Full Disclosure mailing list archives
Re: nginx 1.3.9/1.4.0 x86 brute force remote exploit (CVE-2013-2028)
From: Grandma Eubanks <tborland1 () gmail com>
Date: Thu, 11 Jul 2013 09:49:50 -0500
There are already exploits for this vulnerability. This is just taking an entirely different approach for internally accessible systems then what's available, for a reason I can't yet discern. On Thu, Jul 11, 2013 at 9:42 AM, アドリアンヘンドリック <unixfreaxjp22 () gmail com>wrote:
I would like to personally thanked KingCope for this PoC. A great work for the GREATER good impact. Still peeking on the code for tests BUT with very happy feeling,because if this works very well (which I know it will be) then (say) 80+% of the Malware Exploit Kit servers and Malware proxy servers & infectors which mostly are running on NGNIX are ALL affected (hahaha!) A vulnerability for the good guys, and ZERO f*ckin DAY for those bad guys! Seriously. I am saying this out loud in the Full Disclosure maillist for all of the good guys to know and bad guys to start to sweat!! (not provoking anything) (grins) --- Hendrik ADRIAN / @unixfreaxjp #MalwareMUSTDie.org,NPO *king cope* isowarez.isowarez.isowarez at googlemail.com <full-disclosure%40lists.grok.org.uk?Subject=Re%3A%20%5BFull-disclosure%5D%20nginx%201.3.9/1.4.0%20x86%20brute%20force%20remote%20exploit%0A%09%28CVE-2013-2028%29&In-Reply-To=%3CCAFB%3DmGALhq9YhFjFZNMG6kzPjU09KUBMVWpa2Q6%2BfXAKNt8dKQ%40mail.gmail.com%3E> *Wed Jul 10 17:43:56 BST 2013* ------------------------------ (see attachment) Kingcope -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.html> -------------- next part -------------- A non-text attachment was scrubbed... Name: ngxunlock.pl Type: application/octet-stream Size: 23381 bytes Desc: not available URL: <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.obj> _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: nginx 1.3.9/1.4.0 x86 brute force remote exploit (CVE-2013-2028) アドリアンヘンドリック (Jul 11)
- Re: nginx 1.3.9/1.4.0 x86 brute force remote exploit (CVE-2013-2028) Grandma Eubanks (Jul 11)
- Re: nginx 1.3.9/1.4.0 x86 brute force remote exploit (CVE-2013-2028) Valdis . Kletnieks (Jul 11)
- Re: nginx 1.3.9/1.4.0 x86 brute force remote exploit (CVE-2013-2028) Grandma Eubanks (Jul 11)