what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files

eeye.sql-worm.txt
Posted Jan 25, 2003
Authored by Riley Hassell | Site eEye.com

Eeye Advisory - The "SQL Sapphire" worm is spreading quickly among unpatched Microsoft SQL Server 2000 pre SP 2 systems on the internet with are accessible over port 1434 udp. Includes a detailed analysis of the worms payload.

tags | worm, udp
SHA-256 | 1fd78f476cf00ccc0de6101ec49913f97a341524cce0732945250de296f1ea4c
eeye.macromedia.txt
Posted Nov 13, 2002
Authored by Riley Hassell | Site eEye.com

Eeye Advisory - Both Macromedia Coldfusion 6.0 and Macromedia JRun 4.0 along with their prior versions are vulnerable to various heap overflows when handling URI filenames larger than 4096 bytes..

tags | overflow
SHA-256 | 90b2b823b8a467f8fa059878b381391c6e1fa419031b09b61b9981944581ebd7
eeye.iplanet.txt
Posted Aug 9, 2002
Authored by Riley Hassell | Site eEye.com

Eeye Security Advisory - iPlanet Web Server 4.1 and 6.0 contains a remotely exploitable heap overflow in the transfer chunking which allows remote code execution as SYSTEM/root on all platforms.

tags | remote, web, overflow, root, code execution
SHA-256 | d2375ece94681f4833e85dbe34daf64ab6bdd23cbce71013a58fa28a9d8b5fae
eeye.flash.txt
Posted Aug 9, 2002
Authored by Marc Maiffret | Site eEye.com

Eeye Advisory - All versions of Macromedia Shockwave Flash for Windows and Unix contains remotely exploitable overflows in the handling of SWF files. Since this is a browser based bug, it makes it trivial to bypass firewalls and attack the user at his desktop. Also, application browser bugs allow you to target users based on the websites they visit, the newsgroups they read, or the mailing lists they frequent.

tags | overflow
systems | windows, unix
SHA-256 | ef61f5c7bb22a7f1570c610ede3c3d279065fdc8c0930aa34c2231c4cd2e2ea9
eeye.pgp.txt
Posted Jul 11, 2002
Authored by Marc Maiffret | Site eEye.com

Eeye Advisory - The NAI PGP Outlook plug-in in NAI PGP Freeware 7.0.3, PGP Personal Security 7.0.3, and PGP Desktop Security 7.0.4 contains a remotely exploitable heap overflow which can lead to code execution. NAI patch available here.

tags | overflow, code execution
SHA-256 | e7216236aa140bde90e0b6a185d4054a32eb6585e3527ebacfa7d3f1141d1b94
eeye.htr2.txt
Posted Jun 13, 2002
Authored by eEye Digital Security | Site eEye.com

Eeye Advisory - IIS 4.0 and 5.0 for Windows NT and 2000 contain a remotely exploitable heap overflow which allows remote code execution. The bug is in transfer chunking in combination with the processing of HTR request sessions.

tags | remote, overflow, code execution
systems | windows
SHA-256 | 48ccb83f54a8646059f912592e5f6d519b887ca5833838d10ec76f21014b6fa0
eEye-MSN-CHAT-OCX.txt
Posted May 13, 2002
Authored by eEye Digital Security, Drew Copley | Site eEye.com

A buffer overflow vulnerability has been found by eEye in the parameter handling of the MSN Messenger OCX and can allow remote code execution on affected systems.

tags | remote, overflow, code execution
SHA-256 | 76df0e68a796ea743a0cc568c84f1055d8df681f7945e0a436d49f5ed4e21b47
flash.overflow.txt
Posted May 5, 2002
Authored by eEye Digital Security | Site eEye.com

Macromedia Flash ActiveX Buffer overflow - Flash ActiveX Ocx Version 6, revision 23 and below contains a remotely exploitable buffer overflow which leads to the execution of attacker supplied code via email, web or any other avenue in which Internet Explorer is used to display html that an attacker can supply. All users of Internet Explorer are potentially vulnerable.

