Vulnerability Development mailing list archives
Re: OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow
From: Marcell Fodor <m.fodor () mail datanet hu>
Date: 20 Apr 2002 17:29:07 -0000
In-Reply-To: <003201c1e852$7ed5fd00$2a01a8c0 () Asby multiweb nl> Sorry, the provider took my page down. It will be available soon again. If you intrested in the exploit code, drop me a mali. Marcell
Received: (qmail 20105 invoked from network); 20
Apr 2002 16:45:32 -0000
Received: from outgoing3.securityfocus.com (HELO
outgoing.securityfocus.com) (66.38.151.27)
by mail.securityfocus.com with SMTP; 20 Apr
2002 16:45:32 -0000
Received: from lists.securityfocus.com
(lists.securityfocus.com [66.38.151.19])
by outgoing.securityfocus.com (Postfix) with QMQP
id 69251A30B7; Sat, 20 Apr 2002 10:42:43 -0600 (MDT)
Mailing-List: contact
vuln-dev-help () securityfocus com; run by ezmlm
Precedence: bulk List-Id: <vuln-dev.list-id.securityfocus.com> List-Post: <mailto:vuln-dev () securityfocus com> List-Help: <mailto:vuln-dev-help () securityfocus com> List-Unsubscribe:
<mailto:vuln-dev-unsubscribe () securityfocus com>
List-Subscribe:
<mailto:vuln-dev-subscribe () securityfocus com>
Delivered-To: mailing list vuln-dev () securityfocus com Delivered-To: moderator for
vuln-dev () securityfocus com
Received: (qmail 29663 invoked from network); 20
Apr 2002 09:59:50 -0000
Message-ID: <003201c1e852$7ed5fd00$2a01a8c0@
Current thread:
- OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow Marcell Fodor (Apr 19)
- <Possible follow-ups>
- Re: OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow Marcell Fodor (Apr 20)
- Message not available
- Message not available
- Message not available
- Re: OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow Rio Martin. (Apr 20)
- Message not available