Section:  .. / 0209-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 73
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 0209-exploits.tgz
Description:
Packet Storm new exploits for September, 2002.
File Size:4528261
Last Modified:Oct 10 02:57:49 2002
MD5 Checksum:d61e47de2cd35e4a4c6debc4aecef9d2

 ///  File Name: afd-expl.c
Description:
AFD v1.2.14 local root heap overflow exploit. Includes offset for Redhat 7.3 and instructions for finding offsets.
Author:eSDee
Homepage:http://www.netric.org
File Size:2205
Last Modified:Sep 6 06:33:42 2002
MD5 Checksum:f273a2abf33bbe40cc716f3cc0cc09a5

 ///  File Name: alsaplayer-suid.c
Description:
AlsaPlayer contains a buffer overflow that can be used for privileges elevation when this program is setuid. Tested on Red Hat 7.3 linux with alsaplayer-devel-0.99.71-1 . The overflow has been fixed in AlsaPlayer 0.99.71.
Author:zillion
File Size:2104
Last Modified:Sep 23 16:49:29 2002
MD5 Checksum:d3864c1d3454e61a8246fa4e1966ac8f

 ///  File Name: apache-linux.txt
Description:
Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.
Author:Nebunu
File Size:18138
Last Modified:Sep 19 08:39:21 2002
MD5 Checksum:6c13247823eb45dd5c16db33f5077072

 ///  File Name: apache-ssl-bug.c
Description:
This exploit abuses the KEY_ARG buffer overflow that exists in SSL enabled Apache web servers that are compiled with OpenSSL versions prior to 0.9.6e. The apache-ssl-bug.c exploit is based on the Slapper worm (bugtraq.c), which is based on a early version of the apache-open-ssl exploit.
Author:Andy.
File Size:19418
Last Modified:Sep 25 23:58:21 2002
MD5 Checksum:1be047c32ae0e2d1d8930d2ce4c4f7cc

 ///  File Name: apscan2.tgz
Description:
Apache OpenSSL v0.9.6d mass scanner. When a vulnerable server is found code is launched. Includes targets for Apache 1.3.6, 1.3.9, 1.3.12, 1.3.19, 1.3.20, 1.3.26, 1.3.23, and 1.3.14. Includes openssl-too-open binary.
Author:Nebunu
File Size:94609
Last Modified:Sep 30 08:37:40 2002
MD5 Checksum:f56c7c14685cd643a637f60e42497615

 ///  File Name: aspcode.c
Description:
Aspcode.c is an IIS v4.0, 5.0 5.1 asp.dll buffer overflow exploit for Windows.
Author:Yuange
File Size:45626
Last Modified:Sep 3 02:38:42 2002
MD5 Checksum:921d412df9cff8fa94e2aaff0a650ce3

 ///  File Name: autolinuxconf.tgz
Description:
Autolinuxconf.tgz is an improved exploit for linuxconf <= 1.28r3 which has been found to work on Mandrake 8.1 and 8.2 and Redhat 7.2 and 7.3.
Author:Syscalls
Homepage:http://www.myseq.com
File Size:2880
Last Modified:Sep 11 16:05:00 2002
MD5 Checksum:835c256e407b88f79f3720a9d406f353

 ///  File Name: bakkum.c
Description:
Remote root exploit for Linux systems running Null httpd 0.5.0. Tested to work against Red Hat Linux 7.3.
Author:eSDee
Homepage:http://www.netric.org
File Size:8137
Last Modified:Sep 23 16:24:48 2002
MD5 Checksum:88f53e3ca0b89baf95643a18cb9584bb

 ///  File Name: bugtraqworm.tgz
Description:
Linux Slapper Worm - This file contains the binaries and source code for the current Apache worm which affects multiple versions of Linux. It exploits an OpenSSL buffer overflow to run a shell on the remote system and also contains the ability to perform a DDoS attack. These files were found in the wild from machines that had been compromised.
File Size:87726
Last Modified:Sep 16 19:19:29 2002
MD5 Checksum:fc2a65953a4b98971888d9b5df4d1c53

 ///  File Name: cgitelnet.pdf
Description:
CGI-Telnet 1.0, a cgi telnet script that runs on various Unix and NT webservers has vulnerabilities which can be manipulated into giving a user access. The password file is accessible in the web path and passwords are kept DES encrypted.
Author:Lawrence Lavigne
Homepage:http://neoerudition.net
File Size:45271
Last Modified:Sep 2 17:35:23 2002
MD5 Checksum:cb3d0aa2678e9486c390c0e477aa0e01

 ///  File Name: cisco-vpn-5000-lnx.c
Description:
This exploit abuses a local buffer overflow in the Cisco VPN 5000 Linux client v5.1.5 close_tunnel binary to spawn a root shell.
Author:Zillion
Homepage:http://www.safemode.org
File Size:1848
Last Modified:Sep 19 14:02:03 2002
MD5 Checksum:7943a0a865858b090e32ef6d43864ca5

