-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-024-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
January 27, 2001
-
n33dl3r wrote:
Hi folks!
In between of heavy gaming i dished up this tiny
exploit for jaZip!
Educational purposes only. Please dont abuuuse.
Hi mum, gimme some food damnit!
-- [snip - jazip-exp.c] --
/*
* jaZip-0.32 local buffer overflow exploit
(tested on debian)
Right.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-025-2 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
January 28, 2001
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-023-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
January 26, 2001
-
Ben Greenbaum
Director of Site Content
SecurityFocus
http://www.securityfocus.com
-- Forwarded message --
Date: Mon, 29 Jan 2001 03:50:20 -0800 (PST)
From: IT Resource Center [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: security bulletins digest
HP
1. Abstract
---
There are various format string bugs in the ntop package as mentioned in
former Bugtraq articles. This is _not_ a new problem. However, in
opposite to the '-w' option bug, an exploit for the existent '-i' option
format string bug has never been posted/released.
2.