame local DoS/Root attempt of executing your 'shellcode' locally? G _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) koec (Jun 20)
- Re: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) Michael (Jun 20)
- Re: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) Eric Chien (Jun 20)
- RE: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) gml (Jun 20)
- Re: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) David M. Wilson (Jun 23)
- RE: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) gml (Jun 20)
- Re: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) Gareth Bromley (Jun 20)
- <Possible follow-ups>
- RE: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) Hudak, Tyler (Jun 20)
- RE: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) mattmurphy () kc rr com (Jun 20)
- Re: RE: Apache 1.3.27 Remote Root 0-Day Exploit (OFFICIAL POST) Christian Friedl (Jun 21)