exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2007-04-03 to 2007-04-04

Gentoo Linux Security Advisory 200704-1
Posted Apr 3, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200704-01 - The Madynes research team at INRIA has discovered that Asterisk contains a null pointer dereferencing error in the SIP channel when handling INVITE messages. Furthermore qwerty1979 discovered that Asterisk 1.2.x fails to properly handle SIP responses with return code 0. Versions less than 1.2.14-r2 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2007-1561, CVE-2007-1594
SHA-256 | f6851d712de98a5997c4418c720eefbba3b67611e354d32c7bc3d2ee7633b100
vnsecurity-CFP2007.txt
Posted Apr 3, 2007
Site conf.vnsecurity.net

The Call for Papers for VNSECON Security Conference 2007 is now open. VNSECON 2007 is a security conference taking place downtown in Ho Chi Minh City (aka Saigon), Vietnam from the 3rd to 4th of August 2007.

tags | paper, conference
SHA-256 | f1609ba6a8dc7fd81443295492c1ae512d80fead1ba8e724912f8df8256f9eec
iDEFENSE Security Advisory 2007-03-31.2
Posted Apr 3, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 03.31.07 - Remote exploitation of a multiple vulnerabilities within IBM Corp.'s Tivoli Provisioning Manager for OS Deployment allows attackers to crash the service or potentially execute arbitrary code with SYSTEM privileges. These vulnerabilities specifically exist in the handling of multi part/form-data HTTP POST requests. Malformed requests can cause invalid memory accesses leading to denial of service, or in some cases heap corruption. iDefense has confirmed the existence of these vulnerabilities within version 5.1.0.116 of Tivoli Provisioning Manager for OS Deployment. Older versions are suspected to be vulnerable as well.

tags | advisory, remote, web, denial of service, arbitrary, vulnerability
SHA-256 | 6a128b2035e9eb4954ecc96a5b62d28b8965123f1331049790650678b5e38b88
iDEFENSE Security Advisory 2007-04-02.1
Posted Apr 3, 2007
Authored by iDefense Labs, ri0t, Eric DETOISIEN, Titon | Site idefense.com

iDefense Security Advisory 04.02.07 - Remote exploitation of a buffer overflow vulnerability in an ActiveX control installed by Hewlett-Packard Mercury Quality Center could allow for the execution of arbitrary code. iDefense has confirmed this vulnerability in the control that is installed with the 9.0 version of Hewlett-Packard Mercury Quality Center. The vulnerable ActiveX control is version 9.1.0.4353.

tags | advisory, remote, overflow, arbitrary, activex
SHA-256 | 5b7a58a511de0448a1f3aa7cfacb09134ed75ed21003432e47ea7cef077143a6
iDEFENSE Security Advisory 2007-03-31.1
Posted Apr 3, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 03.31.07 - Remote exploitation of several buffer overflow vulnerabilities in ImageMagick, as included in various vendors' operating system distributions, allows attackers to execute arbitrary code with the credentials used for image processing. An integer overflow exists ImageMagick's handling of DCM (Digital Imaging and Communications in Medicine) format files which allows an attacker to cause a heap-based buffer overflow. This vulnerability specifically exists in the ReadDCMImage() function. Two integer overflows exists ImageMagick's handling of XWD (X Windows Dump) format files that allows an attacker to cause a heap-based buffer overflow. The vulnerabilities specifically exist in the ReadXWDImage() function. An integer overflow could occur when calculating the amount of memory to allocate for the 'colors' or 'comment' field. iDefense has confirmed the existence of these vulnerabilities in ImageMagick version 6.3.x. Additionally, the source code for versions 6.3.1, 6.3.2, 6.3.3-3 and 6.2.9 contain the affected code. It is suspected that earlier versions of ImageMagick are also vulnerable.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | windows
SHA-256 | 56c8a5a660452e4edd55f8cf111ae151e2bbb5158e4cacb4bafc0360b92bed25
apop-protocol.txt
Posted Apr 3, 2007
Authored by Gaetan Leurent

A security vulnerability has been discovered in the APOP protocol that is related to the recent collision attacks by Wang and al. against MD5. Using the man in the middle setting, one can recover the first characters of the password with a few hundred authentications from the client.

tags | advisory, protocol
advisories | CVE-2007-1558
SHA-256 | 1fccafc2839ce661bb7e5f89bcf320907774aa2b78dffb56ed7fbb10b9eeb375
HP Security Bulletin 2006-11.77
Posted Apr 3, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). This vulnerability could be exploited remotely to gain unauthorized access to certain facilities of the NNM server.

