Full Disclosure mailing list archives
Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control
From: Shawn Merdinger <shawnmer () gmail com>
Date: Mon, 2 Feb 2009 08:27:02 -0500
On Fri, Jan 30, 2009 at 12:07 PM, <Valdis.Kletnieks () vt edu> wrote:
On Thu, 29 Jan 2009 17:04:53 CST, hack ery said:Security Risk: High Exploitable: Local Vulnerability: Arbitrary Flow Control Control, Cat Spoofing Discovered by: The Hackery ChannelNote the additional possibility of a brute force attack: http://icanhascheezburger.files.wordpress.com/2009/01/funny-pictures-your-cat-is-ready-to-admit-he-gained-weight.jpg
There's also potential for a low-silhouette piggyback attack vector: http://loganbay.org/wp-content/uploads/2007/10/thundercat.jpg Cheers, --scm _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Michael Simpson (Feb 02)
- Message not available
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Nancy Kramer (Feb 02)
- Message not available
- <Possible follow-ups>
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Shawn Merdinger (Feb 02)