Full Disclosure mailing list archives
Rixstep aren't as leet as they thought they were
From: "Rixstep Pwned" <rixstep.pwned () gmail com>
Date: Tue, 16 Jan 2007 00:50:23 +1100
"It may not come as a shocker, but so far the Month of Rixstep Bugs has not netted a single bug." -- http://rixstep.com/1/20070115,00.shtml Maybe because nobody was looking? Here's a nice little exploit to overwrite any file on the system courtesy of Rixstep. Just run Undercover <ftp://rixstep.com/pub/Undercover.tar.bz2> once as an administrator to create that nice little suid-tool. Then run this app giving the path to the uc tool (Undercover.app/Contents/Resources/uc) a file you want to overwrite, and the file the data to overwrite with is located at. The pwnies aren't just for everyone else Rixstep.
Attachment:
rixstep_pwnage.c
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Rixstep aren't as leet as they thought they were Rixstep Pwned (Jan 15)
- Re: Rixstep aren't as leet as they thought they were security curmudgeon (Jan 15)