exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 73 RSS Feed

Files Date: 2006-05-06 to 2006-05-07

Monografia_Rodrigo.pdf
Posted May 6, 2006
Authored by Rodrigo Rubira Branco | Site bsdaemon.org

Whitepaper discussing intrusion detection system evasion. It specifically focuses on polymorphic attacks using scmorphism. This document is written in Brazilian Portuguese.

tags | paper
SHA-256 | 4c01788c64835335cd4d03cfe30a9b30ba0acb96462888063ab547453608b1d0
BigwebmasterXSS.txt
Posted May 6, 2006
Authored by DrFrancky | Site securitydot.net

Bigwebmaster Guestbook versions 1.0.2 and below suffer from cross site scripting flaws.

tags | exploit, xss
SHA-256 | c9cca4c093f598a1257dd03cc910c0d0601370b28c6f1f9e9f5274df891f8e53
CuteGuestbook.txt
Posted May 6, 2006
Authored by Omnipresent

CuteGuestbook is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 02b73543425bd93a8ea0cef739a024abdf91289a44c374148431fbf3f71ed1b5
042006-001-ISA-LM.txt
Posted May 6, 2006
Authored by Noam Rathaus | Site beyondsecurity.com

There is a log manipulation vulnerability in Microsoft ISA Server 2004, which when exploited will enable a malicious user to manipulate the Destination Host parameter of the log file.

tags | advisory
SHA-256 | 180e0b54cd958067ade383676e274a12124bedb9b441eba0612cd5038901f83a
loveyouBypass.txt
Posted May 6, 2006
Authored by Joxean Koret

It appears that Panda Antivirus and ClamAV may be susceptible to bypass for the "I Love You" virus when a simple variable is changed.

tags | advisory, virus
SHA-256 | 2af94d1600d05886722bf0eeb3dad39133549907d1afe1b06819c4fa835cf1f6
Ubuntu Security Notice 280-1
Posted May 6, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 280-1 - The Render extension of the X.org server incorrectly calculated the size of a memory buffer, which led to a buffer overflow. A local attacker could exploit this to crash the X server or even execute arbitrary code with root privileges.

tags | advisory, overflow, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2006-1526
SHA-256 | 4252ccbc2fa1be87bfa9830eeceead304eb917d6bbb3ed937fbe535b1568bf57
Ubuntu Security Notice 281-1
Posted May 6, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 281-1 - Multiple vulnerabilities have been discovered in the Linux 2.6 kernel. The sys_mbind() function did not properly verify the validity of the 'maxnod' argument. A local user could exploit this to trigger a buffer overflow, which caused a kernel crash. The SELinux module did not correctly handle the tracer SID when a process was already being traced. A local attacker could exploit this to cause a kernel crash. Al Viro discovered a local Denial of Service in the sysfs write buffer handling. By writing a block wit h a length exactly equal to the processor's page size to any writable file in /sys, a local attacker could cause a kernel crash. John Blackwood discovered a race condition with single-step debugging multiple processes at the same time. A local attacker could exploit this to crash the system. This only affects the amd64 platform. Marco Ivaldi discovered a flaw in the handling of the ID number of IP packets. This number was incremented after receiving unsolicited TCP SYN-ACK packets. A remote attacker could exploit this to conduct port scans with the 'Idle scan' method (nmap -sI), which bypassed intended port scan protections. Pavel Kankovsky discovered that the getsockopt() function, when called with an SO_ORIGINAL_DST argument, does not properly clear the returned structure, so that a random piece of kernel memory is exposed to the user. This could potentially reveal sensitive data like passwords or encryption keys. A buffer overflow was discovered in the USB Gadget RNDIS implementation. While creating a reply message, the driver did not allocate enough memory for the reply structure. A remote attacker could exploit this to cause a kernel crash. Alexandra Kossovsky discovered an invalid memory access in the ip_route_input() function. By using the 'ip' command in a particular way to retrieve multicast routes, a local attacker could exploit this to crash the kernel.

tags | advisory, remote, denial of service, overflow, kernel, local, tcp, vulnerability
systems | linux, ubuntu
advisories | CVE-2006-0557, CVE-2006-1052, CVE-2006-1055, CVE-2006-1066, CVE-2006-1242, CVE-2006-1343, CVE-2006-1368, CVE-2006-1525
SHA-256 | f07cfa72c65837f67fad1ccb0fdf321f1e3761c7e3af1e3608d6513ebf5ee200
Debian Linux Security Advisory 1051-1
Posted May 6, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1051-1 - Several security related problems have been discovered in Mozilla Thunderbird. This advisory addresses those issues.

