Metasploit mailing list archives
GPSD server Format String Exploit
From: senotier at enseirb.fr (SENOTIER Yann)
Date: Sun, 07 Jan 2007 17:52:37 +0100
Hello, Sorry to repost this message but I didn't receive answers. I have coded a module for Berlios GPSD Format String Vulnerability. It is coded in the Perl language for the stable version of metasploit. Are you still developing this version of Metasploit or are you just working on the version 3.0? I can transcript it in ruby so let me know what is the best solution. Thank you very much ian ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program.
Current thread:
- GPSD server Format String Exploit Yann Senotier (Jan 01)
- <Possible follow-ups>
- GPSD server Format String Exploit SENOTIER Yann (Jan 07)
- GPSD server Format String Exploit mmiller at hick.org (Jan 07)
- GPSD server Format String Exploit Dr.Dairon Perez Frias (Jan 07)
- GPSD server Format String Exploit Angelo Rodriguez (Jan 08)