what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 220 RSS Feed

Operating System: IRIX

lboeg.pl.txt
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.

tags | overflow, local
systems | linux, irix, bsd, hpux, unixware
SHA-256 | 465a904f656b98cb00d6dfdb5da54526aa940319ba0406a0fa7caa938bc9a2a9
HexView Security Advisory 2004-04-01.01
Posted Apr 2, 2004
Authored by HexView | Site support.sgi.com

SGI Security Advisory 20040401-01-P - It has been reported that there are several security issues affecting ftpd on IRIX. There is an ftpd DoS that is possible during PORT mode (SGI BUG 899364) not to mention that ftpd's ftp_syslog() doesn't work with anonymous FTP (SGI BUG 909172).

tags | advisory
systems | irix
SHA-256 | d0f63c5ef8fae4b78f5bbda3793a2c29d3e7603a5dde6ed7dde8af08e6c4ecf6
HexView Security Advisory 2003-09-01.01
Posted Sep 18, 2003
Authored by HexView | Site sgi.com

SGI Security Advisory 20030901-01-P - It has been reported that under certain conditions a NFS client can avoid read-only restrictions on filesystems exported via NFS from a server running IRIX 6.5.21 and mount them in read/write mode.

tags | advisory
systems | irix
advisories | CVE-2003-0680
SHA-256 | 20adad9965ecc3ab9669c0c0f988b3136ffc46d036a3e2a4b59af98e260d296a
HexView Security Advisory 2003-08-01.01
Posted Aug 14, 2003
Authored by HexView | Site sgi.com

SGI Security Advisory 20030801-01-P - It is possible to create a Denial of Service attack on the IRIX nfsd through the use of carefully crafted packets which cause XDR decoding errors. This can lead to kernel panicing the system. No local account or access to an NFS mount point is required, so this could be constructed as a remote exploit.

tags | advisory, remote, denial of service, kernel, local
systems | irix
advisories | CVE-2003-0576
SHA-256 | c8555a9a5b384e2c2b2c17225b0c097f292cea81bae358a367064a71388393f1
HexView Security Advisory 2003-07-04.01
Posted Aug 5, 2003
Authored by HexView | Site support.sgi.com

SGI Security Advisory 20030704-01-P - It has been reported that the IRIX name services daemon nsd can be exploited in various ways through the AUTH_UNIX gid list. This could result in an attacker gaining root access.

tags | advisory, root
systems | irix
advisories | CVE-2003-0575
SHA-256 | 1c492bd25cd117c9719328492ea5a0d705616c02c747a27c46e6a7f055116b8c
HexView Security Advisory 2003-07-02.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030702-01-P - It has been reported that logging into an IRIX 6.5 machine while particular environment variables are set can lead to /usr/lib/iaf/scheme dumping core. Since scheme is suid root, this could potentially lead to a root compromise.

tags | advisory, root
systems | irix
SHA-256 | cf55ec3e1e580ca7b85e91d22604fd9c68c6799680b2b730027f68cf4fe308de
HexView Security Advisory 2003-07-01.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030701-01-P - Multiple vulnerabilities have been found in the Name Service Daemon, or nsd, on IRIX below version 6.5.21.

tags | advisory, vulnerability
systems | irix
advisories | CVE-2003-0176, CVE-2003-0177, CVE-2003-0572, CVE-2003-0573
SHA-256 | b6218821e51de97c515742f76bc0a7393297d398e8dfbefd71584ac16e407bec
0x333shadow.tar.gz
Posted Jul 11, 2003
Authored by 0x333, nsn | Site 0x333.org

Log cleaner, for Linux, Freebsd, Irix and SunOS. While in the midst of cleaning, various system checks are performed to monitor presence of detection.

tags | tool, rootkit
systems | linux, unix, solaris, freebsd, irix
SHA-256 | ac7c25f0290ba5ef2ac9356d2eeaeb7e0973c568e4f1a337da703005cae7353a
HexView Security Advisory 2003-06-07.01
Posted Jun 25, 2003
Authored by HexView, SGI Security | Site sgi.com

SGI Security Advisory 20030607-01-P - Several bugs in the IRIX 6.5.19 implementation of IPv6 result in inetd becoming hung when port scanned, snoop unable to handle packets as root, and other non-security related issues.

tags | advisory, root
systems | irix
SHA-256 | 0fdaa24f936f93dd53593bf93d40a3969220454aeead17be748bfea6c4c28e2d
mips-exit.asm
Posted Sep 20, 2002
Site netric.org

20 byte IRIX/MIPS PIC shellcode that calls exit().

tags | shellcode
systems | irix
SHA-256 | 67a14fa05590c787dcec843671f49b7443a1d7ccc3515d6ee76cb37e2b1870f7
mips-bindshell.asm
Posted Sep 20, 2002
Site netric.org

204 byte MIPS/IRIX PIC shellcode that binds /bin/sh to port 16705 TCP.

tags | tcp, shellcode
systems | irix
SHA-256 | 479827468c5e228e46d4aa888071676392b5c4dc1707661bd875f603c64b1da9
mips-execve.asm
Posted Sep 20, 2002
Authored by ntronic | Site netric.org

52 byte MIPS/IRIX PIC shellcode that does an execve of /bin/sh.

tags | shellcode
systems | irix
SHA-256 | 16f8054992c0d396b5836585aca7a5de8f0a5d1d01fb58a831de763055ada649
HexView Security Advisory 2002-09-02.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020902-01-I - SGI IRIX 6.5 systems apply world-readable permissions on all coredumps. This can allow local users to disclose sensitive information from system coredumps. This affects IRIX versions prior to 6.5.15.

tags | local
systems | irix
SHA-256 | 8865c4316b71f35b8b1d3a39f7a567c21b5039bfae4604de43980cfb6abfae49
irixmail.zip
Posted Aug 26, 2002

Old irix sendmail hole.

tags | bbs
systems | irix
SHA-256 | 1a171ff8efeeb5a569dcc986d1638bfeda943a5eec65da53e4193eedb599c7bc
HexView Security Advisory 2002-06-05.01
Posted Jul 16, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020605-01-I - A vulnerability found in the chunked encoding implementation in Apache versions 1.3.24, 2.0.36 or prior can be used to remotely execute code on systems running this software. This vulnerability affects IRIX systems versions 6.5.12m/f up to and including 6.5.16. SGI IRIX 6.5.17 is not affected.

systems | irix
SHA-256 | 76bb676c215a49fb99134bfa0b2bd17ffce8884666531a51a9bc18221c6c10b1
gdd23.tar.gz
Posted Jul 8, 2002
Authored by shadowpenguin, Shadow Penguin Security | Site shadowpenguin.org

GreedyDog v2.3 is an ethernet packet sniffer for Linux, FreeBSD, OpenBSD, NetBSD, Solaris, IRIX, SunOS4, AIX, MacOSX, and Windows2000/Xp. GreedyDog keeps stream of each TCP session and writes to logfile. Very portable. Manual is here.

tags | tcp
systems | linux, netbsd, solaris, freebsd, irix, openbsd, aix
SHA-256 | 9ea5aa65e79bb73b43231fbad538888ef8b601b0fa200261c300006cf9e23e7c
HexView Security Advisory 2002-06-05.01
Posted Jun 25, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020605-01-I - A vulnerability found in the IRIX xfsmd can lead to the remote root access on a vulnerable system. Affects Irix v6.5 through 6.5.16.

tags | remote, root
systems | irix
SHA-256 | c8508fa83da8c2672e55dc46dd4d9131c93d5bae6d08fe32083d3464562b427e
irx_xfsmd.c
Posted Jun 25, 2002
Site lsd-pl.net

IRIX xfsmd remote root exploit. Tested against Irix v6.2, 6.3, 6.4, 6.5, and 6.5.16.

tags | exploit, remote, root
systems | irix
SHA-256 | c6084d769bc0885efa3d141525b7b1d3d51a171754bb048f0ab470504dd03df1
HexView Security Advisory 2002-06-01.01
Posted Jun 5, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020601-01-P - /usr/etc/rpc.passwd has a vulnerability which allows local users to gain root access. The rpc.passwd binary is not installed by default on IRIX 6.5 systems. It is part of the optional subsystem "nfs.sw.nis".

tags | local, root
systems | irix
SHA-256 | 6e15a663869db717fab24ccc54db4d83319ab67ce789bdd0c2ede9b37f07e1c9
irix-mips-bind.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

364 byte MIPS/Irix PIC port binding shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | c46107fcb5c7497a3d6dd32bc368da7cc825324bae592dbed4b55090d2e2f813
irix-bin-sh.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

68 byte MIPS/Irix PIC execve shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | 6d61eb0821d6cdc026bbc6ae30e9581bf9cef4c2446a60a4aa61309df60b9559
HexView Security Advisory 2002-05-03.01
Posted May 10, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020503-01-I - A vulnerability found in netstat allows local users to detect whether a file exists, even when the permissions and ownership of that file should not allow it. This vulnerability has been corrected in IRIX 6.5.12 and patches are available.

tags | local
systems | irix
SHA-256 | ecfddfe1a5d66662e1eacb3e599522d5cc271ef9922a8b2cb650afd55c1f66d3
HexView Security Advisory 2002-04-09.01
Posted May 4, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020409-01-I - A buffer overflow vulnerability found in the /usr/sbin/cpr binary (IRIX Checkpoint and Restart) can allow local user to gain root level privileges. The overflow has been fixed in SGI IRIX 6.5.11 and patches have been made available for previous versions.

tags | overflow, local, root
systems | irix
SHA-256 | 4f2b6cad39b01f6b18e6056ce1678da489b4ec172ed6d052a6b777d61347616a
HexView Security Advisory 2002-05-01.01
Posted May 4, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020501-01-I - The name service daemon (nsd) contains a symlink vulnerability that can be used by local users to elevate their privileges. This vulnerability has been fixed in IRIX 6.5.11 and patches are available for older versions.

tags | local
systems | irix
SHA-256 | e21e400ab5d66314a3149dd6b20aaa81db2e5c9859e2cf50ed81e6d737e78d4a
SGI Security Advisory 20020102-02-I
Posted Jan 17, 2002
Site sgi.com

SGI Security Advisory 20020102-02-I - A vulnerability related to the way the IRIX unified name service daemon (nsd) manages its cache files has been reported which allows remote users to fill the disk. The nsd daemon is installed by default on all 6.5.x versions of IRIX, and this vulnerability exists in all versions of IRIX 6.5.4m/f through 6.5.11m/f. The problem has been fixed in IRIX 6.5.12m/f.

tags | remote
systems | irix
SHA-256 | 44d2dcae3a1ebef95b52d69bf3a53fea80ae607bc6bbf4571c42ecb9a5b47610
Page 2 of 9
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close