what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-09-08

expl395.c
Posted Sep 8, 2000
Authored by IhaQueR

Screen 3.9.5 and below local root exploit for Linux. Tested against SuSE 6.1.

tags | exploit, local, root
systems | linux, suse
SHA-256 | b32cf02872905afa005ea30d36475fca569d44e349e023f5c0478a9e94373d11
glibc-language.c
Posted Sep 8, 2000
Authored by Z33d

GLIBC 2.1 language local root exploit. Includes bypassing Solar Designer Stack Patch. Tested against Debian 2.1/2.2, exploits Glibc and /usr/bin/msgfmt.

tags | exploit, local, root
systems | linux, debian
SHA-256 | 7595e563137275d49fd68534ecc6196a233a1a24803e1370fc47ba2aae3be20c
suse.apache.txt
Posted Sep 8, 2000
Site suse.de

SuSE Security Advisory - The default package selection in SuSE distributions includes apache. The configuration file that comes with the package allows remote users to read the cgi script sources of the server, and webDAV is installed by default with no access control or authentification activated.

tags | remote, cgi
systems | linux, suse
SHA-256 | f92847ba2aff6bdbefd20587d7b2ffb12c18a8eeec48d3170b3b886b024544ad
rhsa.2000-057-04.glibc
Posted Sep 8, 2000
Site redhat.com

Red Hat Security Advisory - Several bugs were discovered in glibc which could allow local users to gain root privileges. The dynamic linker ld.so uses several environment variables like LD_PRELOAD and LD_LIBRARY_PATH to load additional libraries or modify the library search path. It is unsafe to accept arbitrary user specified values of these variables when executing setuid applications, so ld.so handles them specially in setuid programs and also removes them from the environment.

tags | arbitrary, local, root
systems | linux, redhat
SHA-256 | c56e6a68d94a860ba61c14d5115dfc7beb33462dc20aa809eefbc8eac9ed1a58
Gopher2.3.1p0.c
Posted Sep 8, 2000
Authored by vade79, realhalo | Site realhalo.org

Gopher2.3.1p0 and below has many overflowable functions in the daemon. Most of them overflow with hardcoded data that gets passed along - making it not possible to change any pointers. The "halidate" function contains an exploitable buffer overflow - exploit code for linux included. Note: This is not related to the other vulnerability, authenticate.c, which has since been patched in 2.3.1p0. 2.3.1p0 is vulnerable to this.

tags | exploit, overflow
systems | linux
SHA-256 | c9a967732b2e2119e924d33a9e324290a5f84f712275f52f3cd713c43b128f87
0008-exploits.tgz
Posted Sep 8, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for August, 2000.

tags | exploit
SHA-256 | 718ee7d2e3df69fb7f87a6ba8e72c51df427674f5b91539e482479e963c37ccb
helixcode.gnome.txt
Posted Sep 8, 2000
Site helixcode.com

Helix Code Security Advisory - A vulnerability in Helix GNOME Update allow non-root users to exploit world-writable permissions on /tmp, permitting arbitrarily modified RPM packages to be installed on the system.

tags | root
SHA-256 | aeded11ecc986717940f3ea17245867e224b82196708139d8658b18fa93b426f
motion-2.0.tar.gz
Posted Sep 8, 2000
Authored by Jeroen Vreeken | Site motion.technolust.cx

motion uses a video4linux device as a motion detector. It will make snapshots of the movement it sees, making it usable as an observation or security system. It can send out email, SMS messages, or invoke an external command when detecting motion.

Changes: New stable release! Integrated motion tracking, Improved lightswitch detection, and fixed support for quickcams.
systems | linux
SHA-256 | 430c6a7f743f91dd5a74fc44554634c0d0da5cfa5ebe61a40f41f38bdaf257bb
killbnc.c
Posted Sep 8, 2000
Authored by vade79, realhalo | Site realhalo.org

BNC 2.6.4 remote denial of service exploit. Causes all users who are connected to IRC by BNC by exhausting the resources of the BNC server.

tags | exploit, remote, denial of service
SHA-256 | 2b404efc7917d8d05e17566fbbda6f862e58ad17893ed5aac38f790bba57dbeb
linux-advisory.1-19a.txt
Posted Sep 8, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Advisory Watch for September 8th, 2000. Linux Advisory Watch is a comprehensive newsletter that outlines the security vulnerabilities that have been announced throughout the week. It includes pointers to updated packages and descriptions of each vulnerability. This week, advisories were released for glibc, screen, apache, and suidperl from Caldera, Conectiva, Debian, Mandrake, Slackware, SuSE, and Trustix.

tags | vulnerability
systems | linux, suse, slackware, debian, mandrake
SHA-256 | 58e4fa5accfb242abf0994a96a96bd8ca1fa2451c8d22c4f82165eca1089d646
crucialADS.zip
Posted Sep 8, 2000
Authored by Crucial Security | Site crucialsecurity.com

CrucialADS v1.0 is a GUI based Alternate Data Stream scanning tool. Crucial ADS is designed to quickly and easily detect the presence of Alternate Data Streams in NTFS files and directories. NTFS files contain one primary stream, and, optionally, one or more alternate data streams. The problem is that NT comes with no utilities that list any stream other than the primary stream in a file. When viewing a directory with explorer, or using the dir command in cmd.exe, the information reported pertains to the primary stream only.

SHA-256 | fcb5d7578d65029d6c0752c560951947acc45e678f0c390ee0e80a008283f550
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close