what you don't know can hurt you
Showing 1 - 23 of 23 RSS Feed

Files from Marsu

Email addressmarsupilamipowa at hotmail.fr
First Active2007-02-24
Last Active2009-10-15
iDEFENSE Security Advisory 2009-10-13.4
Posted Oct 15, 2009
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 10.13.09 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Office could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing the msofbtOPT Office Drawing record type. This record is used to provide default values for shape properties. By inserting a specially crafted property ID, it is possible to corrupt heap memory and overwrite an object pointer. iDefense has confirmed the existence of this vulnerability in Office XP SP3.

tags | advisory, remote, arbitrary
advisories | CVE-2009-2528
MD5 | 8ea7e312c9afa8c79588a783d3993de0
iDEFENSE Security Advisory 2009-05-12.6
Posted May 13, 2009
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 05.12.09 - Remote exploitation of multiple stack-based buffer overflow vulnerabilities in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerabilities exist within the importer for PowerPoint 95 format files. This functionality is contained within the PP7X32.DLL. iDefense has confirmed the existence of these vulnerabilities in PowerPoint 2000 SP3 and XP SP3.

tags | advisory, remote, overflow, arbitrary, vulnerability
advisories | CVE-2009-1128
MD5 | fdf8ea7a2c3d92692291d950f57e4a2f
iDEFENSE Security Advisory 2009-05-12.5
Posted May 13, 2009
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 05.12.09 - Remote exploitation of multiple stack based buffer overflow vulnerabilities in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerabilities exist within the importer for PowerPoint 95 format files. This functionality is contained within the PP7X32.DLL. The vulnerabilities occur when reading sound data from a PowerPoint file. In both cases, a value representing a record length is read in from the file. This value is then used to control the number of bytes read into a fixed size stack buffer. There is no check performed to ensure that the buffer can hold the number of bytes specified, which results in a stack buffer overflow. iDefense has confirmed the existence of these vulnerabilities in Office XP SP3, and Office 2000 SP3.

tags | advisory, remote, overflow, arbitrary, vulnerability
advisories | CVE-2009-1129
MD5 | 76895dd63db2cc075ee8e29b4f7dbc50
iDEFENSE Security Advisory 2009-05-12.4
Posted May 13, 2009
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 05.12.09 - Remote exploitation of multiple stack-based buffer overflow vulnerabilities in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerabilities exist within the importer for PowerPoint 4.0 format files. This functionality is contained within the PP4X32.DLL. iDefense has confirmed the existence of these vulnerabilities in PowerPoint 2000 SP3 and XP SP3.

tags | advisory, remote, overflow, arbitrary, vulnerability
advisories | CVE-2009-0220
MD5 | d5c973ceea6c154dddc4026ec264568c
iDEFENSE Security Advisory 2009-05-12.3
Posted May 13, 2009
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 05.12.09 - Remote exploitation of a stack based buffer overflow vulnerability in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user. In particular, there is code that parses a string in the PowerPoint file. If the size of this data is greater than a certain value, then memory corruption will occur. This memory corruption can lead to the vulnerable code executing an attacker supplied address. iDefense has confirmed the existence of these vulnerabilities in PowerPoint 2000 SP3 and XP SP3.

tags | advisory, remote, overflow, arbitrary, vulnerability
advisories | CVE-2009-0226
MD5 | e692b4d7451abbc5bd3f45ddfd820ac0
iDEFENSE Security Advisory 2009-05-12.2
Posted May 13, 2009
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 05.12.09 - Remote exploitation of a heap corruption vulnerability in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user. In particular, there is code that parses structures in the PowerPoint file. If the number of these structures is greater than a certain value, then memory corruption will occur. This memory corruption leads to the executing of arbitrary code. iDefense has confirmed the existence of these vulnerabilities in PowerPoint 2000 SP3 and XP SP3.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2009-0223
MD5 | dda70f10023cb45aa7a6ee81a4374bfd
iDEFENSE Security Advisory 2009-05-12.1
Posted May 13, 2009
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 05.12.09 - Remote exploitation of a heap corruption vulnerability in Microsoft Corp.'s PowerPoint could allow an attacker to execute arbitrary code with the privileges of the current user. In particular, there is code that parses structures in the PowerPoint file. If the number of these structures is greater than a certain value, then memory corruption will occur. This memory corruption leads to the executing of arbitrary code. iDefense has confirmed the existence of these vulnerabilities in PowerPoint 2000 SP3 and XP SP3.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2009-0227
MD5 | 3e5662125337722b41d5dd4752ed8550
iDEFENSE Security Advisory 2008-04-17.1
Posted Apr 17, 2008
Authored by iDefense Labs, Marsu | Site idefense.com

iDefense Security Advisory 04.17.08 - Remote exploitation of a heap based buffer overflow vulnerability in OpenOffice.org's OpenOffice, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability exists within the importer for files stored using the OLE format. When parsing the "DocumentSummaryInformation" stream, the vulnerable code does not correctly verify the size of a destination buffer before copying data from the file into it. This results in an exploitable heap overflow. iDefense confirmed the existence of this vulnerability in OpenOffice version 2.3.1. Other versions may also be affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2008-0320
MD5 | 624877933491e6bd0d3012daf6ac2b07
ms08-016.tgz
Posted Apr 1, 2008
Authored by Marsu

