Full Disclosure mailing list archives
Re: FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique)
From: Jeffrey Walton <noloader () gmail com>
Date: Sat, 1 Dec 2012 17:42:50 -0500
On Sat, Dec 1, 2012 at 5:07 PM, Aris Adamantiadis <aris () 0xbadc0de be> wrote:
Hi Kcope You're late on this one: http://seclists.org/fulldisclosure/2010/Aug/132
It seems there is a disconnect or it appears they got the analysis wrong: "Your "request" was examined. This is nothing more than a null pointer deference, which cannot be easily exploited."
Le 1/12/12 22:26, king cope a écrit :(see attachment) Cheerio, Kingcope
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique) king cope (Dec 01)
- Re: FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique) Aris Adamantiadis (Dec 01)
- Re: FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique) Jeffrey Walton (Dec 01)
- Re: FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique) Aris Adamantiadis (Dec 02)
- Re: FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique) Jeffrey Walton (Dec 01)
- Re: FreeFTPD Remote Authentication Bypass Zeroday Exploit (Stuxnet technique) Aris Adamantiadis (Dec 01)