-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 There seems to be some confusion about whether or not this bug can be exploited on any other operating systems than OpenBSD. Here's a second version of our private exploit, apache-massacre.c, called apache-nosejob.c. Used correctly, it will successfully exploit any vulnerable Free/Net/OpenBSD (x86) machine. Over the weekend and during next week we'll release a few more pieces of tasty candy, including GeneralCuster.exe, and quite possibly apache-massacre.c. The mailing lists may now return to their normal level of mediocrity until we're ready to publicize some more warez. - -GOBBLES Security -----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wlwEARECABwFAj0UAMIVHGdvYmJsZXNAaHVzaG1haWwuY29tAAoJEBzRp5chmbAPix0A n3+UQy72ENv6KSwlcDNM12YrLQmdAJ9PTEjb5N4gyGm/hkgdMXjcHTF8pA== =X2Lc -----END PGP SIGNATURE-----
Attachment:
apache-nosejob.c
Description: Binary data
-----BEGIN PGP SIGNATURE----- Version: Hush 2.1 Note: This signature can be verified at https://www.hushtools.com wj8DBQA9FAC8HNGnlyGZsA8RAiNZAJ90WUHBQjYg9KSyzZKz0WLddgOBggCcDfoh/DXN oYWxbCu8gl2Cz2SUcrU= =oZmB -----END PGP SIGNATURE-----