what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files

SCO Openserver 5.0.7 Command Injection
Posted Dec 21, 2020
Authored by Ramikan

SCO Openserver version 5.0.7 suffers from a command injection vulnerability.

tags | exploit
advisories | CVE-2020-25494
SHA-256 | 1f920966d1dd8d36ad7adc823ced2120722dfce0328e9d29b0525af22edacc9d

Related Files

SCO Openserver 5.0.7 Cross Site Scripting
Posted Dec 21, 2020
Authored by Ramikan

SCO Openserver version 5.0.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-25495
SHA-256 | 55dea7dce9de561be522952bff8ff51c5ba84c18a3090a240ec597cfac9b6d5b
Zero Day Initiative Advisory 11-058
Posted Feb 7, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-058 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the SCO OpenServer IMAP daemon. Authentication is not required to exploit this vulnerability. The specific flaw exists within the imapd process responsible for handling remote IMAP requests. The process does not properly validate IMAP commands and arguments. Supplying an overly long command followed by an invalid argument can cause an exploitable overflow to occur. This vulnerability can be leveraged to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary, imap
SHA-256 | 26e2bee5820b5b73597b730ef799df9eaa6187c8fb7135154033593117ab2880
prdelka-vs-SCO-termshx.c
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

SCO Openserver 5.0.7 termsh exploit. 'termsh' is a program to view or modify an existing terminal entry on SCO Openserver. A stack based overflow exists in the handling of command line arguments, namely the [-o oadir] argument. It is installed setgid auth in a default SCO Openserver 5.0.7 install. An attacker may use this flaw to gain write access to /etc/passwd or /etc/shadow allowing for local root compromise.

tags | exploit, overflow, local, root
SHA-256 | 80848a38a842001ba4c5cb1a4aa2616cfde210738c9f9ac3f9e0ec9ee9fa8266
prdelka-vs-SCO-netwarex.c
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

SCO Openserver 5.0.7 Netware Printing utilities exploit. Multiple buffer overflows exist in the handling of command line arguments in SCO Openserver Netware printing utils. EIP is overwritten after 997 bytes are supplied on the command line. The following binaries are installed setgid 'lp' as default and are vulnerable to this attack.

tags | exploit, overflow
SHA-256 | 83a9ce0000e4291a949433b76dd8e4502dbf1c5dbe40d16fb8f14962865b2148
prdelka-vs-SCO-enable
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

SCO Openserver 5.0.7 enable exploit. A standard stack-overflow exists in the handling of command line arguments in the 'enable' binary. A user must be configured with the correct permissions to use the "enable" binary. SCO user documentation suggests "You can use the asroot(ADM) command. In order to grant a user the right to enable and disable tty devices". This exploit assumes you have those permissions.

tags | exploit, overflow
SHA-256 | 817dbb560a816e2f79b66debcf45beb878184dc4c5bbaa5233467482a065771b
SCOSA-2006.15.txt
Posted Apr 1, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.7 OpenServer 6.0.0 : Xpdf Multiple Buffer Overflow Vulnerabilities

tags | advisory, overflow, vulnerability
SHA-256 | e79161e876cc979daf84a164e2f966eef7dd9ab9f6c85c51935d9681777255c5
Secunia Security Advisory 19243
Posted Mar 16, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SCO has issued an update for OpenServer. This fixes some vulnerabilities and security issues, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to potentially overwrite arbitrary files on a vulnerable device.

tags | advisory, arbitrary, vulnerability
SHA-256 | 81948f6580e9b5608c358983f6bba29bf1af82c49bc5ee3a7391f86009b623cb
SCOSA-2006.11.txt
Posted Mar 15, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSH Multiple Vulnerabilities: A vulnerability has been reported in the OpenSSH scp utilities. This issue may permit a malicious scp server to corrupt files on a client system when files are copied.

tags | advisory, vulnerability
SHA-256 | 058aa07bb6432ba4bcf1b9be324153ec0020060332d2fe3e2985872f20bb2bec
SCOSA-2006.12.txt
Posted Mar 15, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 6.0.0 : OpenSSH Multiple Vulnerabilities: Two security issues have been reported in OpenSSH, which can be exploited by malicious users to gain escalated privileges or bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | 837090b5029fe521ddda692f8741add4aed4195788bac5f25e483bc9723c4cb5
SCOSA-2006.10.txt
Posted Mar 14, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : Multiple System Libraries Vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 3799edee6ac32c542aede100f28a5107cb7f3c2ef49e8f8d016a6fb4ec946993
Secunia Security Advisory 18317
Posted Jan 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SCO has issued an update for OpenServer. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) on an active TCP session.

tags | advisory, denial of service, tcp, vulnerability
SHA-256 | 54d66c0dd9ef3d66f1d4fcf804fdbd4cf3235a785772ca551f7392af63c89bd1
SCOSA-2006.5.txt
Posted Jan 5, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : LibXpm Integer Overflow Vulnerability

tags | advisory, overflow
SHA-256 | 594b55a18007cbcee6575dbc7bfc784f8bcafcf6003cf28068e1de312d17381e
SCOSA-2006.4.txt
Posted Jan 5, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 and OpenServer 5.0.7 : TCP Remote ICMP Denial Of Service Vulnerabilities

tags | advisory, remote, denial of service, tcp, vulnerability
SHA-256 | ecd292fca0e6a99001c77855d5bf7270a6676e1afad1778fb8e5fe1c0a4b256e
termsh.c
Posted Jan 4, 2006
Authored by rod hedor

SCO Openserver 5.0.7 termsh local privilege escalation exploit.

tags | exploit, local
advisories | CVE-2005-0351
SHA-256 | f7a3d4a66d5029784ec01e7c244577689ed677bf1011df6147694236519b212b
Secunia Security Advisory 17645
Posted Nov 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SCO has issued a maintenance pack for OpenServer. This fixes various vulnerabilities in Mozilla, zip, libpng, zlib, libtiff, bzip2, openssh, php, perl, gzip, CUPS, wu-ftpd, cdrecord and squid, which can be exploited by malicious people to cause a DoS (Denial of Service), spoof the content of websites, gain knowledge of potentially sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, manipulate certain data, or compromise a user's system, and by malicious, local users to gain escalated privileges.

tags | advisory, denial of service, local, perl, spoof, php, vulnerability, xss
SHA-256 | 59a54db47795d9a46d215d4496c52e2bf94824fd9b6075136f0e9874f4bd678d
SCOSA-2005.46.txt
Posted Nov 3, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - Cross-site scripting vulnerability in docview (htdig) under OpenServer 5.0.7 and OpenServer 6.0.0 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.

tags | advisory, remote, web, arbitrary, xss
advisories | CVE-2005-0085
SHA-256 | bfe8f1276bbd4439e396e05e3a38cc25023e5409c4ed8582ebe4fe5972e05840
iDEFENSE Security Advisory 2005-10-24.2
Posted Oct 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.24.05 - Local exploitation of a buffer overflow vulnerability in The SCO Group Inc.'s Openserver operating system could allow an attacker to gain root privileges.

tags | advisory, overflow, local, root
SHA-256 | 3ae152c1a2dd00e7fcae7088b157ba81d2ff09974b77c02bc9e97c2d122f8127
iDEFENSE Security Advisory 2005-10-24.1
Posted Oct 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.24.05 - Local exploitation of a buffer overflow vulnerability in The SCO Group Inc.'s Openserver operating system could allow an attacker to gain access to the backup group.

tags | advisory, overflow, local
SHA-256 | 74a54f24ca55eca0f7d2feffa42849b689e2691f620f49d30c5d5e7247306c73
SCOSA-2005.40.txt
Posted Oct 26, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - iDEFENSE has identified a Buffer Overflow vulnerability in SCO Openserver backupsh. The backupsh utility is a standard binary distributed with Openserver 5.0.7 and earlier.

tags | advisory, overflow
SHA-256 | 05597ecea3d8a0bd926b0282d3c7164ffc0d5a812b5296d3da2b44ba717b8f45
Secunia Security Advisory 17274
Posted Oct 21, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenServer, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 2c315213afd390685e9b2fac130100d3bfc72186682d69f709a67bec33571598
Secunia Security Advisory 15339
Posted May 29, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Simon Roses Femerling has reported a vulnerability in SCO OpenServer, which can be exploited by malicious, local users to break out of the chroot jail.

tags | advisory, local
SHA-256 | f880ad50004f2b6a158b6c64867c3218baeb45ea47fe8a3b0899dda590afbca2
Secunia Security Advisory 14836
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pasquale Minervini has reported a vulnerability in SCO OpenServer, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | a38a5c64164f1cf0821c75308e791835feb222982c2bd51718a7aeef75ee8b38
sco507nwprint.c
Posted Apr 17, 2005
Authored by pasquale minervini

Local exploit for nwprint on SCO OpenServer 5.0.7 that gives egid of lp.

tags | exploit, local
SHA-256 | 4d21e63f2918a6727ab6f1765974a340a61a1a5bacf0daad8cc84e8c103ca34e
osx86_mmdfdeliver.c
Posted Oct 26, 2004
Authored by Ramon de C Valle

MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.

tags | exploit, x86, local, root
advisories | CVE-2004-0510
SHA-256 | 5a32e0e43ec0a91696cd2732619706797117d91a12166e0b705430b2a2d691a5
SCOSA-2004.7.txt
Posted Jul 20, 2004
Site sco.com

SCO Security Advisory - Multiple vulnerabilities have been found in the MMDF binaries included with SCO Openserver versions 5.0.6 and 5.0.7. These include buffer overflows, null dereferences, and core dumps.

tags | advisory, overflow, vulnerability
advisories | CVE-2004-0510, CVE-2004-0511, CVE-2004-0512
SHA-256 | f78bc63931e13a59fb61612fe42904a3de9bc9c717ed7cd53c2d6e79a6eb8a55
Page 1 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close