Home page logo
/

bugtraq logo Bugtraq mailing list archives

Ending a few arguments with one simple attachment.
From: gobbles () hushmail com
Date: Fri, 21 Jun 2002 21:44:43 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

There seems to be some confusion about whether or not this bug can be exploited on any other operating systems than 
OpenBSD.  Here's a second version of our private exploit, apache-massacre.c, called apache-nosejob.c.  Used correctly, 
it will successfully exploit any vulnerable Free/Net/OpenBSD (x86) machine.

Over the weekend and during next week we'll release a few more pieces of tasty candy, including GeneralCuster.exe, and 
quite possibly apache-massacre.c.

The mailing lists may now return to their normal level of mediocrity until we're ready to publicize some more warez.

- -GOBBLES Security

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wlwEARECABwFAj0UAMIVHGdvYmJsZXNAaHVzaG1haWwuY29tAAoJEBzRp5chmbAPix0A
n3+UQy72ENv6KSwlcDNM12YrLQmdAJ9PTEjb5N4gyGm/hkgdMXjcHTF8pA==
=X2Lc
-----END PGP SIGNATURE-----

Attachment: apache-nosejob.c
Description:

Attachment: apache-nosejob.c.sig
Description:


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault