Vulnerability Development mailing list archives

Re: OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow


From: Marcell Fodor <m.fodor () mail datanet hu>
Date: 20 Apr 2002 17:29:07 -0000


In-Reply-To: <003201c1e852$7ed5fd00$2a01a8c0 () Asby multiweb nl>

Sorry, the provider took my page down.
It will be available soon again. If you intrested
in the exploit code, drop me a mali.
Marcell

Received: (qmail 20105 invoked from network); 20
Apr 2002 16:45:32 -0000
Received: from outgoing3.securityfocus.com (HELO
outgoing.securityfocus.com) (66.38.151.27)
 by mail.securityfocus.com with SMTP; 20 Apr
2002 16:45:32 -0000
Received: from lists.securityfocus.com
(lists.securityfocus.com [66.38.151.19])

by outgoing.securityfocus.com (Postfix) with QMQP

id 69251A30B7; Sat, 20 Apr 2002 10:42:43 -0600 (MDT)
Mailing-List: contact
vuln-dev-help () securityfocus com; run by ezmlm
Precedence: bulk
List-Id: <vuln-dev.list-id.securityfocus.com>
List-Post: <mailto:vuln-dev () securityfocus com>
List-Help: <mailto:vuln-dev-help () securityfocus com>
List-Unsubscribe:
<mailto:vuln-dev-unsubscribe () securityfocus com>
List-Subscribe:
<mailto:vuln-dev-subscribe () securityfocus com>
Delivered-To: mailing list vuln-dev () securityfocus com
Delivered-To: moderator for
vuln-dev () securityfocus com
Received: (qmail 29663 invoked from network); 20
Apr 2002 09:59:50 -0000
Message-ID: <003201c1e852$7ed5fd00$2a01a8c0@


Current thread: