exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 220 RSS Feed

Operating System: IRIX

SGI IRIX 6.4.x Run-Time Linker Arbitrary File Creation
Posted Apr 28, 2019
Authored by Hacker Fantastic

SGI IRIX versions 6.4.x and below run-time linker (rld) arbitrary file creation exploit.

tags | exploit, arbitrary
systems | irix
SHA-256 | 6f90ee10780f9ce1e84434cd416d1bb52ce40db82cd9f3b32770f230eec3040c
Firewall Log Watch 1.4
Posted May 28, 2013
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release adds IPv6 support for ipfilter and includes fixes for the netfilter parser and forward DNS resolution.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux, ios
SHA-256 | 784c667fc4b2cb45a551290aa31e176a98eedf87686e8f45e5e50794aa951c79
XRIX SQL Injection
Posted Sep 17, 2012
Authored by FarbodEZRaeL

Sites designed by IRIX suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
systems | irix
SHA-256 | 2e1d97b25f5cf62f82dd3038d4d74f2fdf27973b47773218d61fd699c2992eeb
Firewall Log Watch 1.3
Posted Nov 15, 2011
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release adds IPv6 support for netfilter, dns cache initialization, and ASA parser extensions.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux
SHA-256 | da806dbaaa56fdfd36a208b15bfeccaa0531f0789ad1355e43c047523ea60a48
Secunia Security Advisory 42874
Posted Jan 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SGI IRIX, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | irix
SHA-256 | bf97ee2df1b30c808b1fe824dcd7f7fefc5abe895cfdc424e8aa0ce46ec088f6
IRIX Local Kernel Memory Disclosure / Denial Of Service
Posted Jan 10, 2011
Authored by Neil Kettle

IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities.

tags | advisory, denial of service, kernel, local, vulnerability
systems | irix
SHA-256 | 0cecddc322fe604057e9e42e8390e2b8b117401e3fd067e622f698e7eadfb1ee
Firewall Log Watch 1.2
Posted Oct 11, 2010
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release features extended netfilter and Cisco PIX/ASA parsers and large amounts of fixes.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux
SHA-256 | 37fdfb49085fc7871b2bda30c4f334732cc552c1451aede94d96976e9122a92c
rpc.pcnfsd Syslog Format String
Posted May 22, 2010
Authored by Rodrigo Rubira Branco

rpc.pcnfsd suffers from a syslog related format string vulnerability. IBM AIX versions 6.1.0 and below, IRIX 6.5 and HP-UX versions 11.11, 11.23 and 11.31 are all affected.

tags | advisory
systems | irix, aix, hpux
advisories | CVE-2010-1039
SHA-256 | 78d8496b11da0be50a94a9121549a259d6a954ea9337ad9e3d7cd651348c21b2
Irix LPD tagprinter Command Execution
Posted Oct 27, 2009
Authored by H D Moore

This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.

tags | exploit, arbitrary
systems | irix
advisories | CVE-2001-0800
SHA-256 | e9b94c7b39094f786cf93481c5471c76f60e78b4c1f1ebf64aff58eaed537f5d
IRIX-p_sh-asm.c
Posted Jun 14, 2007
Authored by Adam Zabrocki

IRIX MIPS processor shellcode. Tested on R12000 process with system IRIX64 6.5.26m.

tags | shellcode
systems | irix
SHA-256 | a44477ca1f8cd02261ab5c90a11b65a2d02cc650a4771be9db30638bfc80f798
prdelka-vs-SGI-xrunpriv
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

SGI IRIX 6.5 /usr/sysadm/bin/runpriv local root exploit.

tags | exploit, local, root
systems | irix
SHA-256 | 87ee2433cea6d25492bbf29d76ac2dddfffb1036915de7f4e24d87a028286cbe
irix6local.txt
Posted Mar 12, 2006
Authored by RoDhEDoR

SGI IRIX 6.5 local root exploit that makes use of /usr/sysadm/bin/lezririx.

tags | exploit, local, root
systems | irix
SHA-256 | 9e782c3248720f5c96b198b4d71e6be19f6122f33549f5c9a73407a910e5dbf2
iDEFENSE Security Advisory 2005-10-10.t
Posted Oct 11, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.10.05-1 - Local exploitation of a design error vulnerability in the runpriv command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.22 (maintenance). It is suspected that previous and later versions of both the feature and maintenance revisions of IRIX 6.5 are also vulnerable.

tags | exploit, arbitrary, local, root, code execution
systems | irix
advisories | CVE-2005-2925
SHA-256 | 1c012fe38982c56bc23fed6348942a17603277d23ed1b3e06be34b0c10278c98
snaresquid-1.2.tar.gz
Posted Jul 19, 2005
Site intersectalliance.com

Snare for Squid provides a remote distribution facility for Squid proxy server logs, and is known to run on most Unix variations, including Linux, Solaris, AIX, Tru64, and Irix. Snare for Squid can be used to send data to either a remote or local SYSLOG server, or the Snare Server for centralized collection, analysis, and archival.

