mailing list archives
Remote Apache 1.3.x Exploit
From: gobbles () hushmail com
Date: Wed, 19 Jun 2002 12:45:24 -0700
-----BEGIN PGP SIGNED MESSAGE-----
This is for immediate release. This may not be sent to any "advanced warning system", such as ARIS. This was written
for the community, and not just a few companies with deep pockets full of the big dollar.
Attached is a remote Apache 1.3.X exploit for the "chunking" vulnerability. This version of the exploit works only on
OpenBSD. "Experts" have argued as to why this is not exploitable on x86/*nix. This version of the exploit has been
modified to convince these "experts" that they are wrong. Further, it is very ./friendly and all
scriptkids/penetration testers should be able to run it without any trouble.
My God have mercy on our souls.
- -GOBBLES Security
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com
-----END PGP SIGNATURE-----
- Remote Apache 1.3.x Exploit gobbles (Jun 20)