Full Disclosure mailing list archives
Re: dkftpbench 0.45 (Platoon:init) Local buffer overflow vulnerability
From: 3APA3A <3APA3A () SECURITY NNOV RU>
Date: Tue, 20 Mar 2007 17:27:05 +0300
Dear starcadi, Again, a very effective way for user to exploit himself. How can you elevate your privileges that way? Is dkftpbench suid? --Monday, March 19, 2007, 10:32:27 PM, you wrote to full-disclosure () lists grok org uk: s> Description: s> dkftpbench is an FTP benchmark program inspired by SPECweb99. The s> $ dkftpbench -n1 -hlocalhost -p21 -u test -p`perl -e "print 'A'x135"` s> -v1 Segmentation fault $ -- ~/ZARAZA http://securityvulns.com/ Почтенные ископаемые! Жду от вас дальнейших писем. (Твен) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- dkftpbench 0.45 (Platoon:init) Local buffer overflow vulnerability starcadi (Mar 19)
- Re: dkftpbench 0.45 (Platoon:init) Local buffer overflow vulnerability 3APA3A (Mar 20)
- Re: dkftpbench 0.45 (Platoon:init) Local buffer overflow vulnerability starcadi (Mar 20)
- Re: dkftpbench 0.45 (Platoon:init) Local buffer overflow vulnerability 3APA3A (Mar 20)