On 22/12/04 14:26 -0600, Todd Towles wrote: > So now, I just need to trick a user into running a malicious source file > that I assembed and sent him, this makes it much harder.
<snip nasm vulnerability details> You need to publish an exploit for nasm and claim it to be the exploit for something else. This trick has been used here a few times. Devdas Bhagat _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
