From mboxrd@z Thu Jan 1 00:00:00 1970 Message-Id: <200309201045.h8KAjFC9042212@SIGBUS.nove.bg> From: Atanas Bachvaroff Subject: Re: [9fans] Plan9 buffer overflow exploit explained in Phrack Volume 0x0b, Issue 0x3e, Phile #0x09 of 0x0f To: 9fans@cse.psu.edu In-Reply-To: <20030920071935.GA10246@ns.0xfe.org> MIME-Version: 1.0 Content-Type: MULTIPART/signed; micalg=pgp-md5; protocol="application/pgp-signature"; BOUNDARY="0-596516649-1064054720=:31233" Date: Sat, 20 Sep 2003 13:45:11 +0300 Topicbox-Message-UUID: 3d847efe-eacc-11e9-9e20-41e7f4b1d025 --0-596516649-1064054720=:31233 Content-Type: TEXT/plain; charset=us-ascii On 20 Sep, Vester Thacker wrote: > Just in case some folks haven't read about it, an article was written > about a Plan9 exploit. The article can be found at > http://phrack.unixchicks.com/p62-0x09.txt > > I found it disheartening, but interesting nonetheless. Comments? > > -- Vester Thacker Blah! I've just read that crap at the url given. What I see is misconception and ignorance plus very, very, very nice "conclusions"... Just as expected, a kid from the crackbrained generation who read their grandiose-hack-the-world things but no further... Several more things come to my mind but these have no place in this mailing list. Greetings -- BEATVSHOMOQVIINVENITSAPIENTIAMETQVIAFFLVITPRVDENTIALIVRILVCIFERIVS --0-596516649-1064054720=:31233 Content-Type: APPLICATION/pgp-signature -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use MessageID: vyUKoWBDSo/4KzRsPIhnznVxejiGqFSd iQA/AwUAP2wvu9BNHei75lHEEQKgWgCeLsQ9o9CfyaW2bp57QqQgGR2eWagAnj5P 76pbUg+z5m3wEQDUHZtHZQrc =NJ8p -----END PGP SIGNATURE----- --0-596516649-1064054720=:31233--