Microsoft Office XP SP3 Powerpoint file buffer overflow exploit that spawns calc.exe. Based off of the vulnerability listed in MS08-016.

tags | exploit, overflow
MD5 | 862448b46ec7362c469ba9d98a907038
vbe6-dos.txt
Posted Mar 31, 2008
Authored by Marsu

Visual Basic suffers from a local stack overflow vulnerability in vbe6.dll that can lead to a denial of service condition.

tags | exploit, denial of service, overflow, local
MD5 | 4cb49535a3ef1355c4211ee7f7ec9e4c
irfanview-corrupt.txt
Posted Jan 30, 2008
Authored by Marsu

IrfanView version 4.10 .FPX file memory corruption exploit that launches calc.exe.

tags | exploit
MD5 | 94b9718f865909a6ee2110608582a70b
winamp-exec.txt
Posted May 3, 2007
Authored by Marsu

Winamp versions 5.34 and below .MP4 file code execution exploit that spawns calc.exe or binds a shell to tcp port 4444.

tags | exploit, shell, tcp, code execution
MD5 | cd4e895cbb55416b3007794ed7cc36d7
photoshop-voverflow.txt
Posted May 3, 2007
Authored by Marsu

Photoshop CS2/CS3 and Paint Shop Pro version 11.20 .PNG buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.

tags | exploit, overflow, shell, tcp
MD5 | fc0d9a02bd500a7cac2f3e3062315cdb
irfanview-overflow.txt
Posted May 3, 2007
Authored by Marsu

IrfanView versions 4.00 and below .IFF buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.

tags | exploit, overflow, shell, tcp
MD5 | edd9cda2a0ec61be978e6373dab4e70a
gimp-overflow.txt
Posted May 3, 2007
Authored by Marsu

Gimp version 2.2.14 buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.

tags | exploit, overflow, shell, tcp
MD5 | e99d279f20f1628d8c0de62e8bdef028
freshview-overflow.txt
Posted May 3, 2007
Authored by Marsu

FreshView version 7.15 buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.

tags | exploit, overflow, shell, tcp
MD5 | 4084865a59f45484cd88c31f44071fb5
abcview-overflow.txt
Posted May 3, 2007
Authored by Marsu

ABC-View Manager version 1.42 buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.

tags | exploit, overflow, shell, tcp
MD5 | 20e39970115fc134e1db7b32ea5bbd0a
ipswitch505-overflow.txt
Posted Apr 2, 2007
Authored by Marsu

Local buffer overflow exploit for Ipswitch WS_FTP version 5.05 server manager that launches calc.exe.

tags | exploit, overflow, local
MD5 | 96368be76a319d7da33b8093901f63f2
irfanview-ani.txt
Posted Apr 2, 2007
Authored by Marsu

IrfanView version 3.99 .ANI file local buffer overflow exploit. Tested against Windows XP SP2 FR. This is not related to the LoadAniIcon stack overflow.

tags | exploit, overflow, local
systems | windows, xp
MD5 | 5563946777fa2ffd19cd8213024e4364
msani.c
Posted Apr 2, 2007
Authored by Marsu

Microsoft Windows Animated Cursor (.ANI) local buffer overflow exploit.

tags | exploit, overflow, local
systems | windows
advisories | CVE-2007-1765
MD5 | 8784081f135750715341646279e27e68
newsreactor-2.txt
Posted Mar 20, 2007
Authored by Marsu

NewsReactor 20070220 article grabbing remote buffer overflow exploit. Version 2.

tags | exploit, remote, overflow
MD5 | 83e617ba02b413f48ca2840ca1c50933
newsreactor-1.txt
Posted Mar 20, 2007
Authored by Marsu

NewsReactor 20070220 article grabbing remote buffer overflow exploit. Version 1.

tags | exploit, remote, overflow
MD5 | 85b9587feb6b8f81204e286c3f19f316
newsbin-local.txt
Posted Feb 24, 2007
Authored by Marsu

News Bin Pro version 5.33 local buffer overflow exploit for .NBI files.

tags | exploit, overflow, local
MD5 | 8d420915619ab331438c6eaac89dfac1
Page 1 of 1
Back1Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close