Exploit the possiblities
Showing 1 - 25 of 112 RSS Feed

Files

sms.220.zlib
Posted Nov 20, 2002
Site sunsolve.sun.com

Sun Microsystems Advisory #220 - A double free bug in the zlib compression library allows the Java(TM) Runtime Environment to be crashed by remote users. SDK and JRE 1.4.0 and below on Windows and SDK and JRE 1.2.2_011 or earlier on Solaris, and SDK and JRE 1.4.0 on Linux is affected. Releases for JDK and JRE 1.1.x should no longer be used. This vulnerability does not affect the Java 2 SDK, Standard Edition, v 1.4.1 release.

tags | java, remote
systems | linux, windows, solaris
MD5 | 9f45b3718287883c25dac8748a5db660
sms.219.snmpdx
Posted Jun 6, 2002
Site sun.com

Sun Microsystems Advisory #219 - Snmpdx and Mibiisa contain serious remote vulnerabilities - Patches should be installed. Affects SunOS 5.6, 5.7, and 5.8.

tags | remote, vulnerability
systems | solaris
MD5 | 3c2f90af67b2e7d42b76e1fd016aa0d3
sms.213.login
Posted Dec 18, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #213 - The login command contains a local and remote buffer overflow which allows attackers to gain root access on systems running telnet or rlogin. ISS advisory on this bug here. Solaris v5.5.1, 5.6, 5.7, and 5.8 for x86 and sparc is affected.

tags | remote, overflow, x86, local, root
systems | solaris
MD5 | 991978462921ae465f1a8ba403ab935f
sms.212.ttdbserverd
Posted Nov 14, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #212 - The RPC-based ToolTalk database server, rpc.ttdbserverd, contains a remote root format string vulnerability. Affected systems include most versions of SunOS 5.x.

tags | remote, root
systems | solaris
MD5 | f523cd3e0f813f8ce576c0afbce5b36f
sms.211.xntpd
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #211 - The Network Time Protocol daemon, xntpd, contains a remote vulnerability. Affected systems include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, and 5.6_x86.

tags | remote, protocol
systems | solaris
MD5 | 1d2c23f34b4b5b2044a22ee76a531612
sms.210.ufsrestore
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #210 - Another local root vulnerability has been found in ufsrestore. Vulnerable systems include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, 5.6_x86, 5.5.1, 5.5.1_x86, and 5.5, 5.5_x86.

tags | local, root
systems | solaris
MD5 | 71cca2b420f8ff96e5ada33f8b31c5f4
sms.209.rpc.yppasswdd
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #209 - A remote root buffer overflow vulnerability has been discovered in rpc.yppasswd. Vulnerable versions include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, and 5.6_x86.

tags | remote, overflow, root
systems | solaris
MD5 | e7cdc41abec6a7e0eb42a65202ad93c3
sms.208.java.clipboard
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #208 - A vulnerability in the Java Runtime Environment (JRE) may allow an untrusted applet to access the system clipboard. Netscape 6 is vulnerable if the JRE 1.3.0_02 or 1.3.0_01 is used. The default Java runtime environments of Netscape Navigator(TM) and Microsoft Internet Explorer are not vulnerable.

tags | java
MD5 | ab71195c8f247edae12518e705e67f7f
sms.207.snmpXdmid
Posted Sep 1, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #207 - Solaris 2.6, 7, and 8 contains a remotely exploitable buffer overflow in snmpXdmid which allows remote attackers to execute code as root. Cert advisory on this vulnerability available here.

tags | remote, overflow, root
systems | solaris
MD5 | 3ce2d8a3502954267b1ae066cc434b50
sms.206.in-lpd
Posted Sep 1, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #206 - Solaris 2.6, 7, and 8 for Sparc and x86 runs the BSD print daemon which has a buffer overflow allowing remote attackers to execute code as root if they have access to print.

