what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from FlashSky

Email addressflashsky at xfocus.org
First Active2003-07-28
Last Active2005-06-24
eEye.vidplin.txt
Posted Jun 24, 2005
Authored by FlashSky | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in RealPlayer. The vulnerability allows a remote attacker to reliably overwrite heap memory with arbitrary data and execute arbitrary code in the context of the user who executed the player. This specific flaw exists within the vidplin.dll file used by RealPlayer. By specially crafting a malformed .avi movie file, a direct heap overwrite is triggered, and reliable code execution is then possible. This vulnerability can be trigger when a user views a webpage, or opens an .avi file via email, instant messenger, or other common file transfer programs.

tags | advisory, remote, arbitrary, code execution
SHA-256 | 847a8e37f9bd046455e0c8e37d152a9ed8be41d8c966b8aced5ac3d1b07ef988
Venustech AD-Lab Advisory 2004.5
Posted Dec 31, 2004
Authored by FlashSky, Bejing Venustech

Venustech AD-Lab Advisory AD_LAB-04005 - Parsing a specially crafted ANI file causes the windows kernel to crash or stop to work properly. An attacker can crash or freeze a target system if he sends a specially crafted ANI file within an HTML page or within an Email. Vulnerable: Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003.

tags | advisory, kernel
systems | windows
SHA-256 | a4b61c9f9acb50b67f793629552a1104d23cf0c1bf9143acaaeb455b74faf2df
Venustech AD-Lab Advisory 2004.4
Posted Dec 31, 2004
Authored by FlashSky, Bejing Venustech

Venustech AD-Lab Advisory AD_LAB-04004 - An exploitable integer buffer overflow exists in the LoadImage API of the USER32 Lib. This function loads an icon, a cursor or a bitmap and then try to proceed the image. If an attacker sends a specially crafter bmp, cur, ico or ani file within an HTML page or in an Email, it is then possible to run arbitrary code on the affected system. Vulnerable: Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003.

tags | advisory, overflow, arbitrary
systems | windows
SHA-256 | c0a680adceb00e2746611c146dcfe6d92f290f0d6de2753e6424fdc90cb0746e
ASNflashsky.txt
Posted Feb 21, 2004
Authored by FlashSky | Site xfocus.org

Detailed analysis on how the MS ASN library has stack overflows as well as integer overflows.

tags | advisory, overflow
SHA-256 | 8137f224477e7ea1c4b1106a733fe24279c482a6489a01cf4789e7f6d4c93c28
rpcHeap.txt
Posted Sep 21, 2003
Authored by FlashSky | Site xfocus.net

A detailed analysis and exploitation of the RPC Long Filename heap overflow found in the CoGetInstanceFromFile API that was originally discovered by NSFOCUS.

tags | exploit, overflow
SHA-256 | 4620d24fc5b0277f481e241862c7c21d92522cc493f4613d81f9170a54cff666
dcomsploit.tgz
Posted Jul 29, 2003
Authored by FlashSky, Benjurry

DCOM remote exploit utilizing the issue discussed here. Covers Microsoft Windows NT SP6/6a (cn), as well as Windows 2000 SP0-4 (cn) SP0-2 (jp) SP0-2,4 (kr) SP0-1 (mx) SP3-4 (Big 5) SP0-4 (english) SP0 Server (english), and Windows XP SP0-1 (english) SP1 (cn) SP0-1 (Big 5). Modified by sbaa.

tags | exploit, remote
systems | windows
SHA-256 | ce4477817dd7877597f0f89a169f5f8a3cfa8f3f08363bbd31bcf7bbc15209b8
benjurry.txt
Posted Jul 28, 2003
Authored by FlashSky, Benjurry | Site xfocus.org

Thorough analysis of the buffer overrun in the Windows RPC interface that was discovered by the Last Stage of Delirium. Exploit included for Windows 2000 SP4 Chinese version.

tags | exploit, overflow
systems | windows
SHA-256 | 6a46de63d03e6910e4235d4653d7f7572b05b83813037adebbcf6a580f52cbe1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close