Vulnerabilities And Exploit Archive Query Results

 


Filename:retina.vs.iis4-round2.txt
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:General description of the eEye NT4+IIS4 URL buffer overflow remote exploit.

Filename:retina.vs.iis4-round2-the.exploit.txt
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:Details about how and why the eEye NT4+IIS4 URL buffer overflow remote exploit hole was exploited and released.

Filename:retina.vs.iis4-round2-the.brain.txt
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:Detailed description of the Brain File used to uncover the eEye NT4+IIS4 URL buffer overflow remote exploit.

Filename:iishack.exe
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:Executable eEye NT4+IIS4 URL buffer overflow remote exploit program. Use with one of the ncx* files.

Filename:iishack.asm
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:asm source code for the eEye NT4+IIS4 URL buffer overflow remote exploit. Use with one of the ncx* files.

Filename:iis4.htr.pl
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:Perl exploit code port of the eEye NT4+IIS4 URL buffer overflow remote exploit.

Filename:iis4.htr-2.pl
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:Perl exploit code port of the eEye NT4+IIS4 URL buffer overflow remote exploit.

Filename:iis.injector.c
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:IIS Injector for NT is a custom C port (for Windows NT) of the eEye NT4+IIS4 URL buffer overflow remote exploit that allows the attacker to select any desired "payload file" for targets.

Filename:CA-99-07-IIS-Buffer-Overflow.txt
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:A buffer overflow vulnerability in Microsoft Internet Information Server (IIS) 4.0.

Filename:dtterm.c
Operating Systems:SCO Unixware
Service/Daemon:

Description:dtterm buffer overflow by jGgM. Version not disclosed.

Filename:FA-99-09.iis
Operating Systems:Microsoft Windows NT
Service/Daemon:

Description:Buffer overflow vulnerabilities affecting Microsoft Internet Information Server 4.0 have been discovered in several libraries, including libraries that handle .HTR, .STM, and .IDC files.

Filename:solaris.snoop.c
Operating Systems:Solaris 2.7 5.7
Service/Daemon:

Description:Here's a new version of my snoop exploit, it seems that it will work on the new patched version of snoop aswell, and actually, the target host dose NOT have to be running with -v. Snoop is a program similar to tcpdump that allows one to watch network traffic. There is a buffer overflow in the snoop program that occurs when a domain name greater than 1024 bytes is logged, because it will overwrite a buffer in print_domain_name. This vulnerability allows remote access to the system with the privileges of the user who ran snoop (usually root, because it requires read privileges on special devices). Remote Solaris 2.7 x86 snoop exploit included.

Filename:solaris.write.bof.txt
Operating Systems:Solaris 2.6 2.7 5.6 5.7
Service/Daemon:

Description:Exploitable buffer overflow exists in all versions of Solaris 2.6 and 2.7 (possibly other Solaris versions too) /usr/bin/write program.

Filename:solaris-lpstat-bof.txt
Operating Systems:Solaris 2.6 2.7 5.6 5.7
Service/Daemon:

Description:Buffer overflow in Solaris 2.6, 2.7 /usr/bin/lpstat allows root compromise.

Filename:solaris_bof.txt
Operating Systems:Solaris
Service/Daemon:

Description:Buffer overflow exploit for Solaris in /usr/bin/mail

Filename:h-44.solaris2x.fdformat.buffer.overflow.
Operating Systems:Solaris 2.4 2.5 5.4 5.5
Service/Daemon:

Description:h-44.solaris2x.fdformat.buffer.overflow.txt

Filename:h-59.solaris.2x.buffer.overflow.ps.chkey
Operating Systems:Solaris 7 2.x
Service/Daemon:

Description:h-59.solaris.2x.buffer.overflow.ps.chkey.vulnerbilities.txt

Filename:pax-linux-2.2.17.txt
Operating Systems:Linux
Service/Daemon:

Description:PaX is an implementation of non-executable pages for IA-32 processors (i.e. pages which user mode code can read or write, but cannot execute code in). Since the processor's native page table/directory entry format has no provision for such a feature, it is a non-trivial task. The project was designed to provide Linux with protection from buffer overflows. Making parts of the memory pages read/write access enabled, but not executable provides the protection.

Filename:linux-2.2.14-ow2.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Changes: Now works on kernel 2.2.14!

Filename:linux-2.2.12-ow6.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing.

Filename:linux-2.2.15-ow1.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and priveledged IP aliases for kernel 2.0. Changes: Now works on kernel 2.2.15!

Filename:linux-2.2.16-ow1.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and priveledged IP aliases for kernel 2.0. Changes: Now works on kernel 2.2.16!

Filename:linux-2.2.17-ow1.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and priveledged IP aliases for kernel 2.0. Changes: Now works on kernel 2.2.17!

Filename:linux-2.2.18-ow1.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and priveledged IP aliases for kernel 2.0. Changes: Now works on kernel 2.2.18! Also includes workarounds for GNU MailMan and Courier Mail.

Filename:linux-2.0.39-ow2.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and privileged IP aliases for kernel 2.0. Changes: A fix for the recently announced execve(2)/ptrace(2) race condition vulnerability in the Linux kernel.

Filename:linux-2.2.18-ow4.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and privileged IP aliases for kernel 2.0. Changes: A fix for the recently announced execve(2)/ptrace(2) race condition vulnerability in the Linux kernel.

Filename:linux-2.0.39-ow3.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and privileged IP aliases for kernel 2.0. Changes: There are important bugfixes, including to an older kernel vulnerability fix.

Filename:linux-2.2.19-ow1.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction. Changes: Updated to Linux 2.2.19, which contains security fixes not included in older versions of the patch.

Filename:linux-2.2.19-ow3.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction. Changes: Fixes the possible local root vulnerability discovered recently in kernel v2.2.19.

Filename:linux-2.2.19-ow4.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction. Changes: Fixes two Linux kernel vulnerabilities. A non-security symbol export issue was fixed and support for ELF executables was put into a separate configuration option.

Filename:linux-2.2.20-ow1.tar.gz
Operating Systems:Linux
Service/Daemon:

Description:The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction. Changes: Ported to 2.2.0. This version moves even more of the support for combined ELF/a.out setups under the configuration option introduced with 2.2.19-ow4.

Filename:w00aimexp.tgz
Operating Systems:Windows
Service/Daemon:

Description:This an exploit for AOL Instant Messenger, versions 4.7.2480 and 4.8.2616. The overflow is found when parsing for a game request. Non-windows versions not effected. Released by w00w00.org.

Filename:ftpwarez.c
Operating Systems:Linux BSD SunOS Solaris
Service/Daemon:

Description:This is a remote buffer overflow for wu-ftpd beta17. Non-chroot. Written by Anathema

Filename:turkey2.c
Operating Systems:BSD FreeBSD 4.0 OpenBSD 2.8
Service/Daemon:

Description:This is a remote bsd ftpd buffer overflow, particularly for FreeBSD 4.0 and OpenBSD 2.8. Written by fish stiqz.

Filename:mircexploit-v591.c
Operating Systems:Windows
Service/Daemon:

Description:A buffer overflow exists in the nick handling code of mIRC. Confirmed to work with v5.91. Exploit by: James Martin

The Poor Gurus' Network(c).2001.All Rights Reserved.