Full Disclosure mailing list archives

Remote exploit and vulnerability scanner for the OpenSSL KEY_ARG buffer overflow


From: core () bokeoa com (Charles Stevenson)
Date: Tue, 17 Sep 2002 15:27:03 -0600

--PbbHfEnWDsNVBNcp
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Solar, all,

I've been able to exploit this on Yellow Dog Linux and surely others
such as Mandrake/ppc, SUSE/ppc, etc.. So if you run one of these
distros please urge the port maintainer to provide updates. At some
point I will release a patch which will add support for linux/ppc
arch. There is a target for YDL 2.3 default install provided but it
won't do you much good without the rest of the code unless you're drow
or palante perhaps ;)

Best Regards,
Charles Stevenson

--=20
  Charles Stevenson (core) <core () bokeoa com>
  Lab Assistant, College of Eastern Utah San Juan Campus=20
  http://www.bokeoa.com/~core/core.asc


--PbbHfEnWDsNVBNcp
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9h54nGAuLrxOyeJMRApA4AJ9JXBPFEQavvg9l/CXb3j+/qDcGOgCg6EHa
gTBC0Pl9wTqEPT/SBReLCLg=
=2Rgm
-----END PGP SIGNATURE-----

--PbbHfEnWDsNVBNcp--


Current thread: