Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.
465a904f656b98cb00d6dfdb5da54526aa940319ba0406a0fa7caa938bc9a2a9
SGI Security Advisory 20040401-01-P - It has been reported that there are several security issues affecting ftpd on IRIX. There is an ftpd DoS that is possible during PORT mode (SGI BUG 899364) not to mention that ftpd's ftp_syslog() doesn't work with anonymous FTP (SGI BUG 909172).
d0f63c5ef8fae4b78f5bbda3793a2c29d3e7603a5dde6ed7dde8af08e6c4ecf6
SGI Security Advisory 20030901-01-P - It has been reported that under certain conditions a NFS client can avoid read-only restrictions on filesystems exported via NFS from a server running IRIX 6.5.21 and mount them in read/write mode.
20adad9965ecc3ab9669c0c0f988b3136ffc46d036a3e2a4b59af98e260d296a
SGI Security Advisory 20030801-01-P - It is possible to create a Denial of Service attack on the IRIX nfsd through the use of carefully crafted packets which cause XDR decoding errors. This can lead to kernel panicing the system. No local account or access to an NFS mount point is required, so this could be constructed as a remote exploit.
c8555a9a5b384e2c2b2c17225b0c097f292cea81bae358a367064a71388393f1
SGI Security Advisory 20030704-01-P - It has been reported that the IRIX name services daemon nsd can be exploited in various ways through the AUTH_UNIX gid list. This could result in an attacker gaining root access.
1c492bd25cd117c9719328492ea5a0d705616c02c747a27c46e6a7f055116b8c
SGI Security Advisory 20030702-01-P - It has been reported that logging into an IRIX 6.5 machine while particular environment variables are set can lead to /usr/lib/iaf/scheme dumping core. Since scheme is suid root, this could potentially lead to a root compromise.
cf55ec3e1e580ca7b85e91d22604fd9c68c6799680b2b730027f68cf4fe308de
SGI Security Advisory 20030701-01-P - Multiple vulnerabilities have been found in the Name Service Daemon, or nsd, on IRIX below version 6.5.21.
b6218821e51de97c515742f76bc0a7393297d398e8dfbefd71584ac16e407bec
Log cleaner, for Linux, Freebsd, Irix and SunOS. While in the midst of cleaning, various system checks are performed to monitor presence of detection.
ac7c25f0290ba5ef2ac9356d2eeaeb7e0973c568e4f1a337da703005cae7353a
SGI Security Advisory 20030607-01-P - Several bugs in the IRIX 6.5.19 implementation of IPv6 result in inetd becoming hung when port scanned, snoop unable to handle packets as root, and other non-security related issues.
0fdaa24f936f93dd53593bf93d40a3969220454aeead17be748bfea6c4c28e2d
20 byte IRIX/MIPS PIC shellcode that calls exit().
67a14fa05590c787dcec843671f49b7443a1d7ccc3515d6ee76cb37e2b1870f7
204 byte MIPS/IRIX PIC shellcode that binds /bin/sh to port 16705 TCP.
479827468c5e228e46d4aa888071676392b5c4dc1707661bd875f603c64b1da9
52 byte MIPS/IRIX PIC shellcode that does an execve of /bin/sh.
16f8054992c0d396b5836585aca7a5de8f0a5d1d01fb58a831de763055ada649
SGI Security Advisory 20020902-01-I - SGI IRIX 6.5 systems apply world-readable permissions on all coredumps. This can allow local users to disclose sensitive information from system coredumps. This affects IRIX versions prior to 6.5.15.
8865c4316b71f35b8b1d3a39f7a567c21b5039bfae4604de43980cfb6abfae49
Old irix sendmail hole.
1a171ff8efeeb5a569dcc986d1638bfeda943a5eec65da53e4193eedb599c7bc
SGI Security Advisory 20020605-01-I - A vulnerability found in the chunked encoding implementation in Apache versions 1.3.24, 2.0.36 or prior can be used to remotely execute code on systems running this software. This vulnerability affects IRIX systems versions 6.5.12m/f up to and including 6.5.16. SGI IRIX 6.5.17 is not affected.
76bb676c215a49fb99134bfa0b2bd17ffce8884666531a51a9bc18221c6c10b1
GreedyDog v2.3 is an ethernet packet sniffer for Linux, FreeBSD, OpenBSD, NetBSD, Solaris, IRIX, SunOS4, AIX, MacOSX, and Windows2000/Xp. GreedyDog keeps stream of each TCP session and writes to logfile. Very portable. Manual is here.
9ea5aa65e79bb73b43231fbad538888ef8b601b0fa200261c300006cf9e23e7c
SGI Security Advisory 20020605-01-I - A vulnerability found in the IRIX xfsmd can lead to the remote root access on a vulnerable system. Affects Irix v6.5 through 6.5.16.
c8508fa83da8c2672e55dc46dd4d9131c93d5bae6d08fe32083d3464562b427e
IRIX xfsmd remote root exploit. Tested against Irix v6.2, 6.3, 6.4, 6.5, and 6.5.16.
c6084d769bc0885efa3d141525b7b1d3d51a171754bb048f0ab470504dd03df1
SGI Security Advisory 20020601-01-P - /usr/etc/rpc.passwd has a vulnerability which allows local users to gain root access. The rpc.passwd binary is not installed by default on IRIX 6.5 systems. It is part of the optional subsystem "nfs.sw.nis".
6e15a663869db717fab24ccc54db4d83319ab67ce789bdd0c2ede9b37f07e1c9
364 byte MIPS/Irix PIC port binding shellcode (source included)
c46107fcb5c7497a3d6dd32bc368da7cc825324bae592dbed4b55090d2e2f813
68 byte MIPS/Irix PIC execve shellcode (source included)
6d61eb0821d6cdc026bbc6ae30e9581bf9cef4c2446a60a4aa61309df60b9559
SGI Security Advisory 20020503-01-I - A vulnerability found in netstat allows local users to detect whether a file exists, even when the permissions and ownership of that file should not allow it. This vulnerability has been corrected in IRIX 6.5.12 and patches are available.
ecfddfe1a5d66662e1eacb3e599522d5cc271ef9922a8b2cb650afd55c1f66d3
SGI Security Advisory 20020409-01-I - A buffer overflow vulnerability found in the /usr/sbin/cpr binary (IRIX Checkpoint and Restart) can allow local user to gain root level privileges. The overflow has been fixed in SGI IRIX 6.5.11 and patches have been made available for previous versions.
4f2b6cad39b01f6b18e6056ce1678da489b4ec172ed6d052a6b777d61347616a
SGI Security Advisory 20020501-01-I - The name service daemon (nsd) contains a symlink vulnerability that can be used by local users to elevate their privileges. This vulnerability has been fixed in IRIX 6.5.11 and patches are available for older versions.
e21e400ab5d66314a3149dd6b20aaa81db2e5c9859e2cf50ed81e6d737e78d4a
SGI Security Advisory 20020102-02-I - A vulnerability related to the way the IRIX unified name service daemon (nsd) manages its cache files has been reported which allows remote users to fill the disk. The nsd daemon is installed by default on all 6.5.x versions of IRIX, and this vulnerability exists in all versions of IRIX 6.5.4m/f through 6.5.11m/f. The problem has been fixed in IRIX 6.5.12m/f.
44d2dcae3a1ebef95b52d69bf3a53fea80ae607bc6bbf4571c42ecb9a5b47610