exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-10-04

scp.hole.txt
Posted Oct 4, 2000
Authored by Michal Zalewski, Craig Ruefenacht | Site lcamtuf.na.export.pl

When scp'ing files from a remote machine, the remote scp daemon can be modified to overwrite arbitrary files on the client side. Scp from ssh-1.2.30 and below is vulnerable. Proof of concept scp replacment included.

tags | exploit, remote, arbitrary, proof of concept
SHA-256 | c83fdb97397307f495d1cef7e5ab8dc8f8740692dccebe8deaaee85d3f5a2fe1
bindview.lpc.txt
Posted Oct 4, 2000
Authored by Todd Sabin | Site razor.bindview.com

BindView Security Advisory - Windows NT 4.0 and 2000 contain multiple vulnerabilities in the LPC ports, as described in ms00-070. Implications range from denial of service to local promotion.

tags | exploit, denial of service, local, vulnerability
systems | windows
SHA-256 | e24169f769ff08b95674ca0b151e7ca48901eed39216c7984e0e4d0e2e4797ae
obsd_fstat.c
Posted Oct 4, 2000
Authored by Shane A. Macaulay, Caddis | Site ktwo.ca

OpenBSD 2.7 local root exploit for /usr/bin/fstat + libutil exploit. Tested against OPenBSD 2.7 i386.

tags | exploit, local, root
systems | openbsd
SHA-256 | 0871c02f9900cd9d31c6b18d39964674456feb034d0b15de1647853203cc0096
rhsa.2000-066-03.lpr
Posted Oct 4, 2000
Site redhat.com

Red Hat Security Advisory - The old BSD-based lpr which we shipped with Red Hat Linux 5.x and 6.x has a recently discovered local root format string bug in its calls to the syslog facility.

tags | local, root
systems | linux, redhat, bsd
SHA-256 | 68ca43a21f3236c79d794da9e4d510f760089a9d493a6ac04145e637f94c261e
snort2html15.txt
Posted Oct 4, 2000
Authored by Daniel Swan | Site clark.net

Snort2HTML v1.5 converts Snort Intrusion Detection System logs into nicely-formatted HTML.

Changes: Parsing for ICMP alerts, optimized code, input/output files now can be specified on the command line, and more.
tags | tool, sniffer
SHA-256 | c585d4e20fc71f2ee6d79241605c53963ed072a83ff76bc69cb7464c01834cb6
rhsa.2000-065-04.lprng
Posted Oct 4, 2000
Site redhat.com

Red Hat Security Advisory - LPRng has a string format bug in the use_syslog function. This function returns user input in a string that is passed to the syslog() function as the format string. It is possible to corrupt the print daemon's execution with unexpected format specifiers, thus gaining root access to the computer. The vulnerability is theoretically exploitable both locally and remotely.

tags | root
systems | linux, redhat
SHA-256 | 83027cf3896158dff0e111b901dcbc0f01589231168753a60836df217b877264
CW2Setup.exe
Posted Oct 4, 2000
Authored by SubReality | Site subreality.net

Crackwhore 2, a basic HTTP verification application that will test website security. Includes an exploit vulnerability scanner and an FTP root crack utility. IRC chat function, language-packs, text export and more features have been implemented.

tags | tool, web, cgi, root, scanner
SHA-256 | 1e30dcb8eaadbc4ed04814583cb51fc3b09b2fd51eeb524bb2bc169fe85fa391
easy-adv-exploit.pl
Posted Oct 4, 2000
Authored by anno | Site teleh0r.cjb.net

Easy Advertiser v. 2.04 Remote Exploit. The stats.cgi script used in Easy Advertiser has an insecure open() that allows this exploit to bind a shell to port 60179 running with user priviledges that the webserver is run as. Netcat is needed locally to use this.

tags | exploit, remote, shell, cgi
SHA-256 | 3039f45d2afe1dffcacaeeaa10a0cd1ac319430fdfef2be12356e97c5078f50b
Internet Security Systems Security Advisory October 4, 2000
Posted Oct 4, 2000
Site xforce.iss.net

Internet Security Systems (ISS) has identified vulnerabilities in several utilities that ship as part of the Groff document formatting system package.

tags | arbitrary, root
SHA-256 | fbb240e9e8f7090ddc8625ef09174331b3b248f794fec3695f392bdad9961a77
openbsd.libutil
Posted Oct 4, 2000
Site openbsd.org

OpenBSD Advisories - There is a format string vulnerability present in the pw_error() function of OpenBSD 2.7's libutil library can yield localhost users root access through the setuid /usr/bin/chpass utility. Affected versions: OpenBSD versions through 2.7. FreeBSD 4.0 is vulnerable, but patches have been backported, and FreeBSD versions 4.1 and 4.1.1 are safe.

tags | root
systems | freebsd, openbsd
SHA-256 | c4dc0e1f0cf54500d97b341679ab07d2223bed756a6b56374ca34a7169f219cd
ms00-070
Posted Oct 4, 2000

Microsoft Security Bulliten (MS00-070) - Microsoft has released a patch that eliminates several vulnerabilities in Windows NT 4.0 and Windows 2000. There is an "Invalid LPC Request" vulnerability which can cause the affected system to fail, an "LPC Mempry Exhaustion" vulnerability which can deplete the affected system's memory, and a new variant of the "Spoofed LPC Port Request" vulnerability which could allow a malicious user create a process that runs at the priviledge level of the already running process. FAQ can be found here

tags | spoof, vulnerability
systems | windows
SHA-256 | 5d8c5735773152f383166a43c106f08d4a2aa27f464e7f28a521342c91a0ba65
sara-3.2.2.tar.gz
Posted Oct 4, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Updated testing for Subseven, now detects TCP wrappers, added additional "custom" attack modes, and bug fixes.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 7eb53ae562976f11c699ea7d32f06b6d6652df89793f8b483f7147dafb7bff43
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close