Um... the point was that 3 years ago when I found this (or something similar)... the attached exploit worked just fine. I could give a rats ass less what you or anyone else does with it today. The bug was pretty much pointless to begin with anyway.

All these folks are talking about not being able to reproduce it... blah blah... well all I was saying was that I have seen a /bin/sh prompt produced via this issue.

I'll kindly remove my nose from your uber er33t understanding of this crucial unzip overflow.

-KF

DVDMAN's code is pointless. Use the source, luke, and stop watching movies.....

--

regards
c0ntex




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to