Full Disclosure mailing list archives
Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control
From: Valdis.Kletnieks () vt edu
Date: Fri, 30 Jan 2009 12:07:58 -0500
On Thu, 29 Jan 2009 17:04:53 CST, hack ery said:
Security Risk: High Exploitable: Local Vulnerability: Arbitrary Flow Control Control, Cat Spoofing Discovered by: The Hackery Channel
Note the additional possibility of a brute force attack: http://icanhascheezburger.files.wordpress.com/2009/01/funny-pictures-your-cat-is-ready-to-admit-he-gained-weight.jpg
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control hack ery (Jan 29)
- Message not available
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Nancy Kramer (Jan 29)
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Jeremy Brown (Jan 30)
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Nancy Kramer (Jan 29)
- Message not available
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Charles Morris (Jan 30)
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Jordan Bray (Jan 30)
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Michael Holstein (Jan 30)
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Jordan Bray (Jan 30)
- Re: Hackery Channel 01-09-01-LOLZ: Cat Spoofing against Flow Control Valdis . Kletnieks (Jan 30)