tags | web, overflow, activex
SHA-256 | c6c8ca1f7b23f1726dfc2ae5a03d47ea1e5728d9a0f6a3cd3a1e16082fa3c47f
AD20010501.txt
Posted May 3, 2001
Site eeye.com

Eeye Security Advisory - Windows 2000 IIS 5.0 Remote buffer overflow vulnerability (Remote SYSTEM Level Access). Affects Microsoft Windows 2000 Internet Information Services 5.0 + Service Pack 1. The vulnerability arises when a buffer of aprox. 420 bytes is sent within the HTTP Host: header for a .printer ISAPI request. Successful attacks are not logged in the IIS access logs.

tags | remote, web, overflow
systems | windows
SHA-256 | 823ece01e6bb14f8b3fbea2b4d268322ebb462e32c5dedd81802824820639ecf
eeye.iishack-1.5.txt
Posted Nov 5, 2000
Authored by eEye Digital Security | Site eEye.com

A buffer overflow has been discovered in the IIS 4.0 and 5.0 .asp file parsing mechanism. When IIS reads a malformed .asp file, code can be executed to take control of the local server as system. This can be exploited remotely by combining with the unicode bug or by paying for a web hosting account.

tags | web, overflow, local, asp
SHA-256 | 55452aba2566040a0d3cd658472e5693c9fb1752803985a1aceccb5a5abe6090
eeye.98-10-01.ie4_custom_folders
Posted Sep 23, 1999

eeye.98-10-01.ie4_custom_folders

SHA-256 | e358f1f0991f9c99805e7c8f0d2fcad32c0c7819573f5eb466cd11d9537ca419
eeye.99-01-24.iis.ftp.dos
Posted Sep 23, 1999

eeye.99-01-24.iis.ftp.dos

SHA-256 | 313a91c047aaa495766db56db33ac885570263bb6fe6d57d0e16f761138ec8a4
eeye.99-02-02.ws_ftp
Posted Sep 23, 1999

eeye.99-02-02.ws_ftp

SHA-256 | cade8a21583465f43b7dc1f78fee0e6d47a781dd93b537712b19ba0acf25ba00
eeye.99-02-04.slmail
Posted Sep 23, 1999

eeye.99-02-04.slmail

SHA-256 | 4cd275a14892817e2f3545a1461e3ff37bc6e5a5c8addb37c5a22de478cc38ef
eeye.99-02-20.mdaemon_dos
Posted Sep 23, 1999

eeye.99-02-20.mdaemon_dos

SHA-256 | 367f53a3e1c1cf4af9867f9aabb502047c682b336619dd3153731e9c1c6c939e
eeye.99-02-21.mercur_mail
Posted Sep 23, 1999

eeye.99-02-21.mercur_mail

SHA-256 | cd8416601a7bdc853e7df178e5ecbaaa8c8cf226455e3b7d68a01231a69446f2
eeye.99-02-22.wingate
Posted Sep 23, 1999

eeye.99-02-22.wingate

SHA-256 | 75296fecb26152a52ce6f1a407ca4f483e0f650876e01f1ed6aab6c41f3e99a5
eeye.99-03-01.imail
Posted Sep 23, 1999

eeye.99-03-01.imail

SHA-256 | 61b70b7edc28bf04b4e52aac409a46fa8c868c6ebbfadb429f5955bf82afa9be
eeye.99-05-26.mult_web_interface
Posted Sep 23, 1999

eeye.99-05-26.mult_web_interface

SHA-256 | 3ad3f904295e6f4482cc582b41a652a6d50b69a0dee2928c7149a825a6a4fa20
eeye.99-06-08.iis_remote
Posted Sep 23, 1999

eeye.99-06-08.iis_remote

SHA-256 | ff1bd17b04e4de9f9e91d2a6632405f72fbc5f8335da525b2e680861b03f5f05
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close