exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 124 RSS Feed

Files from Kevin Finisterre

Email addresskf at digitalmunition.com
First Active2000-08-29
Last Active2011-05-03
DMA-2006-0801a.txt
Posted Aug 17, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

fetchmail on Mac OSX versions 10.4.7 and below suffer from an arbitrary code execution flaw.

tags | advisory, arbitrary, code execution
systems | apple
SHA-256 | a79a85fa9c78b353f28bab9c307f950ae95726f9619a959e9e455eb143f10992
eIQ-ESA.txt
Posted Jul 28, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit for the Syslog server by eIQnetworks that has a vulnerability when processing long strings transmitted to its TCP port.

tags | exploit, remote, tcp
advisories | CVE-2006-3838
SHA-256 | 60bffcf1a26deeb9ebda5eb75a657c002ee82720c1ef7a36d68131a01a17d94d
eIQ-LM-3.txt
Posted Jul 28, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.

tags | exploit, remote, overflow
advisories | CVE-2006-3838
SHA-256 | 2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984
FailureToLaunch-2.pl.txt
Posted Jul 2, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function. PPC version.

tags | exploit, ppc, proof of concept
systems | apple, osx
SHA-256 | 219477bc10fd86f44e79866b7a5a535c7bfad56e533185cc869da47f54021bdf
FailureToLaunch.pl.txt
Posted Jul 2, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function.

tags | exploit, proof of concept
systems | apple, osx
SHA-256 | dda0b65f359384ab350d9017041509539f3b96081550de30781a83c0f6e82742
DMA-2006-0628a.txt
Posted Jul 2, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Mac OS X versions 10.4.6 and below are susceptible to a vulnerability in launchd's syslog() function.

tags | advisory
systems | apple, osx
SHA-256 | ebe05c1d233358f6cc47cf20ff34ce80da5d2fbaea89f2ca9ece03f88113cdf0
NonExecutableLovin.txt
Posted May 26, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Paper discussing new avenues of exploitation for OSX systems running on Intel hardware. Details ways to execute code despite the NX bit being present.

tags | paper
systems | apple
SHA-256 | 9d18fe12fe6c0f06eef46fae37e5f916eab293d3d1e3d6cb0c09d272fb631603
DMA-2006-0514a.txt
Posted May 22, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

ClamAV freshclam suffers from an incorrect privilege dropping vulnerability.

tags | advisory
SHA-256 | d99dfdbc0180fa1f1ace658b029461b9473dd08a3bfa42d4a2b470b5aa3e3137
rdist.pl.txt
Posted Apr 1, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

rdist NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).

tags | exploit, overflow
systems | unix
SHA-256 | 4c4a19453affa5482e5bbca99f5e8e7e6d25e7f2f3f895644df68abc77e86074
edauth.pl.txt
Posted Apr 1, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

edauth NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).

tags | exploit, overflow
systems | unix
SHA-256 | f73421b49ce9bd7859f4e56e743fa6c9d04c1db4b6d1f331a4c65e5863484bf0
SuperTastey.pl
Posted Mar 14, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

DMA[2006-0313a] - Apple OSX Mail.app RFC1740 Real Name Buffer Overflow exploit.

tags | exploit, overflow
systems | apple
SHA-256 | 13f2fb6a69d07991ff1a09e325d85755140c6c20f25a04064067a182186dfc6b
DMA-2006-0313a.txt
Posted Mar 14, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

DMA[2006-0313a] - Apple OSX Mail.app RFC1740 Real Name Buffer Overflow - After applying Security Update 2006-001 Mail.app becomes vulnerable to a buffer overflow that may be triggered via a properly formatted MIME Encapsuled Macintosh file. Sending a file in the AppleDouble format with a long Real Name entry will invoke the overflow. Reading through RFC1740 should provide enough information to trigger the issue. The overflow is triggered by the file that contains the AppleDouble header information.

tags | advisory, overflow
systems | apple
SHA-256 | 3edf284ed4ed9d45709010aab5c5a4c039e10a8f50cc01ac609017ae27a9b392
InqTanaThroughTheEyes.txt
Posted Feb 26, 2006
Authored by Kevin Finisterre

