help-liquidwar6
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Help-liquidwar6] Why does LiquidWar include an overflow exploit


From: Christian Mauduit
Subject: Re: [Help-liquidwar6] Why does LiquidWar include an overflow exploit
Date: Thu, 13 Aug 2015 21:35:19 +0200
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.8.0

Funny story. I'm afraid this file might be here to stay ;) I would not
have thought McAfee AV would base its decisions on such naive heuristics
as "there's a file called Exploit.c".

Have a nice day,

Christian.

On 08/13/2015 08:46 PM, entrex wrote:
> Ok. It triggered McAfee AV and got my computer removed from the campus 
> network :-) 
> 
> https://www.virustotal.com/en/file/9e84f3e107551d9ca116eb3435e2716c4436c7d68085ca751e2d0d57fe652a1d/analysis/1439491330/
> 
> 
>>It's just a historical bug which has been corrected since, and this file
>>was a "demo" of how to exploit the flaw. It's useless for end-users, but
>>is here in case someones wants to check for real that the exploit is not
>>possible any more.
>>
>>Have a nice day,
>>
>>Christian.
> 
> 
> 
> _______________________________________________
> Help-liquidwar6 mailing list
> address@hidden
> https://lists.gnu.org/mailman/listinfo/help-liquidwar6
> 

-- 
Christian Mauduit
address@hidden
http://www.ufoot.org
int q = (2 * b) || !(2 * b);

Attachment: signature.asc
Description: OpenPGP digital signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]