exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-10-04

scp.hole.txt
Posted Oct 4, 2000
Authored by Michal Zalewski, Craig Ruefenacht | Site lcamtuf.na.export.pl

When scp'ing files from a remote machine, the remote scp daemon can be modified to overwrite arbitrary files on the client side. Scp from ssh-1.2.30 and below is vulnerable. Proof of concept scp replacment included.

tags | exploit, remote, arbitrary, proof of concept
SHA-256 | c83fdb97397307f495d1cef7e5ab8dc8f8740692dccebe8deaaee85d3f5a2fe1
bindview.lpc.txt
Posted Oct 4, 2000
Authored by Todd Sabin | Site razor.bindview.com

BindView Security Advisory - Windows NT 4.0 and 2000 contain multiple vulnerabilities in the LPC ports, as described in ms00-070. Implications range from denial of service to local promotion.

tags | exploit, denial of service, local, vulnerability
systems | windows
SHA-256 | e24169f769ff08b95674ca0b151e7ca48901eed39216c7984e0e4d0e2e4797ae
obsd_fstat.c
Posted Oct 4, 2000
Authored by Shane A. Macaulay, Caddis | Site ktwo.ca

OpenBSD 2.7 local root exploit for /usr/bin/fstat + libutil exploit. Tested against OPenBSD 2.7 i386.

tags | exploit, local, root
systems | openbsd
SHA-256 | 0871c02f9900cd9d31c6b18d39964674456feb034d0b15de1647853203cc0096
rhsa.2000-066-03.lpr
Posted Oct 4, 2000
Site redhat.com

Red Hat Security Advisory - The old BSD-based lpr which we shipped with Red Hat Linux 5.x and 6.x has a recently discovered local root format string bug in its calls to the syslog facility.

tags | local, root
systems | linux, redhat, bsd
SHA-256 | 68ca43a21f3236c79d794da9e4d510f760089a9d493a6ac04145e637f94c261e
snort2html15.txt
Posted Oct 4, 2000
Authored by Daniel Swan | Site clark.net

Snort2HTML v1.5 converts Snort Intrusion Detection System logs into nicely-formatted HTML.

Changes: Parsing for ICMP alerts, optimized code, input/output files now can be specified on the command line, and more.
tags | tool, sniffer
SHA-256 | c585d4e20fc71f2ee6d79241605c53963ed072a83ff76bc69cb7464c01834cb6
rhsa.2000-065-04.lprng
Posted Oct 4, 2000
Site redhat.com

Red Hat Security Advisory - LPRng has a string format bug in the use_syslog function. This function returns user input in a string that is passed to the syslog() function as the format string. It is possible to corrupt the print daemon's execution with unexpected format specifiers, thus gaining root access to the computer. The vulnerability is theoretically exploitable both locally and remotely.

tags | root
systems | linux, redhat
SHA-256 | 83027cf3896158dff0e111b901dcbc0f01589231168753a60836df217b877264
CW2Setup.exe
Posted Oct 4, 2000
Authored by SubReality | Site subreality.net

Crackwhore 2, a basic HTTP verification application that will test website security. Includes an exploit vulnerability scanner and an FTP root crack utility. IRC chat function, language-packs, text export and more features have been implemented.

tags | tool, web, cgi, root, scanner
SHA-256 | 1e30dcb8eaadbc4ed04814583cb51fc3b09b2fd51eeb524bb2bc169fe85fa391
easy-adv-exploit.pl
Posted Oct 4, 2000
Authored by anno | Site teleh0r.cjb.net

Easy Advertiser v. 2.04 Remote Exploit. The stats.cgi script used in Easy Advertiser has an insecure open() that allows this exploit to bind a shell to port 60179 running with user priviledges that the webserver is run as. Netcat is needed locally to use this.

tags | exploit, remote, shell, cgi
SHA-256 | 3039f45d2afe1dffcacaeeaa10a0cd1ac319430fdfef2be12356e97c5078f50b
Internet Security Systems Security Advisory October 4, 2000
Posted Oct 4, 2000
Site xforce.iss.net

Internet Security Systems (ISS) has identified vulnerabilities in several utilities that ship as part of the Groff document formatting system package.

tags | arbitrary, root
SHA-256 | fbb240e9e8f7090ddc8625ef09174331b3b248f794fec3695f392bdad9961a77
openbsd.libutil
Posted Oct 4, 2000
Site openbsd.org

OpenBSD Advisories - There is a format string vulnerability present in the pw_error() function of OpenBSD 2.7's libutil library can yield localhost users root access through the setuid /usr/bin/chpass utility. Affected versions: OpenBSD versions through 2.7. FreeBSD 4.0 is vulnerable, but patches have been backported, and FreeBSD versions 4.1 and 4.1.1 are safe.

tags | root
systems | freebsd, openbsd
SHA-256 | c4dc0e1f0cf54500d97b341679ab07d2223bed756a6b56374ca34a7169f219cd
ms00-070
Posted Oct 4, 2000

Microsoft Security Bulliten (MS00-070) - Microsoft has released a patch that eliminates several vulnerabilities in Windows NT 4.0 and Windows 2000. There is an "Invalid LPC Request" vulnerability which can cause the affected system to fail, an "LPC Mempry Exhaustion" vulnerability which can deplete the affected system's memory, and a new variant of the "Spoofed LPC Port Request" vulnerability which could allow a malicious user create a process that runs at the priviledge level of the already running process. FAQ can be found here

tags | spoof, vulnerability
systems | windows
SHA-256 | 5d8c5735773152f383166a43c106f08d4a2aa27f464e7f28a521342c91a0ba65
sara-3.2.2.tar.gz
Posted Oct 4, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Updated testing for Subseven, now detects TCP wrappers, added additional "custom" attack modes, and bug fixes.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 7eb53ae562976f11c699ea7d32f06b6d6652df89793f8b483f7147dafb7bff43
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close