exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 220 RSS Feed

Operating System: IRIX

Internet Security Systems Security Advisory October 2, 2001
Posted Oct 4, 2001
Site xforce.iss.net

ISS X-Force has discovered a format string vulnerability in the ToolTalk RPC service present on many commercial Unix variants. The ToolTalk database server (rpc.ttdbserverd) contains a format string vulnerability that may allow remote attackers to crash the ToolTalk service, or execute arbitrary code on a target system with super user privilege.

tags | remote, arbitrary
systems | solaris, irix, aix, hpux
SHA-256 | 7b3937ec0ff2a6f8ab2b30dddccd69238b157ccf162a4101a1d63bff08da76b8
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Hhp-temprace6_0.pl is a quick and simple temp race checker for Linux, BSD, Sun/Solaris and IRIX. Put together to eliminate the hassle of manual checking.

systems | linux, solaris, irix, bsd
SHA-256 | 3a7b01350b0436ef102a74f1abf29d166c13d069a577ab60fb104dd82412538d
Posted Jul 29, 2001
Authored by teso, scut | Site team-teso.net

TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.

tags | overflow, root
systems | linux, netbsd, solaris, freebsd, irix, openbsd
SHA-256 | 4849ac76d26caec6f947c4879fceb873db9d4fbf399d4ebadda0a88587f6c0ba
Posted Jul 29, 2001
Authored by The Last Stage of Delerium | Site lsd-pl.net

Unix Assembly Code Development for Vulnerabilities Illustration Purposes v1.02 - Covers IRIX / MIPS, Solaris, HP-UX, AIX, Ultrix, Linux, BeOS, and BSD. Includes system call invocation information, code specifics, "Zero free" code, ASM functionality, and examples.

tags | paper, vulnerability
systems | linux, unix, solaris, irix, bsd, aix, hpux, beos
SHA-256 | 62d2e8de6232b3ff6562e6a1ae2a27a030259d2647d85ffb2ae413a70b82d7e1
Internet Security Systems Security Advisory May 9, 2001
Posted May 17, 2001
Site xforce.iss.net

ISS X-Force has discovered a buffer overflow in the ?rpc.espd? component of the Embedded Support Partner (ESP) subsystem. ESP is installed and enabled by default on all current SGI IRIX installations.

tags | remote, overflow, root
systems | irix
SHA-256 | 6326566a243bd93810f222cdd5171dd79f90bd2adba15b8689aaae8416431796
Internet Security Systems Security Alert Summary May 10, 2001
Posted May 16, 2001
Site xforce.iss.net

This advisory holds 120 vulnerabilities.

tags | remote, web, kernel, cgi, perl, php, javascript, tcp, vulnerability, activex
systems | cisco, linux, unix, solaris, irix
SHA-256 | 00cf12d8a5a8701f90a38c209a88b00c8028def67321206fa40aca19a90f593d
Posted Apr 30, 2001
Authored by vade79, realhalo | Site realhalo.org

Irix Netprint local root exploit. Exploits netprint's -n option. Tested on IRIX 6.2, but should work on other versions.

tags | exploit, local, root
systems | irix
SHA-256 | e1b15bb0206ea96a407bd99676b571620fc56bbe407ca2fe157fa97b328c6b5b
Posted Apr 10, 2001
Authored by Covert Labs | Site nai.com

NAI Security Advisory - Multiple FTP server implementations contain buffer overflows that allow local and remote attackers to gain root privileges on affected servers. These vulnerabilities are contingent upon the remote user having the ability to create directories on the server hosting the FTP daemon, with the exception of a few cases noted below. The vulnerabilities presented are all related to the use of the glob() function, and can be divided into the following two categories - glob() expansion vulnerabilities and glob() implementation vulnerabilities. Vulnerable FTP servers include OpenBSD, NetBSD, FreeBSD, Irix, HPUX 11, and Solaris 8.

tags | remote, overflow, local, root, vulnerability
systems | netbsd, solaris, freebsd, irix, openbsd, hpux
SHA-256 | 14a21100e205f31e8a5af8bf40f62968749848f4653fa977060110baa1c23a96
Posted Apr 10, 2001
Site cert.org

CERT Advisory CA-2001-07 - Many FTP servers have remote vulnerabilities in filename expansion due to the glob() function which allow arbitrary code execution. Vulnerable FTP servers include OpenBSD, NetBSD, FreeBSD, Irix, HPUX 11, and Solaris 8.

