Bugtraq mailing list archives
Happy 3 month anniversary cfingerd remote bug!
From: <zen-parse () gmx net>
Date: Thu, 12 Jul 2001 04:51:24 +1200 (NZST)
Remotish / localish exploit. I wrote this last night, unaware someone else was going to post something today. Here is another exploit for the format string problem in cfingerd<=1.4.3, using a slightly different method for exploiting it. Anti script-kiddied by me being lazy. Exploit redirects fopen() call to popen() and executes code from ~/.nofinger Read the comments. -- zen-parse M4D PR0PZ T0 : Steven for showing me da bugz noid 4 b3in6 7h3r3 wh3n no1 3153 w4z grue 4 lurking, g00bER 4 something and the rest of #roothat @ irc.pulltheplug.com 4150 70 mp3.com 4 http://mp3.com/cosv
Attachment:
idcf.c
Description:
Current thread:
- Happy 3 month anniversary cfingerd remote bug! zen-parse (Jul 11)
- 2.4.x/Slackware Init script vulnerability josh (Jul 16)
- Re: 2.4.x/Slackware Init script vulnerability Derek Martin (Jul 17)
- Re: 2.4.x/Slackware Init script vulnerability Keith Owens (Jul 18)
- secure software philosophy (was Re: 2.4.x/Slackware Init script vulnerability) Derek Martin (Jul 18)
- Re: 2.4.x/Slackware Init script vulnerability Derek Martin (Jul 17)
- Re: 2.4.x/Slackware Init script vulnerability twiz - Perla Enrico (Jul 18)
- Re: 2.4.x/Slackware Init script vulnerability Radu-Adrian Feurdean (Jul 19)
- Re: 2.4.x/Slackware Init script vulnerability twiz - Perla Enrico (Jul 19)
- RE: 2.4.x/Slackware Init script vulnerability Jeev (Jul 19)
- 2.4.x/Slackware Init script vulnerability josh (Jul 16)