tags | remote, overflow, x86, root
systems | solaris, bsd
MD5 | 1061b4b61e74b650f1b1ef4a1a8684b2
sms.205.in-ftpd
Posted Aug 2, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #205 - The in.ftpd daemon in use by Sun contains the "globbing" bug, a remote root vulnerability, as described in <a href="http://www.cert.org/advisories/CA-2001-07.html"this</a> cert advisory. Vulnerable versions of the OS include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, 5.6_x86, 5.5.1, 5.5.1_x86, 5.5, and 5.5_x86.

tags | remote, web, root
systems | solaris
MD5 | ec55caeb9ae839070cd62fce9ed9e45d
sms.204.bind-tsig
Posted Aug 2, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #204 - Bind v8.2.2p5 and below contains a remote root vulnerability in the TSIG handling code. Vulnerable versions include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, 5.6_x86, 5.5.1, 5.5.1_x86, 5.5, 5.5_x86, 5.4, and 5.4_x86.

tags | remote, root
systems | solaris
MD5 | 7315666b7ba1c2989a13c8280ff5dc68
sms.203.ypbind
Posted Jul 12, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #203 - The ypbind daemon runs on all client and server machines that are set up to use NIS. A buffer overflow vulnerability has been discovered in ypbind which may be exploited by a local or a remote attacker to gain root access. Vulnerable systems include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, 5.6_x86, 5.5.1, 5.5.1_x86, 5.5, 5.5_x86, 5.4, and 5.4_x86.

tags | remote, overflow, local, root
systems | solaris
MD5 | 46e0491127139c68520874f9000b1129
sms.201.java.execute
Posted Jul 12, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #201 - A vulnerability in certain versions of the Java(TM) Runtime Environment may allow malicious Java code to execute unauthorized commands. However, permission to execute at least one command must have been granted in order for this vulnerability to be exploited. Since no permission is granted by default, the circumstances necessary to exploit this vulnerability are relatively rare.

tags | java
MD5 | 8526733307be5d61016adb2be827128d
sms.202.i386.syscalls
Posted May 17, 2001
Site sunsolve.sun.com

Sun Security Bulletin #202 - Solaris x86 (5.6, 5.7, and 5.8 and Trusted Solaris TS8_x86 and TS7_x86) contains vulnerabilities which allow local attackers to control arbitrary addresses in kernel memory.

tags | arbitrary, x86, kernel, local, vulnerability
systems | solaris
MD5 | a09345344d3fb484972284df5c1eafa6
sms.200.arp
Posted Jan 13, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #200 - The arp utility prior to Solaris 8 has stack overflows, allowing local users to execute code as root. Vulnerable versions include Solaris 7, 7_x86, 2.6, 2.6_x86, 2.5.1, 2.5.1_x86, 2.5, 2.5_x86, 2.4 and 2.4_x86.

tags | overflow, local, root
systems | solaris
MD5 | 750d8c6708ba5c638679197739fb3b24
sms.199.jdk-jre
Posted Dec 2, 2000
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #198 - The Java Runtime Environment (JRE) may allow an untrusted Java class to call into a disallowed class. Other vendors Java implementations which are derived from Sun's Java Development Kit (JDK) source base are also vulnerable. JDK/JRE 1.2.2_05 or earlier is affected. Fix available here.

tags | java
MD5 | ed4367807f9bed777e9b66014588f9bd
sms.198.certificate
Posted Oct 27, 2000
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #198 - A specific web browser certificate from Sun may have received outside exposure and needs to be removed if it has been accepted.

tags | web
MD5 | b07ced7e1eeca89988e2034e853724d4
sms.197.java
Posted Aug 24, 2000
Site sunsolve.sun.com

Sun Microsystems Advisory #197 - Sun announces patches for Java Web Server 2.0 and 1.1.3 which relate to a vulnerability with the administration module. It is possible to use the administration module to invoke servlets on a Java Web Server. With carefully crafted JSP tags it is possible to execute arbitrary commands on the Web Server. All versions of the Java Web Server are affected.

tags | java, web, arbitrary
MD5 | 8b627b98edd6fd466de6a5e7d46478e6
sms.196.answerbook
Posted Aug 7, 2000
Site sunsolve.sun.com

