[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Help-liquidwar6] Why does LiquidWar include an overflow exploit

From: Christian Mauduit
Subject: Re: [Help-liquidwar6] Why does LiquidWar include an overflow exploit
Date: Thu, 13 Aug 2015 21:35:19 +0200
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.8.0

Funny story. I'm afraid this file might be here to stay ;) I would not
have thought McAfee AV would base its decisions on such naive heuristics
as "there's a file called Exploit.c".

Have a nice day,


On 08/13/2015 08:46 PM, entrex wrote:
> Ok. It triggered McAfee AV and got my computer removed from the campus 
> network :-) 
>>It's just a historical bug which has been corrected since, and this file
>>was a "demo" of how to exploit the flaw. It's useless for end-users, but
>>is here in case someones wants to check for real that the exploit is not
>>possible any more.
>>Have a nice day,
> _______________________________________________
> Help-liquidwar6 mailing list
> address@hidden

Christian Mauduit
int q = (2 * b) || !(2 * b);

Attachment: signature.asc
Description: OpenPGP digital signature

reply via email to

[Prev in Thread] Current Thread [Next in Thread]