exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 40 RSS Feed

Files

netbsd.2002-004.openbsd
Posted Mar 14, 2002
Site netbsd.org

NetBSD Security Advisory 2002-004 - An off by one overflow has been discovered in the channel code of OpenSSH versions 2.0 - 3.0.2 can be used to execute code on systems running vulnerable OpenSSH clients and servers. NetBSD fixed this vulnerability in versions 1.5 - 1.5.2 and announced that the fix will be included in NetBSD 1.5.3.

tags | overflow
systems | netbsd
SHA-256 | 35d64679ad8b60205c3868196bf86fd85e46f45ac237b9994146c212404c430f
netbsd.2002-002.gzip
Posted Mar 14, 2002
Site netbsd.org

NetBSD Security Advisory 2002-002 - A buffer overflow found in Gzip can under certain conditions be used to execute shellcode with elevated privileges, for example through certain FTP servers. NetBSD fixed this vulnerability for CURRENT, 1.5 - 1.5.2 and 1.4 - 1.4.3.

tags | overflow, shellcode
systems | netbsd
SHA-256 | 0711d864488b65c071d0b4fba53663aada9d306b2d2e0f03d43b2c5e7db33503
NetBSD-SA2001-018.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-018 - A remote buffer overflow in BSD derived Line Printer Daemons can lead to a remote root compromise. This vulnerability affects NetBSD current, 1.5, 1.5.1 and 1.5.2.

tags | remote, overflow, root
systems | netbsd, bsd
SHA-256 | b589390a59a8227dbdee0c06ef0e0f5ace6b72b971cd71a9fbf5cd832adc1ed3
NetBSD-SA2001-017.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-017 - Sendmail's incorrect command line argument check can lead to a local root privilege compromise. This vulnerability affects all sendmail versions between 8.10.0 to 8.11.5.

tags | local, root
systems | netbsd
SHA-256 | c1d946cc82df64dd75efc0311699d13db94d85dfddc1469a505f55afa5c3f41a
NetBSD-SA2001-016.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-016 - The fts functions are provided for traversing UNIX file hierarchies. The NetBSD fts implementation can be tricked to follow symbolic links and can therefore be abused by local users. All NetBSD releases prior to July 9, 2001 are affected by this vulnerability.

tags | local
systems | netbsd, unix
SHA-256 | f57f124958aad1172bfa011eb3991d0cb4f8265a45e2b79e6e2404b5bb702613
NetBSD-SA2001-015.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-015 - Several buffer overflows found in the NetBSD kernel can enable local users to crash the system or gain superuser privileges. This vulnerability affects NetBSD-current, 1.4.*, 1.5, and 1.5.1.

tags | overflow, kernel, local
systems | netbsd
SHA-256 | 4100e22d5d95db64c64e1eea57538c4244bb28b9aa2f17e30a3b540f5f1c60a0
NetBSD-SA2001-014.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-014 - Dump (/sbin/dump), which is setgid tty, does not drop its privileges correctly and can be used to execute commands with setgid tty privileges by using the RCMD_CMD environment variable. This vulnerability affects the NetBSD-1.4, 1.5, 1.5.1 and current branch.

systems | netbsd
SHA-256 | 529f55f5564a602c83f290e0f3090627ee3a03395e7520f50edb110c86697cf7
NetBSD-SA2001-013.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-013 - The OpenSSL libcrypto includes a PRNG (pseudo random number generator) implementation. The logic used for PRNG was not strong enough, and allows attackers to guess the internal state of the PRNG. Therefore, attackers can predict future PRNG output. This vulnerability undermines the security level of cryptographic programs such as ssh and pgp.

systems | netbsd
SHA-256 | 264acefa92a1c14959125bb710b0220fa91d956f0c123a93d60a53ec07ffb5b8
NetBSD-SA2001-012.txt.asc
Posted Feb 5, 2002

