exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Brett Gervasoni

Email addressbrett.gervasoni at gmail.com
First Active2008-11-25
Last Active2024-08-31
Apache mod_isapi Dangling Pointer
Posted Aug 31, 2024
Authored by Brett Gervasoni, jduck | Site metasploit.com

This Metasploit module triggers a use-after-free vulnerability in the Apache Software Foundation mod_isapi extension for versions 2.2.14 and earlier. In order to reach the vulnerable code, the target server must have an ISAPI module installed and configured. By making a request that terminates abnormally (either an aborted TCP connection or an unsatisfied chunked request), mod_isapi will unload the ISAPI extension. Later, if another request comes for that ISAPI module, previously obtained pointers will be used resulting in an access violation or potentially arbitrary code execution. Although arbitrary code execution is theoretically possible, a real-world method of invoking this consequence has not been proven. In order to do so, one would need to find a situation where a particular ISAPI module loads at an image base address that can be re-allocated by a remote attacker. Limited success was encountered using two separate ISAPI modules. In this scenario, a second ISAPI module was loaded into the same memory area as the previously unloaded module.

tags | exploit, remote, arbitrary, tcp, code execution
advisories | CVE-2010-0425
SHA-256 | e04d3b9c9de28cf065800495f9d457177003f542be9c1a8e7109f19ae6fb7ca1
Adobe Reader 9.3.4 Multiple Memory Corruption Issues
Posted Oct 8, 2010
Authored by Brett Gervasoni | Site senseofsecurity.com.au

Adobe Reader version 9.3.4 is vulnerable to multiple memory corruption vulnerabilities. By sending specially crafted PDF files it is possible to cause memory corruption in the 3difr and AcroRd32.dll modules. Both issues trigger a null pointer condition which results in an access violation. The issue in AcroRd32.dll is triggered when Adobe Reader is closed.

tags | advisory, vulnerability
advisories | CVE-2010-3630
SHA-256 | 8cc088f240fc45c266a250afb545cea36a5bbe247a4e721a59aa2a79ae7d9a37
Write-To-File Shellcode
Posted Jul 9, 2010
Authored by Brett Gervasoni | Site senseofsecurity.com.au

278 bytes small write-to-file shellcode that writes the word pwned to a text file titled f.txt in the current working directory.

tags | shellcode
SHA-256 | fb57669413ae8633c51d2bf538c0ed15eb323bac6e59fe689cabe6326fd2b66a
Apache 2.2.14 mod_isapi Remote SYSTEM Exploit
Posted Mar 6, 2010
Authored by Brett Gervasoni | Site senseofsecurity.com.au

Apache version 2.2.14 mod_isapi remote SYSTEM exploit. Due to the nature of the vulnerability, and exploitation method, DEP should be limited to essential Windows programs and services. At worst, if DEP is enabled for the Apache process, you could cause a constant DoS by looping this (since apache will automatically restart).

tags | exploit, remote
systems | windows
advisories | CVE-2010-0425
SHA-256 | c783414f79f43dcae00ce4cd44e85c324652565b650c7c405e711ebdd5c30075
Apache 2.2.14 mod_isapi Dangling Pointer
Posted Mar 6, 2010
Authored by Brett Gervasoni | Site senseofsecurity.com.au

By sending a specially crafted request followed by a reset packet it is possible to trigger a vulnerability in Apache 2.2.14 mod_isapi that will unload the target ISAPI module from memory. However function pointers still remain in memory and are called when published ISAPI functions are referenced. This results in a dangling pointer vulnerability. Successful exploitation results in the execution of arbitrary code with SYSTEM privileges.

tags | advisory, arbitrary
advisories | CVE-2010-0425
SHA-256 | 90f73578fb832e46f16d36335ab9911e89d608d85ddf6502b6fd7c3f8e006935
TheGreenBow VPN Client Local Stack Overflow
Posted Jan 22, 2010
Authored by Brett Gervasoni | Site senseofsecurity.com.au

TheGreenBow VPN Client is vulnerable to a local stack based buffer overflow which can lead to the compromise of a vulnerable system. The vulnerability is caused due to a boundary error when processing certain sections of tgb (policy) files. Passing an overly long string to "OpenScriptAfterUp" will trigger the overflow. Successful exploitation results in the execution of arbitrary code.

tags | advisory, overflow, arbitrary, local
SHA-256 | 1ffec12a678c5b206a9f84012a31ba855c8fdf3a743bd8d5c1d652387ca0644c
A5.1.zip
Posted Nov 25, 2008
Authored by Brett Gervasoni

An implementation of the A5/1 cipher written in C#. A5/1 is the current encryption cipher used in Telstra GSM phones.

tags | encryption
SHA-256 | d37e849ea29aaedf216357024b5e10bbb8b8f3c612ad613fb974907be687a51c
a51-php.txt
Posted Nov 25, 2008
Authored by Brett Gervasoni

An implementation of the A5/1 cipher written in PHP. A5/1 is the current encryption cipher used in Telstra GSM phones.

tags | encryption, php
SHA-256 | cadba26324b0e9e4f121129c2086166c670cbe02cdd5d75890fa68d5a1f16653
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close