Full Disclosure mailing list archives
Remote exploit and vulnerability scanner for the OpenSSL KEY_ARG buffer overflow
From: core () bokeoa com (Charles Stevenson)
Date: Tue, 17 Sep 2002 15:27:03 -0600
--PbbHfEnWDsNVBNcp Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Solar, all, I've been able to exploit this on Yellow Dog Linux and surely others such as Mandrake/ppc, SUSE/ppc, etc.. So if you run one of these distros please urge the port maintainer to provide updates. At some point I will release a patch which will add support for linux/ppc arch. There is a target for YDL 2.3 default install provided but it won't do you much good without the rest of the code unless you're drow or palante perhaps ;) Best Regards, Charles Stevenson --=20 Charles Stevenson (core) <core () bokeoa com> Lab Assistant, College of Eastern Utah San Juan Campus=20 http://www.bokeoa.com/~core/core.asc --PbbHfEnWDsNVBNcp Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9h54nGAuLrxOyeJMRApA4AJ9JXBPFEQavvg9l/CXb3j+/qDcGOgCg6EHa gTBC0Pl9wTqEPT/SBReLCLg= =2Rgm -----END PGP SIGNATURE----- --PbbHfEnWDsNVBNcp--
Current thread:
- Remote exploit and vulnerability scanner for the OpenSSL KEY_ARG buffer overflow Solar Eclipse (Sep 17)
- Remote exploit and vulnerability scanner for the OpenSSL KEY_ARG buffer overflow Charles Stevenson (Sep 17)