Twenty Year Anniversary
Showing 1 - 15 of 15 RSS Feed

Files from NGSSoftware

Email addressresearch at ngssoftware.com
First Active2002-05-24
Last Active2005-01-06
Next Generation Security Advisory 205012005I
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005I - IBM's DB2 database server contain four XML functions that can be used to read and write files on the system. Systems Affected: DB2 8.1.

tags | advisory
MD5 | 2fecab13d56fd188f38f7cf181893547
Next Generation Security Advisory 205012005H
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005H - IBM's DB2 database server contain four XML functions that suffer from stack based buffer overflow vulnerabilities. Systems Affected: DB2 8.1.

tags | advisory, overflow, vulnerability
MD5 | 8db4cbce0d6b52abd45c6a9699fbc990
Next Generation Security Advisory 205012005G
Posted Jan 6, 2005
Authored by NGSSoftware, Chris Anley | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005G - IBM DB2 is vulnerable to denial of service conditions when processing certain function calls. Systems Affected: DB2 8.1.

tags | advisory, denial of service
MD5 | 54b91e3921d78d0c569e18b878a47779
Next Generation Security Advisory 205012005F
Posted Jan 6, 2005
Authored by NGSSoftware, Chris Anley | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005F - Almost all shared memory sections and events in the Windows version of DB2 have weak permissions; all sections can be read and written by Everyone, and all events can be set and waited on by Everyone. This results in a number of security issues relating to the privileges of local users. Systems Affected: DB2 8.1.

tags | advisory, local
systems | windows
MD5 | 0023200926f34002fb0327f7079a3c6e
Next Generation Security Advisory 205012005E
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005E - IBM's DB2 database server, when configured for Satellite Administration includes a number of SQL functions. One of these, the SATENCRYPT function, suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1.

tags | advisory, overflow
MD5 | e46a1800152ce2d5b88b3ad30901cb4c
Next Generation Security Advisory 205012005D
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005D - IBM's DB2 JDBC Applet Server suffers from a stack based buffer overflow vulnerability that can be exploited remotely without a user ID or password. Systems Affected: DB2 8.1.

tags | advisory, overflow
MD5 | e2de9579efdb785254e18ac4794b67fb
Next Generation Security Advisory 205012005C
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005C - IBM's DB2 database server suffers from a stack based buffer overflow vulnerability when using call. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
MD5 | b9088eac807c12028677ae46c288e2ac
Next Generation Security Advisory 205012005B
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005B - libdb2.so.1, one of the libraries supplied with IBM's DB2 database server suffers from a buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
MD5 | 32f5e1aeb6ca63b4f2aa831a0f3315dc
Next Generation Security Advisory 205012005A
Posted Jan 6, 2005
Authored by David Litchfield, NGSSoftware | Site nextgenss.com

NGSSoftware Insight Security Research Advisory #NISR05012005A - IBM's DB2 database server suffers from a local attack whereby passing an overly parameter to the db2fmp binary will overflow a stack based buffer. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow, local
MD5 | e2044e2653fa1efb000397247dbfa538
Next Generation Security Advisory 223122004L
Posted Dec 31, 2004
Authored by David Litchfield, NGSSoftware | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004L - IBM's DB2 database server contains a procedure, generate_distfile. This procedure suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
MD5 | cdd3d73cfa50d9f5fe7a95749dd99e9d
Next Generation Security Advisory 223122004K
Posted Dec 31, 2004
Authored by Mark Litchfield, NGSSoftware | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004J - IBM's DB2 database server contains a function, rec2xml, used to format a string in XML. This function suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
MD5 | 8131309f4210d2ed68cd045c14a04b82
Next Generation Security Advisory 2004.7
Posted Aug 26, 2004
Authored by FJ Serna, NGSSoftware | Site ngsec.com

Next Generation Advisory NGSEC-2004-7 - NtRegmon, the Registry monitoring utility for Windows, suffers from an unvalidated pointer referencing. While any privileged user is using NtRegmon, any local and unauthorized user can crash the system. Versions below 6.12 are susceptible.

tags | advisory, local, registry
systems | windows
MD5 | 0fe7c24bff3aa28d43b7413f8a80d29e
Next Generation Security Advisory 2004.6
Posted Aug 18, 2004
Authored by FJ Serna, NGSSoftware | Site ngsec.com

Next Generation Advisory NGSEC-2004-6 - The IPD, or Integrity Protection Driver, from Pedestal Software suffers from an unvalidated pointer referencing in some of its kernel hooks. Any local and unauthorized user can crash the system with some simple coding skills. Versions up to 1.4 are affected.

tags | advisory, kernel, local
MD5 | 0c147bf2fcf8f63236393de9fcf0d409
Next Generation Security Advisory 2002.4
Posted Nov 19, 2002
Authored by FJ Serna, NGSSoftware | Site ngsec.com

The iPlanet WebServer v4.x up to SP11 contains vulnerabilities which allow remote root command execution by using a cross site scripting vulnerability to redirect the Administrator's browser to a URL in a vulnerable perl script that will cause the open() command injection.

tags | advisory, remote, root, perl, vulnerability, xss
MD5 | d4f6a4c950dcbce4f1a86c95db657557
Next Generation Security Advisory 2002.3
Posted May 24, 2002
Authored by FJ Serna, NGSSoftware | Site ngsec.com

Next Generation Advisory NGSEC-2002-3 - Sun Solaris in.talkd is vulnerable to a remote root format string bug. An attacker can request a talk session with a especially crafted user field able to write memory and gain control of the flow of the in.talkd.

tags | remote, root
systems | solaris
MD5 | 0ded2c3c660a43fc9c4128a34c57bf12
Page 1 of 1
Back1Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    16 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close