NetBSD Security Advisory 2001-012 - A remotely exploitable buffer overflow found in BSD derived telnet daemons can be used to execute shell code with root privileges.

tags | overflow, shell, root
systems | netbsd, bsd
SHA-256 | abd588019233fcad4fe67559cd67fe90fa0e9b1db3af226b1c231844e91ea10b
netbsd.2002-001.ptrace
Posted Jan 19, 2002
Site netbsd.org

NetBSD Security Advisory 2002-001 - A vulnerability found in the ptrace implementation on NetBSD 1.5.* , 1.4.* and CURRENT (prior to January 14, 2002) systems can result in race conditions where it is possible to use ptrace and SUID binaries to execute code with elevated privileges.

systems | netbsd
SHA-256 | e2ceb90aa470a1126631cd2c2ce223394cc423f2b65930b3f1227dd7029eb3b2
netbsd.2000-018.ftpd
Posted Dec 22, 2000

NetBSD Security Advisory 2000-017 - A one-byte remote buffer overrun has been found in the ftp daemon which is believed to allow remote attackers to gain root access. A bad bounds check was found in the replydirname() function.

tags | remote, overflow, root
systems | netbsd
SHA-256 | e0ab5c31958bafa483ecd3f408d2edbd579e570fd1a7c4b75e395e24680f2190
netbsd.2000-017.libkrb
Posted Dec 22, 2000

NetBSD Security Advisory 2000-017 - Kerberised telnetd and libkrb contain exploitable local root bugs. There were two problems - first, telnetd allowed the user to provide arbitrary environment variables, including several that cause programs to behave differently. There was also a possible buffer overflow in the Kerberos v4 library.

tags | overflow, arbitrary, local, root
systems | netbsd
SHA-256 | e2ca278f746dd9a252a1141d30648c61f4059f12835a666a65c72466f7ff53b7
netbsd.2000-015.passwd
Posted Oct 31, 2000

NetBSD Security Advisory 2000-015 - The pw_error() function of the system libutil library, used by several programs including the setuid passwd program, was vulnerable to a format string attack resulting in local root compromise.

tags | local, root
systems | netbsd
SHA-256 | 0bd58837c2ea7980937b6ae199b243b9a170c7e4f70bff757e2e5df990146a4b
netbsd.2000-014.global
Posted Oct 31, 2000

NetBSD Security Advisory 2000-014 - Global-3.55 and below allows remote users to execute arbitrary commands.

tags | remote, arbitrary
systems | netbsd
SHA-256 | e00899c0e255208ded76f38b9812dad970932a7c963afdc4d518d7ba7d807b8f
netbsd.2000-013.cfengine
Posted Oct 31, 2000

NetBSD Security Advisory 2000-013 - The cfd daemon in GNU CFEngine port contains several format string vulnerabilities in syslog() calls. This could permit remote hosts to inject the network daemon with a message causing a segmentation fault. As cfd is almost always run as root due to its nature (centralized configuration management), this could lead to a root compromise.

tags | remote, root, vulnerability
systems | netbsd
SHA-256 | a392e1028967dfd74f1427f253727f5d9d7dae1b650ec93ed68da41cb984d632
netbsd.2000-012.nis
Posted Oct 31, 2000

NetBSD Security Advisory 2000-012 - NIS client nodes may be vulnerable to a remote buffer overflow attack. If the node is configured to use NIS for hostname lookups, and a rogue NIS server is in a position to respond to a hostname lookup request, a malformed response could cause a denial of service due to abnormal program termination. In the worst case, an account could be hijacked.

tags | remote, denial of service, overflow
systems | netbsd
SHA-256 | 9690fedf1029bc414ba63b720b85705df2c468f2335478a505a2da0e0ca9449d
netbsd.2000-011.netscape
Posted Aug 9, 2000
Site netbsd.org

