funsec mailing list archives
Remote exploit PoC rshd for Windows buffer overflow?
From: "Paul Ferguson" <fergdawg () netzero net>
Date: Tue, 24 Jul 2007 19:20:38 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Seen here: http://securityvulns.com/news/RSHD-Windows/BO.html ...and: http://www.milw0rm.com/exploits/4222 - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.6.2 (Build 2014) wj8DBQFGplECq1pz9mNUZTMRAg+VAKDCFsJsWNH7tkWga6rtRZ99FonIeQCghcBX cBgozpoRwwXsRFsIo8OCtPw= =g+Lt -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/ _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- Remote exploit PoC rshd for Windows buffer overflow? Paul Ferguson (Jul 24)