Full Disclosure mailing list archives
Re: Re: Remote root exploit for mod_gzip (with debug_mode)
From: martin f krafft <madduck () madduck net>
Date: Thu, 20 Nov 2003 22:17:41 +0100
also sprach Ben Nelson <lists () venom600 org> [2003.11.20.2201 +0100]:
I s'pose it's only a 'root' exploit if you're running your webserver as root.
how foolish that would be. asking for trouble... -- martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@madduck invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver! tempt not a desperate man. -- william shakespeare
Attachment:
_bin
Description:
Current thread:
- Remote root exploit for mod_gzip (with debug_mode) Alexander Antipov (Nov 20)
- Re: Remote root exploit for mod_gzip (with debug_mode) martin f krafft (Nov 20)
- Re: Re: Remote root exploit for mod_gzip (with debug_mode) Ben Nelson (Nov 20)
- Re: Re: Remote root exploit for mod_gzip (with debug_mode) martin f krafft (Nov 20)
- Re: Re: Remote root exploit for mod_gzip (with debug_mode) Ron DuFresne (Nov 20)
- Message not available
- Re: Re: Remote root exploit for mod_gzip (with debug_mode) madsaxon (Nov 20)
- Re: Re: Remote root exploit for mod_gzip (with debug_mode) Ben Nelson (Nov 20)
- Re: Remote root exploit for mod_gzip (with debug_mode) martin f krafft (Nov 20)
- Re: Remote root exploit for mod_gzip (with debug_mode) Stephen (Nov 20)
- <Possible follow-ups>
- RE: Re: Remote root exploit for mod_gzip (with debug_mode) Schmehl, Paul L (Nov 20)
- RE: Re: Remote root exploit for mod_gzip (with debug_mode) Frank Knobbe (Nov 20)