ietf-asrg
[Top] [All Lists]

Re: [Asrg] Scrambled headers?

2003-03-21 11:59:09
Chuq Von Rospach wrote:
someone's trying that new sendmail exploit.

No, the sendmail exploit is based on overflowing a buffer in the
crackaddr() function which is fed with the contents of 'To', 'Cc' and such.

Find the exploit here: http://www.security.nnov.ru/files/linx86_sendmail.c

//Frank


--
   WWWWW      ________________________
  ## o o\    /     Frank de Lange     \
  }#   \|   /      +46-734352015       \
   \ `--| _/     <Hacker for Hire>      \
    `---'  \       +31-640037120        /
            \    frank(_at_)unternet(_dot_)org    /
             `------------------------'
  [ "Omnis enim res, quae dando non deficit, dum habetur
     et non datur, nondum habetur, quomodo habenda est."  ]


_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg



<Prev in Thread] Current Thread [Next in Thread>