Re: server security

From: ben heise (
Date: 05/31/02

>Not exactly off topic, but just as a question:
>Has anyone had happen or heard of someone gaining shell access thru a
>mud?  It's been since bpl15 that I've had anything near stock, and even
>with that, I couldn't really find any exploitable stack overflows (the
>most common exploit method).

I did not see anything wrong with the coding as far as a stack overflow.
(yes, my point is that the circlemud people do great work)

also, I would suspect it is not possible because the packets are handled
by the circle process.

so, more than likely, gaining access thru a mud is not feasible.

                {yeah, yeah, we know, something about Madly Implementing}

Juno offers FREE or PREMIUM Internet access for less!
Join Juno today!  For your FREE software, visit:

   | FAQ: |
   | Archives: |
   | Newbie List:   |

This archive was generated by hypermail 2b30 : 06/25/03 PDT