exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

FreeBSD Local Denial Of Service
Posted Jan 28, 2011
Authored by Kingcope

FreeBSD local denial of service exploit that causes a forced reboot.

tags | exploit, denial of service, local
systems | freebsd
SHA-256 | 74e9ff916c830d783aa31aad9f51279b50bb6492d981404c7bf0b44fa6c5ff54

Related Files

FreeBSD Security Advisory 2000.31
Posted Jul 12, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:31 - The Canna server, which is not installed by default, contains an overflowable buffer which may be exploited by a remote user to execute arbitrary code on the local system as user 'bin'.

tags | remote, overflow, arbitrary, local
systems | freebsd
SHA-256 | a5c72623b3c311e90c72f4b47d9722fac689db56ba5ef144be25900514208d35
FreeBSD Security Advisory 2000.29
Posted Jul 12, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:29 - The wu-ftpd port, versions 2.6.0 and below, contains a vulnerability which allows remote anonymous FTP users to execute arbitrary code as root on the local machine, by inserting string-formatting operators into command input, which are incorrectly parsed by the FTP server.

tags | remote, arbitrary, local, root
systems | freebsd
SHA-256 | bd79217c21c14fb58f503398bbd1738af72e6d6b50c3fa9c2bc3c38460cad46e
FreeBSD Security Advisory 2000.32
Posted Jul 6, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:32 - The bitchx client incorrectly parses string-formatting operators included as part of channel invitation messages sent by remote IRC users. This can cause the local client to crash, and may possibly present the ability to execute arbitrary code as the local user.

tags | remote, arbitrary, local
systems | freebsd
SHA-256 | e7981774cffd17fc53074acbfb424642e5071b74f399e53d90d11f29736a246f
FreeBSD Security Advisory 2000.30
Posted Jul 6, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:30 - OpenSSH UseLogin directive permits remote root access. OpenSSH has a configuration option, not enabled by default ("UseLogin") which fails to drop privileges when it executes commands, meaning that remote users without root access can execute commands on the local system as root.

tags | remote, local, root
systems | freebsd
SHA-256 | cb82b177655948ab3564d4e7aec566508e4686e4196abfb36f05bd8ab77f7c7d
FreeBSD Security Advisory 2000.28
Posted Jul 6, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:28 - Majordomo is not safe to run on multi-user machines.

systems | freebsd
SHA-256 | d6c024647b5da1bc20ff1d6711780141bfc6dbff7a1dab4b3c31e88768ea05c1
FreeBSD Security Advisory 2000.27
Posted Jul 6, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:27 - XFree86 4.0 contains a local root vulnerability in the XFree86 server binary, due to incorrect bounds checking of command-line arguments. The server binary is setuid root, in contrast to previous versions which had a small setuid wrapper which performed (among other things) argument sanitizing.

tags | local, root
systems | freebsd
SHA-256 | 59a4505dfbaf3da8b36c51a1a3d230d3e4eed4e5b3cc4ad6e30ba5d98b30573f
FreeBSD Security Advisory 2000.24
Posted Jul 6, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:24 - libedit incorrectly reads an ".editrc" file in the current directory if it exists, in order to specify configurable program behaviour. However it does not check for ownership of the file, so an attacker can cause a libedit application to execute arbitrary key rebindings and exercise terminal capabilities by creating an .editrc file in a directory from which another user executes a libedit binary (e.g. root running ftp(1) from /tmp). This can be used to fool the user into unknowingly executing program commands which may compromise system security. For example, ftp(1) includes the ability to escape to a shell and execute a command, which can be done under libedit control.

tags | arbitrary, shell, root
systems | freebsd
SHA-256 | cccd003b6e1f91c431307ed76b55bc71a35b0a2ac22b441ba48fb52895eb0b7a
FreeBSD Security Advisory 2000.25
Posted Jun 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:25 - The FreeBSD port to the Alpha platform did not provide the /dev/random or /dev/urandom devices. Some applications fail to correctly check for a working /dev/random and do not exit with an error if it is not available, so this weakness goes undetected. OpenSSL 0.9.4, and utilities based on it, including OpenSSH (both of which are included in the base FreeBSD 4.0 system) are affected in this manner.

