what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files

IRIX-p_sh-asm.c
Posted Jun 14, 2007
Authored by Adam Zabrocki

IRIX MIPS processor shellcode. Tested on R12000 process with system IRIX64 6.5.26m.

tags | shellcode
systems | irix
SHA-256 | a44477ca1f8cd02261ab5c90a11b65a2d02cc650a4771be9db30638bfc80f798

Related Files

SGI IRIX 6.4.x Run-Time Linker Arbitrary File Creation
Posted Apr 28, 2019
Authored by Hacker Fantastic

SGI IRIX versions 6.4.x and below run-time linker (rld) arbitrary file creation exploit.

tags | exploit, arbitrary
systems | irix
SHA-256 | 6f90ee10780f9ce1e84434cd416d1bb52ce40db82cd9f3b32770f230eec3040c
irix6local.txt
Posted Mar 12, 2006
Authored by RoDhEDoR

SGI IRIX 6.5 local root exploit that makes use of /usr/sysadm/bin/lezririx.

tags | exploit, local, root
systems | irix
SHA-256 | 9e782c3248720f5c96b198b4d71e6be19f6122f33549f5c9a73407a910e5dbf2
irixmail.zip
Posted Aug 26, 2002

Old irix sendmail hole.

tags | bbs
systems | irix
SHA-256 | 1a171ff8efeeb5a569dcc986d1638bfeda943a5eec65da53e4193eedb599c7bc
irix-mips-bind.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

364 byte MIPS/Irix PIC port binding shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | c46107fcb5c7497a3d6dd32bc368da7cc825324bae592dbed4b55090d2e2f813
irix-bin-sh.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

68 byte MIPS/Irix PIC execve shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | 6d61eb0821d6cdc026bbc6ae30e9581bf9cef4c2446a60a4aa61309df60b9559
irix.telnetd.txt
Posted Sep 13, 2000
Authored by LSD | Site lsd-pl.net

A serious vulnerability has been found in IRIX telnetd which can give remote root access to any IRIX 6.2-6.5.8[m,f] system. The vulnerability occurrs when one of the environment variables contains a format string which is passed on to the syslog() function. Proof of concept exploit included (updated version - compiler and little endian fixes). Fix available here.

tags | exploit, remote, root, proof of concept
systems | irix
SHA-256 | f3757ed7c83366e37236fcd1468ac10d93f1b85113d1d44c9616dc8a918135d9
irix-libc.c
Posted Sep 7, 2000
Site lsd-pl.net

libc.so NLSPATH local exploit for Irix 6.2.

tags | exploit, local
systems | irix
SHA-256 | e85e8187d098ebd688d3477b8b4f2a5c06fecf078ca93a00d0e4689f460e9a32
irix-xlock.c
Posted Sep 7, 2000
Site lsd-pl.net

Irix 6.3/6.2 /usr/bin/X11/xlock local buffer overflow exploit.

tags | exploit, overflow, local
systems | irix
SHA-256 | b8d9843b397b57fccaa793ccf840cd9d1975e50c5e927c8e182b01e64aeea9fa
irix_rpc_ttdbserverd.c
Posted Sep 7, 2000
Site lsd-pl.net

rpc.ttdbserverd remote root exploit for irix 5.2 5.3 6.2 6.3 6.4 6.5 6.5.2.

tags | exploit, remote, root
systems | irix
SHA-256 | 013680ab2f18fda2da0613e985b4d69e5e887fe8bfcdd023cd1e22f04cb5343e
IRIX.Login.Security.txt
Posted Apr 10, 2000
Authored by Prizm

IRIX Login Security - In this paper you will learn a bit about logins, and the seriousness of what could happen if you don't take certain precautions. You will have found out some options you can take with your logins, certain restrictions, and a lot more.

tags | paper
systems | unix, irix
SHA-256 | 35daa4e31eadc2e9835852cb680f16c18c3d63d83c32a3c93afa078dcdfd4718
irix-objectserver.c
Posted Apr 4, 2000
Authored by Marcy

SGI IRIX objectserver remote exploit - Remotely adds account to the IRIX system. Patched February, 1998. Tested on IRIX 5.2, 5.3, 6.0.1, 6.1 and even 6.2.

tags | exploit, remote
systems | irix
SHA-256 | 50cc9680c224be9e0219d599f01be7fd1deae2ff3856942ef92ade8bb1049054
irix-infosrch.cgi.txt
Posted Mar 4, 2000
Authored by Jared

Irix 6.5 InfoSearch is a web-based interface to books, manpages, and relnotes, distributed by SGI. infosrch.cgi can execute commands remotely.

tags | exploit, web, cgi
systems | irix
SHA-256 | eba4d77a802d260631abb020810e7f15fba73aa9ed4f550a8086a00d34d95608
irixaa.tar.gz
Posted Nov 5, 1999
Authored by shadowpenguin

This program checks many IRIX security holes automatically. If you are admin, can check easily the security vulnerabilities of each IRIX. Don't use for the auto attack. This scanner contains the ttdbserver attack, this function is based on the script which is developped by the rootshell. thanks.

tags | vulnerability
systems | unix, irix
SHA-256 | fdb645ddef470ad46457b433af158fdcca322e238d6798e1a9c1d9a0dfd44190
irixlp.c
Posted Sep 23, 1999
Authored by Mixter

Scans for the default logins on IRIX boxes. Courtesy of Mixter

systems | irix
SHA-256 | 24bb4b2576c66fa3a627292e52438a6d2321f903c3b4f9c6b6d8b7f9aeebb68e
irix-fcagent-DoS.txt
Posted Aug 17, 1999

IRIX's (versions 6.4, 6.5 and 6.5.2) fcagent daemon is vulnerable to a Denial of Service attack, which involves sending a specific RPC packet to the fcagent daemon.

tags | exploit, denial of service
systems | irix
SHA-256 | 4b7cd0ae9439fbb26e8e8cd428eecf4bb11b41bcf64331d0d8dc7533366cd1ef
irix.autofsd.txt
Posted Aug 17, 1999

Three buffer overflow exploits to get root on Irix.

tags | exploit, overflow, root
systems | irix
SHA-256 | 6f46de5c128d3fb8874a4c23a09714ace1800238d667d5a9665984f04846eb31
irixat.txt
Posted Aug 17, 1999

IRIX 6.2 'at' allows you to send yourself files owned by root via e-mail.

tags | exploit, root
systems | irix
SHA-256 | b457a616615cc3321399981969ba0786268b4aae4bce8e6b62ae9fd5ff63e0dc
irix.midikeys.txt
Posted Aug 17, 1999

IRIX midikeys setuid permissions allow local root compromise. Exploit description and vendor recommended temporary solution included.

tags | exploit, local, root
systems | irix
SHA-256 | 29ae2ff4845e65a827c57fd2c78ac6cac0a775cd014310a4523f453aa54f9db3
irix.wu-ftpd.bof.txt
Posted Aug 17, 1999

IRIX versions of wu-ftpd are also vulnerable to buffer overflows, resulting in potential root compromise.

tags | exploit, overflow, root
systems | irix
SHA-256 | 5e7b2edecefa87ba2138c3cf75d596c6b6552aea446f9096c6d1172323e31fe4
irix.x.server.font.bof.txt
Posted Aug 17, 1999

IRIX v5.3 - v6.5 X server font path buffer overflow vulnerability can lead to remote root compromise. Vendor patch information included.

tags | exploit, remote, overflow, root
systems | irix
SHA-256 | 85cfa5a85bdc6f12264cccc1756577a17b835c0db9ca363f7c2bf576b29881b2
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close