exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 124 RSS Feed

Files from Kevin Finisterre

Email addresskf at digitalmunition.com
First Active2000-08-29
Last Active2011-05-03
DMA-2007-0107a.txt
Posted Jan 13, 2007
Authored by Kevin Finisterre | Site digitalmunition.com

OmbiWeb version 5.51 suffers from a format string vulnerability.

tags | advisory
SHA-256 | a78831973f24a948d49ed59403543dddce63a381877be9ae52dfb7e565dfb568
MOAB-07-01-2007.html
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - This HTML file is an exploit for OmniWeb. OmniWeb is affected by a format string vulnerability in the handling of Javascript alert() function, which could allow remote arbitrary code execution.

tags | exploit, remote, arbitrary, javascript, code execution
systems | apple
SHA-256 | 297d0995c250f8cc72592389a406917ac1bf22428361bbff663a27278cf94085
MOAB-06-01-2007.pdf
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Warning, this pdf is an exploit. The current PDF specification is affected by a design flaw, a rogue Pages entry or malicious catalog dictionary could cause a denial of service (memory corruption condition, memory leakage, etc) or potential arbitrary code execution in the reader application.

tags | exploit, denial of service, arbitrary, code execution, memory leak
systems | apple
SHA-256 | 7befba5152c7b30d54a97e3a52d7ff58a3858ea958dac2460153bce1334d0e22
MOAB-05-01-2007_cron.rb.txt
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Exploit for a vulnerability in the handling of BOM files by the DiskManagement/diskutil that allows the setting of rogue permissions on the filesystem. This can be used to execute arbitrary code and escalate privileges. One of two exploits.

tags | exploit, arbitrary
systems | apple
SHA-256 | d23d1ffe7410fc22b798de3144cff78a0f519bb100421ea6abce589bef246321
MOAB-05-01-2007.rb.txt
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Exploit for a vulnerability in the handling of BOM files by the DiskManagement/diskutil that allows the setting of rogue permissions on the filesystem. This can be used to execute arbitrary code and escalate privileges. One of two exploits.

tags | exploit, arbitrary
systems | apple
SHA-256 | 9ff09c4c31ae71fb68fb87e214f17eb7e955b0cbe68a242d876ba38452f4a223
MOAB-05-01-2007.html
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of Apple DiskManagement BOM files allows to set rogue permissions on the filesystem via the 'diskutil' tool. This can be used to execute arbitrary code and escalate privileges. A malicious user could create a BOM declaring new permissions for specific filesystem locations (ex. binaries, cron and log directories, etc). Once 'diskutil' runs a permission repair operation the rogue permissions would be set, allowing to plant a backdoor, overwrite resources or simply gain root privileges.

tags | advisory, arbitrary, root
systems | apple
SHA-256 | c25666ddbe5ff06c32ae1027a19af259bbc8f98431a50aaf19f02ff9168bb9ec
MOAB-04-01-2007.rb.txt
Posted Jan 5, 2007
Authored by Kevin Finisterre | Site projects.info-pull.com

Proof of concept exploit for a format string vulnerability in the handling of iPhoto XML feeds title field that allows for potential remote arbitrary code execution.

tags | exploit, remote, arbitrary, code execution, proof of concept
SHA-256 | e22a6470fc666699af0e4e6af18f627ff30d33949f7b6a49f61f9c8b697fc9de
DMA-2007-0104a.txt
Posted Jan 5, 2007
Authored by Kevin Finisterre | Site projects.info-pull.com

A format string vulnerability in the handling of iPhoto XML feeds title field allows potential remote arbitrary code execution.

tags | advisory, remote, arbitrary, code execution
SHA-256 | 88beb803c889745f602294769e427670b7244b32e210379b0c1ba1987045b753
23c3_Bluetooh_revisited.pdf
Posted Jan 5, 2007
Authored by Kevin Finisterre, Thierry Zoller

Presentation given at 23C3 called Bluetooth Hacking Revisited.

tags | paper
SHA-256 | 62cb81e204ee1879c82113f8ffc4c4c8fa9b539abcf6a25d3af5d29d73336577
MOAB-03-01-2007.rb.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of the HREFTrack field in Apple QuickTime allows cross-zone scripting, leading to potential remote arbitrary code execution.

tags | exploit, remote, arbitrary, code execution
systems | apple
SHA-256 | 82e3af040fcc4e61d05647eb0b0db44301d563a10028b396f5a1ff378299df69
VLCMediaSlayer-ppc.pl.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This is just a vanilla format string exploit for OSX on ppc.

tags | exploit, remote, arbitrary, udp, code execution, ppc
systems | apple
advisories | CVE-2007-0017
SHA-256 | eee494f2f67e54b963758dd0fa93937a50e35597b8d00f31b63f7f421bb37406
VLCMediaSlayer-x86.pl.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This exploit will create a malicious .m3u file that will cause VLC Player for OSX to execute arbitrary code.

