what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2003-07-28 to 2003-07-29

imapd_overflow
Posted Jul 28, 2003
Authored by sac, LexLufix | Site sac.cc

Description of a simple buffer overflow attack against older IMAP servers developed by the University of Washington.

tags | advisory, overflow, imap
SHA-256 | 801b38cc3b6e3bf19304acdeb6078697e05b7feabd89dcdfedd58d3099098ccd
zappa-0.2.c
Posted Jul 28, 2003
Authored by sac, Soeren Bleikertz | Site sac.cc

A backdoor which waits for an ICMP packet and then connects with a UDP server on the client. v0.2

tags | udp
SHA-256 | f7ee9dcfe3b1e7c2bde267a0510f1210573dc52b3c5ad843f4436f19feec2445
benjurry.txt
Posted Jul 28, 2003
Authored by FlashSky, Benjurry | Site xfocus.org

Thorough analysis of the buffer overrun in the Windows RPC interface that was discovered by the Last Stage of Delirium. Exploit included for Windows 2000 SP4 Chinese version.

tags | exploit, overflow
systems | windows
SHA-256 | 6a46de63d03e6910e4235d4653d7f7572b05b83813037adebbcf6a580f52cbe1
operalong.txt
Posted Jul 28, 2003
Authored by dodo | Site darkwired.org

Opera version 7.0 and 6.12 is vulnerable to a buffer overflow that results in a crash when redirected with a long URL.

tags | advisory, overflow
SHA-256 | 9ba3231d475b450b82ab4bcb3dac5dbc752e08e1814ab64a42481436815ecd0d
Gobbler-2.0.1-Alpha1.tar.gz
Posted Jul 28, 2003
Authored by STE Jones | Site networkpenetration.com

Gobbler is a tool designed to audit various aspects of DHCP networks, from detecting if DHCP is running on a network to performing a denial of service attack. Gobbler also exploits DHCP and ethernet, to allow distributed spoofed port scanning with the added bonus of being able to sniff the reply from a spoofed host. This tool is based on proof of concept code "DHCP Gobbler" available from networkpenetration.com and the DHCP flaws paper.

Changes: Added port 0 fingerprinting, bug fixes.
tags | tool, denial of service, spoof, rootkit, proof of concept
systems | unix
SHA-256 | 28547ebff2666e8695d9c5e76a8063c0a32e0fc3e55e54aa0f70c4206c761b56
port0paper.txt
Posted Jul 28, 2003
Authored by STE Jones | Site networkpenetration.com

Paper discussing utilization of port zero for OS fingerprinting and how to protect against it.

tags | paper
SHA-256 | bbe9a71a165db0e8b2e6a2f2d5c437c544faf4ba99ad3d4c8737d4bf2ef584a0
illmob.txt
Posted Jul 28, 2003
Site illmob.org

Paper discussing utilization of the Win32 exploit for the DCOM RPC vulnerability.

tags | paper
systems | windows
SHA-256 | ac991411216d76522190300a8ee9d05dc9d1eee9a92a9af2f72a6cffa66b6bb9
sambash-release.c
Posted Jul 28, 2003
Authored by flatline

Remote root exploit for samba 2.2.7a and below using reply_nttrans(). Written for the Linux x86 platform.

tags | exploit, remote, x86, root
systems | linux
SHA-256 | d92d52b7bdffc81559e9c811bfbce60c3ac57434a8318be8a5f08c724eaa127b
DComExpl_UnixWin32.zip
Posted Jul 28, 2003
Authored by Benjamin Lauziere

Windows port of the remote exploit utilizing the DCOM RPC overflow originally coded by H D Moore.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 98186a16043a537eb59eec975695e217b9043d1747d7a414c37c888c6b72be38
dcom.c
Posted Jul 28, 2003
Authored by H D Moore | Site metasploit.com

Remote exploit utilizing the DCOM RPC overflow discovered by LSD. Includes targets for Windows 2000 and XP. Binds a shell on port 4444.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | aac1c914909b279cffcee8699eff0774f5962b99d0dbd3ed2a80f12fa7a64d4a
ACME-mitel.txt
Posted Jul 28, 2003
Authored by Acme | Site olografix.org

An interesting bug in the Mitel Voice Over IP system that allows an attacker to discover phone numbers calling through the DHCP server.

tags | exploit
SHA-256 | 1ed33fcc27a383016afe3811d1aa56ff46a4cdcfdf95bf1b10d6082b6b4ffcdb
CA-2003-18.directx.txt
Posted Jul 28, 2003
Site cert.org

CERT Advisory CA-2003-18 - CERT announces that a set of integer overflows exists in a DirectX library included in Microsoft Windows. An attacker could exploit this vulnerability to execute arbitrary code or to cause a denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | windows
SHA-256 | eafbaabf97c03108de6117e44f1d1a3d553ac31d3dabf02f3f7f03ac596520c5
NGSextproc.txt
Posted Jul 28, 2003
Authored by David Litchfield, Chris Anley | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR25072003 - In an attempt to fix previous vulnerabilities discovered by NGSSoftware, the Oracle RDBMS fix patched the hole but left a logging function vulnerable to a stack overflow.

tags | advisory, overflow, vulnerability
SHA-256 | 237dd712fc93400a7d9eed9e111f3ab5238fd5fcb2322857fa12ec0d69be3187
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close