Vulnerability Development mailing list archives

Re: Remote exploitation of network scanners?


From: Paul Cardon <paul () MOQUIJO COM>
Date: Fri, 25 Aug 2000 14:02:17 -0400

Lincoln Yeoh wrote:

Hypothetical scenario:
A scanner requiring remote input scans a targeted host, looking for replies.
The targeted host replies with exceptional input causing the scanner to run
arbitrary code (buffer overflow etc etc), probably with the privileges of
the user running that scanner.

Real scenario:

This happened to an early version of ISS.  I believe it was discovered
by Mudge or somebody else at the L0pht.

-paul


Current thread: