exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 33 RSS Feed

Files from Jon Oberheide

Email addressjon at oberheide.org
First Active2005-03-17
Last Active2012-09-14
Linux udev Netlink Local Privilege Escalation
Posted Sep 14, 2012
Authored by Kingcope, Jon Oberheide, egypt | Site metasploit.com

Versions of udev < 1.4.1 do not verify that netlink messages are coming from the kernel. This allows local users to gain privileges by sending netlink messages from userland.

tags | exploit, kernel, local
advisories | CVE-2009-1185
SHA-256 | a339530d415e4d147ac5e6556a603790385a27c54518e11e95069181161f0615
Linux Kernel Econet Privilege Escalation
Posted Sep 6, 2011
Authored by Jon Oberheide

This exploit leverages three vulnerabilities to escalate privileges. The primary vulnerability is a kernel stack overflow, not a stack buffer overflow as the CVE description incorrectly states. This may be the first public exploit for a kernel stack overflow, and it turns out to be a bit tricky due to some particulars of the econet vulnerability. It involves the econet_sendmsg function, ec_dev_ioctl function, and the ipc subsystem. Linux kernel versions prior to 2.6.36.2 are affected.

tags | exploit, overflow, kernel, vulnerability
systems | linux
advisories | CVE-2010-3848, CVE-2010-3850, CVE-2010-4073
SHA-256 | 2d37f538eada970a47c67a722a79c8dce6b69007ccd606d4168c8d3c2c9a2c21
Linux 2.6 Kernel ACPI custom_method Privilege Escalation
Posted Dec 20, 2010
Authored by Jon Oberheide

Linux kernel versions prior to 2.6.37-rc2 ACPI custom_method local root privilege escalation exploit.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2010-4347
SHA-256 | 8e96652e9d0319db605344763c66b55b3366e06bdb9f068aa4c881ffd48bd76f
Exploiting Stack Overflows In The Linux Kernel
Posted Nov 29, 2010
Authored by Jon Oberheide

Whitepaper called Exploiting Stack Overflows in the Linux Kernel.

tags | paper, overflow, kernel
systems | linux
SHA-256 | 016bb77dac51e83a5b49b22d5da3ab33e11a12156f1d991c106ca0fd1204189b
Linux Kernel pktcdvd Kernel Memory Disclosure
Posted Sep 29, 2010
Authored by Jon Oberheide

Linux kernel versions prior to 2.6.36-rc6 pktcdvd kernel memory disclosure exploit.

tags | exploit, kernel
systems | linux
advisories | CVE-2010-3437
SHA-256 | bcaeadc0f0bddd7bd8801078daa8979e9919c284cca685426f03dee6b47267a6
Linux Kernel CAN BCM Privilege Escalation Exploit
Posted Aug 28, 2010
Authored by Jon Oberheide

Linux Kernel versions prior to 2.6.36-rc1 CAN BCM privilege escalation exploit.

tags | exploit, kernel
systems | linux
advisories | CVE-2010-2959
SHA-256 | 72e086a014a41a623ca930856f57c9a2e1ea6f163b29e800d67473f6e614b2f1
Linux Kernel 2.6.33.3 SCTP INIT Denial Of Service
Posted Aug 12, 2010
Authored by Jon Oberheide

Linux kernel versions 2.6.33.3 and below SCTP INIT remote denial of service exploit.

tags | exploit, remote, denial of service, kernel
systems | linux
advisories | CVE-2010-1173
SHA-256 | a35d8f03321604b0eee056d633f06be3f14c328a7fc6b0c000888fa3b75af760
Linux Kernel 2.6.34-rc3 ReiserFS xattr Privilege Escalation
Posted Apr 10, 2010
Authored by Jon Oberheide

Linux Kernel versions 2.6.34-rc3 and below ReiserFS xattr privilege escalation exploit.

tags | exploit, kernel
systems | linux
advisories | CVE-2010-1146
SHA-256 | ec3e3da22ac58162ce7be7447d104d5ca1384de9ba4a5958c34ad37d6cb977dc
ISC DHCP dhclient Buffer Overflow
Posted Nov 17, 2009
Authored by Jon Oberheide

ISC DHCP dhclient scripts_write_params() stack buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2009-0692
SHA-256 | 2014e6abc56455168433974101c55c09624023f1879081dc6ce5c0c8823eb70e
Dam Burst 1.2
Posted Sep 29, 2009
Authored by Jon Oberheide | Site jon.oberheide.org

Dam Burst is a simple utility that allows an unprivileged user to disable the censorship functionality of the Green Dam Youth Escort software. Dam Burst operates by injecting code into a running application and removing the Green Dam hooks that enable it to monitor and block user activity, effectively restoring the running application to its original uncensored state.

SHA-256 | 0673f6b2281b49995b2f6ade3bc6f690015861420aff1882e86d5ffc75e31757
Linux 2.6 Stack Disclosure
Posted Sep 1, 2009
Authored by Jon Oberheide

Linux 2.6 kernel versions prior to 2.6.31-rc7 AF_IRDA 29 byte stack disclosure exploit.

tags | exploit, kernel
systems | linux
SHA-256 | 90a78e8b742cc2eecf0c9710b57319b91e493fda7abff23b8e6a6810d96a39b5
Linux 2.6.31-rc7 AF_LLC getsockname Stack Disclosure
Posted Aug 25, 2009
Authored by Jon Oberheide

Linux kernel versions 2.6.31-rc7 and below AF_LLC getsockname 5-byte stack disclosure exploit.

tags | exploit, kernel
systems | linux
SHA-256 | b0e4c47e044db1a597742e8115493357309acc15b1e7785990b678662b54fbb2
Linux Kernel 2.6 cfg80211 Denial Of Service
Posted Aug 18, 2009
Authored by Jon Oberheide

Linux kernel versions prior to 2.6.30.5 cfg80211 remote denial of service exploit.

tags | exploit, remote, denial of service, kernel
systems | linux
SHA-256 | 45970a756cf7a9942c7a2e7c7b0dc26134f658d3ccb8fb4c7b15f7dd91b61591
Linux Kernel procfs Memory Disclosure
Posted Aug 5, 2009
Authored by Jon Oberheide

procfs memory disclosure exploit for Linux kernel versions prior to 2.6.14.6.

tags | exploit, kernel
systems | linux
advisories | CVE-2005-4605
SHA-256 | a870ac7b48160c6a68b2fabfa0d763085a457e0261e1bcfb589827d445df5e4d
Linux Kernel sigaltstack Stack Disclosure
Posted Aug 5, 2009
Authored by Jon Oberheide

Linux kernel versions 2.6.31-rc5 and below sigaltstack 4-byte stack disclosure exploit.

tags | exploit, kernel
systems | linux
SHA-256 | 52f0e66a6980d794824ef33af3f3f2f76b062c3ba6b5b2d6ca1c7555db98f160
ISC DHCP dhclient Buffer Overflow
Posted Jul 28, 2009
Authored by Jon Oberheide

ISC DHCP dhclient versions below 3.1.2p1 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
advisories | CVE-2009-0692
SHA-256 | 3349faa893f5026dc2f5ad7d730fa3755ae56fe23834c0c9677e3b5a0eee16fc
OpenSSL 0.9.8.h DTLS Denial Of Service
Posted Jun 4, 2009
Authored by Jon Oberheide

OpenSSL versions below 0.9.8i DTLS ChangeCipherSpec remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2009-1386
SHA-256 | c423dfdd2b8cf9bdc5f6306e55b415b44cbfafa64e6fbbae22549b1a42b3810c
OpenSSL 0.9.8k Memory Exhaustion
Posted May 19, 2009
Authored by Jon Oberheide

OpenSSL versions 0.9.8k and 1.0.0-beta2 DTLS remote memory exhaustion denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2009-1378
SHA-256 | 707ecaa806e575970e45edb096353e9e70a251a1b313a57024ad97ba671abea1
Linux Kernel 2.6 UDEV Privilege Escalation
Posted May 1, 2009
Authored by Jon Oberheide

Linux 2.6 kernel udev versions below 1.4.1 local privilege escalation exploit.

tags | exploit, kernel, local
systems | linux
advisories | CVE-2009-1185
SHA-256 | bd6992d84b7f36f4d79d12ce8930abcac49295702f6e9938849399ecc5ab82cd
libvirt_proxy 0.5.1 Privilege Escalation
Posted Apr 28, 2009
Authored by Jon Oberheide

libvirt_proxy versions 0.5.1 and below local privilege escalation exploit.

tags | exploit, local
advisories | CVE-2009-0036
SHA-256 | d6a86f33d2c8f6b21caeda9e12fe29f7be896e99bc24a3e50439a596759674f8
pam-krb5 Privilege Escalation
Posted Mar 30, 2009
Authored by Jon Oberheide

pam-krb5 versions below 3.13 local privilege escalation exploit.

tags | exploit, local
advisories | CVE-2009-0360
SHA-256 | ed6caf64e916f13fb22ba283a61616d7a4668b0cdd50588a48572cfcd9deedfb
D-Bus Daemon Denial Of Service
Posted Jan 20, 2009
Authored by Jon Oberheide

D-Bus Daemon versions prior to 1.2.4 remote denial of service exploit that uses a message with a malformed signature.

tags | exploit, remote, denial of service
advisories | CVE-2008-3834
SHA-256 | 861cdf88bd58b60b9c5f7576049675820e167e1b3bd344ffabceb4395c096618
Linux Kernel SCTP Kernel Memory Disclosure Exploit
Posted Dec 31, 2008
Authored by Jon Oberheide

Linux Kernel versions below 2.6.26.4 SCTP kernel memory disclosure exploit.

tags | exploit, kernel
systems | linux
advisories | CVE-2008-4113
SHA-256 | 7e0bf7e87eb0ba0da140e07ab53740c3709083af939cf0f1e2a5c0226a2ac6db
CUPS Privilege Escalation Exploit
Posted Dec 30, 2008
Authored by Jon Oberheide

CUPS versions below 1.3.8-4 privilege escalation exploit.

tags | exploit
advisories | CVE-2008-5377
SHA-256 | fcaa2f0c97580164e7c63808d96436a666a8c9465fb6a71edc363e7961c2dc20
Avahi Remote Denial Of Service Exploit
Posted Dec 22, 2008
Authored by Jon Oberheide

Avahi mDNS daemon versions below 0.6.24 remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2008-5081
SHA-256 | 21710acf10701ccd19d56410ec9950524c32406536eccbcb87f1aab4060bb059
Page 1 of 2
Back12Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close