exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Mark Rowe

Email addressmark.rowe at pentest-limited.com
First Active2002-07-18
Last Active2004-08-12
ptl-2004-03.txt
Posted Aug 12, 2004
Authored by Matt Moore, Mark Rowe | Site pentest.co.uk

An unauthenticated remote attacker can submit various malformed service requests via Bluetooth, triggering a buffer overflow and executing arbitrary code on vulnerable devices using WIDCOMM Bluetooth Connectivity Software. All releases prior to 3.0 are affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0775
SHA-256 | 5ec2b26e117a8391be03708d270e39f990dae23341935158de2640217287f268
ptl-2003-01
Posted Oct 1, 2003
Authored by Mark Rowe | Site pentest.co.uk

IBM DB2 versions 7.2 for Linux and Windows are both vulnerable to a stack overflow in the LOAD command that is both locally and remotely exploitable.

tags | advisory, overflow
systems | linux, windows
advisories | CVE-2003-0836
SHA-256 | c9695c6bff3ba24669ceadb74773cb61399b70ef6ad79da481b669121de0b01a
tivoli.managednode.txt
Posted Jul 18, 2002
Authored by Mark Rowe, Jeff Fay

A remove buffer overflow in IBM Tivoli ManagedNode v3.6.x through 3.7.1 allows attackers to crash the spider process or execute arbitrary code on TMR ManagedNotes. An overly long GET request results in a buffer overflow with registers being overwritten with user supplied data, resulting in code execution as SYSTEM on NT or root on Unix. Tested on Solaris 8 (Sparc).

tags | overflow, arbitrary, root, code execution
systems | unix, solaris
SHA-256 | 8cfc7d24ca4e2b6ff9a79befe4e32557c6ab3305892f9376b8d975a511dce55c
tivoli.endpoint.txt
Posted Jul 18, 2002
Authored by Mark Rowe, Jeff Fay

A remote buffer overflow in IBM Tivoli Management Framework v3.6.x through 3.7.1 running on tcp port 9495 allows attackers to deny service or execute arbitrary code. An overly long GET request results in a buffer overflow with registers being overwritten with user supplied data, resulting in code execution as SYSTEM on NT or root on Unix. Tested on Windows 2000 and NT4 SP6a.

tags | remote, overflow, arbitrary, root, tcp, code execution
systems | windows, unix
SHA-256 | e92e32242706e69a03bcae5286f23fa186f7abf143db928b16d7dc2496525c24
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close