Full Disclosure mailing list archives

Re: BitchX local root


From: "Sha0lin" <Sha0 () badchecksum com>
Date: Thu, 24 Nov 2005 21:51:43 +0100

c0ntex writes:
"Presented below is an exploit for BitchX, a linux IRC client. If the
BitchX binary is installed SetUID (to allow SSL access for non root
users for example), an attacker can exploit a stack overflow and gain
root privileges." "BitchX local root"
lies, lies.

yes, there is NOT ok this summary,
i will request for change it.
why this company plagiarized it?
well, doesn't matter. thanks

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: