[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Help-liquidwar6] Why does LiquidWar include an overflow exploit
From: |
Christian Mauduit |
Subject: |
Re: [Help-liquidwar6] Why does LiquidWar include an overflow exploit |
Date: |
Thu, 13 Aug 2015 21:35:19 +0200 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.8.0 |
Funny story. I'm afraid this file might be here to stay ;) I would not
have thought McAfee AV would base its decisions on such naive heuristics
as "there's a file called Exploit.c".
Have a nice day,
Christian.
On 08/13/2015 08:46 PM, entrex wrote:
> Ok. It triggered McAfee AV and got my computer removed from the campus
> network :-)
>
> https://www.virustotal.com/en/file/9e84f3e107551d9ca116eb3435e2716c4436c7d68085ca751e2d0d57fe652a1d/analysis/1439491330/
>
>
>>It's just a historical bug which has been corrected since, and this file
>>was a "demo" of how to exploit the flaw. It's useless for end-users, but
>>is here in case someones wants to check for real that the exploit is not
>>possible any more.
>>
>>Have a nice day,
>>
>>Christian.
>
>
>
> _______________________________________________
> Help-liquidwar6 mailing list
> address@hidden
> https://lists.gnu.org/mailman/listinfo/help-liquidwar6
>
--
Christian Mauduit
address@hidden
http://www.ufoot.org
int q = (2 * b) || !(2 * b);
signature.asc
Description: OpenPGP digital signature