Just saw this on Twitter, an MSF exploit published:
http://www.rec-sec.com/2009/10/16/httpdx-buffer-overflow-exploit/
On Fri, Oct 9, 2009 at 7:58 PM, wrote:
> The addr value used is required to reach the ret instruction. The value
> used 0x63b8624f lies in idata segment of n.dll
> Note that in o
Can't reproduce it too (XPSP3 En + httpdx 1.4.0)...
On Fri, Oct 9, 2009 at 8:49 AM, wrote:
> this didn't seem to work for me. Test system XPSP3 + httpdx 1.4.0.
>
> Definitely causes a crash but the retn/offsets must not be universal?
>
--
Best wishes,
Freddie Vicious
http://twitter.com/vicio