[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] H9-0001 Advisory: Sphiro HTTPD remote heap overflow (Rosiello Security)



-- .bash_history from the drunken.fi.st box
cd GOBBLES_dvdman
uuencode haxorpc.jpg yo | mail research@xxxxxxxxxxx
--

Please return dvdman's copyright material before continuing any
further communication. Thank you.

On Fri, 30 Apr 2004 00:32:37 -0400, Richard Johnson <thief@xxxxxxxxxxx> wrote:
> 
> On Thu, Apr 29, 2004 at 03:56:50PM -0700, Slotto Corleone wrote:
> > - rave gets his account backdoored on kokanin's box. He finds the
> > obviously placed bindshell stashed as ~/bin/zsh. He laughs and says
> > the backdoor was lame. Well he obviously missed the getpass()
> > LD_PRELOAD, ssh, and passwd all on his local account mailing all his
> > new passwords out. Oh, and he left an exploit (servu.c) in his
> > directory for the version of servu ftpd he was running on his home
> > windows machine. Oops.
> 
> Care to share any additional information on how this described FreeBSD
> kernel bug can be exploited?
> 
> We are ready to pay top dollar for this information, to whoever comes
> forward with it.
> 
> --
> Richard Johnson, CISSP
> Senior Security Researcher
> iDEFENSE Inc.
> thief@xxxxxxxxxxx
> 
> Get paid for security stuff!!!!!!
> http://www.idefense.com/contributor.html
> 
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html