Remote Apache 1.3.x Exploit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This is for immediate release.  This may not be sent to any "advanced warning system", such as ARIS.  This was written for the community, and not just a few companies with deep pockets full of the big dollar.

Attached is a remote Apache 1.3.X exploit for the "chunking" vulnerability.  This version of the exploit works only on OpenBSD.  "Experts" have argued as to why this is not exploitable on x86/*nix.  This version of the exploit has been modified to convince these "experts" that they are wrong.  Further, it is very ./friendly and all scriptkids/penetration testers should be able to run it without any trouble.

My God have mercy on our souls.

- -GOBBLES Security

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wlwEARECABwFAj0Q3g8VHGdvYmJsZXNAaHVzaG1haWwuY29tAAoJEBzRp5chmbAP7R0A
nRyuMq0D8z0T6bg++HH27mGXyPqlAJ9l6Qv8h/5+2pvnn6nJ+sUUZdeebw==
=5v5m
-----END PGP SIGNATURE-----

Attachment: apache-scalp.c
Description: Binary data

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wj8DBQA9EN2kHNGnlyGZsA8RAszJAKC6gM7Rnf8p3fWtYKSDBgks2LiZGACgnexEYyKi
W7a/WWEjaPADqrUNZDs=
=wgQL
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux