Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
[discuss] Re: [exploits] [Fwd: Remote root exploit for proftpd \n bug]
From: Todd Lyons (toddmrball.net)
Date: Sun Oct 19 2003 - 12:17:10 CDT
-----BEGIN PGP SIGNED MESSAGE-----
Jordan T. wanted us to know:
>Has this been patched against?
>Just gave it a default run against mdk 9.1 and it failed to exploit, but
>with tweaking .. who knows?
The question is does it cause a segfault of the server. If yes, it
could potentially cause a problem. If no, then it's safe.
Blue skies... Todd Public key: http://www.mrball.net/todd.asc
P.S. Before I clicked 'send' on this composition I decided to consult
the oracle, I mean Google, on the question of... --Clay Claiborne
Linux kernel 2.4.21-0.25mdk 3 users, load average: 0.18, 0.16, 0.08
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
-----END PGP SIGNATURE-----