what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 61 of 61 RSS Feed

Files from Ruben Santamarta

Email addressruben at reversemode.com
First Active2006-02-02
Last Active2013-06-23
exploit-NAVEX15-222AD3.rar
Posted Oct 12, 2006
Authored by Ruben Santamarta | Site reversemode.com

Local proof of concept exploit for the Symantec Antivirus Engine that requires no special privileges (5 of 6).

tags | exploit, local, proof of concept
SHA-256 | 7718ea0485483a8c51e5532e6a7026b9a70bee7575e9d782a7f39f146bb990f2
exploit-NAVEX15-222ADB.rar
Posted Oct 12, 2006
Authored by Ruben Santamarta | Site reversemode.com

Local proof of concept exploit for the Symantec Antivirus Engine (4 of 6).

tags | exploit, local, proof of concept
SHA-256 | 3b29faa9132b4703f4e35c8a8ec09024b9cc65e357d9853556227bfd2ad4c9db
exploit-NAVEX15-222AD7.rar
Posted Oct 12, 2006
Authored by Ruben Santamarta | Site reversemode.com

Local proof of concept exploit for the Symantec Antivirus Engine (3 of 6).

tags | exploit, local, proof of concept
SHA-256 | 8eea8ca29fb3ff25e0368e41bf061974a45d3cdeb846e266b5cf55e191c2a385
exploit-NAVENG-222ADB.rar
Posted Oct 12, 2006
Authored by Ruben Santamarta | Site reversemode.com

Local proof of concept exploit for the Symantec Antivirus Engine (2 of 6).

tags | exploit, local, proof of concept
SHA-256 | a2449219141ac29887221691004cb2dab5400474056ce5c41cda9b14a0b6244c
exploit-NAVENG-222AD7.rar
Posted Oct 12, 2006
Authored by Ruben Santamarta | Site reversemode.com

Local proof of concept exploit for the Symantec Antivirus Engine (1 of 6).

tags | exploit, local, proof of concept
SHA-256 | 020ec8d9ce5d3255c029d3b03dcd46000ebe2bddbc2eff9c86818ce8a441e4fc
symantecPwn.txt
Posted Oct 12, 2006
Authored by Ruben Santamarta | Site reversemode.com

The Symantec Antivirus Engine drivers NAVEX15.sys and NAVENG.sys are susceptible to privilege escalation attacks.

tags | advisory
SHA-256 | d5f65664b43a323c2a435f57a944a3583d1a1e92479ed775da15a872c6553ee5
iDEFENSE Security Advisory 2006-10-05.t
Posted Oct 9, 2006
Authored by iDefense Labs, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 10.05.06 - Local exploitation of a design error vulnerability in Symantec Corp. AntiVirus can allow an attacker to execute arbitrary code with kernel privileges. The vulnerability specifically exists due to improper address space validation when the NAVENG and NAVEX15 device drivers process IOCTL 0x222AD3, 0x222AD7, and 0x222ADB. An attacker can overwrite a user supplied address, including code segments, with a constant double word value by supplying a specially crafted Irp to the IOCTL handler function. iDefense has confirmed the existence of this vulnerability within version 10 of Symantec Client Security as of this writing. Previous versions, as well as relating products, which contain the NAVENG.SYS and NAVEX15.SYS drivers are suspected to be vulnerable as well.

tags | advisory, arbitrary, kernel, local
advisories | CVE-2006-4927
SHA-256 | 732efba97b7ec341bff44782696cd383114b701e321b698f5802c60077ca466c
iDEFENSE Security Advisory 2006-09-12.1
Posted Sep 13, 2006
Authored by iDefense Labs, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 09.12.06 - Remote exploitation of a heap-based buffer overflow in Apple Computer's QuickTime Player could allow attackers to execute code under the privileges of the affected application. A FLIC file is an animation file consisting of a number of frames, each of which is made up of an image and may contain other information such as a palette or a label. The vulnerability specifically exists in the handling of the COLOR_64 chunk in FLIC format files. QuickTime does not validate that the data size allocated to store the palette is large enough, allowing a malformed file to cause controllable heap corruption. iDefense Labs confirmed that version 7.1 of the QuickTime player is vulnerable. It is suspected that all previous versions are also affected.

tags | advisory, remote, overflow
systems | apple
advisories | CVE-2006-4384
SHA-256 | 8bcabb0d8beb068b97d485b6166612603ed049aad375daf5647a8eed72680052
ntclose-deadlock-advisory.pdf
Posted Jun 15, 2006
Authored by Ruben Santamarta | Site reversemode.com

The Kernel Object Manager is prone to a deadlock situation which could be exploitable making unkillable any process running, complicating its elimination. Exploit included.

tags | exploit, kernel
SHA-256 | 17871ea1d002a3e25ba2cf1431e565ed676c7752e14f1d0fb9ed45a6c632038d
mrxsmb-ring0-advisory.pdf
Posted Jun 15, 2006
Authored by Ruben Santamarta | Site reversemode.com

Whitepaper discussing the fact that the Microsoft Server Message Block Redirector Driver (mrxsmb.sys) does not verify the user-mode buffer properly, allowing any user to overwrite any desired memory address. The successful exploitation results in Ring0 code execution.

tags | paper, code execution
SHA-256 | 8e72140b6ea3bdc38e8d99a76cc14e568dce6926a301540aba00a78f7cb44a46
iDEFENSE Security Advisory 2006-02-01.2
Posted Feb 2, 2006
Authored by iDefense Labs, b0f, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 02.01.06 - It has been found that a specially crafted m3u or pls file can overwrite a stack based buffer allowing for remote code execution. This vulnerability is specific to the 5.11 version of Winamp and does not affect previous versions.

tags | advisory, remote, code execution
advisories | CVE-2006-0476
SHA-256 | 55cfc9433a739a9d58acb02156040187fb0c6d1dfe185aad02576b64a0fdf607
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close