exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files from Greg MacManus

Email addressgmacmanus.edu at gmail.com
First Active2004-04-05
Last Active2013-05-23
iDEFENSE Security Advisory 2005-09-13.1
Posted Sep 14, 2005
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 09.13.05 - Remote exploitation of a design error in multiple versions of the firmware for Cisco Systems Inc.'s Linksys WRT54G wireless router may allow unauthenticated modification of the router configuration. The vulnerability specifically exists in the 'ezconfig.asp' handler of the httpd running on the internal interfaces, including by default the wireless interface. This handler is used by the 'ezSetup' to perform the initial setup of the router. iDEFENSE has confirmed the existence of this vulnerability in version 3.01.03 of the firmware of the Linksys WRT54G, and has identified the same code is present in version 3.03.6. Version 2.04.4 of the WRT54G is confirmed to contain the affected code, however by default it initializes the authentication details, and so requires a password to set the configuration.

tags | advisory, remote, asp
systems | cisco
SHA-256 | 8678dca399143546a683fdfe6d05848911d3e816349bba43699a6387814c6f22
iDEFENSE Security Advisory 2005-03-02.3
Posted Mar 3, 2005
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a directory traversal vulnerability in Computer Associates International Inc. License Client can allow attackers create files in arbitrary locations. The vulnerability specifically exists in the handling of the filename used in PUTOLF requests.

tags | advisory, remote, arbitrary
advisories | CVE-2005-0583
SHA-256 | 91475277c8d64cb526f375cd267e3a59760b6b528b6b0b3e126b4fea519944a6
iDEFENSE Security Advisory 2005-03-02.2
Posted Mar 3, 2005
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a buffer overflow vulnerability in Computer Associates International Inc. License Server can allow attackers to execute arbitrary code. The vulnerability specifically exists in the handling of the filename used in PUTOLF requests.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2005-0582
SHA-256 | d4a15d53bb20b276509b0955bd2cf55df0ef8988e6f2aee00122c68bed36686a
iDEFENSE Security Advisory 2005-03-02.1
Posted Mar 3, 2005
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 03.02.05 - Remote exploitation of a buffer overflow vulnerability in Computer Associates International Inc. License Server and License Client can allow attackers to execute arbitrary code. iDEFENSE has confirmed that CA License Server 0.1.0.15 and CA License Client 0.1.0.15 are vulnerable. It is suspected that most CA products are running vulnerable versions of the client and/or server.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2005-0581
SHA-256 | e0658a00eaab03b8c22bd160e7374593472c52c0576efd78f3408ab8e94cba54
iDEFENSE Security Advisory 2004-12-16.t
Posted Dec 30, 2004
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 12.16.2004 - Remote exploitation of an integer overflow vulnerability in all versions of Samba's smbd prior to and including 3.0.8 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.

tags | advisory, remote, overflow, arbitrary, root
advisories | CVE-2004-1154
SHA-256 | 138d9500e13c893ec665521f664a535ca1a5a6e527fb3a590b49043fa95fbc09
iDEFENSE Security Advisory 2004-12-13.2
Posted Dec 30, 2004
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 12.13.2004-2 - Remote exploitation of a format string vulnerability in version 6.0.2 of Adobe's Reader could allow attackers to execute arbitrary code.

tags | advisory, remote, arbitrary
advisories | CVE-2004-1153
SHA-256 | d3d1881e03cbfa45c3076cf6b1c2bf03b6162147c3ef132b72479f95e266ecb6
iDEFENSE Security Advisory 2004-12-14.t
Posted Dec 30, 2004
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 12.14.2004 - Remote exploitation of a buffer overflow in version 5.09 of Adobe Acrobat Reader for Unix could allow for execution of arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | unix
advisories | CVE-2004-1152
SHA-256 | a89e8f9d1a9fc9825cb2fcdac170c859c736acde6de2dc8e861608f0ba720525
iDEFENSE Security Advisory 2004-08-12.t
Posted Aug 13, 2004
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 08.12.04: Remote exploitation of an input validation error in the uudecoding feature of Adobe Acrobat Reader (Unix) 5.0 allows an attacker to execute arbitrary code. The Unix and Linux versions of Adobe Acrobat Reader 5.0 automatically attempt to convert uuencoded documents back into their original format. The vulnerability specifically exists in the failure of Acrobat Reader to check for the backtick shell metacharacter in the filename before executing a command with a shell. This allows a maliciously constructed filename to execute arbitrary programs.

tags | advisory, remote, arbitrary, shell
systems | linux, unix
advisories | CVE-2004-0630
SHA-256 | 6090411f468013d9881fef9aade925396aa2c0ea7ba6bb2b3ff7d794178a1713
iDEFENSE Security Advisory 2004-05-12.t
Posted May 13, 2004
Authored by Karol Wiesek, iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 05.12.04: Exploitation of an input validation vulnerability within Opera Software ASA.'s Opera Web Browser could allow remote attackers to create or truncate arbitrary files. The problem specifically exists within the telnet URI handler. Opera does not check for '-' at the beginning of hostname passed through the handler, which lets options pass to the telnet program, allowing file creation or overwriting.

tags | advisory, remote, web, arbitrary
SHA-256 | 88a3986f22d8cc48d56d3b3bad13399d7e191cf92cee76f2c337819dcbe15f61
iDEFENSE Security Advisory 2004-04-14.t
Posted Apr 14, 2004
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDEFENSE Security Advisory 04.14.04: The Linux kernel performs no length checking on symbolic links stored on an ISO9660 file system, allowing a malformed CD to perform an arbitrary length overflow in kernel memory. Symbolic links on ISO9660 file systems are supported by the 'Rock Ridge' extension to the standard format. The vulnerability can be triggered by performing a directory listing on a maliciously constructed ISO file system, or attempting to access a file via a malformed symlink on such a file system. Many distributions allow local users to mount CDs, which makes them potentially vulnerable to local elevation attacks. The issue affects the 2.4.x, 2.5.x and 2.6.x kernel. Other kernel implementations may also be vulnerable.

tags | advisory, overflow, arbitrary, kernel, local
systems | linux
advisories | CVE-2004-0109
SHA-256 | 37ae99b004272092f2bfb32d3b0aec033f6d0b99842d8d8cde738ec767346788
idefense-040504.txt
Posted Apr 5, 2004
Authored by Greg MacManus | Site idefense.com

Remote exploitation of a buffer overflow in the win32_stat function of ActiveState's ActivePerl may allow arbitrary commands to be executed. No check is made on the length of the string before the copy is made allowing long strings to overwrite control information and execution of arbitrary code possible.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0377
SHA-256 | 3adc232e9981b7e4b616c8280bed4f979ce9a51c0a72c7d2f4eff52bb06efd16
Page 2 of 2
Back12Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close