httpd-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "TD - Sales International Holland B.V." ...@salesint.com>
Subject Fwd: RE: Rumours about Apache 1.3.22 exploits
Date Tue, 26 Feb 2002 08:37:16 GMT
Does anyone know more about this?

regards

----------  Forwarded Message  ----------

Subject: RE: Rumours about Apache 1.3.22 exploits
Date: Mon, 25 Feb 2002 23:28:37 -0000
From: "Pedro Hugo" <fractalg@highspeedweb.net>
To: <vuln-dev@securityfocus.com>

Yeaps... That's one of the exploits I know... I don't have it yet but I
know some guys who tested it and didn't worked out...Since they executed
it as root (NO NO NO !!! :) ) I would maybe bet in a backdoor.
More interesting, is a bind exploit from w00w00 (w00bind-0.5.tar.gz)
that says it exploits a remote heap overflow in bind 9.x versions (and
maybe 8.x versions)...
The interesting thing about it is that it detects all 9.x and 8.x
versions as exploitable... And the code doesn't look to have anything to
exploit bind...
Ah...I have heard about another bind 9.x exploit, this one is said to be
working !

>According to rumors, this exploit is called 7350cowboy (maded by TESO

team) and exploit Apache 1.3.x versions.

>When executing exploit we see:
>7350apache - x86/linux/BSD/*nix apache = 1.3.x remote (root/nobody)

team teso (thx bnuts, tomas, synnergy.net !). Compiled >for Butcher
02/2/2002..pr0t!

>usage: ./7350cowboy [-h] [-v] [-a] [-D] [-m]
>                    [-t <num>] [-d host]
>                    [-L <retloc>] [-A <retaddr>]

-------------------------------------------------------

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org
For additional commands, e-mail: users-help@httpd.apache.org


Mime
View raw message