exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 154 RSS Feed

Files Date: 2008-08-13 to 2008-08-14

Secunia Security Advisory 31489
Posted Aug 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged some vulnerabilities in VMware ESXi, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | b28cba932affe4bd59eae95162d2becbdf93e20983be6c30a167038fdf3c7b76
charlie.pdf
Posted Aug 13, 2008
Authored by Zack Anderson, Russell Ryan, Alessandro Chiesa

Whitepaper discussing vulnerabilities discovered in the CharlieTicket/CharlieCard systems used on the train system in Boston and elsewhere around the country.

tags | paper, vulnerability
SHA-256 | c1c32cf418a4d86b11b17dae36ca959d8be55e0462e7dbef8e037945264281b8
iDEFENSE Security Advisory 2008-08-12.7
Posted Aug 13, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of a heap-based buffer overflow vulnerability in multiple versions of Microsoft Corp.'s Windows operating system allows an attacker to execute arbitrary code with the privileges of the current user. This vulnerability specifically exists in the InternalOpenColorProfile function in mscms.dll. When a malformed parameter is supplied, a heap-based buffer overflow can occur, resulting in an exploitable condition. iDefense has confirmed the existence of this vulnerability in the following Microsoft products: Windows 2000 Service Pack 4, Windows XP Service Pack 2, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2008-2245
SHA-256 | 2bab1a50684834c78470b73a0f99d6b62a5bf68c2b11d0ad24caf1a309eff6b6
iDEFENSE Security Advisory 2008-08-12.6
Posted Aug 13, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of an invalid array indexing vulnerability in Microsoft Corp.'s Excel could allows attackers to execute arbitrary code with the privileges of the current user. This issue exists in the handling of "FORMAT" records within an Excel spreadsheet (XLS). By crafting a spreadsheet with an out-of-bounds array index, attackers are able to cause Excel to write a byte to arbitrary locations in stack memory. iDefense has confirmed the existence of this vulnerability with Office 2000 SP-3 fully patched as of March 2008. Other versions may also be affected.

tags | advisory, remote, arbitrary
advisories | CVE-2008-3005
SHA-256 | 7fd2c609c0f7243586a09cc8c6edcea1802126c6f08df2dccdcbc0504032c1bc
iDEFENSE Security Advisory 2008-08-12.5
Posted Aug 13, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of an invalid array indexing vulnerability in Microsoft Corp.'s Excel could allow an attacker to execute arbitrary code with the privileges of the current user. This issue exists in the handling of "AxesSet" records within a chart embedded in a spreadsheet. This record is typically used for setting the location and size of a set of axes on a chart. This particular record type is not included in Microsoft's official documentation for the Excel file format. However, the freely available source code for OpenOffice implements this record type. When processing this record, Excel does not validate a value that is used as an index into the array of chart axes. By crafting an Excel spreadsheet (XLS) that contains an out-of-bounds array value, an attacker can cause memory corruption. This leads to a potentially exploitable condition. iDefense has confirmed the existence of this vulnerability with Office 2000 SP-3 fully patched as of March 2008. Other versions may also be affected.