Whitepaper written to address both FUD and rumors surrounding the release of detailed information about the InqTana proof of concept worm.

tags | paper, worm, proof of concept
SHA-256 | 97f38cd5ac3a5a8e7f37fced12c45e663ce5ca7f24ea52a2d3c528ce2ed49f19
DMA-2006-0115a.txt
Posted Jan 21, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

AmbiCom Blue Neighbors versions 2.50 Build 2500 and below suffer from a buffer overflow in the Object Push service.

tags | advisory, overflow
SHA-256 | da47d3a1cfa2a10633bedd980ce061b8059930008236018cc8db60cc23de5f44
DMA-2006-0112a.txt
Posted Jan 15, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Using ussp-push from the Toshiba Bluetooth Stack versions 4.00.23(T) and below, an attacker can place a trojaned file anywhere on the filesystem.

tags | exploit, trojan
SHA-256 | 032e619b38af3404776cca356075de5f940987e34114e0fcfc11faaae45c8d2f
DMA-2005-1214a.txt
Posted Dec 15, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

The Widcomm BTW suffers from a remote audio eavesdropping issue.

tags | advisory, remote
SHA-256 | 866ef0aaf005e2d1e28227c8b6a9b0360290e3611a675df0bb6706bd1d5e5344
BluePIMped.diff
Posted Dec 7, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Patch for ussp-push that allows you to exploit the overflows discovered in the Widcomm BTStackServer.

tags | exploit, overflow
SHA-256 | 0e42bdfaf64c52451da826f13806b1f19737198ef4ee6c79b7376721678cb3cd
BluePIMped.txt
Posted Dec 7, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Interesting write up on the exploitation of the Widcomm BTStackServer used for Bluetooth connectivity.

tags | paper
SHA-256 | 4981b2c6e270ad216ac899d27addb88e2e5b92507be34df0f6b93c2ec2d8d339
sobexsrv.pl.txt
Posted Dec 7, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit that makes use of a format string vulnerability in sobexsrv.

tags | exploit, remote
SHA-256 | 70af8edf82d16d5c0a15f619b7c245147a561588641160e58d5d55fedecb6bb3
DMA-2005-1202a.txt
Posted Dec 7, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

DMA[2005-1202a] - sobexsrv is susceptible to a format string vulnerability.

tags | advisory
SHA-256 | 76c84e2bf4e5cd57ebbbffba7467689a561d8e8da82bd825409341907cb1c713
SF_multi.pl.txt
Posted Nov 13, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Veritas Storage Foundation 4.0 local root exploit that takes advantage of a buffer overflow in the VCSI18N_LANG environment variable.

tags | exploit, overflow, local, root
SHA-256 | 587a778f72ac01b11f2daf11d28d6e33a3c6d445c52a6d3b53972ceb9b9746b2
DMA-2005-1112a.txt
Posted Nov 13, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

A buffer overflow has been identified in the VCSI18N_LANG environment variable which is used by a number of setuid root applications in Veritas Storage Foundation.

tags | advisory, overflow, root
SHA-256 | 1ce7f2efa1b083250601260fef3536057de94ea8ec55c3048d69d5ed9d37e836
gpsdrive-ex-short-x86.pl.txt
Posted Nov 5, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. x86 version. Binds a shell to port 5074.

tags | exploit, shell, x86
SHA-256 | de673cde91a63e038403a137ba948626e811cb07bebe8fe092b400487c6d5169
gpsdrive-ex-long-ppc.pl.txt
Posted Nov 5, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. PowerPC version.

tags | exploit
SHA-256 | 768ba4a55ceffa1d68472a0647f755e17c5a821c24580850c632022b10c98bd8
DMA-2005-1104a.txt
Posted Nov 5, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

The friendsd server that comes with GpsDrive contains an obvious format string issue compliments of a bad fprintf() call.

tags | advisory
SHA-256 | ec70d84c5f0cca691f8ba58bee71f8d6fe7cc9f04578b31c5892e4614ff209f0
Page 3 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close