 ///  File Name: compress_expl.c
Description:
Compress v4.2.4 local test exploit for Linux systems.
Homepage:http://www.netric.org
File Size:1799
Last Modified:Sep 21 11:34:25 2002
MD5 Checksum:599d99a8e14ed34f83f118d3d2d84799

 ///  File Name: coudrape.c
Description:
Efstool local root exploit for linux/x86 in C.
Author:Cloudass
File Size:1621
Last Modified:Sep 11 16:18:00 2002
MD5 Checksum:84517123be77c81385f4331da5de0b49

 ///  File Name: efstool.pl
Description:
Efstool local root exploit for linux/x86 in perl.
Author:user_15335[at]erato.uk.clara.net
File Size:646
Last Modified:Sep 11 16:15:00 2002
MD5 Checksum:adcba327cd833a9c94c4cfbf10570e96

 ///  File Name: efstool.txt
Description:
Efstool local root exploit. A condition has been found in efstool which is shipped with Redhat and Slackware linux (and possibly other distributions) which, given the right environment, root privileges can be gained. Full research provided.
Author:ntfx
Homepage:http://www.soldierx.com
File Size:6573
Last Modified:Sep 13 00:27:30 2002
MD5 Checksum:044dc4da250fc55be975c7fb9c557d87

 ///  File Name: elinuxconf2.c
Description:
Another Proof of Concept exploit for the local buffer overflow vulnerability existing in linuxconf v1.28r3 and below which allows users to spawn a root shell. Tested on Mandrake Linux 8.2.
Author:pokleyzz
Homepage:http://www.scan-associates.net
File Size:1687
Last Modified:Sep 2 18:10:41 2002
MD5 Checksum:9902c624a4fa627d34e0dd222043ded8

 ///  File Name: ES-cisco-vpn.c
Description:
Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.
Author:ElectronicSouls
File Size:3087
Last Modified:Sep 19 14:07:14 2002
MD5 Checksum:a2c3a57714a738b22361ec246558f0da

 ///  File Name: free-apache.txt
Description:
FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.
Author:Nebunu
File Size:9102
Last Modified:Sep 19 08:34:19 2002
MD5 Checksum:c951622daa65e39d1df562c2219acecc

 ///  File Name: gawk_expl.c
Description:
Linux proof of concept exploit for a local buffer overflow in GNU Awk 3.1.0-x.
Homepage:http://www.netric.org
File Size:1047
Last Modified:Sep 21 11:37:51 2002
MD5 Checksum:9e653a0462e3f7ef60c123e9ca381c63

 ///  File Name: gm010-ie
Description:
GreyMagic Security Advisory GM#010-IE - Microsoft Internet Explorer 5.5 and above are vulnerable to an attacker who can execute scripts on any page that contains frame or iframe elements, ignoring any protocol or domain restriction set forth by Internet Explorer. This means that an attacker can steal cookies from almost any site, access and change content in sites and in most cases also read local files and execute arbitrary programs on the client's machine. Note that any other application that uses Internet Explorer's engine is also affected.
Homepage:http://sec.greymagic.com/adv/gm010-ie/
File Size:4712
Last Modified:Sep 11 08:20:53 2002
MD5 Checksum:0a3d976bfa8b7f03c04ae3576b7fb110

 ///  File Name: guardadv.db4web.txt
Description:
Guardeonic Solutions Security Advisory #01-2002 - The DB4Web Application Server for Linux, Unix, and Windows can be accessed with malicious URLs allowing users to download any readable file on the server. Exploit URL's included.
Author:Stefan Bagdohn
Homepage:http://www.guardeonic.com
File Size:3215
Last Modified:Sep 21 10:09:06 2002
MD5 Checksum:64d4d5f90284d5f5e2d2bb4d52fe728f

 ///  File Name: gv-exploit.pdf
Description:
Buffer overflow exploit for gv v3.5.8 on linux which creates the file /tmp/itworked when gv opens the PDF. Some mail readers use GV to view pdf's. Tested on Red Hat 7.3.
Author:Zen-Parse
Homepage:http://www.idefense.com
File Size:1377
Last Modified:Oct 1 07:44:40 2002
MD5 Checksum:da9705f79a8782d078819470306ac5c0

 ///  File Name: idefense.dinoweb.txt
Description:
iDEFENSE Security Advisory 09.23.2002 - A vulnerability exists in the latest version of the Dino Webserver that can allow an attacker to view and retrieve any file on the system.
Author:David Endler
Homepage:http://www.idefense.com
File Size:2429
Last Modified:Sep 24 06:27:17 2002
MD5 Checksum:c2e5dd5d49683b918059438a2f7d405a

 ///  File Name: idefense.libkvm.txt
Description:
iDEFENSE Security Advisory 09.16.2002 - The FreeBSD ports asmon, ascpu, bubblemon, wmmon, and wmnet2 can be locally manipulated to take advantage of open file descriptors /dev/mem and /dev/kmem to gain root privileges on a target host. These five programs are installed setgid kmem by default. Exploit information included.
Author:David Endler and Jaguar
Homepage:http://www.idefense.com
File Size:3351
Last Modified:Sep 17 14:29:59 2002
MD5 Checksum:b728af73087e744934fdfbbea052f689