Sun Microsystems Security Bulletin - AnswerBook2 below v1.4.2 ships with dwhttpd which has a vulnerability which allows a malicious user to access the administration of AnswerBook2 as well as the ability to run arbitrary commands on the remote host as the webserver user (daemon).

tags | remote, arbitrary
MD5 | 22abb8e88793e21b0641e970077116ab
sms.195.lp
Posted Aug 3, 2000
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #195 - Sun announces patches for Solaris 5.7, 5.7_x86, 5.6, and 5.6_x86 which relate to buffer overflow vulnerabilities in libprint.so.2, and patches for Solaris 5.8, 5.8_x86 5.7, 5.7_x86, 5.6, and 5.6_x86 which relate to a buffer overflow vulnerability in /usr/lib/lp/bin/netpr.

tags | overflow, vulnerability
systems | solaris
MD5 | e809605d692be9b864f6ff145ca44e6d
sms.194.txt
Posted Mar 29, 2000
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #194 - Sun announces the release of patches for Solaris 7 which relate to four vulnerabilities in BIND reported in CERT Advisory CA-99-14 which allow remote attackers to crash or degrade the performance of named.

tags | remote, vulnerability
systems | solaris
MD5 | 1770ef7d71d2935ecee7a51316bba060
sms.193.ddos
Posted Jan 6, 2000

Sun Microsystems Advisory #193 - Distributed denial service tools.

MD5 | 5f6695af876d0c7f6c0dbee8c3dd35ab
sms.192.cde
Posted Dec 31, 1999

Sun Microsystems Security Bulletin #192 - Vulnerabilities in CDE and openwindows. Vulnerable versions include SunOS 5.7, 5.7_x86, 5.6, 5.6_x86, 5.5.1, 5.5, 5.4, 5.3, 4.1.4, and 4.1.3_U1. Vulnerable programs include the ToolTalk messaging utility, ttsession, CDE dtspcd, CDE dtaction, and the CDE ToolTalk shared library.

tags | vulnerability
systems | solaris
MD5 | 8872bf3eace3fc478f608f87350e82c6
sms.191.sadmind
Posted Dec 31, 1999

Sun Security Bulletin #191 - The sadmind program is installed by default on SunOS 5.7, 5.6, 5.5.1, and 5.5. In SunOS 5.4 and 5.3. A buffer overflow vulnerability has been discovered in sadmind which is exploited by a remote attacker to execute arbitrary instructions and gain root access.

tags | remote, overflow, arbitrary, root
systems | solaris
MD5 | 02753042def1c0264f885699fa83b094
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Archive Of 1.4 Billion Creds Found On Dark Web
Posted Dec 12, 2017

tags | headline, hacker, data loss, password
MoneyTaker Steals Millions From US, UK, Russian Banks
Posted Dec 12, 2017

tags | headline, malware, bank, usa, britain, russia, cybercrime, fraud
Web Pioneers Plead To Cancel US Net Vote
Posted Dec 12, 2017

tags | headline, government, usa, fraud
Google Releases Tool To Help iPhone Hackers
Posted Dec 12, 2017

tags | headline, hacker, phone, google, apple
Language Bugs Infest Downstream Software
Posted Dec 11, 2017

tags | headline, flaw
German Spy Agency Warns Of Chinese LinkedIn Espionage
Posted Dec 11, 2017

tags | headline, government, china, cyberwar, germany, spyware, social
Dynamics 365 Sandbox Leaked TLS Certificates
Posted Dec 11, 2017

tags | headline, privacy, microsoft, data loss, flaw, cryptography
Keylogger Uncovered On Hundreds Of HP PCs
Posted Dec 11, 2017

tags | headline, flaw, spyware, backdoor
PlexCoin Scam Founder Sentenced To Jail And Fined $10k
Posted Dec 10, 2017

tags | headline, cybercrime, fraud, scam, cryptography
Google Lifts Lid On FBI Data Requests: Now You Can Read Actual Letters Online
Posted Dec 9, 2017

tags | headline, government, privacy, usa, google, fbi
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close