what you don't know can hurt you
Showing 76 - 100 of 220 RSS Feed

Operating System: IRIX

Posted Sep 7, 2000
Site lsd-pl.net

Irix 6.3/6.2 /usr/bin/X11/xlock local buffer overflow exploit.

tags | exploit, overflow, local
systems | irix
MD5 | 19d26832ec333919d795f33bfc09de1f
Posted Sep 7, 2000
Site lsd-pl.net

Irix 6.2/5.3 named iquery remote root buffer overflow exploit. Spawns a bindshell.

tags | exploit, remote, overflow, root
systems | irix
MD5 | ae79a7e9edab60e1b0a4d70a00b1c04b
Posted Sep 7, 2000
Site lsd-pl.net

Autofsd remote buffer overflow exploit for Irix 6.4 and 6.5.

tags | exploit, remote, overflow
systems | irix
MD5 | 01378a7a7c5f88bb5c1927e293890131
Posted Sep 7, 2000
Site lsd-pl.net

Irix 6.5/6.4/6.3/6.2 arrayd remote buffer overflow exploit as described in CA-99-09-arrayd.txt.

tags | exploit, remote, overflow
systems | irix
MD5 | e14c5e74a826f15f48e76a155fec4eb9
Posted Sep 7, 2000
Site lsd-pl.net

SGI objectserver "export" exploit - Remotely adds new entry to the export list on the IRIX system. See our SGI objectserver "account" exploit for more information. Only directories that aren't supersets of already exported ones can be added to the export list.

tags | exploit
systems | irix
MD5 | 7819f36ebeb0df0e7d844ea40bc548a4
Posted Sep 7, 2000
Site lsd-pl.net

rpc.ttdbserverd remote root exploit for irix 5.2 5.3 6.2 6.3 6.4 6.5 6.5.2.

tags | exploit, remote, root
systems | irix
MD5 | 983cc713413d355851a1143d56d1b1e5
Posted Aug 22, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 26 - 21.08.2000 - Covers weekly roundups of security related events. In this issue: Updated perl and mailx packages to address potential local exploit, widespread suseptibility to IIS 4.0/5.0 "Specialized Header" vulnerability, Rapidstream VPN Appliances root compromise, IRIX tenetd vulnerability, Hotmail/Microsoft Instant Messanger issue, Watchguard Firebox Authentication DOS, OS/2 WARP 4.5 FTP Server DOS, IMAIL web service remote DOS attack v.2, and a paper presented at the Black Hat briefings titled, "A Stateful Inspection of Firewall-1."

tags | remote, web, local, root, perl
systems | irix
MD5 | 290bac84855ce531f7f948345816ea06
Posted Jul 8, 2000
Site xforce.iss.net

ISS Security Alert Summary July 1, 2000 - 77 new vulnerabilities were reported last month. This document has links to more information and full advisories on each. Includes: win2k-telnetserver-dos, win2k-cpu-overload-dos, fw1-resource-overload-dos, sybergen-routing-table-modify, ircd-dalnet-summon-bo, win-arp-spoofing, imesh-tcp-port-overflow, ie-active-setup-download, ftgate-invalid-user-requests, winproxy-get-dos, firstclass-large-bcc-dos, winproxy-command-bo, boa-webserver-file-access, ie-access-vba-code-execute, ie-powerpoint-activex-object-execute, fortech-proxy-telnet-gateway, xwin-clients-default-export, sawmill-file-access, sawmill-weak-encryption, netscape-virtual-directory-bo, netscape-enterprise-netware-bo, proxyplus-telnet-gateway, glftpd-privpath-directive, irc-leafchat-dos, openbsd-isc-dhcp-bo, debian-cups-malformed-ipp, jetadmin-network-dos, wuftp-format-string-stack-overwrite, jrun-read-sample-files, redhat-secure-locate-path, redhat-gkermit, weblogic-file-source-read, netscape-ftpserver-chroot, linux-kon-bo, dmailweb-long-username-dos, dmailweb-long-pophost-dos, aix-cdmount-insecure-call, irix-workshop-cvconnect-overwrite, blackice-security-level-nervous, linux-libice-dos, xdm-xdmcp-remote-bo, webbbs-get-request-overflow, nettools-pki-http-bo, nettools-pki-unauthenticated-access, panda-antivirus-remote-admin, dragon-telnet-dos, dragon-ftp-dos, small-http-get-overflow-dos, mdaemon-pass-dos, simpleserver-long-url-dos, win2k-desktop-separation, zope-dtml-remote-modify, pgp-cert-server-dos, antivirus-nav-fail-open, antivirus-nav-zip-bo, kerberos-gssftpd-dos, sol-ufsrestore-bo, tigris-radius-login-failure, webbanner-input-validation-exe, smartftp-directory-traversal, antisniff-arptest, weblogic-jsp-source-read, websphere-jsp-source-read, freebsd-alpha-weak-encryption, mailstudio-set-passwords, http-cgi-mailstudio-bo, mailstudio-view-files, kerberos-lastrealm-bo, kerberos-localrealm-bo, kerberos-emsg-bo, kerberos-authmsgkdcrequests, kerberos-free-memory, openssh-uselogin-remote-exec, mailstudio-cgi-input-vaildation, ceilidh-path-disclosure, ceilidh-post-dos, and nt-admin-lockout.

tags | remote, web, overflow, cgi, spoof, tcp, vulnerability, activex
systems | linux, redhat, windows, freebsd, irix, openbsd, debian, aix
MD5 | f42c147da98f5e9123136319d61b43b0
Posted Jun 2, 2000
Site ussrback.com

USSR Advisory #43 - Remote dos attack against Real Networks Real Server version 7, 7.01, and G2 1.0. Sending malformed packets to the RealServer HTTP port (default 8080) will cause the service to stop responding. Exploit URL included. Affects Windoows NT/2000, Solaris 2.x, Linux, Irix, Unixware, and FreeBSD.

tags | remote, web
systems | linux, solaris, freebsd, irix, unixware
MD5 | 840b40693ba117badc34d7d40ef574cd
Posted May 4, 2000

ISS Security Alert Summary for May 1, 2000. 35 new reported vulnerabilities this quarter, including: eudora-warning-message, icradius-username-bo, postgresql-plaintext-passwords, aix-frcactrl-file-modify, cisco-ios-http-dos, meetingmaker-weak-encryption, pcanywhere-tcpsyn-dos, piranha-passwd-execute, piranha-default-password, solaris-lp-bo, solaris-xsun-bo, solaris-lpset-bo, zonealarm-portscan, cvs-tempfile-dos, imp-wordfile-dos, imp-tmpfile-view, suse-file-deletion, qpopper-fgets-spoofing, adtran ping-dos, emacs-local-eavesdrop, emacs-tempfile-creation, emacs-password-history, irix-pmcd-mounts, irix-pmcd-processes, irix-pmcd-dos, iis-myriad-escape-chars, freebsd-healthd, beos-syscall-dos, linux-trustees-patch-dos, pcanywhere-login-dos, beos-networking-dos, win2k-unattended-install, mssql-agent-stored-pw, and webobjects-post-dos.

tags | web, local, spoof, vulnerability
systems | cisco, linux, windows, solaris, freebsd, irix, suse, aix, beos
MD5 | be2e086de2c1e0f594e4f7674154e696
Posted May 4, 2000
Authored by phrack | Site phrack.com

Phrack Magazine Issue 56 - Shared Library Redirection via ELF PLT Infection, writing IRIX shellcode, subtle backdooring techniques, Bypassing StackGuard and StackShield, the Phrack Prophile, and more

tags | shellcode, magazine
systems | irix
MD5 | eb34d33ee6426f7395489eaddd757a0b
Posted Apr 10, 2000
Authored by Prizm

IRIX Login Security - In this paper you will learn a bit about logins, and the seriousness of what could happen if you don't take certain precautions. You will have found out some options you can take with your logins, certain restrictions, and a lot more.

tags | paper
systems | unix, irix
MD5 | e63b7ee974a2cce3da3eabb47ebfaf7e
Posted Apr 4, 2000
Site xforce.iss.net

ISS Security Alert Summary 5.3 - Summary of vulnerabilities discovered in March, 2000. Contains 33 reported vulnerabilities - windmail-pipe-command, windmail-fileread, simpleserver-exception-dos, linux-domain-socket-dos, linux-gpm-root, outlook-manipulate-hidden-drives, vqserver-dir-traverse, vqserver-passwd-plaintext, iis-chunked-encoding-dos, nav-email-gateway-dos, netscape-server-directory-indexing, mercur-webview-get-dos, officescan-admin-pw-plaintext, officescan-admin-access, linux-kreatecd-path, win-dos-devicename-dos, wmcdplay-bo, nt-registry-permissions, staroffice-scheduler-fileread, staroffice-scheduler-bo, iis-root-enum, mssql-query-abuse, clipart-cil-bo, oracle-installer, linux-rpm-query, thebat-mua-attach, irix-infosrch-fname, linux-dosemu-config, coldfusion-reveal-pathname, netscape-enterprise-command-bo, nmh-execute-code, htdig-remote-read, and ie-html-shortcut.

