Re: [Full-disclosure] Remote buffer overflow in httpdx

2009-10-16 Thread Freddie Vicious
Just saw this on Twitter, an MSF exploit published: http://www.rec-sec.com/2009/10/16/httpdx-buffer-overflow-exploit/ On Fri, Oct 9, 2009 at 7:58 PM, pankaj...@gmail.com wrote: The addr value used is required to reach the ret instruction. The value used 0x63b8624f lies in idata segment of

Re: [Full-disclosure] Remote buffer overflow in httpdx

2009-10-12 Thread Freddie Vicious
Can't reproduce it too (XPSP3 En + httpdx 1.4.0)... On Fri, Oct 9, 2009 at 8:49 AM, dr_...@hushmail.com wrote: this didn't seem to work for me. Test system XPSP3 + httpdx 1.4.0. Definitely causes a crash but the retn/offsets must not be universal? -- Best wishes, Freddie Vicious