what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed


Posted Aug 30, 2001
Site xforce.iss.net

ISS Security Advisory - A buffer overflow has been discovered in the line printer daemon of several BSD implementations. (in.lpd or lpd) A remote or local attacker can execute arbitrary code as root. The vulnerability presents itself when an attacker submits a specially crafted print job and then requests a display of the printer queue to trigger the overflow. Affected versions include OpenBSD CURRENT and earlier, FreeBSD 4.3 and earlier, NetBSD 1.5.1 and earlier, and BSD/OS 4.1 and earlier.

tags | remote, overflow, arbitrary, local, root
systems | netbsd, freebsd, bsd, openbsd
SHA-256 | 7585435d2dff29c86e3097c97aed447cd260d501d502447697a7356257a2687b

Related Files

Posted Jan 29, 2006
Authored by Esteban Martinez Fayo | Site argeniss.com

Argeniss Security Advisory - Oracle Database Server provides the DBMS_XMLSCHEMA and DBMS_XMLSCHEMA_INT Packages that include procedures to register and delete XML schemas. These packages contain the public procedures GENERATESCHEMA and GENERATESCHEMAS that are vulnerable to buffer overflow attacks.

tags | advisory, overflow
SHA-256 | 367ed9eab6261d53ec2bfcaf1f65901f75fa8a8fa1f0d9139fb4c8389da1b9d7
Posted Mar 15, 2005
Authored by Cesar Cerrudo | Site argeniss.com

Argeniss Security Advisory - Oracle database servers versions 8i and 9i are susceptible to directory traversal attacks.

tags | exploit
SHA-256 | fbdd2328be239c99f2f1f4d9662604a2451eee01ce19ea3fcb94fd2005ce1cc0
Posted Sep 24, 2003
Site xforce.iss.net

ISS Security Advisory - A flaw in the ProFTPD Unix FTP server versions 1.2.7 through 1.2.9rc2 allows an attacker capable of uploading files the ability to trigger a buffer overflow and execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | unix
SHA-256 | 0b7e33b20eb6e39707bf6f99835e0d7b6a4c02fe435aa0e95c32fea7585d8dee
Posted Mar 11, 2003

ISS Security Advisory - ISS X-Force has discovered a flaw in the PeopleSoft PeopleTools application framework. Attackers could exploit a vulnerability to write arbitrary files with attacker-defined data under the permissions of the Web server via the "SchedulerTransfer" servlet.

tags | advisory, web, arbitrary
SHA-256 | d4e4a170931e409182da4f67336e84fd3dcb57e5a8ce070bb07f6abbfceb3062
Posted Mar 10, 2003
Site xforce.iss.net

ISS Security Advisory - A remote root vulnerability has been discovered in Sendmail v5.79 to 8.12.7 in the crackaddr() function which is used to parse headers. This vulnerability is especially dangerous because the exploit can be delivered within an email message and the attacker doesn't need any specific knowledge of the target to launch a successful attack.

tags | advisory, remote, root
SHA-256 | a777b9ea2ee630fe2497afce3a91ff81fed5df586e37de4d937c084f3d483e7f
Posted Mar 10, 2003
Site xforce.iss.net

ISS Security Advisory - Snort v1.8 through 1.9.0 contains a remote root vulnerability in the processing of fragmented RPC traffic. Since fragment sizes are not properly checked against the remaining buffer space, remote attackers can execute arbitrary code as root by sending a packet to any IP in network space a snort sensor is listening to. Successful exploitation does not generate log entries, and non-executable stacks do not offer protection.

tags | remote, arbitrary, root
SHA-256 | bc99632cf2915e3fd09192db51188d45a561de0df9f9c62671d14df80a1747b9
Posted Jan 25, 2003
Site xforce.iss.net

ISS Security Advisory - The "Microsoft SQL Slammer Worm" is spreading via unpatched SQL servers. Once a vulnerable computer is compromised, the worm will infect that target, randomly select a new target, and resend the exploit and propagation code to that host sending a large amount of network traffic in the process which crashes some network equipment.

tags | worm
advisories | CVE-2002-0649
SHA-256 | 3a77fcd92ec00163f9ca845cd4c731f4b077b50ac1f7c0901d732242725f76d2
Posted Nov 13, 2002
Site xforce.iss.net

ISS Security Advisory - Bind 8 v8.3.3-REL and below and Bind 4 v4.9.10-REL and below contain a flaw in the formation of DNS responses containing SIG resource records (RR) that allows remote code execution. Two denial of service vulnerabilities exist as well. A workaround is available by turning off recursive DNS functionality.

