what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files from Brock Tellier

First Active1999-10-15
Last Active2001-11-22
oracle8.exploit.txt
Posted Nov 22, 2001
Authored by Brock Tellier

A vulnerability exists in Oracle 8.1.5 for UN*X which may allow any user to obtain root privileges. Local root exploit shell script included.

tags | exploit, shell, local, root
SHA-256 | 17d374afd2a8378ded9bbbbbe17182f77ee586f2c4da4eb247fb052a192da311
fastrack.remote.txt
Posted Jan 2, 2000
Authored by Brock Tellier

A vulnerability in Netscape FastTrack 2.01a will allow any remote user to execute commands as the user running the httpd daemon (probably nobody). I've only tested the version of Netscape FastTrack that comes with SCO UnixWare 7.1, 2.01a. I'm not sure what other platforms, if any, are vulnerable. Unixware exploit included.

tags | exploit, remote
systems | unixware
SHA-256 | d75d7676e9ba884cae00eb12d442f7c46825fe70ae4746948d00b7756b541383
majordomo.local.txt
Posted Dec 31, 1999
Authored by Brock Tellier

A vulnerability in majordomo allows local users to gain elevated privileges.

tags | exploit, local
SHA-256 | 792d59158dadd36a7ada42e732b5f076be51ac1491f09ece77427d758fc24205
unixware.netstation.txt
Posted Dec 28, 1999
Authored by Brock Tellier

A vulnerability in IBM's Network Station Manager will allow any local user to gain root privileges.

tags | exploit, local, root
SHA-256 | aac4438238668b605585d43fcc4b4f4ebe45a72c09a4cd9071962bc28a93d82b
unixware.pis.txt
Posted Dec 28, 1999
Authored by Brock Tellier

A vulnerability in "/usr/local/bin/pis" on SCO UnixWare will allow any user to create arbitrary files with group "sys" privileges. A full root compromise is then trivial.

tags | exploit, arbitrary, local, root
systems | unixware
SHA-256 | 6bb80262134ac8ffccd94ff0c09ebbb892bf91d48a90d119fec119e35aea2470
i2odialogd.txt
Posted Dec 24, 1999
Authored by Brock Tellier

Anyone can gain remote root access to a UnixWare 7.1 system by exploiting a vulnerability in the i2odialogd daemon. This daemon is installed and running by default.

tags | exploit, remote, root
systems | unixware
SHA-256 | 036bfe31c03c92e9bc94b4a442b735a8cb7fd6fd7607cdb68240709bed19aff3
solaris.dmispd.txt
Posted Dec 22, 1999
Authored by Brock Tellier

Several holes in the Solaris 2.7 SPARC/x86 dmispd daemon will allow malicious users to do various local and remote DoS attacks and probably more.

tags | exploit, remote, x86, local
systems | solaris
SHA-256 | f473b55e73cc713bf480a073d0ec58518887e272f350177275f1a0e6bf9202b6
xsoldier.c
Posted Dec 16, 1999
Authored by Brock Tellier

A vulnerability in FreeBSD 3.3's xsoldier will allow any user to gain root access. This user does not have to have a valid $DISPLAY to exploit this.

tags | exploit, root
systems | freebsd
SHA-256 | 411e25fa4d0f8f1546ae437eca6b7cd89ef9c9556cec361f9418db59086b8ed4
unixware7.fundamental.txt
Posted Dec 10, 1999
Authored by Brock Tellier

A fundamental flaw in SCO UnixWare's security model will allow any user to gain root, read system files, etc. Any process that gets extra privledges from /etc/security/tcb/privs is vulnerable. Exploit included.

tags | exploit, root
systems | unixware
SHA-256 | e43f1d71568f42ead69639f27b46f790fcc45e7e0ab1b76a9ed368206e498a62
unixware.pkg.exploits.txt
Posted Dec 6, 1999
Authored by Brock Tellier

Most of UnixWare's pkg commands can be exploited to print /etc/shadow, leading to a probable root compromise. Tested on Unixware 7.1. Contains exploits for pkgtrans, pkginfo, pkginstall, pkgcat, and pkgparam.

tags | exploit, root
systems | unixware
SHA-256 | 0bda77b4bfd4fb0d530fdbb0f125b2437e75b360b862295fcd5fbc49d7944cba
unixware.pkg.txt
Posted Dec 6, 1999
Authored by Brock Tellier

The majority of the UnixWare "pkg" command, such as pkginfo, pkgcat, pkgparam, etc, are vulnerable to a bug which will allow any user to read any file on the system as a result of their additional "dacread" permission in the privs file.

tags | exploit
systems | unixware
SHA-256 | eed02a6b7a86a7d3af4ec8b75523b340d16c847a4c9f0c75df048402aa31a77e
unixware7.mail.txt
Posted Dec 6, 1999
Authored by Brock Tellier

/var/mail is mode 777 on unixware. As such, any user may create a file called /var/mail/ with a mode readable by him and trap all incoming mail. Afraid of getting caught? chown the file to (see my advisory on this subject), leaving it still world-readable.

tags | exploit
systems | unixware
SHA-256 | 46ae8ff88d8e772a92c9ba19350af2ed03967745531fb28c4fa5017049596f5c
unixware.auto.txt
Posted Dec 4, 1999
Authored by Brock Tellier

Although UnixWare's /usr/X/bin/xauto is NOT suid/sgid, we can still overflow a buffer within it and gain root privileges. Exploit included.

