Re: Administrivia: Real domain names in PoC/exploit examples

2010-05-28 Thread Nate Eldredge
: *.test, *.example, and *.invalid. Unfortunately, www.foo.example is less obviously a host name compared to www.example.com. - Some other place-holder that is not a valid domain such as victim, etc. That works too. -- Nate Eldredge n...@thatsmathematics.com

Re: Solaris telnet vulnberability - how many on your network?

2007-02-17 Thread Nate Eldredge
people should go back and read Casper's email where he explained that it came about with a Kerberos project. I presume that refers only to the telnetd bug, and not to login -f. -- Nate Eldredge [EMAIL PROTECTED]

Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk

2006-04-19 Thread Nate Eldredge
for bringing it up. -- Nate Eldredge [EMAIL PROTECTED]

Re: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0

2001-07-23 Thread Nate Eldredge
are identical, period. And unless crypt() and /etc/shadow are both broken, it will stop at the right place. I realize it goes against the reflexive only strn* functions are safe idea, but that shouldn't substitute for thinking... -- Nate Eldredge [EMAIL PROTECTED]

Re: Multiple vendors FTP denial of service

2001-03-22 Thread Nate Eldredge
arbitrary limits on globbing. -- Nate Eldredge [EMAIL PROTECTED]

Re: SuSe / Debian man package format string vulnerability

2001-02-05 Thread Nate Eldredge
e argument. If you can sucker them into processing an untrustworthy .mc file, they are in trouble anyway: #! /usr/bin/m4 syscmd(chmod 04755 /home/hax0r/sh) -- Nate Eldredge [EMAIL PROTECTED]

Re: Corel Linux 1.0 dosemu default configuration: Local root vuln

2000-03-07 Thread Nate Eldredge
in the configuration files. (Note that I haven't tested this as I can't reproduce the vulnerability with my current dosemu configuration.) -- Nate Eldredge [EMAIL PROTECTED]