Um... the point was that 3 years ago when I found this (or something
similar)... the attached exploit worked just fine. I could give a rats
ass less what you or anyone else does with it today. The bug was pretty
much pointless to begin with anyway.
All these folks are talking about not being able to reproduce it... blah
blah... well all I was saying was that I have seen a /bin/sh prompt
produced via this issue.
I'll kindly remove my nose from your uber er33t understanding of this
crucial unzip overflow.
-KF
DVDMAN's code is pointless. Use the source, luke, and stop watching movies.....
--
regards
c0ntex
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/