Full Disclosure mailing list archives
Re: BitchX local root
From: "Sha0lin" <Sha0 () badchecksum com>
Date: Thu, 24 Nov 2005 21:51:43 +0100
c0ntex writes:
"Presented below is an exploit for BitchX, a linux IRC client. If the BitchX binary is installed SetUID (to allow SSL access for non root users for example), an attacker can exploit a stack overflow and gainroot privileges." "BitchX local root"lies, lies.
yes, there is NOT ok this summary,i will request for change it.
why this company plagiarized it?well, doesn't matter. thanks
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- BitchX local root Sha0lin (Nov 23)
- Re: BitchX local root c0ntex (Nov 23)
- Re: BitchX local root Sha0lin (Nov 24)
- Re: BitchX local root c0ntex (Nov 23)