Exploit world!

Master Index for ALL Exploits

Compiled by Fyodor fyodor@insecure.org
on Thu Jan 13 21:41:31 UTC 2000

[Back] to Fyodor's Playhouse


3com/USR Total Control Chassis termserver problem
Description:The IP filtering on these servers doesn't appear to work for dialin connections. Thus a user can dialin, get a "host:" prompt without authentication, and then type in any hostname on the internet (or intranet) to connect to. System logs incorrectly say that the connection was denied.
Author:Jason Downs <downsj@DOWNSJ.COM>
Compromise:Unauthorized access to Internet/Intranet through the terminal server
Vulnerable Systems:Those running the Total Control (tm) NETServer Card V.34/ISDN with Frame Relay V3.7.24, perhaps other versions.
Date:11 May 1998
Exploit & full info:Available here


Bay networks unpassworded "User" account
Description:Unless they sysadmins change it (they should!), bay networkds access node/wellfleet routers have a "User" account for ftp/telnet access with no password. The Manager account also ships w/o a password, but that is more likely to be changed.
Author:Marty Rigaletto <marty@SLACK.NET>
Compromise:Read valuable configuration information, edit routing tables, etc.
Vulnerable Systems:Networks using Bay Networks access node/wellfleet routers that haven't changed the default passwords.
Date:10 May 1998
Notes:Many products come w/o passwords with the assumption that they will be changed. This isn't really Bay Networks' fault, although perhaps the "User" account isn't documented well enough.
Exploit & full info:Available here


AIX rmail hole
Description:IFS attack, apparently AIX may be using system()
Author:Unknown
Compromise:gid mail
Vulnerable Systems:AIX 3.2, perhaps earlier
Date:10 May 1998 (it is actually much older)
Notes:Thanks to the person who submitted this to me!
Exploit & full info:Available here


Motorola Cablerouter hole
Description:Motorola CableRouters listen on port 1024 regardless of IP access restrictions for some reason. This hole in combination with the default login:cablecom pass:router can lead to easy unauthorized access
Author:January <january@SPY.NET>
Compromise:unathorized administrator access
Vulnerable Systems:Motorola CableRouters, especially those where the admin left the default passwords in place (always a horrible idea).
Date:10 May 1998
Notes:Cablemodem users must connect from the Internet interface, not from the interface on their side of the router. Also Motorola wrote me to say this has been fixed. They claim that all customers have upgraded to newer software.
Exploit & full info:Available here


Overflow in Vixie crontab
Description:standard overflow
Author:Dave G. wrote the exploit
Compromise: root (local)
Vulnerable Systems:Some RedHat distributions, a German distribution DLD 5.2, etc. Anyone running vulnerable version of Vixie crontab.
Date:10 May 1998 (actually it is an older problem)
Exploit & full info:Available here


Overflows in Minicom
Description:The terminal emulation modem program minicom has a number of blatant overflows.
Author:Tiago F P Rodrigues <11108496@LIS.ULUSIADA.PT>
Compromise:group uucp on some Linux distros (such as RedHat), but if installed from source with default makefile then it allows root access (local)
Vulnerable Systems:Most Linux boxes ship with minicom. Version 1.81 and presumably earlier are vulnerable.
Date:9 May 1998
Exploit & full info:Available here


NCSA httpd buffer overflow
Description:Standard overflow in client request string
Author:Renos <renosm@YAHOO.COM>
Compromise:You can probably run arbitrary commands on the web server machine, it is trivial to crash the server
Vulnerable Systems:Those running NCSA's httpd v1.4 for Windows. Probably earlier versions too.
Date:8 May 1998
Exploit & full info:Available here


Poor BSDI squid permissions
Description:on BSDI squid configuration files are owned by "www", which is the same UID that user CGI runs at. Thus a user could change start-squid to start a root shell, for example.
Author:"Jonathan A. Zdziarski" <jonz@NETRAIL.NET>
Compromise:user WWW privs -> root
Vulnerable Systems:BSDI 3.1 , perhaps other squid installs
Date:7 May 1998
Exploit & full info:Available here


dip 3.3.7o overflow
Description:Standard overflow (in the -l option processing).
Author:Goran Gajic <ggajic@AFRODITA.RCUB.BG.AC.YU>
Compromise: root (local)
Vulnerable Systems:Slackware Linux 3.4, presumably any other system using dip-3.3.7o or earlier suid root.
Date:5 May 1998
Notes:I've included a couple standard exploits and one that works against systems utilizing Solar Designer's excellent non-executable-stack patch.
Exploit & full info:Available here


