what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Imran Ghory

Email addressimranghory at gmail.com
First Active2005-04-14
Last Active2005-08-05
unzip552.txt
Posted Aug 5, 2005
Authored by Imran Ghory

If a malicious local user extracts a file using unzip 5.52 in a directory that they have write access to, a TOCTOU bug can be exploited to change the permission of any file belonging to that user.

tags | advisory, local
SHA-256 | 55b2c4f64e7c54f23df8ac2775729729ccfb5e0dccfe171b11c2faff2adf5173
rpdump_race_condition.txt
Posted Apr 18, 2005
Authored by Imran Ghory

Pine mail's rpdump is vulnerable to a race condition allowing local users to overwrite files which are writable by anyone using Pine.

tags | advisory, local
SHA-256 | de5bb033829419007c7d3461177a2e00c37c9a5805fb998a8137ae3ed4e1617b
gnu521race.txt
Posted Apr 17, 2005
Authored by Imran Ghory

mkdir, mknod, mkfifo included in GNU Core Utilities 5.2.1 suffer from race conditions.

tags | advisory
SHA-256 | 5d46c6e44436a1f3a69fe74eafdae7b644badbdee503c3f69bf1cabbc47c5aea
gzipPerm.txt
Posted Apr 17, 2005
Authored by Imran Ghory

If a malicious local user has write access to a directory in which a target user is using gzip to extract or compress a file to then a TOCTOU bug can be exploited to change the permission of any file belonging to that user. Versions 1.2.4 and 1.3.3 of gzip are affected.

tags | advisory, local
SHA-256 | 5854e58147b30441763747f7c80602edbb8467d416034d870faf6f5a84ee25a5
bzip2102.txt
Posted Apr 14, 2005
Authored by Imran Ghory

If a malicious local user has write access to a directory in which a target user is using bzip2 to extract or compress a file to then a TOCTOU bug can be exploited to change the permission of any file belonging to that user. Versions 1.0.2 and below are affected.

tags | advisory, local
SHA-256 | e96d285c58912244431cfbe1842d9191f1d0f9e8a20c752c7b40d01dd92a639e
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close