Section:  .. / 0307-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 64
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0307-exploits.tgz
Description:
Packet Storm new exploits for July, 2003.
File Size:409322
Last Modified:Aug 13 03:46:07 2003
MD5 Checksum:547ce621a6d09bbcafdec2ffa67f4064

 ///  File Name: shadowchode.tar.gz
Description:
Remote exploit that will cause a denial of service against Cisco routers and switches.
Author:L0cK.
Related File:ciscoIPv4.txt
File Size:212019
Last Modified:Jul 18 20:59:59 2003
MD5 Checksum:be6bf5e146a17153190577d694cf26b6

 ///  File Name: sambash-release.c
Description:
Remote root exploit for samba 2.2.7a and below using reply_nttrans(). Written for the Linux x86 platform.
Author:flatline
File Size:25440
Last Modified:Jul 28 02:55:41 2003
MD5 Checksum:e79059d286adde4d8809a56206df5089

 ///  File Name: DComExpl_UnixWin32.zip
Description:
Windows port of the remote exploit utilizing the DCOM RPC overflow originally coded by H D Moore.
Author:Benjamin Lauzičre
File Size:18336
Last Modified:Jul 28 02:52:51 2003
MD5 Checksum:4dadfb9aafb1cdac05ab734453dcee88

 ///  File Name: benjurry.txt
Description:
Thorough analysis of the buffer overrun in the Windows RPC interface that was discovered by the Last Stage of Delirium. Exploit included for Windows 2000 SP4 Chinese version.
Author:Flashsky, Benjurry
Homepage:http://www.xfocus.org/documents/200307/2.html
Related File:lsdRPC.txt
File Size:17765
Last Modified:Jul 28 05:40:01 2003
MD5 Checksum:bcd9321ac5d7e4a8d74b197efe4a7e07

 ///  File Name: CLIVITT-2003-4-Citadel-exploit.c
Description:
Citadel/UX BBS version 6.07 remote exploit that yields a bindshell of the user id running the software.
Author:Carl Livitt
Related File:CLIVITT-2003-4-Citadel.txt
File Size:15789
Last Modified:Jul 18 01:31:00 2003
MD5 Checksum:99ae9b5f60fd6a0d523cb10d618886d9

 ///  File Name: dcom.c
Description:
Remote exploit utilizing the DCOM RPC overflow discovered by LSD. Includes targets for Windows 2000 and XP. Binds a shell on port 4444.
Author:H D Moore
Homepage:http://www.metasploit.com/
File Size:15014
Last Modified:Jul 28 02:51:24 2003
MD5 Checksum:a731771b1cd73887da81c33d2f48471f

 ///  File Name: CLIVITT-2003-5.txt
Description:
Apache 1.3.x using the mod_mylo module version 0.2.1 and below is vulnerable to a buffer overflow. The mod_mylo module is designed to log HTTP requests to a MySQL database and insufficient bounds checking in mylo_log() allows a remote attacker to gain full webserver uid access. Remote exploit for SuSE 8.1 Linux with Apache 1.3.27, RedHat 7.2/7.3 Linux with Apache 1.3.20, and FreeBSD 4.8 with Apache 1.3.27 included.
Author:Carl Livitt
File Size:14775
Last Modified:Jul 29 19:33:50 2003
MD5 Checksum:b6a0cd78d32dfe4d978f56c3436cdb69

 ///  File Name: msqlex.c
Description:
Remote exploit for miniSQL version 1.3 and below that achieves privilege escalation root gid.
Author:The Itch, lucipher
Homepage:http://www.netric.org/
File Size:14277
Last Modified:Jul 24 23:00:07 2003
MD5 Checksum:2fc4590154b857c4bf26fc805bb66099

 ///  File Name: NetScare.c
Description:
Remote buffer overflow denial of service exploit for the Netware Enterprise CGI2PERL.NLM.
Author:Knight420.
File Size:11683
Last Modified:Jul 24 22:56:42 2003
MD5 Checksum:c7063bffb5b954421951423f36a48c07

 ///  File Name: elf-reloc.c
Description:
A demonstration of ELF relocation.
Author:Soeren Bleikertz
Homepage:http://www.sac.cc
File Size:10869
Last Modified:Jul 29 02:06:36 2003
MD5 Checksum:d072fc2f8db2721c0971aa0ee90e4ab3

 ///  File Name: 0006_AP.CF-rds-dump.txt
Description:
The ColdFusion Server versions 4.5 and 5 suffer from multiple vulnerabilities. They range from the default RDS password being blank by default to allowing a normal remote user to reconfigure their website properties to put and get any file on the server.
Author:Victim1, rs2112
Homepage:http://www.angrypacket.com/
File Size:10825
Last Modified:Jul 6 07:24:34 2003
MD5 Checksum:c681b33a362511d647a01f9b46492542

 ///  File Name: wilco.zip
Description:
This tool make uses of the recent vulnerabilities discussed here regarding a broadcast buffer overflow and server freeze denial of service discovered in Roger Wilco.
Author:Auriemma Luigi
Homepage:http://www.pivx.com/luigi/
File Size:10220
Last Modified:Jul 4 19:09:03 2003
MD5 Checksum:0ce7866114009e152ce1905369898649

 ///  File Name: Yahoo-ducky.txt
Description:
Yahoo Messenger 5.5 and below suffers from a buffer overflow that was originally discovered and fixed in May of 2002, but has since resurfaced. Systems Affected: Windows NT/2000/SP1/SP2/SP3, Windows ME, Windows 95/98, Windows XP.
Author:Rave, Bob
Homepage:http://www.dtors.net/
File Size:10139
Last Modified:Jul 6 21:29:49 2003
MD5 Checksum:6f46595fb8f8c9ab9e7d127ab94b1f67

