exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-06-02

tacacs.analysis.txt
Posted Jun 2, 2000
Authored by Solar Designer | Site openwall.com

This advisory presents an analysis of several vulnerabilities in the TACACS+ protocol. Unfortunately, only some of the vulnerabilities can be fixed without breaking the interoperability. Thus, the main purpose of this advisory is to identify the weaknesses, to allow for a conscious decision to be made on how much trust to place into the encryption offered by TACACS+.

tags | paper, vulnerability, protocol
SHA-256 | 072ddc2bf221d5c240f48441f527c417d20180f2dd0752f271db6be05c4d6be2
DST2K0003.txt
Posted Jun 2, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0003 - Buffer Overrun in NAI WebShield SMTP v4.5.44 Management Tool for Microsoft Windows NT v4.0 Server (SP6). Any user who can connect to tcp port 9999 can obtain a copy of the configuration. Secondly, if you pass an oversized buffer of 208 bytes or more within one of the configuration parameters the service will crash overwriting the stack but and the EIP with what ever was passed within the parameter.

tags | exploit, overflow, tcp
systems | windows
SHA-256 | 5230eece683fd72a6c2495b32df00a21a3efe154506ea65502fe723b503ba75a
DST2K0007.txt
Posted Jun 2, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0007 - Buffer Overrun in ITHouse Mail Server v1.04 for Microsoft Windows NT v4.0 Workstation (SP6). Sending an email via SMTP to an IT House Mail Server with a recipient's name in excess of 2270 bytes causes the IT House Mail Server to buffer overrun overwriting the EIP, allowing an attacker to execute arbitrary code on the the server.

tags | exploit, overflow, arbitrary
systems | windows
SHA-256 | 04158d4a5fa3738aa4bbf98b226f6ad9e374d75fe9a62e42b5df8f4909473a59
DST2K0008.txt
Posted Jun 2, 2000
Authored by Delphis Security Team | Site delphisplc.com

Delphis Consulting Plc Security Team Advisory DST2K0008 - Buffer Overrun in Sambar Server 4.3 (Production). By using the default finger script shipped with Sambar server it is possible to cause an Buffer overrun in sambar.dll overwriting the EIP allowing the execution of arbitry code.

tags | exploit, overflow
SHA-256 | 05b6dfa2ec29e75514de7fa8cbc730fb79c63434ccf49ad1b6c49e7cedffd1cb
xterm-dos.c
Posted Jun 2, 2000
Authored by Kit Knox | Site rootshell.com

xterm denial of service attack - By sending the VT control characters to resize a window it is possible to cause an xterm to crash and in some cases consume all available memory. This is a problem because remote users can inject these control characters into your xterm in many different ways. This sample exploit injects these control characters into a web get request. If an admin were to cat this log file, or happened to be doing a "tail -f access_log" at the time of attack they would find their xterm crashed. Tested against rxvt v2.6.1 and xterm (XFree86 3.3.3.1b(88b).

tags | exploit, remote, web, denial of service
SHA-256 | e795174a235a3f5459e6a457c90c55832ca2987bccf1247db19929754e389a0e
msbd-dos.c
Posted Jun 2, 2000
Authored by Kit Knox | Site rootshell.com

Windows Media Encoder 4.0 and 4.1 is vulnerable to a remote denial of service attack. This source causes the Windows Media Encoder to crash with a "Runtime Error". Tested on version 4.1.0.3920. This is the vulnerability described in ms00-038.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 2ed47a5509b2f1b80d55fd6418bff28abd5d3f4d1ccef95b325aedc8176ceead
sara-3.1.0.tar.gz
Posted Jun 2, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Included SARAPRO report writer into SARA, provided report writer to SATAN and SAINT users, added SANS-10 top vulnerability filter to report writer, corrected tutorial problem with pcanywhere and kerberos, and fixed man page to include the "-n" option.
tags | tool, cgi, scanner
systems | unix
SHA-256 | b9e878d60975e8423fe2f6fd111af65627f5ad6761a8ae20153c699859a24004
tcpdump2ascii.tar.gz
Posted Jun 2, 2000
Authored by Codex | Site bogus.net

Tcpdump2ascii version 2.10 - Takes the hexadecimal output from tcpdump(8) and produces the ASCII equivalent side by side.

Changes: A bugfix in -snoop code, new and untested options.
tags | tool, sniffer
SHA-256 | c06763c61879d769de62d6811f0ed8d7e74faf1172022eda699969c8ea307ca1
motion-0.5.tar.gz
Posted Jun 2, 2000
Authored by Jeroen Vreeken | Site motion.technolust.cx

motion uses a video4linux device as a motion detector. It will make snapshots of the movement it sees, making it usable as an observation or security system. It can send out email, SMS messages, or invoke an external command when detecting motion.

Changes: Added intra-red script, Option to always output changes between images, Overall cleanup, Added -E option for executing external commands when motion is detected.
systems | linux
SHA-256 | 55bad078b3619a9594e28d0cfdb8e3dbf579327d1876a270f6e8daa9a669a3ec
labs43.txt
Posted Jun 2, 2000
Site ussrback.com

USSR Advisory #43 - Remote dos attack against Real Networks Real Server version 7, 7.01, and G2 1.0. Sending malformed packets to the RealServer HTTP port (default 8080) will cause the service to stop responding. Exploit URL included. Affects Windoows NT/2000, Solaris 2.x, Linux, Irix, Unixware, and FreeBSD.

tags | remote, web
systems | linux, solaris, freebsd, irix, unixware
SHA-256 | fb3235de31d91f9fe6c72377f127e585ee0a820398fcdfdb7ff9898b18eeb010
mdbms-exp.c
Posted Jun 2, 2000
Authored by Diab

MDBMS v0.99b5 remote root exploit - tested on Redhat 6.0. Shellcode runs an interactive shell on port 30464.

tags | exploit, remote, shell, root, shellcode
systems | linux, redhat
SHA-256 | a37ea7852b725a2b014dd84e51b418b4f973791e412512e52b44f2d86f61fd6c
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close