Vulnerability Development mailing list archives
Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works?
From: Jim Kovalchuk <raxor () dexlink com>
Date: Sat, 4 May 2002 22:02:44 -0700 (PDT)
Make sure the offset in the code (0xbfffd77c) is within your NOP sled. pub 1024D/4D4E605E 2001-10-05 Jim Kovalchuk <raxor () dexlink com> Fingerprint: 6DF1 31C6 05E9 FCA6 02AB 386D 5640 EF8C 4D4E 605E On Sat, 4 May 2002, Paul_Asadoorian wrote:
I came across the following exploit on packetstorm and have been unable to get it to work. It crashes the daemon but never creates a shell on the specified port. Anyone else had any luck? http://packetstormsecurity.org/0203-exploits/ucd-snmp.c Thanks, Paul A struggling SANS GCIH student
Current thread:
- Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? Paul_Asadoorian (May 04)
- Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? Jim Kovalchuk (May 05)
- Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? jove (May 06)
- Re: Slackware 8.0 / ucd-snmpd 4.2.1 exploit works? Jim Kovalchuk (May 05)