Vulnerability Development mailing list archives
Fwd: Returned post for bugtraq () securityfocus com
From: Alex Balayan <abalayan () bigpond net au>
Date: Mon, 03 Sep 2001 15:21:31 +0800
Mailing-List: contact bugtraq-help () securityfocus com; run by ezmlm Date: 3 Sep 2001 05:04:06 -0000 From: bugtraq-owner () securityfocus com To: abalayan () bigpond net au Subject: Returned post for bugtraq () securityfocus com Hi! This is the ezmlm program. I'm managing the bugtraq () securityfocus com mailing list. I'm working for my owner, who can be reached at bugtraq-owner () securityfocus com. I'm sorry, your message (enclosed) was not accepted by the moderator. If the moderator has made any comments, they are shown below. >>>>> -------------------- >>>>> vuln-dev :) <<<<< -------------------- <<<<< Return-Path: <abalayan () bigpond net au> Delivered-To: moderator for bugtraq () securityfocus com Received: (qmail 7221 invoked from network); 2 Sep 2001 22:14:43 -0000 Received: from mail.securityfocus.com (HELO securityfocus.com) (66.38.151.9) by lists.securityfocus.com with SMTP; 2 Sep 2001 22:14:43 -0000 Received: (qmail 17135 invoked by alias); 2 Sep 2001 22:14:43 -0000 Received: (qmail 17128 invoked from network); 2 Sep 2001 22:14:42 -0000 Received: from juicer03.bigpond.com (HELO mailin6.bigpond.com) (139.134.6.79) by mail.securityfocus.com with SMTP; 2 Sep 2001 22:14:42 -0000 Received: from win2k.bigpond.net.au ([144.135.24.78]) by mailin6.bigpond.com (Netscape Messaging Server 4.15) with SMTP id GJ23EO00.4LI; Mon, 3 Sep 2001 08:20:48 +1000Received: from CPE-61-9-179-117.vic.bigpond.net.au ([61.9.179.117]) by bwmam04.mailsvc.email.bigpond.com(MailRouter V2.9i 8329/2383759); 03 Sep 2001 08:20:48Message-Id: <4.3.2.7.0.20010903081401.02347a08 () pop-server bigpond net au> X-Sender: abalayan () pop-server bigpond net au X-Mailer: QUALCOMM Windows Eudora Version 4.3.2 Date: Mon, 03 Sep 2001 08:15:21 +0800 To: Alexander Yurchenko <grange () rt mipt ru> From: Alex Balayan <abalayan () bigpond net au> Subject: Re: Another sendmail exploit Cc: bugtraq () securityfocus com;, vul-dev () securityfocus com Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowedJust wondering if there is exploit code for Cobalt systems ? I am conducting an audit and have shell access to the Cobalt Qube 2 systems. AFAIK this exploit will not compile on a cobalt system due to different cpu architecture.Thanks in advance.Here's an another sendmail exploit for linux x86. Alexander Yurchenko aka grange
Current thread:
- Fwd: Returned post for bugtraq () securityfocus com Alex Balayan (Sep 03)
- Re: Fwd: Returned post for bugtraq () securityfocus com Blue Boar (Sep 03)
- Cobalt Cubes (was: Re: Fwd: Returned post for bugtraq () securityfocus com) Mike Johnson (Sep 04)
- Re: Fwd: Returned post for bugtraq () securityfocus com Blue Boar (Sep 03)