Full Disclosure mailing list archives
Re: Goatse Security EMERGENCY RELEASE - RAMPANT VULNERABILITY SPREADING LIKE WILDFIRE
From: "Ankara" <ankara () taphouse org>
Date: Thu, 23 Jun 2011 13:43:02 -0400
-----Original Message----- From: dikkyheartiez () hotmail com To: full-disclosure () lists grok org uk Date: Tue, 21 Jun 2011 21:12:56 +0000 Subject: [Full-disclosure] Goatse Security EMERGENCY RELEASE - RAMPANT VULNERABILITY SPREADING LIKE WILDFIRE
We've just stumbled upon a few dangerous exploits which can be used in conjunction to wreak havoc in online chatrooms, which could potentially be very dangerous. Home routers running VXWorks, such as the Netgear 614, 624, and Linksys WRT54G v5 routers, allow remote attackers to cause a denial of service by sending a malformed DCC SEND string to an IRC channel, which causes an IRC connection reset,
Gosh I hope you intrepid time travelling adventurers make it back to 2006 to fix this dangerous exploit. End of Line. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Goatse Security EMERGENCY RELEASE - RAMPANT VULNERABILITY SPREADING LIKE WILDFIRE Ankara (Jun 23)