tags | remote, arbitrary, vulnerability, code execution
systems | netbsd, solaris, freebsd, irix, openbsd, hpux
SHA-256 | 809c9d0e40e40d5ec796bd833496f52b16bd9671042bef29959a533565d6676b
Posted Jan 19, 2001
Authored by teso, scut | Site team-teso.net

Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.

tags | shell, shellcode
systems | irix
SHA-256 | 4ae9d1a99adae30ec567bcc47c657eb5fa712b7d9ea625abbd8747f87f01cfae
Posted Dec 19, 2000
Authored by teso | Site team-teso.net

Exploit for the Bind NXT remote root vulnerability, which affects Bind v8.2 - 8.2.1. Compiles on Linux, tested against Irix, BSD, and Linux. Includes Irix shellcode for breaking chroot.

tags | exploit, remote, root, shellcode
systems | linux, irix, bsd
SHA-256 | febfc0b34d825bb1fd2b1ea1e96374fa6816966c45c2f8ac101caef72cf4b91b
Posted Dec 3, 2000
Site cert.org

CERT Quarterly Summary for November, 2000 - Since the last regularly scheduled CERT summary, issued in August (CS-2000-03), we have seen continued compromises via rpc.statd and FTPd. We have also seen a number of sites compromised by exploiting a vulnerability in the IRIX telnet daemon. Notable virus activity includes the Loveletter.as worm and the QAZ worm.

tags | worm, virus
systems | irix
SHA-256 | e8488c9895d8d674123d6fae983a30e4fa01369e7a25ab353192c987dd4546ee
Posted Sep 15, 2000
Site xforce.iss.net

ISS Security Alert Summary for September 15, 2000. 87 new vulnerablities were reported this month. This document has links to more information and full advisories on each. Includes: ftp-goodtech-rnto-dos, imail-file-attachment, go-gnome-preinstaller-symlink, mailers-cgimail-spoof, win-netbios-corrupt-cache, news-publisher-add-author, xpdf-embedded-url, intel-express-switch-dos, viking-server-bo, win2k-corrupt-lsp, vqserver-get-dos, mgetty-faxrunq-symlink, money-plaintext-password, wormhttp-dir-traverse, wormhttp-filename-dos, cgi-auction-weaver-read-files, iis-cross-site-scripting, telnetserver-rpc-bo, nai-pgp-unsigned-adk, website-pro-upload-files, account-manager-overwrite-password, subscribe-me-overwrite-password, hp-netinit-symlink, realsecure-frag-syn-dos, sunjava-webadmin-bbs, zkey-java-compromise-accounts, java-vm-applet, darxite-login-bo, gopherd-halidate-bo, phpnuke-pwd-admin-access, becky-imail-header-dos, gnome-installer-overwrite-configuration, gnome-lokkit-open-ports, minicom-capture-groupown, webshield-smtp-dos, netwin-netauth-dir-traverse, xlock-format-d-option, frontpage-ext-device-name-dos, xchat-url-execute-commands, irix-worldview-wnn-bo, os2-ftpserver-login-dos, weblogic-plugin-bo, ie-folder-remote-exe, firebox-url-dos, trustix-secure-apache-misconfig, irix-telnetd-syslog-format, rapidstream-remote-execution, ntop-bo, iis-specialized-header, linux-update-race-condition, etrust-access-control-default, zope-additional-role, list-manager-elevate-privileges, iis-incorrect-permissions, varicad-world-write-permissions, gopherd-gdeskey-bo, gopherd-gdeskey-bo, mediahouse-stats-livestats-bo, linux-umb-scheme, mdaemon-session-id-hijack, tumbleweed-mms-blank-password, ie-scriptlet-rendering-file-access, office-html-object-tag, hp-openview-nnm-password, hp-newgrp, totalbill-remote-execution, solaris-answerbook2-admin-interface, perl-shell-escape, solaris-answerbook2-remote-execution, mopd-bo, java-brownorifice, diskcheck-tmp-race-condition, servu-null-character-dos, pccs-mysql-admin-tool, irix-xfs-truncate, win-ipx-ping-packet, nai-nettools-strong-bo, fw1-unauth-rsh-connection, win2k-named-pipes, sol-libprint-bo, ntop-remote-file-access, irix-grosview-bo, irix-libgl-bo, irix-dmplay-bo, irix-inpview-symlink, nettools-pki-dir-traverse, fw1-localhost-auth.

tags | java, remote, shell, cgi, perl, spoof
systems | linux, windows, solaris, irix
SHA-256 | dbd64db221e040e05a4a342ac92b13566073a9300c9dab57446e955bb03abca1
Posted Sep 13, 2000
Authored by LSD | Site lsd-pl.net

A serious vulnerability has been found in IRIX telnetd which can give remote root access to any IRIX 6.2-6.5.8[m,f] system. The vulnerability occurrs when one of the environment variables contains a format string which is passed on to the syslog() function. Proof of concept exploit included (updated version - compiler and little endian fixes). Fix available here.

tags | exploit, remote, root, proof of concept
systems | irix
SHA-256 | f3757ed7c83366e37236fcd1468ac10d93f1b85113d1d44c9616dc8a918135d9
Posted Sep 7, 2000
Site lsd-pl.net

/usr/sbin/dmplay local exploit for Irix 6.2 and 6.3.

tags | exploit, local
systems | irix
SHA-256 | 33878132ba17cb14adacfd7fd63917d631a677b211c06b27f7f324d7f8ae2106
Posted Sep 7, 2000
Site lsd-pl.net

/usr/lib/InPerson/inpview local exploit for irix 6.5 and 6.5.8.

tags | exploit, local
systems | irix
SHA-256 | 20de4d5d3536e5a6e5d1f11e4bbfa5569460661e437fac2c091206b9e6a5f703
Posted Sep 7, 2000
Site lsd-pl.net

/usr/sbin/eject local exploit for Irix 6.2.

tags | exploit, local
systems | irix
SHA-256 | 3a274f0803f6cacbb36ee5488c5bf9157c5233ee43f416c630317941da7f5ffa
Posted Sep 7, 2000
Site lsd-pl.net

libxt.so HOME environment variable local buffer overflow exploit for Irix 6.2 and 6.3.

tags | exploit, overflow, local
systems | irix
SHA-256 | 0fd64a260597d92ddc35ec83625712320142e8d70f5dd3905e921919c3b0948c
Posted Sep 7, 2000
Site lsd-pl.net

/sbin/pset local exploit for Irix 6.2 and 6.3.

tags | exploit, local
systems | irix
SHA-256 | 8cd67fc2075fb7fa9cdcb4d9c5b2a7e65e9b68ea269c58db2ff38f003c788c73
Posted Sep 7, 2000
Site lsd-pl.net

/usr/sbin/gr_osview local exploit for Irix 6.2 and 6.3.

tags | exploit, local
systems | irix
SHA-256 | b7c2bda68db1f2496ae176d7e583399122ba0fa280c6c84c3540a42b21a84999
Posted Sep 7, 2000
Site lsd-pl.net

libc.so NLSPATH local exploit for Irix 6.2.

tags | exploit, local
systems | irix
SHA-256 | e85e8187d098ebd688d3477b8b4f2a5c06fecf078ca93a00d0e4689f460e9a32
Posted Sep 7, 2000
Site lsd-pl.net

libgl.so HOME environment variable local exploit for irix 6.2.

tags | exploit, local
systems | irix
SHA-256 | 91e0d34d930699e2770b4e4644d12dd7899a0c4309cc8a270a5fe0de7e6876aa
Posted Sep 7, 2000
Site lsd-pl.net

/usr/lib/iaf/scheme (login) local exploit for Irix 5.3.

tags | exploit, local
systems | irix
SHA-256 | 36924fa523d8e0197e9d55131aec3483099b5ec30e51b03798b09634c120ba38
Posted Sep 7, 2000
Site lsd-pl.net

libxaw.so inputmethod local exploit for irix 6.2.

tags | exploit, local
systems | irix
SHA-256 | 356a8d6b331d9f92665ee9be6d8339e4765c5517109d264bcdafd148614a7dad
Posted Sep 7, 2000
Site lsd-pl.net

/usr/bin/mail local exploit for Irix 6.2 and 6.3.

tags | exploit, local
systems | irix
SHA-256 | 46d88fde5c1a93b2c29a7b13090d438345edda725b4cb6c5a7f206e0337b0902
Page 3 of 9

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By