tags | advisory
SHA-256 | 2aeb6d5b358e88617a159942d83632417260ecad448880f0d9e00ce2f623556d
Debian Linux Security Advisory 1274-1
Posted Apr 3, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1274-1 - An integer underflow bug has been found in the file_printf function in file, a tool to determine file types based analysis of file content. The bug could allow an attacker to execute arbitrary code by inducing a local user to examine a specially crafted file that triggers a buffer overflow.

tags | advisory, overflow, arbitrary, local
systems | linux, debian
advisories | CVE-2007-1536
SHA-256 | 391c88e04422b21a20d2d064764b5af7e5efa1e26a113210c50cb29d42a83596
ani_loadimage_chunksize-email.rb.txt
Posted Apr 3, 2007
Authored by Matt Miller, H D Moore

This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.

tags | exploit, overflow
advisories | CVE-2007-1765, CVE-2007-0038
SHA-256 | 157b4e60ef0c519b39cdcd14ed1785bcf8179f18b70a23331ef92a5645137481
ani_loadimage_chunksize-browser.rb.txt
Posted Apr 3, 2007
Authored by Matt Miller, H D Moore

This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Internet Explorer (6 and 7) by using the CURSOR style sheet directive to load a malicious .ANI file. Internet Explorer will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen.

tags | exploit, overflow
advisories | CVE-2007-1765, CVE-2007-0038
SHA-256 | 6b5f6b6710a71a3732c8bd3e9bdaa13eef0f941340da69f23d19c64b17e8f8bd
rspa-rfi.txt
Posted Apr 3, 2007
Authored by Hamid Ebadi | Site bugtraq.ir

Really Simple PHP and Ajax, or RSPA, is susceptible to a remote file inclusion vulnerability. Version RSPA-2007-03-23 is susceptible.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 4ca08ebadbed9149443b4f1921f77f9fb3ed0057795a03b0dad4f02d9087b531
directadmin1293-xss.txt
Posted Apr 3, 2007
Authored by Kanedaaa Bohater | Site kaneda.bohater.net

DirectAdmin versions below 1.29.3 are susceptible to a persistent cross site scripting attack.

tags | exploit, xss
SHA-256 | aecddc4ae8ca386f2b4c093ee49c6aed712e0a3f864740dc9a0f671d5638a37c
SecTor-CFP2007.txt
Posted Apr 3, 2007
Site sector.ca

The Toronto security conference SecTor official call for papers has been announced. SecTor will be held from November 20-21, 2007.

tags | paper, conference
SHA-256 | 507b8c89bd0ad762eccfa07e0dff38b13baa522e638b24524fbb40af93354a51
Samhain File Integrity Checker
Posted Apr 3, 2007
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 6bd6a9dada95cabce9c3a4423a630072d45dcc85500ad0ce648adbd2be385fcc
snortalog_v2.4.2.tgz
Posted Apr 3, 2007
Authored by Jeremy Chartier | Site jeremy.chartier.free.fr

Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats: syslog, fast, and full snort alerts. Moreover, it is able to summarize other logs like Fw-1 (NG and 4.1), Netfilter, and IPFilter in a similar way.

Changes: Multiple features added including the addition of the Russian language and various new log detection functionality.
tags | tool, perl, sniffer
SHA-256 | a0ef108a14602c8cf8fd55027d103fde1ba00c3893eb279fd65da7e83c9dddd3
nufw-2.0.18.tar.gz
Posted Apr 3, 2007
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Bugfix release.
tags | tool, remote, firewall
systems | unix
SHA-256 | 6ebc4484e1f550824e45f39c5ce1ecc0546aeb2c706460311b7374eb8d33dde5
2bgal-rfi.txt
Posted Apr 3, 2007
Authored by BorN To K!LL

2BGal version 3.1.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 4fc4f22a82230081310b7df20ef2e59e381445e20cfd8329c23904ef5b3d2fa7
xoopszmag-sql.txt
Posted Apr 3, 2007
Authored by ajann

Xoops module Zmagazine version 1.0 remote SQL injection exploit that makes use of print.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6f87f6d966fc61ae6653eb5fb3ee2568ba922b066aa8821b621a6a15565bfa6a
xoopsxfsec-sql.txt
Posted Apr 3, 2007
Authored by ajann

Xoops module XFsection versions 1.07 and below blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | e240f4747083cb79053ff292be4b719bf997ac1b286933a149f6001cc03b3044
xoopswfsec-sql.txt
Posted Apr 3, 2007
Authored by ajann

Xoops module WF-Section versions 1.01 and below remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | e5abcd80f85f9bcb6cf0dfc009e37afcf8a727a9a85345d777a8808e1c383826
xoopsvirii-rfi.txt
Posted Apr 3, 2007
Authored by ajann

Xoops module Virii Info versions 1.10 and below remote file inclusion exploit that makes use of index.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | a33a94bfcb3eb2b45ad24026925e0773d7350cbc6c403515dc874c1fc971af1c
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close