systems | freebsd
SHA-256 | b5a6b3e3c85aab31d8474b3242b293e743d2375070930536cd70abb583048751
freebsd-cdrecord.c
Posted Jun 12, 2000
Authored by Sectorx | Site xorteam.cjb.net

Freebsd cdrecord local root exploit - Tested against FreeBSD 3.3-RELEASE.

tags | exploit, local, root
systems | freebsd
SHA-256 | 69c97fd5a84be42d400615e765ad61662441f2ca88b97bbb52105cfe55f17024
FreeBSD Security Advisory 2000.22
Posted Jun 9, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:22 - A patch added to the FreeBSD SSH port on 2000-01-14 incorrectly configured the SSH daemon to listen on an additional network port, 722, in addition to the usual port 22. This may cause a violation of security policy if the additional port is not subjected to the same access-controls (e.g. firewallling) as the standard SSH port.

systems | freebsd
SHA-256 | 33c72447d93fde7131a8d8212c02092b4f3850d030c64554377c8b18f6be713d
FreeBSD Security Advisory 2000.21
Posted Jun 9, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:22 - The apsfilter port, versions 5.4.1 and below, contain a vulnerability which allow local users to execute arbitrary commands as the user running lpd, user root in a default FreeBSD installation.

tags | arbitrary, local, root
systems | freebsd
SHA-256 | ebfe79af11d363c60595bcdc3353668e6393f13c9aefc881f75f10e098545841
FreeBSD Security Advisory 2000.20
Posted May 26, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:20 - The MIT Kerberos 5 port version 1.1.1 and earlier contains remote and local root vulnerabilities. Note that the implementations of Kerberos shipped in the FreeBSD base system is not the MIT version and not vulnerable to these problems. However, a very old release of FreeBSD dating from 1997 (FreeBSD 2.2.5) did ship with a closely MIT-derived Kerberos implementation ("eBones") and may be vulnerable to attacks of the kind described here.

tags | remote, local, root, vulnerability
systems | freebsd
SHA-256 | 4f55ecf6320468d66123267409375a0ace13858593f9a6d9bf1e9f89ace29546
FreeBSD Security Advisory 2000.19
Posted May 26, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD-SA-00:19 - A bug in the BSD kernel allows local users to cause every process on the system to hang during exiting. An undocumented system call is incorrectly exported from the kernel without access-control checks, allowing for a denial of service attack. Kernel patch included for FreeBSD.

tags | denial of service, kernel, local
systems | freebsd, bsd
SHA-256 | 45e3f6b40d7341db9e1de883923c171e91c998be44dc982602439178f3b0113b
FreeBSD Security Advisory 2000.18
Posted May 18, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory SA-00:18 - The gnapster port (version 1.3.8 and earlier), and the knapster port (version 0.9 and earlier) contain a vulnerability which allows remote napster users to view any file on the local system which is accessible to the user running gnapster/knapster.

tags | remote, local
systems | freebsd
SHA-256 | f2d4875ee2a6597cc2a94c6118a4d88b60ed4746d0f0b055496f531d15e77b46
FreeBSD Security Advisory 2000.8
Posted May 18, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory SA-00:08 - lynx revised. Versions of the lynx software prior to version 2.8.3pre.5 were written in a very insecure style and contain numerous potential and several proven security vulnerabilities. A malicious server which is visited by a user with the lynx browser can exploit the browser security holes in order to execute arbitrary code as the local user. The Lynx development team conducted an audit of the source code, and have corrected the known vulnerabilities in lynx. As of lynx-2.8.3pre.5, we consider it safe enough to use again.

