exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-08-13

suse.suidperl.txt
Posted Aug 13, 2000

SuSE Security Advisory - Suidperl is the perl interpreter for suid perl scripts, a part of the perl package. A maliciously implemented feature causes the interpreter to spawn the /bin/mail program, thereby passing on untrusted environment that causes /bin/mail to execute arbitrary commands as user root. SuSE security site here.

tags | arbitrary, root, perl
systems | linux, suse
SHA-256 | 014ed0af6fcd3148a794ea9fc8ef4e1118024f8702a2a3d00d41005ed9cc8956
suse.knfsd.txt
Posted Aug 13, 2000

SuSE Security Advisory - Due to incorrect string parsing in the code, a remote attacker could gain root priviledges on the machine running the vulnerable rpc.kstatd, which was distributed in the package linuxnfs or knfsd. SuSE security site here.

tags | remote, root
systems | linux, suse
SHA-256 | 4fc97e2211f496c84ae3546f1ae36d7e425e0a9e13e7d63bd4f8100763e8c53b
A0208102000.txt
Posted Aug 13, 2000
Authored by Mike Schiffman | Site guardent.com

Guardent Security Advisory - There is a vulnerability in the way the standard Unix gopherd 2.x (a.k.a. UMN gopherd) creates a gopher DES key for authentication. If properly exploited, this vulnerability allows a remote user to gain unauthorized root access to affected systems.

tags | remote, root
systems | unix
SHA-256 | 4ddb2889c185993771351800971338c2916b9b438d1abe4e842bb757b6fac085
ssexploit502x.pl
Posted Aug 13, 2000
Authored by nemo | Site deepzone.org

Statistics Server 5.02x for Windows contains a buffer overflow caused by a long GET request. Includes perl exploit which spawns a winshell with system privileges on port 8008 on Statistics Server 5.02x/Win2k.

tags | exploit, overflow, perl
systems | windows
SHA-256 | 4d5eb9ffd94b406e9662e8575bcca3692763124371afe9b77e28d789f947712f
rhsa.2000-052-02.zope
Posted Aug 13, 2000
Site redhat.com

Red Hat Security Advisory - Vulnerabilities exist with all Zope-2.0 releases - This HotFix corrects issues in the getRoles method of user objects contained in the default UserFolder implementation. Users with the ability to edit DTML could arrange to give themselves extra roles for the duration of a single request by mutating the roles list as a part of the request processing.

tags | vulnerability
systems | linux, redhat
SHA-256 | 3aae58fa2ce77f6e29e2937cd2bf1a04b0f4bc3336e8c2895523e8de5692adca
rhsa.2000-053-1.usermode
Posted Aug 13, 2000
Site redhat.com

Red Hat Security Advisory - The usermode package allows unprivileged users logged in at the system console to run the halt, poweroff, reboot, and shutdown commands without needing to know the superuser's password. While being able to halt, poweroff, and reboot is a desirable thing, an unprivileged user can also bring the system to single-user mode by running "shutdown now" with no additional flags.

systems | linux, redhat
SHA-256 | 74e1c146411d4e810234e042524b50565b60f9c341a78a1d67295a79e887a3ba
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close