Full Disclosure mailing list archives
Re: About eMule web server "Buffer Overflow" discovered vulnerability
From: "Lorenzo Hernandez Garcia-Hierro" <lorenzohgh () nsrg-security com>
Date: Fri, 24 Oct 2003 18:57:30 +0200
sorry , i sent the message only to nathan, ;-) here is it. best regards. ----- Original Message ----- From: "Lorenzo Hernandez Garcia-Hierro" <lorenzohgh () nsrg-security com> To: <nathan.grandbois () cerdant com> Sent: Friday, October 24, 2003 6:56 PM Subject: Re: [Full-disclosure] About eMule web server "Buffer Overflow" discovered vulnerability
Hi nathan, yeah , its many common to use in a bad context. many common when somebody talks about a thing that it's not known. ;-) FOR ALL MEMBERS: is somebody going to stay in spanish SIMO TCI ??? ( like the 3 and other technology meetings ) its really good except some stands: Microsoft -> The worst dj's of the world The spin cow shits .-SPANISH GOVERNMENT-. MCIT -> The worst i+d help to little enterprises The worst services Pure liers about high band connections , they promise cheaper connections but they don't do nothing !!! Best regards to all, ------------------------------- 0x00->Lorenzo Hernandez Garcia-Hierro 0x01->\x74\x72\x75\x6c\x75\x78 0x02->The truth is out there, 0x03-> outside your mind . __________________________________ PGP: Keyfingerprint 4ACC D892 05F9 74F1 F453 7D62 6B4E B53E 9180 5F5B ID: 0x91805F5B ********************************** \x6e\x73\x72\x67 \x73\x65\x63\x75\x72\x69\x74\x79 \x72\x65\x73\x65\x61\x72\x63\x68 http://www.nsrg-security.com ______________________ ----- Original Message ----- From: "Nathan" <nathan.grandbois () cerdant com> To: "'Lorenzo Hernandez Garcia-Hierro'" <lorenzohgh () nsrg-security com> Sent: Friday, October 24, 2003 6:51 PM Subject: RE: [Full-disclosure] About eMule web server "Buffer Overflow" discovered vulnerabilityI agree, people use it in the wrong context very often. -----Original Message----- From: Lorenzo Hernandez Garcia-Hierro [mailto:lorenzohgh () nsrg-security com] Sent: Friday, October 24, 2003 12:02 PM To: nathan.grandbois () cerdant com Subject: Re: [Full-disclosure] About eMule web server "Buffer Overflow" discovered vulnerability Thanks Nathan. it seems a stupid expression xD best regards, ------------------------------- 0x00->Lorenzo Hernandez Garcia-Hierro 0x01->\x74\x72\x75\x6c\x75\x78 0x02->The truth is out there, 0x03-> outside your mind . __________________________________ PGP: Keyfingerprint 4ACC D892 05F9 74F1 F453 7D62 6B4E B53E 9180 5F5B ID: 0x91805F5B ********************************** \x6e\x73\x72\x67 \x73\x65\x63\x75\x72\x69\x74\x79 \x72\x65\x73\x65\x61\x72\x63\x68 http://www.nsrg-security.com ______________________ ----- Original Message ----- From: "Nathan" <nathan.grandbois () cerdant com> To: "'Lorenzo Hernandez Garcia-Hierro'" <lorenzohgh () nsrg-security com> Sent: Friday, October 24, 2003 6:04 PM Subject: RE: [Full-disclosure] About eMule web server "Buffer Overflow" discovered vulnerabilityLOL=Laughing out Loud -----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com]On Behalf Of Lorenzo Hernandez Garcia-Hierro Sent: Friday, October 24, 2003 10:13 AM To: Full-Disclosure Cc: BUGTRAQ Subject: [Full-disclosure] About eMule web server "Buffer Overflow" discovered vulnerability Hi again, Umm , i've read in the website of my friend , 3APA3A , (security.nnov.ru )a person discovered a supposed "Buffer Overflow" in the eMule webserver used for remote administration. It is not a Buffer Overflow , you don't corrupt the stack and theninsertdata to gain shell access or similar and definately it is not a non-remote exploitable buffer oveflow, it is only a typical Denial of Service attack against an incorrect
data
handler with the only protection of the user side. So , if you read one of my past advisories you can see my advisory
about
Sambar Server search.pl Buffer Overflow, it was wrong too xD , i was confused but long time passed since that advisory. Its common to confuse the DoS attacks and Buffer Overflows. NOTE: the search.pl script of sambar had the same problem , an
incorrect
input data handler that allowed to make DoS attacks against the sambar webserver and the perl executable ( i wrote Buffer Overflowdueto this , i didn't know if the perl executable could allow to corrupt the stack or similar ), so it was only a DoS , simple and
easy.
Best regards to all, PS: can somebody tell me about the l0l experssion ? is it laughting ontheloud ? xD a stupid question i know ! ------------------------------- 0x00->Lorenzo Hernandez Garcia-Hierro 0x01->/* not csh but sh */ 0x02->$ PATH=pretending!/usr/ucb/which sense 0x03-> no sense in pretending! __________________________________ PGP: Keyfingerprint 4ACC D892 05F9 74F1 F453 7D62 6B4E B53E 9180 5F5B ID: 0x91805F5B ********************************** No Secure Root Group Security Research Team http://www.nsrg-security.com ______________________ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- About eMule web server "Buffer Overflow" discovered vulnerability Lorenzo Hernandez Garcia-Hierro (Oct 24)
- <Possible follow-ups>
- Re: About eMule web server "Buffer Overflow" discovered vulnerability Lorenzo Hernandez Garcia-Hierro (Oct 24)