exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Jean-Sebastien Guay-Leroux

Email addressjean-sebastien at guay-leroux.com
First Active2006-02-26
Last Active2007-05-04
zoo-loop.txt
Posted May 4, 2007
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

Various anti-virus vendors are susceptible to an infinite loop denial of service vulnerability when analyzing the ZOO archives.

tags | advisory, denial of service, virus
SHA-256 | 3b658cea35cfa9bde250c49e4ba202f14f79b5eb8fcd042fa5192a57cab9a7d6
barracude-uulib.txt
Posted Dec 6, 2006
Authored by Jean-Sebastien Guay-Leroux

Further research has been performed against the Barracuda Convert-UUlib library buffer overflow.

tags | advisory, overflow
advisories | CVE-2005-1349
SHA-256 | f6951b1ebcbd690adceae17e1c1dfc054bf9a724c4c9727d2dd586cd08c7292f
pirana-0.3.1.tar.gz
Posted Dec 6, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.

Changes: Added uulib exploitation module and bindshell type of shellcode. Cleanup in the exploit codes. Modifications to the manpage, how the shellcode generator was called, and the README.
systems | unix
SHA-256 | 4f4bf22a3446dcede66d3f4fc60bfd1cdac5e6fd174c4f6f682bbdf405cdca09
Dr.Web4.33.txt
Posted Oct 4, 2006
Authored by Jean-Sebastien Guay-Leroux

Dr.Web 4.33 antivirus LHA long directory name heap overflow: When building a special LHA archive with a long directory name in an extended directory header, a fixed size buffer on the heap is overflowed. When processing this malicious archive, it is then possible to make Dr.Web run arbitrary code by overwriting some internal malloc management informations.

tags | advisory, web, overflow, arbitrary
SHA-256 | 2a30296b1d42bc902eefd52faffa18b6b2e14bb10873a005d4d3df2b73a5ab6c
pirana-0.2.1.tar.gz
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.

systems | unix
SHA-256 | 3657e8c9cb39fe8805ada794f7b9e5b5c772a6b208998810e38934e7268cc63d
barracuda-advisory-LHA.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.10045 suffers from a remote compromise via an email containing a specially crafted LHA archive.

tags | advisory, remote
SHA-256 | 1fc543a965dad878e85c76e8374b6bf456536444e43cef102ce41c68fd3b54f1
barracuda-advisory-ZOO.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.9388 suffers from a remote compromise via an email containing a specially crafted ZOO archive.

tags | advisory, remote
SHA-256 | b1a125d11ebe95bcf9be62768a67891c17278898c0cd6217c2f1e78f625b5082
zooExec.txt
Posted Feb 26, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

When feeding zoo a specially crafted archive, an attacker may be able to trigger a stack overflow and seize control of the program.

tags | advisory, overflow
SHA-256 | 9422982e39289d304e78eb097b387485df9810f1e7aa80c2b08a8bf23dce1d39
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close