Metasploit mailing list archives
Novell Groupwise client remote stack overflow silently patched.
From: spam01 at infobyte.com.ar (Francisco Amato)
Date: Fri, 14 Dec 2007 11:27:04 -0300
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello list, I would like to share the followings metasploit modules: http://www.infobyte.com.ar/down/isr-novellpoc.html They exploit a remote stack overflow silently patched by Novell in the Groupwise Client. Vulnerability video demo: http://www.infobyte.com.ar/demo/ISR_groupwise.html Advisory: http://www.infobyte.com.ar/adv/ISR-16.html Regards, Francisco Amato. - -- [ISR] - Infobyte Security Research http://www.infobyte.com.ar -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.6.1 (Build 1012) - not licensed for commercial use: www.pgp.com wj8DBQFHYpCeezag+Nqk1FkRAkgMAKCA7yfVGQ7Mt1EVFelf/lscyUSlHwCgl5/s 7Qx9vMPSoLggw7lnLHpk05g= =Jrss -----END PGP SIGNATURE-----
Current thread:
- Novell Groupwise client remote stack overflow silently patched. Francisco Amato (Dec 14)