Chuq Von Rospach wrote:
someone's trying that new sendmail exploit.
No, the sendmail exploit is based on overflowing a buffer in the
crackaddr() function which is fed with the contents of 'To', 'Cc' and such.
Find the exploit here: http://www.security.nnov.ru/files/linx86_sendmail.c
//Frank
--
WWWWW ________________________
## o o\ / Frank de Lange \
}# \| / +46-734352015 \
\ `--| _/ <Hacker for Hire> \
`---' \ +31-640037120 /
\ frank(_at_)unternet(_dot_)org /
`------------------------'
[ "Omnis enim res, quae dando non deficit, dum habetur
et non datur, nondum habetur, quomodo habenda est." ]
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg