search for: dizznutt

Displaying 3 results from an estimated 3 matches for "dizznutt".

2004 Aug 06
2
[dizznutt@my.security.nl: icecast 1.3.11 remote shell/root exploit - #temp]
Contrary to the report, this only affect 1.3.x version of icecast, not _all_ versions. But this is a serious problem and I do hope you all took my advice last time and aren't running icecast as root. I'll try to have a patch today. jack. ----- Forwarded message from dizznutt@my.security.nl ----- Date: Tue, 2 Apr 2002 07:51:55 +0000 (GMT+00:00) From: dizznutt@my.security.nl To: bugtraq@securityfocus.com Cc: team@icecast.org Subject: icecast 1.3.11 remote shell/root exploit - #temp X-Spam-Status: No, hits=0.6 required=10.0 tests=NO_REAL_NAME version=2.11 Ola, I'm...
2004 Aug 06
0
[dizznutt@my.security.nl: [Secure] Full analysis of multiple remotely exploitable bugs in Icecast 1.3.11]
hi, don't know whether this is already covered in the list, sorry if it's old news... is there any 1.3.11 bugfix release out there? can't find things on icecast.org attached the email from bugtraq. best, uno <p> <strong>attached mail follows:</strong><hr noshade> Hello, Attached is a full analysis to accompany the earlier disclosed remote root/shell
2004 Aug 06
2
Full analysis of the remotely exploitable icecast 1.3.x bugs
Hello Icecast folks, Attached is an analysis I slapped together detailing the exact specifics of the bug that is exploited with the icecast exploit I disclosed earlier this week. Furthermore it details another remotely exploitable bug. I sent this to team@icecast.org and to Jack Moffit, but have not received a response as of yet. So if people, like I noticed in the icecast@xiph.org list, are