Backdoor passwords in 3com switches,routers,smart hubs.
Description:Numerous 3com products apparently have secret backdoors in case the administrator "forgets the password". Yeah, there is a good idea. BIOS vendors have the annoying habit of making passwords useless the same way, but at least there the attacker needs physical access. With 3com the attacker can telnet over to your network from bis.bg in Sofiya, Bulgaria and reconfigure your routers!
Author:Eric Monti <monti@MAIL.NETURAL.COM> and others
Compromise:Intruders can reconfigure and basically take over your switches
Vulnerable Systems:Many 3com products have various backdoors including: LanPlex/Corebuilder switches, 3Com LANplex 2500 , CellPlex 7000
Date:5 May 1998
Notes:Another post I appended notes that admin passwords and SNMP keys are available vi the "public" SNMP community by default.
Exploit & full info:Available here


Many holes in the Netmanager Chameleon tool suite
Description:Mostly standard overflows, but there are lots of them. Virtually every product that comes in the suite seems exploitable.
Author:arager@MCGRAW-HILL.COM
Compromise:remote attackers can likely obtain root /administrator privileges on the machines running Chameleion daemons. The clients also have serious security holes.
Vulnerable Systems:These holes are in the Windows versions, although I would be very careful about running something like thier Unix Z-mail product.
Date:4 May 1998
Exploit & full info:Available here


Xaw and Xterm vulnerabilities
Description:There are a number of vulnerabilities in X11R6 xterm(1) and Xaw(3c) libraries. They are mostly all overflows
Author:Pavel Kankovsky <peak@kerberos.troja.mff.cuni.cz> and the exploit was written by alcuin
Compromise: root (local)
Vulnerable Systems:Those running Xterm or X apps linked to vulnerable Xaw. Virtually all versions of X are vulnerable to the *Keymap hole and the others are mostly X11R6 specific (which virtually everyone uses anyway). Thus it is likely that many Solaris, Linux, HP/UX, and perhaps IRIX and AIX boxes are vulnerable.
Date:4 May 1998
Notes:I have also included an exploit sent to me by "M.C.Mar" <emsi@it.com.pl>. This exploit works against Xaw and neXtaw even WITH Solar Designer's non-executable stack patch applied. Check it out!
Exploit & full info:Available here


Overflow in lynx processing of mailto: URLs
Description:a mailto: URL with a long email address causes lynx 2.8 to crashh and can cause it to execute arbitrary code
Author:Michal Zalewski <lcamtuf@boss.staszic.waw.pl>
Compromise:remote pages can cause commands to be executed on the lynx user's machine. This can also be used to break out of restricted lynx shells.
Vulnerable Systems:Those running lynx 2.8 and probably earlier.
Date:3 May 1998
Exploit & full info:Available here


ID games Backdoor in quake
Description:ID software blatantly put a backdoor in Quake 1/2 and QuakeWorld including both the Linux/Solaris Quake2. RCON commands sent from the subnet 192.246.40.0/24 and containing the password "tms" are automaticly executed on the server without being logged.
Author:Mark Zielinski <markz@repsec.com>
Compromise: root (remote)
Vulnerable Systems:Those running Quake 1, QuakeWorld, Quake 2, Quake 2 Linux and Quake 2 Solaris, all versions. Thus many Windows and UNIX boxes are affected
Date:1 May 1998
Notes:Quake was always a horrible security hole, but I never thought Id would stoop to introducing an intentional backdoor to allow them access to systems running Quake. I am surprised this didn't get more publicity.
Exploit & full info:Available here


Overflow in kppp -c option
Description:Standard overflow
Author:"|[TDP]|" <tdp@psynet.net>
Compromise: root (local)
Vulnerable Systems:Those running kppp version < 1.1.3 suid root. This comes with the KDE system (which is pretty neat -- www.kde.org) and runs on Solaris, Linux, IRIX, and HP/UX
Date:29 April 1998
Notes:The hole was fixed a while prior to this posting so the (then) current version was not vulnerable.
Exploit & full info:Available here


