what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Mark Rowe

Email addressmark.rowe at pentest-limited.com
First Active2002-07-18
Last Active2004-08-12
ptl-2004-03.txt
Posted Aug 12, 2004
Authored by Matt Moore, Mark Rowe | Site pentest.co.uk

An unauthenticated remote attacker can submit various malformed service requests via Bluetooth, triggering a buffer overflow and executing arbitrary code on vulnerable devices using WIDCOMM Bluetooth Connectivity Software. All releases prior to 3.0 are affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0775
SHA-256 | 5ec2b26e117a8391be03708d270e39f990dae23341935158de2640217287f268
ptl-2003-01
Posted Oct 1, 2003
Authored by Mark Rowe | Site pentest.co.uk

IBM DB2 versions 7.2 for Linux and Windows are both vulnerable to a stack overflow in the LOAD command that is both locally and remotely exploitable.

tags | advisory, overflow
systems | linux, windows
advisories | CVE-2003-0836
SHA-256 | c9695c6bff3ba24669ceadb74773cb61399b70ef6ad79da481b669121de0b01a
tivoli.managednode.txt
Posted Jul 18, 2002
Authored by Mark Rowe, Jeff Fay

A remove buffer overflow in IBM Tivoli ManagedNode v3.6.x through 3.7.1 allows attackers to crash the spider process or execute arbitrary code on TMR ManagedNotes. An overly long GET request results in a buffer overflow with registers being overwritten with user supplied data, resulting in code execution as SYSTEM on NT or root on Unix. Tested on Solaris 8 (Sparc).

tags | overflow, arbitrary, root, code execution
systems | unix, solaris
SHA-256 | 8cfc7d24ca4e2b6ff9a79befe4e32557c6ab3305892f9376b8d975a511dce55c
tivoli.endpoint.txt
Posted Jul 18, 2002
Authored by Mark Rowe, Jeff Fay

A remote buffer overflow in IBM Tivoli Management Framework v3.6.x through 3.7.1 running on tcp port 9495 allows attackers to deny service or execute arbitrary code. An overly long GET request results in a buffer overflow with registers being overwritten with user supplied data, resulting in code execution as SYSTEM on NT or root on Unix. Tested on Windows 2000 and NT4 SP6a.

tags | remote, overflow, arbitrary, root, tcp, code execution
systems | windows, unix
SHA-256 | e92e32242706e69a03bcae5286f23fa186f7abf143db928b16d7dc2496525c24
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close