NetBSD Security Advisory 2000-011 - Netscape's processing of JPEG comments trusted the length parameter for comment fields; by manipulating this value, it is possible to cause netscape to read in an excessive amount of data, overwriting memory. Specially designed data could allow a remote site to execute arbitrary code as the user of netscape. This vulnerability has been fixed in Netscape 4.74.

tags | remote, arbitrary
systems | netbsd
SHA-256 | ee621f140533c524890bdf720a8551ec93c8c64af2312f54c7cd2a1fa6820ed5
netbsd.2000-010.wu-ftpd
Posted Jul 13, 2000
Site netbsd.org

NetBSD Security Advisory 2000-010 - wu-ftpd versions prior to 2.6.1 contain known security holes which allow unauthorized remote users to gain root access.

tags | remote, root
systems | netbsd
SHA-256 | cd93cf79b743ebe4c8fadd4db3ac3ba2d12280f7e28999ab3115b93f37840dd2
netbsd.2000-009.ftpd.setproctitle
Posted Jul 13, 2000
Site netbsd.org

NetBSD Security Advisory 2000-009 - An improper use of the setproctitle() library function by ftpd may allow a malicious remote ftp client to subvert an FTP server, including possibly getting remote root access to a system.

tags | remote, root
systems | netbsd
SHA-256 | e738d5814b569a7ca3be40277de7b98cd3a21bb900e8613c115bf34d5e3d85c4
netbsd.2000-008.dhcpclient
Posted Jul 13, 2000
Site netbsd.org

NetBSD Security Advisory 2000-008 - The DHCP client program, dhclient(8), did not correctly handle DHCP options it receives in DHCP response messages, possibly permitting a rogue dhcp server to send maliciously formed options which resulted in a remote root compromise.

tags | remote, root
systems | netbsd
SHA-256 | 689eb3394762910611c11587282a13367c62d78411f6906114508c189e19670e
netbsd.2000-007.urandom
Posted Jun 23, 2000

NetBSD Security Advisory 2000-007 - If /dev/urandom is not present and functioning correctly, des_init_random_number_generator seeds the random number generator with constant data, causing the generation of keys which are easy to determine. The following programs which are included in the NetBSD distribution are impacted by this bug: telnet, telnetd, kadmin, kdb_edit, kdb_init, kerberos, and ksrvutil.

systems | netbsd
SHA-256 | e1d055b2555d5fce58da4d1716b13072674fd2c5d66c268d460de2e000491fb8
netbsd.2000-006.ftpchroot
Posted Jun 1, 2000

NetBSD Security Advisory 2000-006 - Untrusted local processes can hog cpu and kernel memory by tricking the kernel into running exclusively on their behalf, denying other processes the CPU.

tags | kernel, local
systems | netbsd
SHA-256 | cac750a58cf9b85d2630794215188083198ea320a7a11c55b56b766d530a2dea
netbsd.2000-005.cpu-hog
Posted Jun 1, 2000

NetBSD Security Advisory 2000-005 - Untrusted local processes can hog cpu and kernel memory by tricking the kernel into running exclusively on their behalf, denying other processes the CPU.

tags | kernel, local
systems | netbsd
SHA-256 | f386ac97b48ce8e1bd94b4c276d31ed35256067003b8a2673f30c9f9fe95f974
netbsd.2000-004.semaphore
Posted Jun 1, 2000

NetBSD Security Advisory 2000-004 - An undocumented system call permits any user process to lock up the entire semaphore subsystem, preventing processes using semaphores from locking or unlocking them, and preventing processes holding semaphores from exiting.

systems | netbsd
SHA-256 | c73d42a54f6b2912c562ac008d2fceb0d23730edbc94c5372e844549d8e71073
netbsd.2000-003.xlock
Posted May 31, 2000

NetBSD Security Advisory 2000-003 - Exploitable vulnerability in xlockmore. Xlock can be manipulated to print /etc/shadow.

systems | netbsd
SHA-256 | 287e6d1314b1ad1faffd919e3f691fe493e2b86f5526625e8e868eaa9d21974e
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close