Full Disclosure mailing list archives
Re: Apache 2.2.17 exploit?
From: Andrew Farmer <andfarm () gmail com>
Date: Mon, 3 Oct 2011 08:20:23 -0700
On 2011-10-03, at 07:31, Darren Martyn wrote:
I regularly trawl Pastebin.com to find code - often idiots leave some 0day and similar there and it is nice to find. Well, seeing as I have no test boxes at the moment, can someone check this code in a VM? I am not sure if it is legit or not.
Totally fake:
execl("/bin/sh", "sh", "-c", evil, 0);
That's taking "shellcode" in a much different direction than I've seen in the past. ;) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Apache 2.2.17 exploit?, (continued)
- Re: Apache 2.2.17 exploit? xD 0x41 (Oct 04)
- Re: Apache 2.2.17 exploit? halfdog (Oct 04)
- Re: Apache 2.2.17 exploit? halfdog (Oct 04)
- Re: Apache 2.2.17 exploit? Andrew Farmer (Oct 04)
- Re: Apache 2.2.17 exploit? GloW - XD (Oct 03)
- Re: Apache 2.2.17 exploit? nix (Oct 03)
- Re: Apache 2.2.17 exploit? GloW - XD (Oct 03)
- Re: Apache 2.2.17 exploit? Laurelai (Oct 03)
- Re: Apache 2.2.17 exploit? GloW - XD (Oct 03)
- Re: Apache 2.2.17 exploit? xD 0x41 (Oct 04)
- Re: Apache 2.2.17 exploit? adam (Oct 04)
- Re: Apache 2.2.17 exploit? VeNoMouS (Oct 04)
- Re: Apache 2.2.17 exploit? adam (Oct 04)
- Re: Apache 2.2.17 exploit? xD 0x41 (Oct 04)