| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: sendmail exploit |
From: "Joe Barr"
On Tue, 04 Mar 2003 22:20:16 +0000, Geo. wrote:
> "Joe Barr" wrote in message
> news:3e643599$1{at}w3.nls.net...
>
>> Name one report of an exploit being found.
>
> From what I know about it you don't need a coded exploit, it's done with a
> simple email. I don't know of any specific compromises that have been
> reported but I know the guys who have had access to this since january and
> it's the sort of thing they couldn't resist trying out at least a couple
> times.
>
> The "security types" had a blast with the ::DATA$ exploit for NT a few
> years back. This is that sort of an exploit from what I understand of it.
>
> Geo.
Still waiting for a single example of this being exploited. Gosh, I can
give you millions of examples of Slammer exploitation. Can't you come up
with one for Sendmail?
--
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.