the original cloud security
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-11-14

local_nonexec_sun.c
Posted Nov 14, 2000
Authored by Warning3 | Site nsfocus.com

Solaris Sparc 2.6 / 7 local root exploit against /usr/bin/passwd which uses the yet unpatched libc locale bug and bypasses non-executable stack protection.

tags | exploit, local, root
systems | solaris
MD5 | 8d215e0e58c070b6c9274a482874e467
bsdi_filter.c
Posted Nov 14, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI /usr/contrib/bin/filter v2.* local buffer overflow exploit. Tested on BSDI 3.0, provides a shell with GID mail.

tags | exploit, overflow, shell, local
MD5 | 0c706f8ee5ba485602394241d43bcbad
ex_winproxy.c
Posted Nov 14, 2000
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

Shadow Penguin Security Advsory #37 - WinProxy 2.0.0/2.0.1 (now known as Black Jumbo dog) contains many remotely exploitable buffer overflows. Exploit for the POP3 service included, tested on Japanese Windows98.

tags | exploit, overflow
MD5 | 198c837d86b4acc67f7042d7d8ed65f9
pgsql_php3
Posted Nov 14, 2000
Authored by Yen-Ming Chen | Site xanadu.incident.org

This is a php script which goes to the database (Postgresql) and generate some statistics from the data. For more info see this snortdb page.

tags | tool, php, sniffer
MD5 | 60b87f3b1313543c52c6070d66a776fa
CA-2000-20.bind
Posted Nov 14, 2000
Site cert.org

CERT Advisory CA-2000-20 - Name servers running ISC bind v8.2 through 8.2.2-P6 contains two denial of service vulnerabilities. The first vulnerability is referred to by the ISC as the "zxfr bug" and affects ISC BIND version 8.2.2, patch levels 1 through 6. The second vulnerability, the "srv bug", affects ISC BIND versions 8.2 through 8.2.2-P6. More information about these vulnerabilities available here.

tags | denial of service, vulnerability
MD5 | fc3ac876330d29b24b986176e0d22625
iXsecurity.20001107.compaq-wbm.a
Posted Nov 14, 2000
Authored by Ian Vitek | Site ixsecurity.com

iXsecurity Security Vulnerability Report - The default installation of Compaq Web-Based Management on a Netware server reveals sensitive system files to anyone who can access TCP port 2301. Allows remote users to read the remote console password. Software version 2.28 verified vulnerable. Compaq advisory available here.

tags | exploit, remote, web, tcp
MD5 | 029f2530b5f8c5d9c1cba996ce98cce4
hpux.10.20.644.txt
Posted Nov 14, 2000
Authored by J.A. Gutierrez

HP/UX 10.20 allows any file on the filesystem to be chmodded 644.

tags | exploit
systems | hpux
MD5 | 62ea45f3d63c60a3cb3a3038f32fc25e
new.phf.txt
Posted Nov 14, 2000
Authored by PrOtOn

An exploitable buffer overflow vulnerability has been found in phf which is unrelated to the well known bad filter problem. All versions of phf should be removed.

tags | exploit, overflow
MD5 | 3c927718a1d994245ce67a2209fe38a5
adv_novellleak.txt
Posted Nov 14, 2000
Authored by Simple Nomad | Site razor.bindview.com

Object Enumeration in Novell Environments - Due to a combination of legacy support and default settings, Novell Netware servers using native IP will leak system information via TCP port 524 when properly queried. In mixed Novell/Microsoft environments, information regarding Microsoft devices is leaked via the Service Advertising Protocol (SAP) table. Third party products, such as those used to synchronize directory services between environments can further the problem. Essentially, a remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication.

tags | remote, tcp, protocol
MD5 | ed52bf34d17e54095f1b53202c9dea03
rhsa.2000-075-07.usermode
Posted Nov 14, 2000
Site redhat.com

Red Hat Security Advisory - The usermode package contains a binary (/usr/bin/userhelper), which is used to control access to programs which are to be executed as root. Because programs invoked by userhelper are not actually running setuid-root, security measures built into recent versions of glibc are not active. If one of these programs supports internationalized text messages, a malicious user can use the LANG or LC_ALL environment variables (which are inherited by userhelper and, in turn, any programs it runs) to create a format-string exploit in these programs.

tags | root
systems | linux, redhat
MD5 | bf0e4f7df84b1876cc8cdc8d1f774793
slackware.pine.txt
Posted Nov 14, 2000
Site slackware.com

Slackware Security Advisory - Pine 4.21 and below contains remote vulnerabilities. Upgrade to at least Pine 4.30.

tags | remote, vulnerability
systems | linux, slackware
MD5 | af90b1699bc83d6abbd4c1aaf9111900
XATO-112000-01
Posted Nov 14, 2000
Authored by Sozni | Site xato.net

Xato Security Advisory XATO-112000-01 - The Cart32 shopping cart v3.5 and below for Windows contains multiple remote vulnerabilities. Common user misconfigurations and bad password encryption make the application more vulnerable, often allowing a full compromise of the server.

tags | remote, vulnerability
systems | windows
MD5 | c53878c21da417cbef5973c502a3fec7
sadmind-sun.brute.c
Posted Nov 14, 2000
Authored by synnergy, Nikolai Abromov

Remote exploit for rpc.sadmind which brute forces the offset. Tested against Solaris X86 and SPARC v2.6 and 7.0.

tags | exploit, remote, x86, cracker
systems | solaris
MD5 | c0c0dc5180d9081f3ba5df8bbfca3981
rhsa.2000-102-04.pine
Posted Nov 14, 2000
Site redhat.com

Red Hat Security Advisory - Adding specific headers to messages, the pine mail reader v4.21 and the imap server could be made to exit with an error message when users attempted to manipulate mail folders containing those messages.

tags | imap
systems | linux, redhat
MD5 | 06a5008623f246f53ca88cd4a8b6d5ca
exchange.dos.txt
Posted Nov 14, 2000
Authored by Art Savelev | Site savelev.com

Remote denail of service exploit for Microsoft Exchange 5.5 SP3 Internet Mail Service. A message containing charset = "" causes mail service to crash.

tags | exploit, remote
MD5 | 1019b745517c405b5168833375c8417b
guninski27.txt
Posted Nov 14, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #27 - There is a security vulnerability in IE 5.x, Outlook, and Outlook Express which allows searching for files with specific name (wildcards are allowed) or content. Combined with other local file reading vulnerabilities this allows attackers to search for and retrieve any file on a users drive. The problem is the "ixsso.query" ActiveXObject which is used to query the Indexing service and surprisingly it is marked safe for scripting. Exploit code included, demonstration available here.

tags | exploit, local, vulnerability, activex
MD5 | 9fc02ada52111b298e4d2c9c19542ba9
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close