| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: sendmail exploit |
From: Tim Boyer
On Tue, 4 Mar 2003 22:20:16 -0500, "Geo." wrote:
>"Joe Barr" wrote in message
>news:3e643599$1{at}w3.nls.net...
>
>> Name one report of an exploit being found.
>
>From what I know about it you don't need a coded exploit, it's done with a
>simple email. I don't know of any specific compromises that have been
>reported but I know the guys who have had access to this since january and
>it's the sort of thing they couldn't resist trying out at least a couple
>times.
>
>The "security types" had a blast with the ::DATA$ exploit for
NT a few years
>back. This is that sort of an exploit from what I understand of it.
>
>Geo.
>
There's a proof-of-concept out now, and the exploit code should be released
in a couple of days.
--
Tim Boyer
tim{at}denmantire.com
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.