Re: CVE Exploit
Dear I just need an idea could you please give me hints that how can i start or just write the steps or any relavent reference available I shall be very thank ful to you
Thanks for anticipation
Sent from my iPhone
On 9 Mar 2011, at 19:26, Timothy Ball <email@example.com> wrote:
> On Wed, Mar 09, 2011 at 01:31:50AM -0800, aizaz83 hussain wrote:
>> Dear I need your Help regarding Exploit development of CVE-2010-3872
>> Could you please Guide.
>> How might this CVE-2010-3872 be exploited and how might an exploit work
> bwahahahahaha ... thanks this was a pretty good pick-me-up .
> read-code-write-0day ur-own-damn-self .
> need a hint ? pointer walk FTW !!!
> ps) no i won't help u write 0day
> GPG key available on pgpkeys.mit.edu
> pub 1024D/511FBD54 2001-07-23 Timothy Lu Hu Ball <firstname.lastname@example.org>
> Key fingerprint = B579 29B0 F6C8 C7AA 3840 E053 FE02 BB97 511F BD54