tags | remote, denial of service, vulnerability, code execution
SHA-256 | 415591543028456a7c65c52b6e53dedc3d552efa7ad0f398790215825ae30993
Posted Sep 25, 2002
Authored by Rammstein

This tool can be used to scan IIS servers for the unicode directory traversal vulnerability.

tags | cgi
systems | unix
SHA-256 | d68555136e1216e01f665bb28f94c34d9fa82ebd4c0629f79f500a373361d1c4
Posted Sep 18, 2002
Site xforce.iss.net

ISS Security Advisory - A vulnerability found in the manner used by Internet Scanner to parse certain types of non-standard HTTP responses can result in a remotely exploitable buffer overflow condition. This affects Internet Scanner version 6.2.1 for Windows (NT/2000) and has been corrected with X-Press Update 6.17.

tags | web, overflow
systems | windows
SHA-256 | 34566c0ce8925f26dbbf2bf5886377abce98ca70c2881f2aaf17c71614aaae00
Posted Sep 5, 2002
Authored by Jeff Horne | Site xforce.iss.net

ISS Security Advisory - Polycom ViewStation videoconferencing products contain several remote vulnerabilities which allow attackers to gather information about the device, retrieve files, crash the device, and monitor videoconferences. Polycom ViewStation 7.2 and earlier and Polycom ViewStation FX/VS 4000 version 4.1.5 and below are affected.

tags | remote, vulnerability
advisories | CVE-2002-0626, CVE-2002-0627, CVE-2002-0628, CVE-2002-0629, CVE-2002-0630
SHA-256 | 0e9546d6ec69efb53f99fa0cb060c52d2a61dadc43f6032a89ce7704eb741851
Posted Aug 30, 2002
Site iss.net

ISS Security Advisory - Windows NT, 2000, and XP can be crashed remotely by sending a malformed packet to port 139, triggering a heap overflow. MS02-045.

tags | denial of service, overflow
systems | windows
advisories | CVE-2002-0724
SHA-256 | b74704a2cee3637e1a2e674c5a67573beff65a176eec97554c88e17a844cc641
Posted Jul 25, 2002
Site iss.net

ISS Security Advisory - Microsoft Exchange Server v5.5 contains a remotely exploitable buffer overflow. This flaw allows attackers to either crash Exchange and block all inbound and outbound email delivery or allow an attacker to gain complete control of the server.

tags | overflow
SHA-256 | a61e4caccffff08e6577f171e4763c83baf57da3c8f3bcfb4e8dd5b42fca11c8
Posted Nov 20, 2001
Site iss.net

ISS Security Advisory - ISS X-Force has discovered a vulnerability in the HP-UX line printer daemon (rlpdaemon) that allows a remote or local user to execute arbitrary code with root privileges. Affected versions include HP-UX 10.01, 10.10, 10.20, 11.00, and 11.11.

tags | remote, arbitrary, local, root
systems | hpux
SHA-256 | fc8855c32af05bfe561174dc0946a2ed415b60808e50f138370be7dc3d2426dc
Posted Nov 12, 2001
Site xforce.iss.net

ISS discovered a buffer overflow vulnerability in the Subprocess Control Server (dtspcd) in all Unix variants running CDE (Common Desktop Environment) system. The vulnerability in the dtspcd daemon allows remote attackers to execute arbitrary commands on a target system as root. Many unix flavors are affected.

tags | remote, overflow, arbitrary, root
systems | unix
SHA-256 | d1bfc5d62d8c313808c9f569fae242504771c9276aac917e265af53497e54bf5
Posted Oct 17, 2001
Site xforce.iss.net

ISS Security Advisory - A remote denial of service vulnerability has been found in Citrix MetaFrame, an application server that works with Windows Terminal Services. This vulnerability causes a MetaFrame installation to crash or "blue screen" and requires an affected system to be restarted manually.

tags | remote, denial of service
systems | windows
SHA-256 | 4ac34a8787598472e233d32474352c12be8616df6bec830ac5dd73fd29b0f80d
Posted Oct 4, 2001
Site xforce.iss.net

ISS Security Advisory - A format string vulnerability has been found in the tooltalk service (rpc.ttdbserverd) on multiple versions of HP-UX, IBM AIX, IRIX, DG-UX, and Solaris. ToolTalk contains a "syslog()" call that will interpret user-supplied formatting arguments. This call is insecure and allows remote attackers to control formatting and manipulate data at arbitrary locations in the memory of the running executable.

tags | remote, arbitrary
systems | solaris, irix, aix, hpux
SHA-256 | 7b3937ec0ff2a6f8ab2b30dddccd69238b157ccf162a4101a1d63bff08da76b8
Posted Aug 28, 2001
Site xforce.iss.net

ISS Security Advisory - A buffer overflow has been discovered in the HP-UX line printer daemon (rlpdaemon) which allows a remote or local attacker to execute arbitrary code with superuser privilege. Affected versions include HP-UX 10.01, 10.10, 10.20, 11.00, and 11.11. Rlpdaemon is configured to run by default even if it is not being used.

tags | remote, overflow, arbitrary, local
systems | hpux
SHA-256 | b5a445dab3717a3385ee1bfe58ee3b898d4e1161c8f436be861fcb4c1556bd65
Posted Jul 12, 2001
Site xforce.iss.net

ISS Security Advisory - X-Force has discovered buffer overflow vulnerabilities in two popular Remote Authentication Dial-In User Server (RADIUS) implementations. The vulnerabilities in this advisory allow attackers to launch Denial of Service (DoS) attacks against critical network components, bypass 802.11 WLAN access control, and compromise and control protected network resources. Affected versions include Merit 3.6b RADIUS and Lucent 2.1-2 RADIUS. Prior releases are also vulnerable.

tags | remote, denial of service, overflow, vulnerability
SHA-256 | d5d80e70fd98ab61af0a31f821187d5887d6b3bb8563e79b3a40554e82a4ba19
Posted May 17, 2001
Site xforce.iss.net

ISS Security Alert - A flaw exists in Microsoft Internet Information Server (IIS) that may allow remote attackers to view directory structures, view and delete files, execute arbitrary commands, and deny service to the server. It is possible for attackers to craft URLs that take advantage of a flaw in IIS URL decoding routines. Security mechanisms within these routines can be bypassed. All recent versions of IIS are affected by this vulnerability.

tags | remote, arbitrary
SHA-256 | 0678361f10357557833b2a2d33b82e84b3523cf921e44d95ea0e3d806abb98d1
Posted May 17, 2001
Site xforce.iss.net

ISS Security Advisory - A buffer overflow has been discovered in IRIX rpc.espd, which is installed by default on all current SGI IRIX installations. Remote attackers without accounts can execute commands as root. Patch available here.

tags | remote, overflow, root
systems | irix
SHA-256 | 6326566a243bd93810f222cdd5171dd79f90bd2adba15b8689aaae8416431796
Posted May 3, 2001
Site xforce.iss.net

ISS Security Advisory - Windows 2000 running IIS 5.0 has a serious remote vulnerability in the ISAPI printer extension. More information available here.

tags | remote
systems | windows
SHA-256 | 775b962801b88729d6a6728a04293da2e67437ad128f3b5ef34731e52f9cb69e
Posted Mar 16, 2001
Site xforce.iss.net

The Stick ddos tool overloads IDS systems with false positives, causing them to fail. Paper on stick available here.

SHA-256 | da1612bccb80ba244587e23c1bfb6b0a07c6e7e404ffbe49e615f9ba4a14b6a8
Posted Feb 1, 2001
Site xforce.iss.net

ISS Security Alert - Remote Vulnerabilities in BIND versions 4 and 8. Bind 8 has a buffer overflow in the TSIG handling code - Bind 4 has several buffer overflows. Affected versions include v4.9.3 through 4.9.7 and 8.2 through 8.2.3-T9B. Fix available here.

tags | remote, overflow, vulnerability
SHA-256 | 5e7225bf4a9af61e978fa9688324e60943dcb7419ee5c653d86f400962442dd1
Posted Jan 23, 2001
Site xforce.iss.net

ISS Security Alert - Ramen Linux Worm. A self-propagating worm known as Ramen is currently exploiting well-known holes (wu-ftp, rpc.statd, and LPRng) in unpatched Red Hat Linux 6.2 systems and in early versions of Red Hat 7.0. In addition to scanning for additional systems and propagating to vulnerable systems, the worm also defaces Web servers it encounters by replacing the "index.html" file. It may also interfere with some networks supporting multicasting.

tags | worm, web
systems | linux, redhat
SHA-256 | 5fafe03a3ac411b8a7266fdb981c05bf1655ddbeb36af33ffcc0cace05e380fc
Page 1 of 4

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By