Metasploit mailing list archives

Novell Groupwise client remote stack overflow silently patched.


From: spam01 at infobyte.com.ar (Francisco Amato)
Date: Fri, 14 Dec 2007 11:27:04 -0300

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello list,

I would like to share the followings metasploit modules:
http://www.infobyte.com.ar/down/isr-novellpoc.html

They exploit a remote stack overflow silently patched by Novell in the
Groupwise Client.

Vulnerability video demo:
http://www.infobyte.com.ar/demo/ISR_groupwise.html

Advisory:
http://www.infobyte.com.ar/adv/ISR-16.html

Regards,
Francisco Amato.

- -- 
[ISR] - Infobyte Security Research
http://www.infobyte.com.ar

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.1 (Build 1012) - not licensed for commercial use:
www.pgp.com

wj8DBQFHYpCeezag+Nqk1FkRAkgMAKCA7yfVGQ7Mt1EVFelf/lscyUSlHwCgl5/s
7Qx9vMPSoLggw7lnLHpk05g=
=Jrss
-----END PGP SIGNATURE-----




Current thread: