Exploit the possiblities
Showing 76 - 100 of 219 RSS Feed

Operating System: IRIX

named2.c
Posted Sep 7, 2000
Site lsd-pl.net

Irix 6.2/5.3 named iquery remote root buffer overflow exploit. Spawns a bindshell.

tags | exploit, remote, overflow, root
systems | irix
MD5 | ae79a7e9edab60e1b0a4d70a00b1c04b
autofsd.c
Posted Sep 7, 2000
Site lsd-pl.net

Autofsd remote buffer overflow exploit for Irix 6.4 and 6.5.

tags | exploit, remote, overflow
systems | irix
MD5 | 01378a7a7c5f88bb5c1927e293890131
arrayd.c
Posted Sep 7, 2000
Site lsd-pl.net

Irix 6.5/6.4/6.3/6.2 arrayd remote buffer overflow exploit as described in CA-99-09-arrayd.txt.

tags | exploit, remote, overflow
systems | irix
MD5 | e14c5e74a826f15f48e76a155fec4eb9
objectserver2.c
Posted Sep 7, 2000
Site lsd-pl.net

SGI objectserver "export" exploit - Remotely adds new entry to the export list on the IRIX system. See our SGI objectserver "account" exploit for more information. Only directories that aren't supersets of already exported ones can be added to the export list.

tags | exploit
systems | irix
MD5 | 7819f36ebeb0df0e7d844ea40bc548a4
irix_rpc_ttdbserverd.c
Posted Sep 7, 2000
Site lsd-pl.net

rpc.ttdbserverd remote root exploit for irix 5.2 5.3 6.2 6.3 6.4 6.5 6.5.2.

tags | exploit, remote, root
systems | irix
MD5 | 983cc713413d355851a1143d56d1b1e5
netsec26.txt
Posted Aug 22, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 26 - 21.08.2000 - Covers weekly roundups of security related events. In this issue: Updated perl and mailx packages to address potential local exploit, widespread suseptibility to IIS 4.0/5.0 "Specialized Header" vulnerability, Rapidstream VPN Appliances root compromise, IRIX tenetd vulnerability, Hotmail/Microsoft Instant Messanger issue, Watchguard Firebox Authentication DOS, OS/2 WARP 4.5 FTP Server DOS, IMAIL web service remote DOS attack v.2, and a paper presented at the Black Hat briefings titled, "A Stateful Inspection of Firewall-1."

tags | remote, web, local, root, perl
systems | irix
MD5 | 290bac84855ce531f7f948345816ea06
iss.summary.5.6
Posted Jul 8, 2000
Site xforce.iss.net

ISS Security Alert Summary July 1, 2000 - 77 new vulnerabilities were reported last month. This document has links to more information and full advisories on each. Includes: win2k-telnetserver-dos, win2k-cpu-overload-dos, fw1-resource-overload-dos, sybergen-routing-table-modify, ircd-dalnet-summon-bo, win-arp-spoofing, imesh-tcp-port-overflow, ie-active-setup-download, ftgate-invalid-user-requests, winproxy-get-dos, firstclass-large-bcc-dos, winproxy-command-bo, boa-webserver-file-access, ie-access-vba-code-execute, ie-powerpoint-activex-object-execute, fortech-proxy-telnet-gateway, xwin-clients-default-export, sawmill-file-access, sawmill-weak-encryption, netscape-virtual-directory-bo, netscape-enterprise-netware-bo, proxyplus-telnet-gateway, glftpd-privpath-directive, irc-leafchat-dos, openbsd-isc-dhcp-bo, debian-cups-malformed-ipp, jetadmin-network-dos, wuftp-format-string-stack-overwrite, jrun-read-sample-files, redhat-secure-locate-path, redhat-gkermit, weblogic-file-source-read, netscape-ftpserver-chroot, linux-kon-bo, dmailweb-long-username-dos, dmailweb-long-pophost-dos, aix-cdmount-insecure-call, irix-workshop-cvconnect-overwrite, blackice-security-level-nervous, linux-libice-dos, xdm-xdmcp-remote-bo, webbbs-get-request-overflow, nettools-pki-http-bo, nettools-pki-unauthenticated-access, panda-antivirus-remote-admin, dragon-telnet-dos, dragon-ftp-dos, small-http-get-overflow-dos, mdaemon-pass-dos, simpleserver-long-url-dos, win2k-desktop-separation, zope-dtml-remote-modify, pgp-cert-server-dos, antivirus-nav-fail-open, antivirus-nav-zip-bo, kerberos-gssftpd-dos, sol-ufsrestore-bo, tigris-radius-login-failure, webbanner-input-validation-exe, smartftp-directory-traversal, antisniff-arptest, weblogic-jsp-source-read, websphere-jsp-source-read, freebsd-alpha-weak-encryption, mailstudio-set-passwords, http-cgi-mailstudio-bo, mailstudio-view-files, kerberos-lastrealm-bo, kerberos-localrealm-bo, kerberos-emsg-bo, kerberos-authmsgkdcrequests, kerberos-free-memory, openssh-uselogin-remote-exec, mailstudio-cgi-input-vaildation, ceilidh-path-disclosure, ceilidh-post-dos, and nt-admin-lockout.

tags | remote, web, overflow, cgi, spoof, tcp, vulnerability, activex
systems | linux, redhat, windows, freebsd, irix, openbsd, debian, aix
MD5 | f42c147da98f5e9123136319d61b43b0
labs43.txt
Posted Jun 2, 2000
Site ussrback.com

USSR Advisory #43 - Remote dos attack against Real Networks Real Server version 7, 7.01, and G2 1.0. Sending malformed packets to the RealServer HTTP port (default 8080) will cause the service to stop responding. Exploit URL included. Affects Windoows NT/2000, Solaris 2.x, Linux, Irix, Unixware, and FreeBSD.

tags | remote, web
systems | linux, solaris, freebsd, irix, unixware
MD5 | 840b40693ba117badc34d7d40ef574cd
iss.summary.5.4
Posted May 4, 2000

ISS Security Alert Summary for May 1, 2000. 35 new reported vulnerabilities this quarter, including: eudora-warning-message, icradius-username-bo, postgresql-plaintext-passwords, aix-frcactrl-file-modify, cisco-ios-http-dos, meetingmaker-weak-encryption, pcanywhere-tcpsyn-dos, piranha-passwd-execute, piranha-default-password, solaris-lp-bo, solaris-xsun-bo, solaris-lpset-bo, zonealarm-portscan, cvs-tempfile-dos, imp-wordfile-dos, imp-tmpfile-view, suse-file-deletion, qpopper-fgets-spoofing, adtran ping-dos, emacs-local-eavesdrop, emacs-tempfile-creation, emacs-password-history, irix-pmcd-mounts, irix-pmcd-processes, irix-pmcd-dos, iis-myriad-escape-chars, freebsd-healthd, beos-syscall-dos, linux-trustees-patch-dos, pcanywhere-login-dos, beos-networking-dos, win2k-unattended-install, mssql-agent-stored-pw, and webobjects-post-dos.

tags | web, local, spoof, vulnerability
systems | cisco, linux, windows, solaris, freebsd, irix, suse, aix, beos
MD5 | be2e086de2c1e0f594e4f7674154e696
phrack56.tar.gz
Posted May 4, 2000
Authored by phrack | Site phrack.com

Phrack Magazine Issue 56 - Shared Library Redirection via ELF PLT Infection, writing IRIX shellcode, subtle backdooring techniques, Bypassing StackGuard and StackShield, the Phrack Prophile, and more

tags | shellcode, magazine
systems | irix
MD5 | eb34d33ee6426f7395489eaddd757a0b
IRIX.Login.Security.txt
Posted Apr 10, 2000
Authored by Prizm

IRIX Login Security - In this paper you will learn a bit about logins, and the seriousness of what could happen if you don't take certain precautions. You will have found out some options you can take with your logins, certain restrictions, and a lot more.

tags | paper
systems | unix, irix
MD5 | e63b7ee974a2cce3da3eabb47ebfaf7e
iss.summary.5.3
Posted Apr 4, 2000
Site xforce.iss.net

ISS Security Alert Summary 5.3 - Summary of vulnerabilities discovered in March, 2000. Contains 33 reported vulnerabilities - windmail-pipe-command, windmail-fileread, simpleserver-exception-dos, linux-domain-socket-dos, linux-gpm-root, outlook-manipulate-hidden-drives, vqserver-dir-traverse, vqserver-passwd-plaintext, iis-chunked-encoding-dos, nav-email-gateway-dos, netscape-server-directory-indexing, mercur-webview-get-dos, officescan-admin-pw-plaintext, officescan-admin-access, linux-kreatecd-path, win-dos-devicename-dos, wmcdplay-bo, nt-registry-permissions, staroffice-scheduler-fileread, staroffice-scheduler-bo, iis-root-enum, mssql-query-abuse, clipart-cil-bo, oracle-installer, linux-rpm-query, thebat-mua-attach, irix-infosrch-fname, linux-dosemu-config, coldfusion-reveal-pathname, netscape-enterprise-command-bo, nmh-execute-code, htdig-remote-read, and ie-html-shortcut.

tags | remote, root, registry, vulnerability
systems | linux, irix
MD5 | 6b84f0c33589c9f3ac1e066b9eb70cdd
irix-objectserver.c
Posted Apr 4, 2000
Authored by Marcy

SGI IRIX objectserver remote exploit - Remotely adds account to the IRIX system. Patched February, 1998. Tested on IRIX 5.2, 5.3, 6.0.1, 6.1 and even 6.2.

tags | exploit, remote
systems | irix
MD5 | f8f3902c4810ad26e5c2a990e4c83666
sgi.20000328.txt
Posted Apr 4, 2000

SGI Security Advisory - A remote vulnerability in the objectserver(1M) daemon has been discovered which can lead to unauthorized non-privileged user accounts being created. IRIX operating systems versions 5.1 through 6.2 are vulnerable. SGI Security page here.

tags | remote
systems | irix
MD5 | e4343e22781b1c35c49c904155df6f6a
binds.c
Posted Mar 4, 2000
Authored by LSD | Site hack.co.za

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
MD5 | 2f117b3fcceb11a27bd2e4924725d9e5
irix-infosrch.cgi.txt
Posted Mar 4, 2000
Authored by Jared

Irix 6.5 InfoSearch is a web-based interface to books, manpages, and relnotes, distributed by SGI. infosrch.cgi can execute commands remotely.

tags | exploit, web, cgi
systems | irix
MD5 | 3536615dd0985d711d41b0dd562fccc8
ucgi200.c
Posted Feb 25, 2000
Authored by su1d sh3ll

CGI vulnerability scanner version 2.00. Checks for 173 CGI vulnerabilities. Tested on linux, freebsd, and irix.

tags | cgi, vulnerability
systems | linux, unix, freebsd, irix
MD5 | 8620187c5c513eb141b1865e64607bbd
ulogin.c
Posted Feb 4, 2000
Authored by Tragedy | Site etc-crew.org

Universal login trojan - Login trojan for pretty much any O/S. Tested on Linux, BSDI 2.0, FreeBSD, IRIX 6.x, 5.x, Sunos 5.5,5.6,5.7, and OSF1/DGUX4.0. Works by checking the DISPLAY environment variable before passing the session to the real login binary.

tags | tool, trojan, rootkit
systems | linux, unix, solaris, freebsd, irix
MD5 | 4d5c12f579e07686a1b350c0064601f4
sentinel-1.2.0.tar.gz
Posted Jan 25, 2000
Site zurk.netpedia.net

Sentinel is a fast file/drive scanning utility similar to the Tripwire and Viper.pl utilities available. It uses a database similar to Tripwire, but uses a RIPEMD-160bit MAC checksumming algorithm (no patents) which is more secure than the patented MD5 128 bit checksum. It should run on most unixes (tested on redhat linux v6.0 & v5.2, slackware linux v3.x & 4.xb and IRIX (v5.2 and v6.x). Several other utilities which are used for Sentinel development are also posted here. Most utilities are included with the sentinel tarball. gSentinel is a graphical front-end to sentinel. Newbies should download gSentinel as it comes with a very simple rpm based installation and offers a friendly interface. Beware that gSentinel is currently under development and may be fairly crude compared to most GUI packages.

tags | tool, intrusion detection
systems | linux, redhat, unix, irix, slackware
MD5 | 6c7adcd611c90494db94c4e3f9b579cc
midikeys.htm
Posted Jan 14, 2000
Site oliver.efri.hr

The IRIX setuid root binary midikeys can be used to read any file on the system using its gui interface. It can also be used to edit anyfile on the system.

tags | exploit, root
systems | irix
MD5 | d382f99a2a6dd54713e4c4aeef2ce1ba
S-00-08.asc
Posted Jan 10, 2000

Subject SGI IRIX fam service Vulnerability Date 04-Mar-2000

systems | irix
MD5 | 2c29854940be5aaf9dd4865b799ce75a
S-92-08.asc
Posted Jan 10, 2000

Subject "IRIX" lp Vulnerability Date 10-apr-92

systems | irix
MD5 | eecddb99d4c1f3b11c55d97d7fec7697
S-93-22.asc
Posted Jan 10, 2000

Subject SGI IRIX configuration vulnerabilities Date 25-Oct-93

tags | vulnerability
systems | irix
MD5 | 0006b543bebdb1801d140be97ca06cbf
S-94-19.asc
Posted Jan 10, 2000

Subject SGI IRIX Help Vulnerability Date 12-aug-94

systems | irix
MD5 | 3de9c0ce0834a62905f792ffe742ebc8
S-94-20.asc
Posted Jan 10, 2000

Subject SGI IRIX V4 serial_ports vulnerability Date 04-Oct-94

systems | irix
MD5 | deae3c0a14c5d78ba50d629a6738f31b
Page 4 of 9
Back23456Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    14 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close