Vulnerability Development mailing list archives

Fwd: Returned post for bugtraq () securityfocus com


From: Alex Balayan <abalayan () bigpond net au>
Date: Mon, 03 Sep 2001 15:21:31 +0800


Mailing-List: contact bugtraq-help () securityfocus com; run by ezmlm
Date: 3 Sep 2001 05:04:06 -0000
From: bugtraq-owner () securityfocus com
To: abalayan () bigpond net au
Subject: Returned post for bugtraq () securityfocus com

Hi! This is the ezmlm program. I'm managing the
bugtraq () securityfocus com mailing list.

I'm working for my owner, who can be reached
at bugtraq-owner () securityfocus com.

I'm sorry, your message (enclosed) was not accepted by the moderator.
If the moderator has made any comments, they are shown below.

>>>>> -------------------- >>>>>
vuln-dev :)
<<<<< -------------------- <<<<<
Return-Path: <abalayan () bigpond net au>
Delivered-To: moderator for bugtraq () securityfocus com
Received: (qmail 7221 invoked from network); 2 Sep 2001 22:14:43 -0000
Received: from mail.securityfocus.com (HELO securityfocus.com) (66.38.151.9)
  by lists.securityfocus.com with SMTP; 2 Sep 2001 22:14:43 -0000
Received: (qmail 17135 invoked by alias); 2 Sep 2001 22:14:43 -0000
Received: (qmail 17128 invoked from network); 2 Sep 2001 22:14:42 -0000
Received: from juicer03.bigpond.com (HELO mailin6.bigpond.com) (139.134.6.79)
  by mail.securityfocus.com with SMTP; 2 Sep 2001 22:14:42 -0000
Received: from win2k.bigpond.net.au ([144.135.24.78]) by
          mailin6.bigpond.com (Netscape Messaging Server 4.15) with SMTP
          id GJ23EO00.4LI; Mon, 3 Sep 2001 08:20:48 +1000
Received: from CPE-61-9-179-117.vic.bigpond.net.au ([61.9.179.117]) by bwmam04.mailsvc.email.bigpond.com(MailRouter V2.9i 8329/2383759); 03 Sep 2001 08:20:48
Message-Id: <4.3.2.7.0.20010903081401.02347a08 () pop-server bigpond net au>
X-Sender: abalayan () pop-server bigpond net au
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Mon, 03 Sep 2001 08:15:21 +0800
To: Alexander Yurchenko <grange () rt mipt ru>
From: Alex Balayan <abalayan () bigpond net au>
Subject: Re: Another sendmail exploit
Cc: bugtraq () securityfocus com;, vul-dev () securityfocus com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

Just wondering if there is exploit code for Cobalt systems ? I am conducting an audit and have shell access to the Cobalt Qube 2 systems. AFAIK this exploit will not compile on a cobalt system due to different cpu architecture.


Thanks in advance.


Here's an another sendmail exploit for linux x86.

   Alexander Yurchenko aka grange



Current thread: