Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed

Files from Karol Wiesek

Email addresskarol at
First Active2002-11-01
Last Active2009-08-07
iDEFENSE Security Advisory 2009-08-04.2
Posted Aug 7, 2009
Authored by Karol Wiesek, iDefense Labs | Site

iDefense Security Advisory 08.04.09 - Local exploitation of an arbitrary file creation vulnerability in IBM Corp.'s Advanced Interactive eXecutive (AIX) Operating System allows attackers to execute arbitrary code with super-user privileges. iDefense has confirmed the existence of this vulnerability in IBM Corp.'s AIX version 5.3. Other versions may also be affected.

tags | advisory, arbitrary, local
systems | aix
MD5 | 8147cac303fc662744bbe8d28f399b65
Posted Jul 10, 2008
Authored by Karol Wiesek | Site

Two vulnerabilities exist in the update function for Panda Security ActiveScan version 2.0. Remote buffer overflow exploit included.

tags | exploit, remote, overflow, vulnerability
MD5 | c2ba88906e42f6e782f1c20b44340709
Posted Aug 18, 2006
Authored by Karol Wiesek | Site

Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default.

tags | exploit, local, root
systems | linux, mandrake
MD5 | dab61de17ed00b1aceccf8b0697fe42e
Posted Apr 17, 2005
Authored by Karol Wiesek

Vixie crontab allows reading other user's crontabs. Tested on FC3 with vixie-cron-4.1-24_FC3.

tags | exploit
MD5 | 06354dd4c33cfef8fa979d0c4b5b4515
iDEFENSE Security Advisory 2005-02-07.t
Posted Feb 23, 2005
Authored by Karol Wiesek, iDefense Labs | Site

iDEFENSE Security Advisory 02.07.05 - Remote exploitation of a command injection vulnerability in the Squirrelmail S/MIME plugin allows web mail users to execute arbitrary commands with the privileges of the web server.

tags | advisory, remote, web, arbitrary
MD5 | 307bfe8c873d565743535ec655774bf0
Posted Dec 11, 2004
Authored by Karol Wiesek

Buffer overflows have been discovered in ncplogin and ncpmap in ncpfs.

tags | advisory, overflow
MD5 | 7afe873a3c2de6c146b55bbaaa492ed3
iDEFENSE Security Advisory 2004-11-15.t
Posted Nov 20, 2004
Authored by Karol Wiesek, iDefense Labs | Site

iDEFENSE Security Advisory 11.15.04 - Multiple vulnerabilities have been found in Fcron 2.0.1 and 2.9.4. Local exploitation of vulnerabilities in the fcronsighup component of Fcron may allow users to view the contents of root owned files, bypass access restrictions, and remove arbitrary files or create arbitrary empty files.

tags | advisory, arbitrary, local, root, vulnerability
advisories | CVE-2004-1030, CVE-2004-1031, CVE-2004-1032, CVE-2004-1033
MD5 | ed312db2703e2ef3d74583afd5c6360e
iDEFENSE Security Advisory 2004-11-08.t
Posted Nov 10, 2004
Authored by Karol Wiesek, iDefense Labs | Site

iDEFENSE Security Advisory 11.08.04 - Remote exploitation of an input validation error in Samba could allow an attacker to consume system resources and potentially cause the target system to crash.

tags | advisory, remote
advisories | CVE-2004-0930
MD5 | eeb9deef0bf252b50f560d80d13a7dda
Posted Oct 26, 2004
Authored by Karol Wiesek

cPanel 9.4.1 allows logged in users to change permission of any file to 755.

tags | advisory
MD5 | a1f10723c5e8bdfe91a178a8ea930a00
Posted Oct 26, 2004
Authored by Karol Wiesek

cPanel 9.4.1 allows logged in users the ability to change ownership of any file to their uid:gid.

tags | advisory
MD5 | aff8db13eba0ffc7582d45dc04418fd2
Posted Oct 26, 2004
Authored by Karol Wiesek

cPanel 9.4.1 is susceptible to a classic symbolic link attack.

tags | advisory
MD5 | a297f531d4d9ee531fa3ecbbfca4cc25
Posted Oct 7, 2004
Authored by Karol Wiesek | Site

Samba versions 2.2.11 and below and versions below and equal to 3.0.5 allow a remote attacker that ability to gain access to files that exist outside of the share's defined path. Such files must still be readable by the account used for the connection.

tags | advisory, remote
MD5 | 557f0e83f9827bdf1169f7659e894be9
iDEFENSE Security Advisory 2004-05-12.t
Posted May 13, 2004
Authored by Karol Wiesek, iDefense Labs, Greg MacManus | Site

iDEFENSE Security Advisory 05.12.04: Exploitation of an input validation vulnerability within Opera Software ASA.'s Opera Web Browser could allow remote attackers to create or truncate arbitrary files. The problem specifically exists within the telnet URI handler. Opera does not check for '-' at the beginning of hostname passed through the handler, which lets options pass to the telnet program, allowing file creation or overwriting.

tags | advisory, remote, web, arbitrary
MD5 | 23806cfad7c62fa62b97951faae8296c
iDEFENSE Security Advisory 2003-06-16.t
Posted Jun 17, 2003
Authored by Karol Wiesek, iDefense Labs | Site

iDEFENSE Security Advisory 06.16.03: The pam_wheel module of Linux-PAM uses getlogin() in an insecure manner, thereby allowing attackers to bypass certain restrictions. The pam_wheel module is often used with the su command to allow users belonging to a trusted group to utilize the command without supplying a password. The module utilizes the getlogin() function to determine the name of the currently logged in user. This name is then compared against a list of members of a trusted group as specified in the configuration file. If the trust option is enabled in the pam_wheel configuration file and the use_uid option is disabled, any local user may spoof the username returned by getlogin() and gain access to a super-user account without supplying a password.

tags | exploit, local, spoof
systems | linux
MD5 | ac13337671c6ada04dcb6c4a7dec904e
iDEFENSE Security Advisory 2003-01-21.t
Posted Jan 23, 2003
Authored by Karol Wiesek, iDefense Labs | Site

iDEFENSE Security Advisory 01.21.03: Buffer Overflows in Mandrake Linux printer-drivers Package. Three vulnerabilities exist, the worst of which allows local root compromise. Overflows in the mtink and escputil binaries, which are set group id sys, allow an attacker to gain sys group privileges. A race condition in the ml85p binary, which is set user id root, allows an attacker to create a file with super user privileges.

tags | advisory, overflow, local, root, vulnerability
systems | linux, mandrake
MD5 | fb32a4acc9576b038a89bcfa8ef7a947
Posted Nov 1, 2002
Authored by David Endler, Karol Wiesek | Site

iDEFENSE Security Advisory 10.31.2002b - Prometheus v6.0 and below is a web application framework written in PHP which allows remote attackers to execute arbitrary commands.

tags | remote, web, arbitrary, php
MD5 | f8ac63352b5b5fc5aaa268b12f1318a3
Page 1 of 1

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    20 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By