RE: header based explotation

From: Brett Moore (brett@softwarecreations.co.nz)
Date: Sun Jun 09 2002 - 17:35:42 EDT


The lastest Host head buffer overflow for jrun.
http://www.nextgenss.com/advisories/jrun.txt

Brett

> -----Original Message-----
> From: Powertech [mailto:r2d2@getrewted.com.ar]
> Sent: Saturday, 8 June 2002 09:24
> To: pen-test@securityfocus.com
> Subject: header based explotation
>
>
> hi folks
> does any body have succeded exploitig this kind of vuln
> explained in the paper that can be found in:
> http://www.cgisecurity.com/papers/header-based-explotation.txt
> or attached in this mail
> if anybody knows software that is vulnerable to this issue please
> name it.
> thanks in advance
>
> --
> Once at a social gathering, Gladstone said to Disraeli, "I
> predict, Sir, that
> you will die either by hanging or of some vile disease".
> Disraeli replied,
> "That all depends, Sir, upon whether I embrace your principles or your
> mistress."
>
>

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:22 EDT