Twenty Year Anniversary
Showing 1 - 17 of 17 RSS Feed

Files Date: 2003-07-29

hlbof-client.zip
Posted Jul 29, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Half-Life client versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) remote exploit that will pose as a server that overwrites the stored return address but does not attempt any command execution.

tags | exploit, remote
MD5 | 47c81302e345d9a31e8cb8ee2dab615f
halflifeclient.txt
Posted Jul 29, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Half-Life client versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) on Windows has a remote buffer overflow in the connection routine.

tags | advisory, remote, overflow
systems | windows
MD5 | 8f14177844eb32395c9f1b8646b5f18f
hlbof-server.zip
Posted Jul 29, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Half-Life server versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) remote exploit that will cause a denial of service.

tags | exploit, remote, denial of service
MD5 | 5936369be7bf61fd4c0c410f03526b21
halflife.txt
Posted Jul 29, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Half-Life server versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) on both Windows and Linux suffer from a remote buffer overflow and are vulnerable to a denial of service attack. Affects both the game and dedicated servers.

tags | advisory, remote, denial of service, overflow
systems | linux, windows
MD5 | 5d39f465811ebcde1ccaa1c5d7cde6cd
iDEFENSE Security Advisory 2003-07-29.t
Posted Jul 29, 2003
Authored by Jouko Pynnonen, iDefense Labs | Site klikki.fi

iDEFENSE Security Advisory 07.29.03: A locally exploitable buffer overflow exists in the ld.so.1 dynamic runtime linker in Sun's Solaris operating system. The LD_PRELOAD variable can be passed a large value, which will cause the runtime linker to overflow a stack based buffer.

tags | advisory, overflow
systems | solaris
advisories | CVE-2003-0609
MD5 | e72d48324cb88671474e05cf35b5582b
0x333-lockdexvul.txt
Posted Jul 29, 2003
Authored by nic | Site 0x333.org

lockdev 1.0.0 local exploit that escalates privileges to group lock. Tested against RedHat 7.3, 8.0, and 9.0.

tags | exploit, local
systems | linux, redhat
MD5 | f1abaa914fb3eae21371eee17e50e6ad
dcomsploit.tgz
Posted Jul 29, 2003
Authored by FlashSky, Benjurry

DCOM remote exploit utilizing the issue discussed here. Covers Microsoft Windows NT SP6/6a (cn), as well as Windows 2000 SP0-4 (cn) SP0-2 (jp) SP0-2,4 (kr) SP0-1 (mx) SP3-4 (Big 5) SP0-4 (english) SP0 Server (english), and Windows XP SP0-1 (english) SP1 (cn) SP0-1 (Big 5). Modified by sbaa.

tags | exploit, remote
systems | windows, 2k, nt, xp
MD5 | 330e19366c8d5664a7f2a55efc3a8e78
shatterSEH2.txt
Posted Jul 29, 2003
Authored by Brett Moore SA | Site security-assessment.com

Version two of this paper discussing more shatter attacks that are possible using SEH memory locations to escalate privileges in Windows. Exploit code included. Related information available here.

tags | exploit
systems | windows
MD5 | 128b5b0cdea6aee5c389eaa7ac17b801
VIGILANTE-2003002.txt
Posted Jul 29, 2003
Authored by Reda Zitouni | Site vigilante.com

Vigilante Advisory 2003002 - A flaw in firmware version 12.2(4)JA and earlier of the Cisco Aironet 1100 series allows a malicious remote user to discover which accounts are valid on the targeted Cisco Aironet Access Point by using classical brute force techniques. Exploitation of this flaw is possible if the telnet service is enabled with authentication.

tags | advisory, remote
systems | cisco
advisories | CVE-2003-0512
MD5 | bd7e68d1d92b208a740d22498972fe9f
VIGILANTE-2003001.txt
Posted Jul 29, 2003
Authored by Reda Zitouni | Site vigilante.com

Vigilante Advisory 2003001 - It is possible to cause Cisco Aironet Access Point to crash and reboot if the HTTP server feature is enabled. This can be accomplished by submitting a specially crafted request to the web server. There is no need to authenticate to perform this attack, only access to the web server is required. The Aironet bridge reboots upon receiving the request and failing to handle correctly this one. Afterwards, no further access to the WLAN or its services is possible.

tags | advisory, web
systems | cisco
advisories | CVE-2003-0511
MD5 | 63d04387b121a302daea1fd36d5e5ee9
ciscoHTTP.txt
Posted Jul 29, 2003
Authored by Cisco Systems PSIRT

Cisco Security Advisory - Sending a malformed URL to the Cisco Aironet AP1x00 can cause the device to reload resulting in a denial of service.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2003-0511
MD5 | 8b9769d31f0d581d3b0ae51da7b56204
CLIVITT-2003-5.txt
Posted Jul 29, 2003
Authored by Carl Livitt

Apache 1.3.x using the mod_mylo module version 0.2.1 and below is vulnerable to a buffer overflow. The mod_mylo module is designed to log HTTP requests to a MySQL database and insufficient bounds checking in mylo_log() allows a remote attacker to gain full webserver uid access. Remote exploit for SuSE 8.1 Linux with Apache 1.3.27, RedHat 7.2/7.3 Linux with Apache 1.3.20, and FreeBSD 4.8 with Apache 1.3.27 included.

tags | exploit, remote, web, overflow
systems | linux, redhat, freebsd, suse
MD5 | b6a0cd78d32dfe4d978f56c3436cdb69
sqlscan12eval.zip
Posted Jul 29, 2003
Authored by Lazy Sysadmin

SQLScan v1.2 is intended to run against Microsoft SQL Server and attempts to connect directly to port 1433. It features the ability to scan one host or an IP list from an input file, the ability to scan for one SQL account password or multiple passwords from a dictionary file, and the ability to create an administrative NT backdoor account on vulnerable hosts, which will fail if xp_cmdshell is disabled on the server.

Changes: Bugs fixed. Added ability to specify backdoor account name and password.
MD5 | 6858396adfefa08dfbac24c0cd7e4482
nsniff-0.1.2.tar
Posted Jul 29, 2003
Authored by sac, LexLufix | Site sac.cc

Packet capturing and network monitoring tool. Contains all the basics for monitoring network traffic. Tested on NetBSD and Linux. v0.1.2

systems | linux, netbsd
MD5 | ee826c2b1b9bd46d13c2036a2590b11c
sxor.tar
Posted Jul 29, 2003
Authored by sac, LexLufix | Site sac.cc

A program that XORs the bytes of a given file with a specified key to encrypt the file. With the same file, the file can be decrypted.

MD5 | b431ff6ac7aa4cfe2295ccd598d9b42e
elf-reloc.c
Posted Jul 29, 2003
Authored by sac, Soeren Bleikertz | Site sac.cc

A demonstration of ELF relocation.

tags | exploit
MD5 | d072fc2f8db2721c0971aa0ee90e4ab3
56kill.pl
Posted Jul 29, 2003
Authored by sac, Wel | Site sac.cc

A perl script which simulates a ATH+++ against 56k modems.

tags | perl
MD5 | 0d3f74439dc554ff889c9cdd6a794004
Page 1 of 1
Back1Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    5 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close