what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2002-06-19

apache-chunked.txt
Posted Jun 19, 2002
Authored by Mark Litchfield, Apache developers | Site httpd.apache.org

Apache Advisory - A vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers can under some conditions be used to remotely execute code on systems running this software.

advisories | CVE-2002-0392
SHA-256 | 3576dbeaf81b78b50b61214cbe4d286dbbfd04b6af6a433d492bc3bd471c2dfc
apache-chunked-xforce.txt
Posted Jun 19, 2002
Authored by ISS | Site iss.net

ISS reported a vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers that under some conditions can be used to remotely execute code on systems running this software. Note that the by ISS supplied patch, which is included in this advisory, does not fix this vulnerability.

advisories | CVE-2002-0392
SHA-256 | eda6ad9d37711b41b271339dd3102eebcf86b868e4acbe53efdd0b47ba875df1
tracesex.pl
Posted Jun 19, 2002
Authored by Stringz | Site snosoft.com

TrACESroute v6.0 gold local format string exploit exploit. Tested on Red Hat Linux release 7.2 (Enigma).

tags | exploit, local
systems | linux, redhat
SHA-256 | 14d19acb3a570221091bebb1f7f37f1e180242840c6fa9b621ec65b29374a9ed
icx2.c
Posted Jun 19, 2002
Authored by Bab Boon

Icecast v1.3.11 and below remote root exploit for linux/x86. Binds a shell to port 30464. Tested against SuSE 7.2, Debian 2.2r2, and Slackware 8.0.

Changes: Fixes some issues with the child friendliness of the original exploit.
tags | exploit, remote, shell, x86, root
systems | linux, suse, slackware, debian
SHA-256 | 766b53ac8f37a9dae4525d7da3fbb07b12711f55801b3625d281dc809594f972
Wellenreiter-v14.tar.gz
Posted Jun 19, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. The unique essid-brute forcer helps to get the essid of low-traffic networks. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: GPS support has been added. Uncovers non-broadcasting networks by just waiting until a probe response passes the network (someone joins the network) or brute-forcing the ess! Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | a725e7f5891752efed8a64832a6a73b96ab9984333e66a484ac4e0b3987d8cc8
apache_1.3.26.tar.gz
Posted Jun 19, 2002
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed. Changelog available here.

Changes: Fixed a remotely exploitable security vulnerability in chunked encoding.
systems | unix
advisories | CVE-2002-0392
SHA-256 | 5f2d4a7c51fa8824cf1f95fbecbc07656d4da08eb4757f885239745a762ccc70
CA-2002-17.apache
Posted Jun 19, 2002
Site cert.org

CERT Advisory CA-2002-17 - Apache v1.3.24 and 2.0.36 and below contains a remotely exploitable vulnerability in chunk encoded data support that is present by default. Remote code execution is possible on some platforms, denial of service attacks are possible against others. Fix available here.

tags | remote, denial of service, code execution
SHA-256 | 035e534f43dbafda96dff7b5b279ff95900947a1373bd9503afdd764aba7c3cd
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close