tags | exploit, overflow, root
systems | unixware
SHA-256 | 1c1b11b96493a0a6c636a63b841987b7379e3ca31f6adcf1fb5f261a46c6bd93
unixware.chown.txt
Posted Dec 4, 1999
Authored by Brock Tellier

Unixware allows regular users to use chown to give files away to other users. Tested on Unixware 7.1.

tags | exploit
systems | unixware
SHA-256 | 6a4b1a07cc91d4a9530defc0981f88a0f28de02c2709b9e4a672624b2b3113a4
unixware7.gethostbyname.txt
Posted Dec 2, 1999
Authored by Brock Tellier

A serious bug exists in UnixWare 7.1's libc. A buffer overflow in gethostbyname() will allow any user to obtain elevated privileges. My demonstration exploit happened to be "arp", but any program calling this function will do.

tags | exploit, overflow
systems | unixware
SHA-256 | 33ff95b3f628171302cc481f7d84bd468b39f1cbee5eefe342b2237ec3c91cdd
unixware7.uidadmin.txt
Posted Dec 2, 1999
Authored by Brock Tellier

SCO UnixWare 7.1's sgid-sys /usr/bin/uidadmin will allow any user to gain root privileges as a result of it's ability to write *ANY* file, not just those traditionally writable by gid-sys. Exploit for 7.1 included, 7.0 is vulnerable as well.

tags | exploit, root
systems | unixware
SHA-256 | e3601c95a78b23bc230de20b8d8323da8152ce4edc6999c9572c383340376a25
freebsd.seyon.txt
Posted Dec 2, 1999
Authored by Brock Tellier

Seyon, shipped with FreeBSD 3.3-RELEASE has several vulnerabilities. The problem is that seyon is still installed setgid dialer in FreeBSD, allowing a local user can grant himself priviliges which allow access to anything that requires group dialer, including modem devices.

tags | exploit, local, vulnerability
systems | freebsd
SHA-256 | a9642539381b9b2c0b68f11b82b75f51cf840c23814a843007b8cb83175e7c42
solaris.chkperm+arp.txt
Posted Dec 2, 1999
Authored by Brock Tellier

/usr/vmsys/bin/chkperm and /usr/sbin/arp can be used to read bin-owned files. Tested on Solaris 2.6 and 2.7, sparc edition.

tags | exploit
systems | solaris
SHA-256 | f90b3fcc752af63f6b5d54d3b5905eca70e3ace2ce6af776755dca4e9c75ee57
xmindx.c
Posted Dec 1, 1999
Authored by Brock Tellier

The version of xmindpath shipped with FreeBSD 3.3 has a local buffer overflow. Exploit gives euid uucp.

tags | exploit, overflow, local
systems | freebsd
SHA-256 | 5d52e1a5419ac5a1c0569f83febf0226fe7e2f7a12ae55f4a5ede2a4ea222568
angband.c
Posted Dec 1, 1999
Authored by Brock Tellier

The version angband shipped with FreeBSD 3.3-RELEASE has a buffer overflow vulnerability. Exploit yields egid of group games.

tags | exploit, overflow
systems | freebsd
SHA-256 | 44b73b99876799ae46c66c8fa966417aafad596ff1a5346c51c0eae2a3e456e5
gdcx.c
Posted Dec 1, 1999
Authored by Brock Tellier

gdc exploit for gated-3.5.11 included on Freebsd-3.3 instalation CD yields euid=0(root). By default, only group wheel (or whatever your trusted gated group is) and root can run gdc.

tags | exploit, root
systems | freebsd
SHA-256 | daf532f5a241b630b4257fee36d298e5ae539656328096a75c7b55b9f5f48468
faxalter.txt
Posted Nov 4, 1999
Authored by Brock Tellier

A vulnerability exists in "faxalter", part of the hylafax-4.0.2 package which will allow any user gain uucp and possibly root privs. Includes FreeBSD exploit.

tags | exploit, root
systems | freebsd
SHA-256 | 68696f6c129b8107698b0a9eed8e8c03714dd4c57913fef0990702c86d7d68a3
amanda.backup.txt
Posted Nov 2, 1999
Authored by Brock Tellier

The Amanda backup package has a several vulnerabilities which will allow any user to gain root privs. Includes exploit for FreeBSD. Other OS's that are probably vulnerable include RedHat ?.?, TurboLinux, PowerTools CD, and SuSE 6.2.

tags | exploit, root, vulnerability
systems | linux, redhat, freebsd, suse
SHA-256 | cd4b43d16583bbc925d634ec7e84deded1e5b3df2fcd67705805e29ebc0e2505
SCOUNIX_shadow_exploit.txt
Posted Oct 15, 1999
Authored by Brock Tellier

Any user may overwrite any file with group auth (i.e. /etc/shadow, /etc/passwd) using /etc/sysadm.d/bin/userOsa.

tags | exploit
SHA-256 | efdff100c4986b360fdb21f715839b67fb3d8d0b39aa721df77706513060b1a7
SCO_OpenServer_exploit.txt
Posted Oct 15, 1999
Authored by Brock Tellier

An overflow in /opt/K/SCO/Unix/5.0.5Eb/.softmgmt/var/usr/bin/cancel which will allow any user to gain lp privs.

tags | exploit, overflow
systems | unix
SHA-256 | 9a4e597b84c8c1eb31bb630c9cc574cac8e99b62e17a606be42a39e44a6790f1
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close