tags | remote, root, registry, vulnerability
systems | linux, irix
MD5 | 6b84f0c33589c9f3ac1e066b9eb70cdd
Posted Apr 4, 2000
Authored by Marcy

SGI IRIX objectserver remote exploit - Remotely adds account to the IRIX system. Patched February, 1998. Tested on IRIX 5.2, 5.3, 6.0.1, 6.1 and even 6.2.

tags | exploit, remote
systems | irix
MD5 | f8f3902c4810ad26e5c2a990e4c83666
Posted Apr 4, 2000

SGI Security Advisory - A remote vulnerability in the objectserver(1M) daemon has been discovered which can lead to unauthorized non-privileged user accounts being created. IRIX operating systems versions 5.1 through 6.2 are vulnerable. SGI Security page here.

tags | remote
systems | irix
MD5 | e4343e22781b1c35c49c904155df6f6a
Posted Mar 4, 2000
Authored by LSD | Site hack.co.za

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
MD5 | 2f117b3fcceb11a27bd2e4924725d9e5
Posted Mar 4, 2000
Authored by Jared

Irix 6.5 InfoSearch is a web-based interface to books, manpages, and relnotes, distributed by SGI. infosrch.cgi can execute commands remotely.

tags | exploit, web, cgi
systems | irix
MD5 | 3536615dd0985d711d41b0dd562fccc8
Posted Feb 25, 2000
Authored by su1d sh3ll

CGI vulnerability scanner version 2.00. Checks for 173 CGI vulnerabilities. Tested on linux, freebsd, and irix.

tags | cgi, vulnerability
systems | linux, unix, freebsd, irix
MD5 | 8620187c5c513eb141b1865e64607bbd
Posted Feb 4, 2000
Authored by Tragedy | Site etc-crew.org

Universal login trojan - Login trojan for pretty much any O/S. Tested on Linux, BSDI 2.0, FreeBSD, IRIX 6.x, 5.x, Sunos 5.5,5.6,5.7, and OSF1/DGUX4.0. Works by checking the DISPLAY environment variable before passing the session to the real login binary.

tags | tool, trojan, rootkit
systems | linux, unix, solaris, freebsd, irix
MD5 | 4d5c12f579e07686a1b350c0064601f4
Posted Jan 25, 2000
Site zurk.netpedia.net

Sentinel is a fast file/drive scanning utility similar to the Tripwire and Viper.pl utilities available. It uses a database similar to Tripwire, but uses a RIPEMD-160bit MAC checksumming algorithm (no patents) which is more secure than the patented MD5 128 bit checksum. It should run on most unixes (tested on redhat linux v6.0 & v5.2, slackware linux v3.x & 4.xb and IRIX (v5.2 and v6.x). Several other utilities which are used for Sentinel development are also posted here. Most utilities are included with the sentinel tarball. gSentinel is a graphical front-end to sentinel. Newbies should download gSentinel as it comes with a very simple rpm based installation and offers a friendly interface. Beware that gSentinel is currently under development and may be fairly crude compared to most GUI packages.

tags | tool, intrusion detection
systems | linux, redhat, unix, irix, slackware
MD5 | 6c7adcd611c90494db94c4e3f9b579cc
Posted Jan 14, 2000
Site oliver.efri.hr

The IRIX setuid root binary midikeys can be used to read any file on the system using its gui interface. It can also be used to edit anyfile on the system.

tags | exploit, root
systems | irix
MD5 | d382f99a2a6dd54713e4c4aeef2ce1ba
Posted Jan 10, 2000

Subject SGI IRIX fam service Vulnerability Date 04-Mar-2000

systems | irix
MD5 | 2c29854940be5aaf9dd4865b799ce75a
Posted Jan 10, 2000

Subject "IRIX" lp Vulnerability Date 10-apr-92

systems | irix
MD5 | eecddb99d4c1f3b11c55d97d7fec7697
Posted Jan 10, 2000

Subject SGI IRIX configuration vulnerabilities Date 25-Oct-93

tags | vulnerability
systems | irix
MD5 | 0006b543bebdb1801d140be97ca06cbf
Posted Jan 10, 2000

Subject SGI IRIX Help Vulnerability Date 12-aug-94

systems | irix
MD5 | 3de9c0ce0834a62905f792ffe742ebc8
Page 4 of 9

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    1 Files
  • 9
    Aug 9th
    2 Files
  • 10
    Aug 10th
    27 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By