Does anyone know more about this?
regards
---------- Forwarded Message ----------
Subject: RE: Rumours about Apache 1.3.22 exploits
Date: Mon, 25 Feb 2002 23:28:37 -0000
From: "Pedro Hugo" <fractalg@highspeedweb.net>
To: <vuln-dev@securityfocus.com>
Yeaps... That's one of the exploits I know... I don't have it yet but I
know some guys who tested it and didn't worked out...Since they executed
it as root (NO NO NO !!! :) ) I would maybe bet in a backdoor.
More interesting, is a bind exploit from w00w00 (w00bind-0.5.tar.gz)
that says it exploits a remote heap overflow in bind 9.x versions (and
maybe 8.x versions)...
The interesting thing about it is that it detects all 9.x and 8.x
versions as exploitable... And the code doesn't look to have anything to
exploit bind...
Ah...I have heard about another bind 9.x exploit, this one is said to be
working !
>According to rumors, this exploit is called 7350cowboy (maded by TESO
team) and exploit Apache 1.3.x versions.
>When executing exploit we see:
>7350apache - x86/linux/BSD/*nix apache = 1.3.x remote (root/nobody)
team teso (thx bnuts, tomas, synnergy.net !). Compiled >for Butcher
02/2/2002..pr0t!
>usage: ./7350cowboy [-h] [-v] [-a] [-D] [-m]
> [-t <num>] [-d host]
> [-L <retloc>] [-A <retaddr>]
-------------------------------------------------------
---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org
regards
---------- Forwarded Message ----------
Subject: RE: Rumours about Apache 1.3.22 exploits
Date: Mon, 25 Feb 2002 23:28:37 -0000
From: "Pedro Hugo" <fractalg@highspeedweb.net>
To: <vuln-dev@securityfocus.com>
Yeaps... That's one of the exploits I know... I don't have it yet but I
know some guys who tested it and didn't worked out...Since they executed
it as root (NO NO NO !!! :) ) I would maybe bet in a backdoor.
More interesting, is a bind exploit from w00w00 (w00bind-0.5.tar.gz)
that says it exploits a remote heap overflow in bind 9.x versions (and
maybe 8.x versions)...
The interesting thing about it is that it detects all 9.x and 8.x
versions as exploitable... And the code doesn't look to have anything to
exploit bind...
Ah...I have heard about another bind 9.x exploit, this one is said to be
working !
>According to rumors, this exploit is called 7350cowboy (maded by TESO
team) and exploit Apache 1.3.x versions.
>When executing exploit we see:
>7350apache - x86/linux/BSD/*nix apache = 1.3.x remote (root/nobody)
team teso (thx bnuts, tomas, synnergy.net !). Compiled >for Butcher
02/2/2002..pr0t!
>usage: ./7350cowboy [-h] [-v] [-a] [-D] [-m]
> [-t <num>] [-d host]
> [-L <retloc>] [-A <retaddr>]
-------------------------------------------------------
---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org