>Not exactly off topic, but just as a question:
>Has anyone had happen or heard of someone gaining shell access thru a
>mud? It's been since bpl15 that I've had anything near stock, and even
>with that, I couldn't really find any exploitable stack overflows (the
>most common exploit method).
I did not see anything wrong with the coding as far as a stack overflow.
(yes, my point is that the circlemud people do great work)
also, I would suspect it is not possible because the packets are handled
by the circle process.
so, more than likely, gaining access thru a mud is not feasible.
Konigstein
{yeah, yeah, we know, something about Madly Implementing}
________________________________________________________________
GET INTERNET ACCESS FROM JUNO!
Juno offers FREE or PREMIUM Internet access for less!
Join Juno today! For your FREE software, visit:
http://dl.www.juno.com/get/web/.
--
+---------------------------------------------------------------+
| FAQ: http://qsilver.queensu.ca/~fletchra/Circle/list-faq.html |
| Archives: http://post.queensu.ca/listserv/wwwarch/circle.html |
| Newbie List: http://groups.yahoo.com/group/circle-newbies/ |
+---------------------------------------------------------------+
This archive was generated by hypermail 2b30 : 06/25/03 PDT