exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files Date: 2002-03-07

pine-cert-20020301.txt
Posted Mar 7, 2002
Authored by Joost Pol | Site pine.nl

An off by one overflow has been discovered in the channel code of OpenSSH versions 2.0 - 3.0.2. Users with an existing user account can abuse this bug to gain root privileges. Exploitability without an existing user account has not been proven but is not considered impossible. A malicious ssh server could also use this bug to exploit a connecting vulnerable client. Fix available here.

tags | overflow, root
SHA-256 | f862fbf462b1a8965de529058ff2c189f2e7ad5ad9d1c0dde44d02b7424b0163
openssh-3.1p1.tar.gz
Posted Mar 7, 2002
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Fixes an overflow which can be used to gain root access on the server. Exploitability without an existing user account has not been proven but is not considered impossible. A malicious ssh server could also use this bug to exploit a connecting vulnerable client. Full changelog available here.
tags | encryption
systems | linux, openbsd
SHA-256 | d3ea0d0c55eccf07ffd42350e1df1b108f38e0605fa9b7343e4db28c1417fb9f
icmpchat-0.2.tar.gz
Posted Mar 7, 2002
Site mjm.gmc-online.de

ICMP-Chat is an encrypted console chat program that uses ICMP packets. ICMP-Chat uses enigma (crypt) for encryption. It is a peer-to-peer chat program that enables you to hide your chat or to chat through many firewalls.

Changes: A small fix - You can now enter the password each time you start chat.
systems | unix
SHA-256 | 187cd3d7e58024fa85e43c48821723f85596cb3e58d9f0aa0460386303e5e554
phpxpl.c
Posted Mar 7, 2002
Authored by Count August Anton Wilhelm Neithardt von Gneisenau

PHP 3.0.16/4.0.2 remote root format string overflow exploit for Linux/x86. Included shellcode adds a root shell on tcp port 1524 to inetd.conf.

tags | exploit, remote, overflow, shell, x86, root, php, tcp, shellcode
systems | linux
SHA-256 | bd2179b0230478789cc9cadd205ee72f2c69c586fee39b3401c11b80fc6d9a40
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close