|
Re: lug-bg: apache remote vulnerability
- Subject: Re: lug-bg: apache remote vulnerability
- From: firedust@xxxxxxx (Stanislav "Lechev [AngelFire])
- Date: 21 Jun 2002 11:41:46 +0300
ne bydi prekaleno siguren che samo windows i 64bit unix sa exploitable
Attached is a remote Apache 1.3.X exploit for the "chunking"
vulnerability. This version of the exploit works only on OpenBSD.
"Experts" have argued as to why this is not exploitable on x86/*nix.
This version of the exploit has been modified to convince these
"experts" that they are wrong. Further, it is very ./friendly and all
scriptkids/penetration testers should be able to run it without any
trouble.
My God have mercy on our souls.
- -GOBBLES Security
On Fri, 2002-06-21 at 10:11, yasho wrote:
> Az sym typ i ne razbiram - shto nqkoi ne zeme da mi obiasni kakyv mi e problema kato izlezne klienta sys SEGFAULT i zatvoria connection-a ? a?
> Ili moje bi vie polzvat 64-bit Unixi ili Winboze ili Netware ?
> --
> Get your free email from www.linuxmail.org
>
--
-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-
Regards, AngelFire
Stanislav Lechev <firedust@xxxxxxx>
PGP Key: http://firedust.vega.bg/pgp/StanislavLechev.asc
Vega Internet Service Provider (tm) -- http://www.vega.bg
-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-=#=-
<HR>
<UL>
<LI>application/pgp-signature \\\\\\\\\ \\\\: signature.asc_
</UL>
============================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers).
http://www.linux-bulgaria.org - Hosted by Internet Group Ltd. - Stara Zagora
To unsubscribe: http://www.linux-bulgaria.org/public/mail_list.html
============================================================================
|
|
|