tags | arbitrary, local, vulnerability
systems | freebsd
SHA-256 | 2a92410e2c400253c2509ab21b18153feab913a2c915ded15e727eccdab16a13
FreeBSD Security Advisory 2000.15
Posted Apr 25, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:15 - The imap-uw port supplies a "libc-client" library which provides various functionality common to mail servers. The algorithm used for locking of mailbox files contains a weakness which allows an unprivileged local user to lock an arbitrary local mailbox.

tags | arbitrary, local, imap
systems | freebsd
SHA-256 | e886c572dda7f30f968164db8223b60f93ec3a3a62c1ffa925d1c397304210bc
FreeBSD Security Advisory 2000.14
Posted Apr 25, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:14 - imap-uw contains security vulnerabilities for "closed" mail servers. There are numerous buffer overflows available to an imap user after they have successfully logged into their mail account. Thus, the vulnerability is only relevant on a "closed" mail server, i.e. one which does not normally allow interactive logins by mail users.

tags | overflow, vulnerability, imap
systems | freebsd
SHA-256 | 6fda2e7d9e5a79ccc9fa6a78c1894f185013d87e58d37237a89d82bc3c09dca2
FreeBSD Security Advisory 2000.13
Posted Apr 19, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:13 - generic-nqs v3.50.7 and earlier from the ports connection contains a local root compromise.

tags | local, root
systems | freebsd
SHA-256 | ef2592b6ee1f85613b4697dc9647ef182edb76c9b0b50c536c2611807caf36cc
FreeBSD Security Advisory 2000.12
Posted Apr 11, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory - healthd allows a local root compromise. healthd v0.3 installs a utility which is setuid root in order to monitor the system status. This utility contains a trivial buffer overflow which allows an unprivileged local user to obtain root privileges on the system. healthd is part of the freebsd ports collection.

tags | overflow, local, root
systems | freebsd
SHA-256 | 4f5be229484c65d7c49f8225b7b74307cfe1d849795c078158155c12990724f9
FreeBSD Security Advisory 2000.11
Posted Apr 11, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory - ircII port contains a remote overflow. ircII version 4.4 distributed with freebsd contained a remotely-exploitable buffer overflow in the /DCC CHAT command which allows remote users to execute arbitrary code as the client user.

tags | remote, overflow, arbitrary
systems | freebsd
SHA-256 | 3a268e8ea1fac6ad5e28d4025657105fbf8a8193d83f84cc0c60a9aad1ccb416
FreeBSD_DoS.txt
Posted Sep 28, 1999

FreeBSD vfs_cache.c in version 3.0 and later is vulnerable to a denial of service attack as there is no way to purge entries from the cache.

tags | exploit, denial of service
systems | freebsd
SHA-256 | bd076457f63ba433e668902ae2abeed4b04f14b8d13e7b4cff6f2455d620f582
freebsd_DoS.txt
Posted Sep 22, 1999

FreeBSD local denial of service exploit

tags | exploit, denial of service, local
systems | freebsd
SHA-256 | 518c1b82076c16c71768eec77d25455eb48b142d96c19adf98c77c77a568ae77
freebsd_root_exploit.txt
Posted Sep 22, 1999

Free BSD local root exploit for fts_print()

tags | exploit, local, root
systems | bsd
SHA-256 | d9dedbdfe9f077a02f4574df57f8decc78b9ee47fb26f8e54554808cb8b04b5d
FreeBSD_FTP_port_holes.txt
Posted Sep 19, 1999

Three ftpd ports vulnerable to attack that could lead to remote root access

tags | exploit, remote, root
SHA-256 | e6b71558d5c4b5ed46b02913bf4d63388aa44d0fc24cab8f3a450dd6a8f87237
freebsd-mbuf-crash.c
Posted Aug 17, 1999

Exploit code that occasionally crashes FreeBSD; exploits tcp/ip flaw with bof.

tags | exploit, tcp
systems | freebsd
SHA-256 | 33476ecadd045d9953d5f7696cf9a509e56d2656b074b6bcb399c00cf3c9b48b
Page 4 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close