accept no compromises
Showing 26 - 50 of 219 RSS Feed

Operating System: IRIX

HexView Security Advisory 2004-04-01.01
Posted Apr 2, 2004
Authored by HexView | Site support.sgi.com

SGI Security Advisory 20040401-01-P - It has been reported that there are several security issues affecting ftpd on IRIX. There is an ftpd DoS that is possible during PORT mode (SGI BUG 899364) not to mention that ftpd's ftp_syslog() doesn't work with anonymous FTP (SGI BUG 909172).

tags | advisory
systems | irix
MD5 | 7be6ff1c8fb3c76beb33200abd57a0fb
HexView Security Advisory 2003-09-01.01
Posted Sep 18, 2003
Authored by HexView | Site sgi.com

SGI Security Advisory 20030901-01-P - It has been reported that under certain conditions a NFS client can avoid read-only restrictions on filesystems exported via NFS from a server running IRIX 6.5.21 and mount them in read/write mode.

tags | advisory
systems | irix
advisories | CVE-2003-0680
MD5 | 158b80ac8f156a5d0d22ea50142fb208
HexView Security Advisory 2003-08-01.01
Posted Aug 14, 2003
Authored by HexView | Site sgi.com

SGI Security Advisory 20030801-01-P - It is possible to create a Denial of Service attack on the IRIX nfsd through the use of carefully crafted packets which cause XDR decoding errors. This can lead to kernel panicing the system. No local account or access to an NFS mount point is required, so this could be constructed as a remote exploit.

tags | advisory, remote, denial of service, kernel, local
systems | irix
advisories | CVE-2003-0576
MD5 | a98675283906a5666114c8e4e784cb4b
HexView Security Advisory 2003-07-04.01
Posted Aug 5, 2003
Authored by HexView | Site support.sgi.com

SGI Security Advisory 20030704-01-P - It has been reported that the IRIX name services daemon nsd can be exploited in various ways through the AUTH_UNIX gid list. This could result in an attacker gaining root access.

tags | advisory, root
systems | irix
advisories | CVE-2003-0575
MD5 | d24f576633d1116056bce01aa747cc76
HexView Security Advisory 2003-07-02.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030702-01-P - It has been reported that logging into an IRIX 6.5 machine while particular environment variables are set can lead to /usr/lib/iaf/scheme dumping core. Since scheme is suid root, this could potentially lead to a root compromise.

tags | advisory, root
systems | irix
MD5 | 3c4d357d6c4753a6214004ab269e25fe
HexView Security Advisory 2003-07-01.01
Posted Jul 18, 2003
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20030701-01-P - Multiple vulnerabilities have been found in the Name Service Daemon, or nsd, on IRIX below version 6.5.21.

tags | advisory, vulnerability
systems | irix
advisories | CVE-2003-0176, CVE-2003-0177, CVE-2003-0572, CVE-2003-0573
MD5 | 4fda666dd3b10a49c1eb0791597570ba
0x333shadow.tar.gz
Posted Jul 11, 2003
Authored by 0x333, nsn | Site 0x333.org

Log cleaner, for Linux, Freebsd, Irix and SunOS. While in the midst of cleaning, various system checks are performed to monitor presence of detection.

tags | tool, rootkit
systems | linux, unix, solaris, freebsd, irix
MD5 | 058eed61307886505861ff2dfaa2a7c1
HexView Security Advisory 2003-06-07.01
Posted Jun 25, 2003
Authored by HexView, SGI Security | Site sgi.com

SGI Security Advisory 20030607-01-P - Several bugs in the IRIX 6.5.19 implementation of IPv6 result in inetd becoming hung when port scanned, snoop unable to handle packets as root, and other non-security related issues.

tags | advisory, root
systems | irix
MD5 | 99d2e0ce6890eb6a4b4d3ae5e453c5d5
mips-exit.asm
Posted Sep 20, 2002
Site netric.org

20 byte IRIX/MIPS PIC shellcode that calls exit().

tags | shellcode
systems | irix
MD5 | 04d6682631fc215ffd9f94c9e899d6cc
mips-bindshell.asm
Posted Sep 20, 2002
Site netric.org

204 byte MIPS/IRIX PIC shellcode that binds /bin/sh to port 16705 TCP.

tags | tcp, shellcode
systems | irix
MD5 | 40b449c2162a774fe148d967f7d7ce79
mips-execve.asm
Posted Sep 20, 2002
Authored by ntronic | Site netric.org

52 byte MIPS/IRIX PIC shellcode that does an execve of /bin/sh.

tags | shellcode
systems | irix
MD5 | 9041c3b35a844f70a42f6fbf9cc6710a
HexView Security Advisory 2002-09-02.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020902-01-I - SGI IRIX 6.5 systems apply world-readable permissions on all coredumps. This can allow local users to disclose sensitive information from system coredumps. This affects IRIX versions prior to 6.5.15.

tags | local
systems | irix
MD5 | 9315a98001591b774f8fa81e3687ba21
irixmail.zip
Posted Aug 26, 2002

Old irix sendmail hole.