tags | advisory
systems | linux, debian
advisories | CVE-2005-2353, CVE-2005-4134, CVE-2006-0292, CVE-2006-0293, CVE-2006-0296, CVE-2006-0748, CVE-2006-0749, CVE-2006-0884, CVE-2006-1045, CVE-2006-1529, CVE-2006-1530, CVE-2006-1531, CVE-2006-1723, CVE-2006-1724, CVE-2006-1727, CVE-2006-1728, CVE-2006-1729, CVE-2006-1730
SHA-256 | 232c1e59451ba03dd106421d74bb4f3f9811b16a64b7cd1f747ecb410bee5574
AlbinatorPro208.txt
Posted May 6, 2006
Site xorcrew.net

Albinator Pro versions 2.0.8 and below suffer from a remote command execution vulnerability. Exploit included.

tags | exploit, remote
SHA-256 | 7dc4733b402c6a4ad4bc2eb3761a00dae2cb10f8fd266a865534865bb5fc43de
REWTERZ-20060504.txt
Posted May 6, 2006
Authored by Muhammad Ahmed Siddiqui

rewterz has discovered a critical vulnerability in Sami FTP Server. This vulnerability may allow a remote attacker to overwrite memory with user controlled data and execute arbitrary code in the context of the user who executed the Sami FTP Server.

tags | advisory, remote, arbitrary
SHA-256 | 3a0cbc4bddf22efd49018ca85646aa9e1bf187168c0b13735ff7fac3d0d85ff6
REWTERZ-20060503.txt
Posted May 6, 2006
Authored by Muhammad Ahmed Siddiqui

rewterz has discovered a critical vulnerability in XM Easy Personal FTP Server. This vulnerability may allow a remote attacker to overwrite memory with user controlled data and execute arbitrary code in the context of the user who executed the XM Easy Personal FTP Server.

tags | advisory, remote, arbitrary
SHA-256 | 77d331b4b7937322930da713b75459d0ce4f65cf43c0e3ae5ddf857cb1568703
Mandriva Linux Security Advisory 2006.082
Posted May 6, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-082 - Several bugs were discovered in libtiff that can lead to remote Denial of Service attacks. These bugs can only be triggered by a user using an application that uses libtiff to process malformed TIFF images.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2006-2024, CVE-2006-2025, CVE-2006-2026, CVE-2006-2120
SHA-256 | 38743c1428f91d9aad98232a65e3557b789b0391414f626ed5d12a340f17cfb7
openvpn207.txt
Posted May 6, 2006
Authored by c0redump

OpenVPN version 2.0.7 allows for full authentication bypass due to having an administrative interface wide open via telnetd.

tags | exploit
SHA-256 | 8fbdbc9c629ac63b345361fbdd8e3b97d91dec821bcfe5b9dcccf16c1f6162e3
Ubuntu Security Notice 279-1
Posted May 6, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 279-1 - Jayesh KS discovered that the nasl_split() function in the NASL (Nessus Attack Scripting Language) library did not check for a zero-length separator argument, which lead to an invalid memory allocation. This library is primarily used in the Nessus security scanner; a remote attacker could exploit this vulnerability to cause the Nessus daemon to crash.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2006-2093
SHA-256 | 82f35fda1138e8ecebf21b1f0ac12d01b4fd5e721f8ad6382c3d5164747790e0
Ubuntu Security Notice 278-1
Posted May 6, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 278-1 - Marcus Meissner discovered a race condition in gdm's handling of the ~/.ICEauthority file permissions. A local attacker could exploit this to become the owner of an arbitrary file in the system. When getting control over automatically executed scripts (like cron jobs), the attacker could eventually leverage this flaw to execute arbitrary commands with root privileges.

tags | advisory, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2006-1057
SHA-256 | c94bf3a790de59e2145a73f203ef5ec6fe3fcd4cadef4be4005bd2f47cf19336
punBB1211.txt
Posted May 6, 2006
Authored by D3vil-0x1

