exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Alex Wheeler

First Active2005-07-28
Last Active2006-05-22
novell_ndps_advisory.pdf
Posted May 22, 2006
Authored by Alex Wheeler, Ryan Smith | Site hustlelabs.com

Hustle Labs Advisory - There is an integer overflow present that affects Novell Windows clients and Novell Netware server and Novell Open Enterprise server. All versions of Novell Netware and Novell Netware Client for Windows are affected. All Netware based versions of Novell Open Enterprise Server are affected. Detailed analysis provided.

tags | advisory, overflow
systems | windows
SHA-256 | 435daa5ce9ab016eefbb6be70ac9be842be30a1b33f6b52faa8e122246865e00
symantecav.txt
Posted Dec 28, 2005
Authored by Alex Wheeler | Site rem0te.com

The Symantec Antivirus Library provides file format support for virus analysis. During decompression of RAR files Symantec i s vulnerable to multiple heap overflows allowing attackers complete control of the system(s) being protected. These vulnerabilities can be exploited remotely without user interaction in default configurations through common protocols such as SMTP.

tags | advisory, overflow, vulnerability, protocol, virus
SHA-256 | dcbde29aba5cd0432baf2e97646ba98b60fd26042acab5d3a9d921591ee5b1fe
kaspersky.pdf
Posted Oct 6, 2005
Authored by Alex Wheeler

The Kaspersky Antivirus Library provides file format support for virus analysis. During analysis of cab files, Kaspersky is vulnerable to a heap overflow allowing attackers complete control of the system(s) being protected. This vulnerability can be exploited remotely without user interaction in default configurations through common protocols such as SMTP, SMB, HTTP, and FTP.

tags | advisory, web, overflow, protocol, virus
SHA-256 | af434396cefd4db1acc36d0c3508f05a3a6511670795823b7bdb6f62ac153685
zlaveOLE.txt
Posted Aug 14, 2005
Authored by Alex Wheeler

A security vulnerability existed in the anti-virus engine of specific versions of ZoneAlarm Anti-Virus and ZoneAlarm Security Suite (ZoneAlarm and ZoneAlarm Pro are not affected.) The vulnerability was caused due to an integer overflow in the Vet anti-virus engine (VetE.dll) when analyzing OLE streams. This can be exploited to cause a heap-based buffer overflow via a specially crafted Microsoft Office document.

tags | advisory, overflow, virus
SHA-256 | abceb822d39f24e96444992c0b7cb55f415bb170d323db66f5e7c797b94aceb8
caVuln.txt
Posted Aug 14, 2005
Authored by Alex Wheeler | Site rem0te.com

Computer Associates Vet library provides antivirus scan engine capabilities. Vet scan engines allow products to analyze various streams for malware. Vet is vulnerable to an integer wrap during the analysis of an OLE stream. The integer wrap causes an arbitrary heap overflow with no character restrictions allowing remote attackers control of the system(s) Vet is protecting.

tags | advisory, remote, overflow, arbitrary
SHA-256 | c4e6ac4f3f3118a3c7dcd8f30132e256ee811e86703d139084b225e408b0b4fc
zenworks.txt
Posted Aug 14, 2005
Authored by Alex Wheeler

Successful exploitation of Novell ZENworks allows attackers unauthorized control of related data and privileges on the machine and network.

tags | advisory
SHA-256 | 675bd95a6c61ec70ddbfeed484b02dfcfb969f70e96bb8ec044f07d61ce04d33
clamav.pdf
Posted Jul 28, 2005
Authored by Neel Mehta, Alex Wheeler

Clam AntiVirus (ClamAV) versions 0.86.1 and below suffer from remote heap overflows.

tags | advisory, remote, overflow
SHA-256 | d1fb6fbca8fea0d2ff3d187e619c601048b6ef729562695ccc5fe2f00936a6d1
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close