Bugtraq mailing list archives

Re: uTorrent overflow


From: "Gavin Hanover" <netmunky () gmail com>
Date: Wed, 6 Jun 2007 16:51:16 -0700

i tried the suggested exploit

c:\>telnet localhost 62333
<hold down enter>

utorrent 1.61 was unaffected. eventually some random garble was
printed and the connection was closed. utorrent continued normal
operation after the connection was closed.

On 6/4/07, Jon Ribbens <jon+bugtraq2 () unequivocal co uk> wrote:
On Sat, Jun 02, 2007 at 08:15:09PM -0000, Dj.r4iDeN () gmail com wrote:
> if [ "$X" = "y" ];then
> telnet $victamIP $victamport

Um, is it just me, or does this "exploit" do nothing at all?



--
In God we trust,
Everyone else must have an x.509 certificate.


Current thread: