accept no compromises
Showing 26 - 38 of 38 RSS Feed

Files from Piotr Bania

Email addressbania.piotr at gmail.com
First Active2005-03-22
Last Active2016-04-08
quicktime-mov-io2-adv.txt
Posted Nov 4, 2005
Authored by Piotr Bania | Site pb.specialised.info

Apple QuickTime Player is reported prone to remote integer overflow vulnerability (exploitable via remotely originated content). Improper movie attributes could result in a very large memory copy, which lead to potential memory overwrite. The vulnerability may lead to remote code execution when specially crafted video file (MOV file) is being loaded. Software affected: QuickTime package 7.0.1 for Mac OS X 10.3, QuickTime package 7.0.1 for Mac OS X 10.4, QuickTime package 6.5.2 for Mac OS X 10.3, QuickTime package 6.5.2 for Mac OS X 10.2, QuickTime package 7x for Windows.

tags | advisory, remote, overflow, code execution
systems | windows, apple, osx
advisories | CVE-2005-2754
MD5 | 1924bf7429828fe9141d27e2dde3152f
quicktime-mov-io1-adv.txt
Posted Nov 4, 2005
Authored by Piotr Bania | Site pb.specialised.info

Apple QuickTime Player is reported prone to remote integer overflow vulnerability (exploitable via remotely originated content). A sign extension of an embedded "Pascal" style string could result in a very large memory copy, which lead to potential memory overwrite. The vulnerability may lead to remote code execution when specially crafted video file (MOV file) is being loaded. Software affected: QuickTime package 7.0.1 for Mac OS X 10.3, QuickTime package 7.0.1 for Mac OS X 10.4, QuickTime package 6.5.2 for Mac OS X 10.3, QuickTime package 6.5.2 for Mac OS X 10.2, QuickTime package 7x for Windows.

tags | advisory, remote, overflow, code execution
systems | windows, apple, osx
advisories | CVE-2005-2753
MD5 | 0e0441e5cc2b8166ee1a25124bab245d
ewdd.pdf
Posted Oct 18, 2005
Authored by Piotr Bania | Site pb.specialised.info

Exploiting Windows Device Drivers - this paper introduces device driver exploitation techniques, provides detailed descriptions of techniques used and includes full exploit code with sample vulnerable driver code for testing purposes.

tags | paper
systems | windows
MD5 | c5eaa08dfb7ca0000e1705388a72e1a3
kerio-fwdrv-dos-adv.txt
Posted Oct 13, 2005
Authored by Piotr Bania | Site pb.specialised.info

Kerio Personal Firewall 4 (4.2.0) and Kerio Server Firewall version 1.1.1 are susceptible to a local denial of service vulnerability. Earlier versions are also presumed susceptible.

tags | advisory, denial of service, local
MD5 | 4f7d8aae72f064dc58964a67f39f251d
prott_packV01A.zip
Posted Sep 23, 2005
Authored by Piotr Bania | Site pb.specialised.info

Protty is a ring 3 library developed to protect against shellcode execution on Windows NT based systems.

tags | shellcode, code execution, library
systems | windows, nt
MD5 | 833d0d950323ec667b1bfd68c54dad11
tapion_pack01c.zip
Posted Sep 20, 2005
Authored by Piotr Bania | Site pb.specialised.info

The TAPiON engine is a polymorphic shellcode system that can create unical decryptor, encrypt original data and decrypt it on the fly as code executes.

tags | shellcode
MD5 | 465724d3c837cee29438e3a5037a4f29
tapion_pack01b.zip
Posted Sep 13, 2005
Authored by Piotr Bania | Site pb.specialised.info

The TAPiON engine is a polymorphic shellcode system that can create unical decryptor, encrypt original data and decrypt it on the fly as code executes.

tags | shellcode
MD5 | 1b24806d8325b543bb3474e0e32fc609
efilter.c
Posted Aug 17, 2005
Authored by Piotr Bania | Site pb.specialised.info

Efilter is an automatic exception reporting utility. It is very useful and handy while doing vulnerability research on any software designed to work under Windows NT platforms. Due to that it hooks KiUserExceptionDispatcher function, it acts BEFORE any of program's active SEH frames take over the exception. In short words it reports programs exceptions even if they are handled by original program.

systems | windows, nt
MD5 | 057d4656ce42a226d496129793e5afbb
sice-adv.txt
Posted Aug 14, 2005
Authored by Piotr Bania

Compuware Softice (DbgMsg driver) is susceptible to a local denial of service flaw.

tags | advisory, denial of service, local
MD5 | 3b0f39c9a3084473a4db0ac5503b9f30
avast-adv.txt
Posted Aug 14, 2005
Authored by Piotr Bania

Avast Antivirus version 4.6 is susceptible to a memory overwrite flaw.

tags | advisory
MD5 | 365a366d526dc05ee7ad43d53a39aecd
olly-int3-adv.txt
Posted Aug 7, 2005
Authored by Piotr Bania | Site pb.specialised.info

OllyDbg INT3 AT format string vulnerability advisory. Version 1.10 is affected.

tags | advisory
MD5 | b256a961af4f9878f5cb6ff8ceb990ab
real-ram-adv.txt
Posted Jun 1, 2005
Authored by Piotr Bania

RealNetworks RealPlayer, RealOne Player, and Helix Player all suffer from a remote heap overflow that allows for remote code execution.

tags | advisory, remote, overflow, code execution
MD5 | a0116a54d6d401b886c21cc980d42b79
datarescueFormat.txt
Posted Mar 22, 2005
Authored by Piotr Bania | Site pb.specialised.info

DataRescue Interactive Disassembler Pro Debugger version 4.7.0.830 is susceptible to a format string vulnerability.

tags | advisory
MD5 | 7a91bfcdb3756bb4bb8ccfd10445b37f
Page 2 of 2
Back12Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    5 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close