tags | bbs
systems | irix
MD5 | 2d28151477d191dcabc5412a25fd5158
HexView Security Advisory 2002-06-05.01
Posted Jul 16, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020605-01-I - A vulnerability found in the chunked encoding implementation in Apache versions 1.3.24, 2.0.36 or prior can be used to remotely execute code on systems running this software. This vulnerability affects IRIX systems versions 6.5.12m/f up to and including 6.5.16. SGI IRIX 6.5.17 is not affected.

systems | irix
MD5 | b44f60e8f0b88e503d01b5125f0524c6
gdd23.tar.gz
Posted Jul 8, 2002
Authored by shadowpenguin, Shadow Penguin Security | Site shadowpenguin.org

GreedyDog v2.3 is an ethernet packet sniffer for Linux, FreeBSD, OpenBSD, NetBSD, Solaris, IRIX, SunOS4, AIX, MacOSX, and Windows2000/Xp. GreedyDog keeps stream of each TCP session and writes to logfile. Very portable. Manual is here.

tags | tcp
systems | linux, netbsd, solaris, freebsd, irix, openbsd, aix
MD5 | 7f63d4455486e59b4f4b6f788617867f
HexView Security Advisory 2002-06-05.01
Posted Jun 25, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020605-01-I - A vulnerability found in the IRIX xfsmd can lead to the remote root access on a vulnerable system. Affects Irix v6.5 through 6.5.16.

tags | remote, root
systems | irix
MD5 | 107bf81f7d77d1a13ba6b90562c60f90
irx_xfsmd.c
Posted Jun 25, 2002
Site lsd-pl.net

IRIX xfsmd remote root exploit. Tested against Irix v6.2, 6.3, 6.4, 6.5, and 6.5.16.

tags | exploit, remote, root
systems | irix
MD5 | d9769aaa8cde1ae5a06b623eb7261b44
HexView Security Advisory 2002-06-01.01
Posted Jun 5, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020601-01-P - /usr/etc/rpc.passwd has a vulnerability which allows local users to gain root access. The rpc.passwd binary is not installed by default on IRIX 6.5 systems. It is part of the optional subsystem "nfs.sw.nis".

tags | local, root
systems | irix
MD5 | a9f6c3f8bddb276e2347490ed85dd6c5
irix-mips-bind.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

364 byte MIPS/Irix PIC port binding shellcode (source included)

tags | shellcode
systems | irix
MD5 | 024620e7f7f8334a98a18a3bec83a675
irix-bin-sh.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

68 byte MIPS/Irix PIC execve shellcode (source included)

tags | shellcode
systems | irix
MD5 | 2e7c77853c3a790ed0426eb837f63440
HexView Security Advisory 2002-05-03.01
Posted May 10, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020503-01-I - A vulnerability found in netstat allows local users to detect whether a file exists, even when the permissions and ownership of that file should not allow it. This vulnerability has been corrected in IRIX 6.5.12 and patches are available.

tags | local
systems | irix
MD5 | 6ab5d926e943b47fda267a53527c3809
HexView Security Advisory 2002-04-09.01
Posted May 4, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020409-01-I - A buffer overflow vulnerability found in the /usr/sbin/cpr binary (IRIX Checkpoint and Restart) can allow local user to gain root level privileges. The overflow has been fixed in SGI IRIX 6.5.11 and patches have been made available for previous versions.

tags | overflow, local, root
systems | irix
MD5 | 1b212fd1910572e509e5b37c2bd49899
HexView Security Advisory 2002-05-01.01
Posted May 4, 2002
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20020501-01-I - The name service daemon (nsd) contains a symlink vulnerability that can be used by local users to elevate their privileges. This vulnerability has been fixed in IRIX 6.5.11 and patches are available for older versions.

tags | local
systems | irix
MD5 | b7cca256947c54cbaaa2bde4e510fb6c
sgi.20020102-02-i.nsd
Posted Jan 17, 2002
Site sgi.com

SGI Security Advisory 20020102-02-I - A vulnerability related to the way the IRIX unified name service daemon (nsd) manages its cache files has been reported which allows remote users to fill the disk. The nsd daemon is installed by default on all 6.5.x versions of IRIX, and this vulnerability exists in all versions of IRIX 6.5.4m/f through 6.5.11m/f. The problem has been fixed in IRIX 6.5.12m/f.

tags | remote
systems | irix
MD5 | bf5faec99bcaf5b2354ef288848a573c
iss.01-10-02.ttdbserverd
Posted Oct 4, 2001
Site xforce.iss.net

ISS Security Advisory - A format string vulnerability has been found in the tooltalk service (rpc.ttdbserverd) on multiple versions of HP-UX, IBM AIX, IRIX, DG-UX, and Solaris. ToolTalk contains a "syslog()" call that will interpret user-supplied formatting arguments. This call is insecure and allows remote attackers to control formatting and manipulate data at arbitrary locations in the memory of the running executable.

tags | remote, arbitrary
systems | solaris, irix, aix, hpux
MD5 | fc846f2aab901cd94774643b4e146f2d
Page 2 of 9
Back12345Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    2 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close