exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 429 RSS Feed

Operating System: AIX

AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 Buffer Overflow
Posted Feb 10, 2010
Authored by Rodrigo Rubira Branco, jduck | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in opcode 21 handled by rpc.cmsd on AIX. By making a request with a long string passed to the first argument of the "rtable_create" RPC, a stack based buffer overflow occurs. This leads to arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
systems | aix
advisories | CVE-2009-3699
SHA-256 | aff1d1ff1b53822a5be662ef7f7cb50a2f60bbc8bab207ec0fc7df83f3270216
AIX RPC.cmsd Remote Buffer Overflow
Posted Feb 3, 2010
Authored by Rodrigo Rubira Branco

AIX RPC.cmsd remote stack buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
systems | aix
SHA-256 | 7c8e41a206c1c2240e87d6853f2c71873a26177a618a781f20802d31ab305649
Secunia Security Advisory 38189
Posted Jan 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has issued an update for OpenSSL included in AIX. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | aix
SHA-256 | d6bfba994190b93c57bdfda8610ac542294491d9c9714644d3d2e87db9cf173b
Samhain File Integrity Checker 2.6.1b
Posted Dec 23, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: On Linux, login/logout tracking now uses inotify. Log file monitoring has been enhanced to support checking for missing heartbeat messages, reporting bursts of repeated messages, and checking for correlated events. UID/GID caching has been improved to reduce the number of lookups, and a compile problem on Cygwin has been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | eeed30cdab325f7806d6df7a8818a3fedaae429638cc9d2e563515f293cd19c5
Secunia Security Advisory 37833
Posted Dec 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local, vulnerability
systems | aix
SHA-256 | 8db02685a67f34ea6a32d0014a4825c82a1b7a7fb6ec2819db48a021b60820ad
Secunia Security Advisory 37267
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | aix
SHA-256 | 5a922b94dbe98d37457631f6725af4bad4cf4adeced79dacd195097b5448a6cf
Samhain File Integrity Checker 2.6.0
Posted Oct 31, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Pathname expansion is now performed at each file check, rather than only at startup. The SUID check runs in a separate thread now. Some minor bugs have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 759eab4c68e1b60825f761eb8bec609092a5214c9520c7496ad7fe2d75941c75
Secunia Security Advisory 36978
Posted Oct 12, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | aix
SHA-256 | 2c4bd55768803194b9fa4f93a7456d5d9371ada1cdcf45b4edbae0a236762cb7
Samhain File Integrity Checker 2.5.10
Posted Oct 12, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: This release fixes a race condition that would cause problems with stale file handles under certain conditions.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 7862dc37f2675d0199cae206497f8492447dee438f0cb1edeed99b0fba6647e0
iDEFENSE Security Advisory 2009-10-07.1
Posted Oct 8, 2009
Authored by iDefense Labs, Rodrigo Rubira Branco | Site idefense.com

iDefense Security Advisory 10.07.09 - Remote exploitation of a stack based buffer overflow vulnerability in IBM Corp.'s AIX could allow an attacker to execute arbitrary code with the privileges of the affected service. rpc.cmsd, more commonly known as the Calendar Manager Service Daemon, is an RPC application used to manage schedules and calendars. It operates over SUN RPC. The vulnerability is triggered when handling a request for remote procedure 21. This function takes two arguments, both of which are XDR strings. When copying the first argument into a stack based buffer, the code does not properly verify its length. This results in a stack based buffer overflow vulnerability. iDefense has confirmed the existence of this vulnerability in AIX versions 5.3 and 5.2.

tags | advisory, remote, overflow, arbitrary
systems | aix
SHA-256 | e622abe9b0845daaab5cfe3b95d2641f11a23e3387e454d48596ac147be98ab7
Secunia Security Advisory 36894
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users and malicious people to bypass certain security restrictions.

tags | advisory, local, vulnerability
systems | aix
SHA-256 | 5dc21330a603fde4bd9958361ae0847d1354279063a5c21ff95c128207b67f31
IBM AIX 5.6/6.1 File Overwrite
Posted Sep 11, 2009
Authored by Marco Ivaldi

IBM AIX versions 5.6 and 6.1 _LIB_INIT_DBG arbitrary file overwrite via libc debug.

