<<< Date Index >>>     <<< Thread Index >>>

Re: uTorrent overflow



i tried the suggested exploit

c:\>telnet localhost 62333
<hold down enter>

utorrent 1.61 was unaffected. eventually some random garble was
printed and the connection was closed. utorrent continued normal
operation after the connection was closed.

On 6/4/07, Jon Ribbens <jon+bugtraq2@xxxxxxxxxxxxxxxxx> wrote:
On Sat, Jun 02, 2007 at 08:15:09PM -0000, Dj.r4iDeN@xxxxxxxxx wrote:
> if [ "$X" = "y" ];then
> telnet $victamIP $victamport

Um, is it just me, or does this "exploit" do nothing at all?



--
In God we trust,
Everyone else must have an x.509 certificate.