tags | exploit, remote, arbitrary, udp, code execution
systems | apple
advisories | CVE-2007-0017
SHA-256 | 4a8563fe447682266c5981ff8f4f4eb1e3e5a7ac789b3d0b1ce506d8981cf777
MOAB-01-01-2007.rb.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - Apple Quicktime stack buffer overflow exploit that makes use of the rtsp URL Handler vulnerability.

tags | exploit, overflow
systems | apple
advisories | CVE-2007-0015
SHA-256 | d599dfe435a136f896e1f7fd01b079a21a224eedd8616619700a2c3b1a2ac617
kerio_WebSTAR_pwn.pl.txt
Posted Nov 16, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Local privilege escalation exploit for Kerio WebSTAR versions 5.4.2 and below which suffer from a local privilege escalation vulnerability due to an improper loading of a library.

tags | exploit, local
SHA-256 | 348e6138bc49a3143247bec9a4c214653ceca1ead1eb83b9e524b1b7cf979444
DMA-2006-1115a.txt
Posted Nov 16, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Kerio WebSTAR versions 5.4.2 and below suffer from a local privilege escalation vulnerability due to an improper loading of a library.

tags | advisory, local
SHA-256 | 8aef29338e469e924e743135fe46ec140c3e14f4a70c29302bca1c5781c28d15
pwntego.tar.gz
Posted Nov 9, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Race condition exploit that takes advantage of a flaw in Intego VirusBarrier X4.

tags | exploit
SHA-256 | 8fbc3bac0aef7c91710230a3e7449dcef6d21741f4c4c879f4899e657a426416
DMA-2006-1031a.txt
Posted Nov 9, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Intego VirusBarrier X4 suffers from a definition bypass vulnerability.

tags | advisory, bypass
SHA-256 | cb1239541fb426479250540f9150a7e2c069a130c929584cf04e64628d107c1d
openexec_createfile.pl.txt
Posted Nov 9, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Local exploit for the openexec binary in OpenBase SQL versions 10.0 and below which creates a root owned file with 0666 privileges.

tags | exploit, local, root
SHA-256 | a7daa38ac6795fc374ca6fe7775e9474bbf406916127f15d71536db71c9f453b
openexec_duh.pl.txt
Posted Nov 9, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Local root exploit for the openexec binary in OpenBase SQL versions 10.0 and below which makes poor use of system().

tags | exploit, local, root
SHA-256 | d8bd5d35686b4521d00e617deaa5dc653367d439db5a2093aacde04fc5d585d3
DMA-2006-1107a.txt
Posted Nov 9, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

The openexec binary makes poor use of its setuid privileges when calling various helper binaries such as: cp, rm and killall. Each of the mentioned binaries winds up being called while openexec is running as root. Using the PATH environment variable it is possible to influence openbase in a manner that forces it to call the various helper binaries from a location of the attackers choice. OpenBase SQL versions 10.0 and below are affected.

tags | advisory, root
SHA-256 | ad085189dd0915f8dae7270a178ad7c5e725a20fdd3cfa1d4ef7ea7224f1dae6
DMA-2006-1016a - WebObjects and OpenBase SQL Local Root
Posted Oct 20, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

DMA-2006-1016a - Apple Xcode WebObjects / OpenBase SQL multiple vulnerabilities including local root and file creation.

tags | advisory, local, root, vulnerability
systems | apple
SHA-256 | 2e9a7704a15945cda4c84fce6506a7120005ece92cc5c8fe21b842517833457d
excploit.c
Posted Oct 9, 2006
Authored by Kevin Finisterre, xmath

Mac OS X versions 10.4.7 and below Mach Exception handling local exploit.

tags | exploit, local
systems | apple, osx
advisories | CVE-2006-4392
SHA-256 | 0b61b584f7131fa9bf13b6a2ffa8d69159c44addda8cc54bd4d2758903136439
getpwnedmail-x86.pl.txt
Posted Aug 17, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the x86 architecture.

tags | exploit, x86
systems | apple
SHA-256 | abc8c5b9a5bc11f1d75838f33a3f66f9084ed5b0f340b4ec323a19ef3bb3c7c7
gotpwnedagainmail.sh.txt
Posted Aug 17, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Shellscript exploit for fetchmail on Mac OSX versions 10.4.7 and below.

tags | exploit
systems | apple
SHA-256 | a7bcf7de5e8c976b85f2fa9843daaa6d420c62fa3d036f99c66a984a01557bbf
getpwnedmail-ppc.pl.txt
Posted Aug 17, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the PPC architecture.

tags | exploit, ppc
systems | apple
SHA-256 | 8fefc8253056f33ef76e022136819d38456365ed244f5190a475b2f1a4db32ed
Page 2 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close