tags | exploit, arbitrary
systems | aix
SHA-256 | 7f054254bca5207953d6b438ec277152539965bd3ee3d193b3a690ceeb72fe4f
Samhain File Integrity Checker 2.5.8
Posted Aug 15, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: This release fixes two bugs in the mailer code: MX resolving would fail sometimes, and a deadlock could occur.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 5a61ef918e33b06357aa00830181bdcdc4638f77853158d3103bc6c24d7c34fe
iDEFENSE Security Advisory 2009-08-04.2
Posted Aug 7, 2009
Authored by Karol Wiesek, iDefense Labs | Site idefense.com

iDefense Security Advisory 08.04.09 - Local exploitation of an arbitrary file creation vulnerability in IBM Corp.'s Advanced Interactive eXecutive (AIX) Operating System allows attackers to execute arbitrary code with super-user privileges. iDefense has confirmed the existence of this vulnerability in IBM Corp.'s AIX version 5.3. Other versions may also be affected.

tags | advisory, arbitrary, local
systems | aix
SHA-256 | c2f93a0a5ddb535bfba9a73e58921b94de4aee8dfa76f6dbea11cf4494f746d2
Secunia Security Advisory 36192
Posted Aug 7, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in named in AIX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | aix
SHA-256 | f8b313831719026aee3379a3075eedce34c9296650e609b5b1e9c7a6627bf458
IBM AIX libc MALLOCDEBUG File Overwrite
Posted Aug 5, 2009
Authored by Affix

IBM AIX 5.3 suffers from a libc MALLOCDEBUG file overwrite vulnerability.

tags | exploit
systems | aix
SHA-256 | 2761cceaa0576ccf620fefafe7348954090fc718e5c696423bbad975bb7495d1
Secunia Security Advisory 36156
Posted Aug 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AIX, which can be exploited by malicious local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 4de0a07fca25c6acf23f6fea8d12303fd13d6e86c986b247aa097c5c986ad590
Samhain File Integrity Checker 2.5.7
Posted Jul 23, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: A potential deadlock has been fixed along with a configuration reload bug in the \'userfiles\' module. C99-style comments have been removed to improve portability, and the format of the date header of emails has been corrected.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 6396eb5f7f6cfaac1d8b3df0b2b8c0e9e3a83d9051e53cc4dbb90b0f7df26e86
Secunia Security Advisory 35754
Posted Jul 9, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM AIX.

tags | advisory
systems | aix
SHA-256 | dafcb747bb4509af593288e6ba45537bf0450e3435d5db33fb20884c0a11e184
Secunia Security Advisory 35640
Posted Jun 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM AIX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | aix
SHA-256 | fe4268b6724fc8d1faf0c48941610d824c8cf37bf63bb725cb1df98c42068b95
TooTalk Buffer Overflow
Posted Jun 20, 2009
Authored by Ramon de C Valle, Adriano Lima | Site risesecurity.org

ToolTalk suffers from a rpc.ttdbserverd _tt_internal_realpath related buffer overflow vulnerability. IBM AIX versions 5.1.0 through 6.1.3 appear affected.

tags | advisory, overflow
systems | aix
SHA-256 | 444f71cdcf6793937036925f0f55f4904dc7eb7fd8ff621556e979d2148ce216
Secunia Security Advisory 35505
Posted Jun 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | aix
SHA-256 | fba665e40eba98953e7994424bb9ae518492f2bd25b02a2f2c8029f3b5304606
iDEFENSE Security Advisory 2009-05-19.1
Posted May 21, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 05.19.09 - Local exploitation of a file overwrite vulnerability in IBM Corp.'s Advanced Interactive eXecutive (AIX) could allow an attacker to overwrite arbitrary files and execute arbitrary code. The AIX libc implementation of malloc includes a debugging mechanism that is initiated by setting the MALLOCTYPE and MALLOCDEBUG environment variables. This debugging feature writes to a user-specified log file under certain conditions. There is a gap in time between the checks to see if the file is a symbolic link and the process of opening the file. If an attacker can change the file to be a symbolic link to another file within this time frame, it is possible to cause a set-uid binary to write to files owned by privileged users. iDefense confirmed the existence of this vulnerability in IBM Corp.'s AIX version 5.3. Other versions may also be affected.

tags | advisory, arbitrary, local
systems | aix
SHA-256 | 5eb925589dbd4a9070539b783c3c683162ba40bd5d486b533a392ac2f3129ecd
Secunia Security Advisory 35146
Posted May 20, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | aix
SHA-256 | 3b4b33c2bec4c350c6b321ffeee48b4bd42e5c7c710ebf9da781cef3779c6a40
Secunia Security Advisory 35070
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has issued an update for OpenSSL included in AIX. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | aix
SHA-256 | 64cd579519b69b8689809c2c296c6b2357f5f247f6a260caf0fba5a9738be0c3
Page 6 of 18
Back45678Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close