tags | advisory, remote, arbitrary
advisories | CVE-2008-3004
SHA-256 | b416d10bc128773cd656d2bd0d99254fc25631c8ebb771ae716ff16b3546229f
iDEFENSE Security Advisory 2008-08-12.4
Posted Aug 13, 2008
Authored by iDefense Labs, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of an integer overflow vulnerability in Microsoft Corp.'s PowerPoint Viewer 2003 could allow an attacker to execute arbitrary code in the context of the user running the application. This vulnerability specifically exists when handling CString objects embedded in a PowerPoint presentation file. An issue in this object results in a very small amount of buffer being allocated while a very large amount of data is copied into it. This leads to an exploitable heap-based buffer overflow. iDefense has confirmed that pptview.exe file version 11.0.5703.0 and file version 11.0.6566.0, as included in Microsoft Office 2003 SP2, are vulnerable. Other versions are also likely to be affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2008-0120
SHA-256 | ab9458aeec88e0b4bfc7e9fb864d5c1741e1a1d79728cab3e7e18f9e302f5a5e
iDEFENSE Security Advisory 2008-08-12.3
Posted Aug 13, 2008
Authored by iDefense Labs, Ruben Santamarta | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of an out of boundary array index vulnerability in Microsoft Corp.'s PowerPoint Viewer 2003 could allow an attacker to execute arbitrary code in the context of the user running the application. This vulnerability specifically exists in PowerPoint Viewer 2003 when handling certain records in a PowerPoint presentation file. In some circumstances, an array index can be directly controlled by data from within the PowerPoint presentation file. Thus, a function pointer can be directly controlled by the attacker and leveraged for arbitrary code execution. iDefense has confirmed that pptview.exe file version 11.0.5703.0 is vulnerable. Previous versions are also likely to be affected.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2008-0121
SHA-256 | fdbaba262f38504a718a7a20bdfe67eb45165704219047a0a47f08f9c4936860
iDEFENSE Security Advisory 2008-08-12.2
Posted Aug 13, 2008
Authored by iDefense Labs, Damian Put | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of a buffer overflow vulnerability in Microsoft Corp.'s Office filter for WordPerfect Graphics Files, could allow an attacker to execute arbitrary code with the privileges of the victim. This vulnerability specifically lies within the "WPGIMP32.FLT" module. A heap overflow can occur when processing a malformed Wordperfect Graphics (WPG) file. By corrupting heap memory, it is possible to execute arbitrary code. iDefense has confirmed this vulnerability in the following versions of Microsoft Office; Office XP SP3, Office 2003 SP2, Office 97. Other versions may also be affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2008-3460
SHA-256 | 741b9a8dfe66a386492a78748e537e58ca472a1b8d510f626a6e5ff078151ef0
iDEFENSE Security Advisory 2008-08-12.1
Posted Aug 13, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of a heap buffer overflow vulnerability in the "BMPIMP32.FLT" filter module, as distributed with Microsoft Office, allows attackers to execute arbitrary code. The vulnerability specifically exists in the handling of Windows Bitmap (BMP) image files with malformed headers. By specifying a very large number of colors in the header, it is possible to cause controllable heap corruption, which can be leveraged to execute arbitrary code. iDefense confirmed that the "BMPIMP32.FLT" module installed with Microsoft Office XP SP3, including all patches as of May 24, 2006, is vulnerable. Other versions may also be vulnerable.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2008-3020
SHA-256 | c369d53fc3514c335589aaa73929390220ce4db88b492cebeba1b267acc42c1e
Zero Day Initiative Advisory 08-051
Posted Aug 13, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the handling of document objects. When an object is appended in a specific order and particular functions are performed on these objects memory corruption occurs. Successful exploitation leads to remote compromise of the affected system under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary
advisories | CVE-2008-2258
SHA-256 | 8326c1fc3ef77d2978877212f6e6eb60add46c7faded69a954c915053e8d800a
Zero Day Initiative Advisory 08-050
Posted Aug 13, 2008
Authored by Tipping Point, Sam Thomas | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the handling of document objects. When an object is appended in a specific order, memory corruption occurs. Successful exploitation leads to remote compromise of the affected system under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary
advisories | CVE-2008-2257
SHA-256 | ea35c3bea9256f849954229fe44ff2775d4c804fb8b8f1be7b41cb58bbb88f01
Zero Day Initiative Advisory 08-049
Posted Aug 13, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A potential vulnerability exists in the Microsoft Office Suite. The issue is a result of insufficient bounds checking on the content of PICT files embedded into documents. Successful exploitation of this issue enables an attacker to remotely execute arbitrary code on a target system. User interaction would be required, as an attacker would have to convince the target user to open a malformed file. One of the filter DLLs for processing image files in Microsoft Office suffers from a potentially-exploitable memory corruption condition when processing .PICT images. An invalid value in the bits_per_pixel field (offset 0x257) causes heap corruption. Different values of this field result in distinctly different types of corruption. Internally, the issue was only reproducible when the malformed image was directly inserted into an Office document by the target user.

tags | advisory, arbitrary
advisories | CVE-2008-3021
SHA-256 | 974bb98ba30588b96b6efd403c5cc2af6d08b2085fb3458ddc726a0dd5907f16
Zero Day Initiative Advisory 08-048
Posted Aug 13, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. Exploitation requires that the attacker coerce the target into opening a malicious .XLS file. The specific flaw exists within the parsing of the BIFF file format used by Microsoft Excel. During the processing of a malformed Country (0x8c) record, user-supplied data may be used in a memory copy operation resulting in memory corruption. If successfully exploited remote control of the affected system can be obtained under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary
advisories | CVE-2008-3006
SHA-256 | 31a5e8e0d24e93655c6fd5fe2f0bccc6180b35b68e635e5bb8ea9be0b82e7707
cisco-iosftp.txt
Posted Aug 13, 2008
Authored by Andy Davis

Cisco IOS FTP server exploit step-by-step instructions which includes information on connecting to a Cisco router using gdb.