tags | remote, local, system logging
systems | linux, unix, solaris, irix, aix
SHA-256 | 85e084194e7c2a32f392552b2b3871997c9ecf13ca413825aa483139a8f78b00
snaretext-1.1.tar.gz
Posted Jul 19, 2005
Site intersectalliance.com

Snare for Apache provides a remote distribution facility for Apache Web server logs. It is known to run on most Unix variations, including Linux, Solaris, AIX, Tru64, and Irix. Snare for Apache can be used to send data to either a remote or local SYSLOG server, or the Snare Server for centralized collection, analysis, and archival.

tags | remote, web, local, system logging
systems | linux, unix, solaris, irix, aix
SHA-256 | 9dcabe60749e90b6acdd79c63bdceb5abfb7796c105386c53b9a80c5f97095fc
Secunia Security Advisory 15785
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SGI has acknowledged a vulnerability in IRIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | irix
SHA-256 | 4ea34ef44b3a59e40bf864693791767592303c7d6e0cfe32c49397af362eca71
Secunia Security Advisory 15619
Posted Jun 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in SGI IRIX, which potentially can be exploited by malicious users to disclose and modify sensitive information.

tags | advisory
systems | irix
SHA-256 | f124f7a851330600a1b71a01f3abe98b29b215e215d36cd096a98fb059146821
iDEFENSE Security Advisory 2005-04-07.2
Posted Apr 17, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 04.07.05 - Local exploitation of a file overwrite vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX operating system could allow for the overwriting of arbitrary files, regardless of permissions. The vulnerability specifically exists in the way that gr_osview opens user specified files without dropping privileges. When a file is specified using the -s option, it will be opened regardless of permissions, and operating system usage information will be written into it.

tags | advisory, arbitrary, local
systems | irix
advisories | CVE-2005-0465
SHA-256 | 29a70daef98009d4fa1ecd712df21886a85b1073f4c94150aff6fcc84691906c
iDEFENSE Security Advisory 2005-04-07.1
Posted Apr 17, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 04.07.05 - Local exploitation of an information disclosure vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX Operating System could allow for the disclosure of sensitive information such as the root user's password hash. The vulnerability specifically exists in the way that gr_osview opens user-specified description files without dropping privileges. When this is combined with the debug option, it is possible to dump a line from an arbitrary file, regardless of its protection.

tags | advisory, arbitrary, local, root, info disclosure
systems | irix
advisories | CVE-2005-0464
SHA-256 | 33fd95497c6279b174df0ba9d86a06c156ff31e8632e7ad7b59db900e31cdda0
Secunia Security Advisory 14875
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in SGI IRIX, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and disclose some sensitive information.

tags | advisory, local, vulnerability
systems | irix
SHA-256 | 82e6544970c3a21a5afeccf883a7d574eeb03edeecd6dd09457073fedac09581
iDEFENSE Security Advisory 2005-01-13.3
Posted Jan 16, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.13.05-3 - Local exploitation of a design error vulnerability in the inpview command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.9 (feature) and 6.5.22 (maintenance).

tags | advisory, arbitrary, local, root, code execution
systems | irix
SHA-256 | 6fc74e29d221906b5702bda5d63a1aa554f4996f982c5cdfd0f9e76df8802420
NetBSD Security Advisory 2004.10
Posted Dec 30, 2004
Authored by Evgeny Demidov, The NetBSD Project | Site netbsd.org

NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall.

tags | advisory, kernel
systems | linux, netbsd, freebsd, irix, hpux
SHA-256 | 05546d49f053bc61209d8c580436a808dbef16beb496554eb15265e595aea34f
HexView Security Advisory 2004-06-01.01
Posted Jun 18, 2004
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20040601-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible.

tags | advisory, kernel, root
systems | irix
advisories | CVE-2004-0135, CVE-2004-0136, CVE-2004-0137
SHA-256 | c311575509d77e140256db203b3431dabc5c01cfb4dd8d1e624c66a52ee8d789
HexView Security Advisory 2004-05-07.01
Posted May 26, 2004
Authored by HexView | Site support.sgi.com

SGI Security Advisory 20040507-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions the /usr/sbin/cpr binary can be forced to load a user provided library while restarting the checkpointed process which can then be used to obtain root user privileges. All versions of IRIX prior to 6.5.25 are affected.

tags | advisory, root
systems | irix
advisories | CVE-2004-0134
SHA-256 | 7d950166788412a4f59d5667daca8545e4ae1aefd11cc0225a8adfe941090883
HexView Security Advisory 2004-05-03.01
Posted May 18, 2004
Authored by HexView | Site sgi.com

SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x.

tags | advisory, denial of service
systems | irix
SHA-256 | 60b6fab3dcc07e154a22aa2c18072a5e408070846522782d959a9681d25da497
Page 1 of 9
Back12345Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close