 ///  File Name: 0x333-lockdexvul.txt
Description:
lockdev 1.0.0 local exploit that escalates privileges to group lock. Tested against RedHat 7.3, 8.0, and 9.0.
Author:nic
Homepage:http://www.0x333.org
File Size:9705
Last Modified:Jul 29 20:14:21 2003
MD5 Checksum:f1abaa914fb3eae21371eee17e50e6ad

 ///  File Name: iglooftppro.zip
Description:
Proof of concept exploit for IglooFTP PRO 3.8 and possibly earlier versions. This package suffers from multiple client side vulnerabilities including the banner, username, password, and account SMTP parameters.
Author:Peter Winter-Smith
Related File:IglooFTPPRO.txt
File Size:9525
Last Modified:Jul 7 04:10:45 2003
MD5 Checksum:5d7cd2e211932330dac32ebc4fed8286

 ///  File Name: hlbof-server.zip
Description:
Half-Life server versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) remote exploit that will cause a denial of service.
Author:Auriemma Luigi
Homepage:http://www.pivx.com/luigi/
Related File:halflife.txt
File Size:8703
Last Modified:Jul 29 20:24:01 2003
MD5 Checksum:5936369be7bf61fd4c0c410f03526b21

 ///  File Name: hlbof-client.zip
Description:
Half-Life client versions 1.1.1.0 and below (including all MODs based on the game, such as Counter-Strike and DoD) remote exploit that will pose as a server that overwrites the stored return address but does not attempt any command execution.
Author:Auriemma Luigi
Homepage:http://www.pivx.com/luigi/
File Size:8268
Last Modified:Jul 29 20:38:34 2003
MD5 Checksum:47c81302e345d9a31e8cb8ee2dab615f

 ///  File Name: eXtreme.c
Description:
Linux eXtremail versions 1.5-8 and below remote root exploit that makes use of a format string vulnerability in its logging mechanism.
Author:B-r00t
Related File:eXtremail.txt
File Size:7734
Last Modified:Jul 7 03:49:04 2003
MD5 Checksum:60ecf98dc6615b43a41e3e95ec8abbbb

 ///  File Name: SCSA019.txt
Description:
Security Corporation Security Advisory [SCSA-019]: Gattaca Server 2003 version 1.0.8.1 and below is vulnerable to displaying of directory contents and files, a denial a service, a directory traversal attack, and cross site scripting.
Author:Gregory Le Bras
Homepage:http://www.Security-Corp.org
File Size:7603
Last Modified:Jul 11 21:43:28 2003
MD5 Checksum:7c03f7aa26c914d304e30bf9e23cd131

 ///  File Name: core.netmeeting.txt
Description:
Core Security Technologies Advisory ID: CORE-2003-0305-04 - Windows NetMeeting is vulnerable to a directory traversal attack that allows remote arbitrary code execution. Vulnerable version: NetMeeting 3.01 (4.4.3385), possibly others. Fixed in Service Pack 4.
Author:Hernán Ochoa, Gustavo Ajzenman, Javier Garcia Di Palma, Pablo Rubinstein
Homepage:http://www.coresecurity.com/
File Size:6522
Last Modified:Jul 4 20:29:25 2003
MD5 Checksum:b1953ba5b79dc97db6f6fc38c2531733

 ///  File Name: shatterSEH2.txt
Description:
Version two of this paper discussing more shatter attacks that are possible using SEH memory locations to escalate privileges in Windows. Exploit code included. Related information available here.
Author:Brett Moore
Homepage:http://www.security-assessment.com
File Size:6359
Last Modified:Jul 29 19:51:59 2003
MD5 Checksum:128b5b0cdea6aee5c389eaa7ac17b801

 ///  File Name: exceed.c
Description:
Hummingbird's Exceed X emulator mishandles fonts and is vulnerable to both remote and local denial of service attacks and may allow an attacker to remotely gain root privileges.
Author:c0ntex
File Size:6257
Last Modified:Jul 15 01:56:15 2003
MD5 Checksum:0b5ebb158eab213b26366e5f689ba41c

 ///  File Name: dcomsploit.tgz
Description:
DCOM remote exploit utilizing the issue discussed here. Covers Microsoft Windows NT SP6/6a (cn), as well as Windows 2000 SP0-4 (cn) SP0-2 (jp) SP0-2,4 (kr) SP0-1 (mx) SP3-4 (Big 5) SP0-4 (english) SP0 Server (english), and Windows XP SP0-1 (english) SP1 (cn) SP0-1 (Big 5). Modified by sbaa
Author:FlashSky, Benjurry
File Size:6126
Last Modified:Jul 29 20:07:02 2003
MD5 Checksum:330e19366c8d5664a7f2a55efc3a8e78

 ///  File Name: core.active.txt
Description:
Core Security Technologies Advisory ID: CORE-2003-0305-03 - The Microsoft Active Directory functionality is remotely and locally vulnerable to a stack overflow that allows an attacker to crash and force a reboot of any Windows 2000 server. Vulnerable package: Windows 2000 Server with Active Directory SP3. Fixed with Service Pack 4.
Author:Eduardo Arias, Gabriel Becedillas, Ricardo Quesada, Damian Saura
Homepage:http://www.coresecurity.com/
File Size:5744
Last Modified:Jul 4 19:16:01 2003
MD5 Checksum:9104d6686a8f0483995df11c58854fd3