tags | paper
systems | cisco
SHA-256 | ae635a76307aaf65d0cd771afdc2ccb4754e8f175174fd6311f79b519ae837af
Technical Cyber Security Alert 2008-225A
Posted Aug 13, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-225A - Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Office, Internet Explorer, and other related components as part of the Microsoft Security Bulletin Summary for August 2008. The most severe vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
systems | windows
SHA-256 | dd5350024ae5483089c3928d95b00cc47c668f8b4003102c6ef508a41ac464bc
vim-ftp.txt
Posted Aug 13, 2008
Authored by Jan Minar

Vim versions 7.1.266 and 7.2 suffer from a ftp credential disclosure vulnerability.

tags | exploit
SHA-256 | 9efd8fed7bb569b3b6816eb2bbea69d32d15c299b7ab14a6d6318af5c0d8ebed
joomla-changepasswd.txt
Posted Aug 13, 2008
Authored by d3m0n

Joomla version 1.5.x suffers from a remote administrator change password vulnerability.

tags | exploit, remote
SHA-256 | 536c9d409192e5620a21934692acc237b4a7cdbfa50ff9ebffdb665af6fcf34c
gelatocms-disclose.txt
Posted Aug 13, 2008
Authored by jiko | Site no-back.org

gelato CMS version 0.95 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | e135ec4a5add93244b47eec91db991e89f9e7d24bfbfade064ea36d3603ea596
bblog-sql.txt
Posted Aug 13, 2008
Authored by IP-Sh0k

BBlog version 0.7.6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7e545945167e20a503f6197c645977b1d9caa050286e94a826d377cb2b81be48
HP Security Bulletin 2008-00.51
Posted Aug 13, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running ftpd. The vulnerability could be exploited to allow remote privileged access.

tags | advisory, remote
systems | hpux
advisories | CVE-2008-1668
SHA-256 | 5577a310f6f784dde276dedbbd838e7f16b6f618303c326fb5773acc5a5f4c2f
TKADV2008-006.txt
Posted Aug 13, 2008
Authored by Tobias Klein | Site trapkit.de

The kernel driver KmxFw.sys shipped with various CA products contains a vulnerability in the code that handles IOCTL requests. Exploitation of this vulnerability can result in local denial of service attacks and local execution of arbitrary code.

tags | advisory, denial of service, arbitrary, kernel, local
advisories | CVE-2008-2926
SHA-256 | 93703348034f1b4025f82f9365b813c7c87d326073fb65b2fddfd9ba7c13b52b
CAID-hips.txt
Posted Aug 13, 2008
Authored by Ken Williams | Site www3.ca.com

The Computer Associates Host-Based Intrusion Prevention System SDK contains two vulnerabilities that can allow an attacker to cause a denial of service or possibly execute arbitrary code. CA has issued updates to address the vulnerabilities. The first vulnerability occurs due to insufficient verification of IOCTL requests by the kmxfw.sys driver. A local attacker can send an IOCTL request that can cause a system crash or potentially result in arbitrary code execution. The second vulnerability occurs due to insufficient validation by the kmxfw.sys driver. An attacker can make a request that can cause a system crash.

tags | advisory, denial of service, arbitrary, local, vulnerability, code execution
advisories | CVE-2008-2926, CVE-2008-3174
SHA-256 | 985be0e793f4ac4d6d9e3779bf5ca6b54567e5ea355a83dec5b7ae1dbd4feee5
PDFResurrect PDF Analyzer 0.4
Posted Aug 13, 2008
Authored by enferex | Site 757labs.com

PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.

tags | tool, forensics
SHA-256 | 78f9e8b9424d30f7bfbee06a10ca6e39c49bc5d9376b6de1b76986f26d2912b0
Nmap Scanning Utility 4.68
Posted Aug 13, 2008
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: A large amount of improvements and fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 4c1026da1386c4ce859ab1fda53311292e7a9c6a576ec328e7ae9b683edbc5af
sipvicious-0.2.4.tar.gz
Posted Aug 13, 2008
Authored by Sandro Gauci | Site sipvicious.org

SIPVicious tools address the need for traditional security tools to be ported to SIP. This package consists of a SIP scanner, a SIP wardialer, and a SIP PBX cracker. Written in Python.

Changes: The wardialer has had some improvements made. Various bug fixes. Multiple features added including fingerprinting support for svmap. Included fphelper.py and 3 databases used for fingerprinting.
tags | telephony, python
SHA-256 | 925c5e20334b59f8b4dfa8b74af93cca91bb177f7927dc064b5c0b0eea42524b
Page 2 of 7
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close