Gauntlet Firewall Remote Buffer Overflow Vulnerability

This exploit is written to run a test file called /bin/zz. Just throw a file called zz in /bin on the gauntlet firewall and chmod it to 700. Inside the zz file you should have it do something where it will leave you a log, as in the following example:

---
#!/bin/sh
echo "IT RAN" > /tmp/TEST
---


 

Privacy Statement
Copyright 2010, SecurityFocus