Bugtraq mailing list archives
Re: uTorrent overflow
From: "Gavin Hanover" <netmunky () gmail com>
Date: Wed, 6 Jun 2007 16:51:16 -0700
i tried the suggested exploit c:\>telnet localhost 62333 <hold down enter> utorrent 1.61 was unaffected. eventually some random garble was printed and the connection was closed. utorrent continued normal operation after the connection was closed. On 6/4/07, Jon Ribbens <jon+bugtraq2 () unequivocal co uk> wrote:
On Sat, Jun 02, 2007 at 08:15:09PM -0000, Dj.r4iDeN () gmail com wrote: > if [ "$X" = "y" ];then > telnet $victamIP $victamport Um, is it just me, or does this "exploit" do nothing at all?
-- In God we trust, Everyone else must have an x.509 certificate.
Current thread:
- uTorrent overflow Dj . r4iDeN (Jun 04)
- Re: uTorrent overflow Jon Ribbens (Jun 06)
- Re: uTorrent overflow Andreas Beck (Jun 07)
- Re: uTorrent overflow Gavin Hanover (Jun 07)
- Message not available
- Re: uTorrent overflow Pavel Konov (Jun 07)
- Re: uTorrent overflow Jon Ribbens (Jun 06)
- <Possible follow-ups>
- Re: uTorrent overflow Dj . r4iDeN (Jun 06)