PunBB version 1.2.11 suffers from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | a8c8a719646c3bd65c34c6d9fe39c1959af50f181fc3f8b9280c9ff5a82c32c0
Debian Linux Security Advisory 1050-1
Posted May 6, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1050-1 - Ulf Harnhammar and an anonymous researcher from Germany discovered a vulnerability in the protocol code of freshclam, a command line utility responsible for downloading and installing virus signature updates for ClamAV, the antivirus scanner for Unix. This could lead to a denial of service or potentially the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, protocol, virus
systems | linux, unix, debian
advisories | CVE-2006-1989
SHA-256 | 9c4b762a70dff5cd5f6f80156cada5f3fe6b372dc0ebb9ad419336a64f893088
Ubuntu Security Notice 277-1
Posted May 6, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 277-1 - Tavis Ormandy and Andrey Kiselev discovered that libtiff did not sufficiently verify the validity of TIFF files. By tricking an user into opening a specially crafted TIFF file with any application that uses libtiff, an attacker could exploit this to crash the application or even execute arbitrary code with the application's privileges.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2006-2024, CVE-2006-2025, CVE-2006-2026, CVE-2006-2120
SHA-256 | ba4e453f24970b3973ae9d131096186a83cba08cbb8ffdaef37aaeeff2993f3a
SUSE-SA-2006-023.txt
Posted May 6, 2006
Site suse.com

SUSE Security Announcement SUSE-SA-2006-023 - Miscalculation of a buffer size in the X Render extension of the X.Org X11 server could potentially be exploited by users to cause a buffer overflow and run code with elevated privileges.

tags | advisory, overflow
systems | linux, suse
advisories | CVE-2006-1526
SHA-256 | 52d90b0b78168a60644274e0a3f413c07be58b05e633809e2a7b89236c5a4fc1
banktown.txt
Posted May 6, 2006
Authored by Gyu Tae Park

BankTown Client Control 1,4,2,51817 suffers from a buffer overflow related to ActiveX.

tags | advisory, overflow, activex
SHA-256 | b11b763682cb2694a7443738ac43746545cc4dbf1b10f7f0ffdb6bd762eb3807
Ubuntu Security Notice 276-1
Posted May 6, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 276-1 - A large number of mozilla-thunderbird related vulnerabilities have been patched for Ubuntu.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2006-0292, CVE-2006-0296, CVE-2006-0748, CVE-2006-0749, CVE-2006-0884, CVE-2006-1045, CVE-2006-1727, CVE-2006-1728, CVE-2006-1730, CVE-2006-1731, CVE-2006-1732, CVE-2006-1733, CVE-2006-1734, CVE-2006-1735, CVE-2006-1737, CVE-2006-1738, CVE-2006-1739, CVE-2006-1741
SHA-256 | 0d54d1afd2d2c09f93f209b3493047c92cd797d04fd014a8b876c31b3209fcbe
AGR-ADV-2006-01.txt
Posted May 6, 2006
Authored by Deon Force | Site asia-global-risk.com

A vulnerability exists in the way Ultr@VNC-1.0.1 handles MS-Login authentication.

tags | advisory
SHA-256 | e0a05d0fd6fb9c3497fadef1e2eaa09b466ae41c374bb1b1d791932fbb29e84f
dynamicPHP.txt
Posted May 6, 2006
Authored by Steven M. Christey

Small write-up discussing dynamic evaluation vulnerabilities in PHP applications.

tags | paper, php, vulnerability
SHA-256 | a217e9eefc906363f69f40b0accf98bbda961516dbf227b93297f62febc5822a
quagga-inject.txt
Posted May 6, 2006
Authored by Konstantin V. Gavrilenko | Site arhont.com

Quagga RIPD suffers from an unauthenticated route injection issue. Verified on Quagga Suites 0.98.5 and 0.99.3.

tags | advisory
SHA-256 | 32e8e4251d1b775980f3db64774374e5e04bb624043d2dba0af30a0de55e3369
quagga-broadcast.txt
Posted May 6, 2006
Authored by Konstantin V. Gavrilenko | Site arhont.com

Quagga RIPD suffers from an unauthenticated route table broadcast issue. Verified on Quagga Suites 0.98.5 and 0.99.3.

tags | advisory
SHA-256 | c449513208a094287aa203473cbac6b648a2b8373c46461978e0b9894acac7e8
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close