ïw¤ÎBlog
来源: BlogBus 原始链接: http://www.blogbus.com:80/blogbus/blog/index.php?blogid=16980&pg=17&cat= 存档链接: https://web.archive.org/web/20041124065511id_/http://www.blogbus.com:80/blogbus/blog/index.php?blogid=16980&pg=17&cat=
ïw¤ÎBlog ÃΣ¬·ÉÆðµÄµØ·½ diary (33) article (45) exploit (57) 2004 Äê 11 Ô Sun Mon Tue Wen Thu Fri Sat 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ×îÐÂÎÄÕ SLmail 5.x POP3 Remote Pass Buffer Overflow Exploit Apache <= 2.0.52 HTTP GET Remote Denial of Service Exploit Ç÷ÊÆ¿Æ¼¼½«·¢²¼Ð¿îÇ÷ÊÆ¿Æ¼¼ÍøÂ粡¶¾Ç½ VeriSign³Æ£º90%ÍøÂç¹¥»÷À´×ÔÃÀ¹ú¿í´øÓû§ UBB.Threads 6.2.-6.3. one char bruteforce Exploit Multiple Antivirus Products Virus Detection Bypass PoC Exploit Eudora 6.2 Remote Attachment Spoofing Proof of Concept IPSwitch-IMail 8.13 Delete Command stack overflow Exploit Kerio Personal Firewall Multiple IP Options Denial of Service PoC NetNote Server v2.2 build 230 ×îÐÂÆÀÂÛ ¹Â¹â½£Òþ : Ö÷°åÏÔ¿¨»úÏä»»¡£. ¹Â¹â½£Òþ : ºÇºÇ¡£¡£B4½Ãñ£¬. alvashev : ͬÀÖͬÀÖ . Á´½Ó 56TECH ÄÏÒþÊÀ¼Ò ÷ÁÖÐ¡í¬ ÍøÂç¼¼ÊõÁªÃË °µµØÇ±Á÷ ´æµµ 2004/05/31/-2004/05/31 2004/06/01/-2004/06/04 2004/06/05/-2004/06/28 2004/06/29/-2004/10/27 2004/10/28/-2004/11/05 2004/11/06/-2004/11/13 2004-06-03 15:20 - [ exploit ] /* * Exploit for /bin/mkdir Unix V7 PDP-11. * mkdir has a buffer overflow when checking if the directory * in /arg/with/slashes/fname exists. * * This will run /bin/sh with euid 0, but not uid 0. Since * the shell doesn't do anything special about this, we don't * really care. If you care, run&nb.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-06-03 15:20 | ±à¼ 2004-06-03 11:34 - [ article ] ÈËÉúÒ»ÊÀ,µÃʧÄÑÁÏ,Ö»ÐëÄãÓÃÕæÐÄ,È¥°ÑÎÕ,È¥Éú»î,ÓÃÕæÇàȥƷλ,µÃµ½ÁËÃÀÀö,ʧȥÁËҲͬÑùÃÀÀö,µÃµ½²»Ò»¶¨¾ÍÊÇÓÀºãµÄÓµÓÐ,ʧȥҲ²»Ò»¶¨²»ÄܳÉΪһÖֵõ½, Òò´Ë,±»Ì«¿ÁÇó,±ðÌ«¼«¶Ë,µÃµÃʧʧ,¶¼ÊÇ˳Æä×ÔÈ»µÄºÃ! ..........ÈËÉú±¾ÎÞÏç,ÐݲÊǹ鴦. .............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-06-03 11:34 | ±à¼ 2004-06-03 11:28 - [ article ] »ØÊ×,ºçµÄ±³ºó,Ðľ²ÈçË®. ·ÅÖð×Ô¼º,»Ø¹é×Ô¼º,Ò²ÐíÉúÃüµÄ¸ººÉÖð½¥±»ÊÀË׸¯×¤ºÍ°þÏ÷,Ò²ÐíÃÎÖеĵÆËþ×îÖÕ±»·ç±©´Ý²ÐµÄ±éÌåÁÛÉË,Ò²ÐíûÓÐÀáË®µÄ±¯ÉËÖ»ÊÇÒ»ÖÖͽÀ͵ķ¢Ð¹,µ«ÎÒÒÀ¾ÉÖ´×Å,ØËÊØÐĵ×Àï×î³õµÄ´¿Õæ ·çÓêµÄºç,ºÜÓÐÔÏζ Ì«ÑôÊÇÓÀºãµÄ ºçÊÇÓÀºãµÄ!.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-06-03 11:28 | ±à¼ 2004-06-03 11:25 - [ exploit ] SUMMARY=======
The krb5_aname_to_localname() library function contains multiplebuffer overflows which could be exploited to gain unauthorized rootaccess. Exploitation of these flaws requires an unusual combinationof factors, including successful authentication to a vulnerableservice and a non-default configuration on t.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-06-03 11:25 | ±à¼ 2004-06-03 11:21 - [ exploit ] i found a nice email... with some strange code, i'm not a hacker but i think this is what some people call a 0-day exploit... :)
i think you can use this .............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-06-03 11:21 | ±à¼ 2004-06-03 09:51 - [ diary ] 6ÔÂ2ÈÕ£¬Ò¹£¬Ó꣬²»´ó£¬ÊÇÎÒϲ»¶µÄÄÇÖÖ11µã£¬¸úÍù³£Ò»Ñù£¬Í£µçÁË£¬Ò²¸úÍù³£Ò»Ñù£¬ÌÉÔÚÁË´²ÉÏ¡£Ëæ±ã²¦Á˼¸¸öµç»°£¬ºÇºÇ~²»ÖªµÀʲôʱºòÆð£¬Ë¯¾õǰ´ò¼¸¸öɧÈŵ绰³ÉÁËϰ¹ßÁË£¬·¢Á˸ö¶ÌÐÅ£¬Ã»»Ø£¡¿ì˯×ŵÄʱºò£¬µç»°ÏìÁË£¬²Å¿´£¬Í£ÁË£¬ÖªµÀÊÇʲôµç»°Á˰É---ɧÈŰ¡£¡ÏëÀÏÃÃÁË£¬»ØÑ§Ð£ÄÇÌ죬À´Á˸öµç»°£¬Ê²Ã´¶¼Ã»Ëµ£¡¹ÖÎÒ×ܾõµÃ²»ÖªµÀÄdzöÎÊÌâÁË£¬±¾À´Ïë·¢¸ö¶ÌÐŹýÈ¥£ºÒª²»Òª¸øÎÒ·¢¸ö¶ÌÐÅ£¿¹þ¹þ£¬Õæ²»ÖªµÀ×Ô¼º.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-06-03 09:51 | ±à¼ ·ÖÒ³: µÚÒ»Ò³ [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] ×îºóÒ³ Ä£°åÉè¼Æ£º zhou