On 22/12/04 14:26 -0600, Todd Towles wrote:
> So now, I just need to trick a user into running a malicious source file
> that I assembed and sent him, this makes it much harder.

<snip nasm vulnerability details>

You need to publish an exploit for nasm and claim it to be the exploit
for something else. This trick has been used here a few times.

Devdas Bhagat
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to