Horrendous suidexec hole
Description:Debian Linux apparently distributes a program called suidexec as part of the suidmanager package. This program is trivially exploitable to run any program on the system as root.
Author:Thomas Roessler <roessler@GUUG.DE>
Compromise: root (local)
Vulnerable Systems:Debian Linux 2.0 (probably won't be in the final 2.0 Hamm release).
Date:28 April 1998
Exploit & full info:Available here


Yet ANOTHER hole in the HP/UX Glance program
Description:Standard symlink-following TMPFILE stupidity
Author:"J.A. Gutierrez" <spd@GTC1.CPS.UNIZAR.ES>
Compromise: root (local)
Vulnerable Systems:HP/UX 10.20, perhaps other versions.
Date:27 April 1998
Exploit & full info:Available here


cxhextris overflow
Description:Standard overflow
Author:Chris Evans <chris@FERRET.LMH.OX.AC.UK>
Compromise:Local users can obtain uid=games privileges! This allows them to cause chaos by changing the high score table or trojaning various games, etc.
Vulnerable Systems:At least RedHat Linux 5.0
Date:25 April 1998
Exploit & full info:Available here


Livewire "source" problem
Description:It is often possible in sites using Livewire to download the actual application rather than individual pages generated by it. If the page is http://www.blah.com/foo/ try downloading http://www.blah.com/foo.web .
Author:Daragh Malone <daragh_malone@ACCURIS.IE>
Compromise:Obtain the livewire application rather than the pages it generates. These may have passwords and other sensitive info stored in them.
Vulnerable Systems:Those running Livewire, in particular DEC UNIX 4.0D running Netscape Enterprise Server 3.0.
Date:24 April 1998
Exploit & full info:Available here


Many, many, many security holes in the Microsoft Frontpage extensions
Description:There are many horrible security holes in the Microsoft Frontpage extensions. For example, you can list all files in directories on FP enabled sites, you can download password files on many of them, and a lot of FP sites even let you UPLOAD your own password files (!).
Author:pedward@WEBCOM.COM
Compromise:Break into user accounts on a web server (remote)
Vulnerable Systems:Those running the Fronpage server extensions. Sone of the vulnerabilities are UNIX only while others also work agains WindowsNT sites.
Date:23 April 1998
Exploit & full info:Available here


Overflows in Solaris ufsdump and ufsrestore binaries
Description:Standard buffer overflow (in device name passed as arguments)
Author:Seth McGann <smm@WPI.EDU>
Compromise:Get UID of tty (local)
Vulnerable Systems:Solaris 2.6/SPARC, opinions differed on whether 2.6/X86 is vulnerable.
Date:23 April 1998
Exploit & full info:Available here


OpenBSD (and others) lprm overflow
Description:There is a subtle overflow in the pointer arithmetic in copying a command string to a buffer.
Author:Niall Smart <rotel@indigo.ie>
Compromise: root (local)
Vulnerable Systems:OpenBSD 2.2 and earlier, some versions of FreeBSD, NetBSD
Date:23 April 1998
Notes:This is an excellent description of the problem. Also congratulations go to Niall Smart for finding this bug in the heavily audited OpenBSD codebase.
Exploit & full info:Available here


qcam overflows
Description:several qcam apps as well as libqcam seem to have rather obvious security holes when installed setuid root.
Author:bst@INAME.COM
Compromise: root (local)
Vulnerable Systems:Thos running qcam, sqcam,xqcam, SANE-0.67. Mostly Linux boxes, perhaps BSD.
Date:20 April 1998
Exploit & full info:Available here


lprm Linux/BSD/Solaris Overflow
Description:The lprm program on some machines has a standard overflow in the name you feed it to remove a job from a remote printer
Author:Chris Evans <chris@FERRET.LMH.OX.AC.UK> posted this problem to BugTraq, it turns out the the OpenBSD folks (probably Theo De Raadt) fixed the problem in 1996.
Compromise: root (local)
Vulnerable Systems:RedHat Linux 4.2 and 5.0, Solaris 2.6, Some *BSD variants vulnerable, but most fixed it 6 months to two years prior to this notice
Date:18 April 1998
Exploit & full info:Available here


Nestea "Off By One" attack
Description:A popular attack against Linux boxes
Author:John McDonald <jmcdonal@UNF.EDU>
Compromise:Stupid remote DOS attack
Vulnerable Systems:Linux 2.0.33 and earlier, PalmOS, HP Jet Direct printer cards, some 3COM routers, Magnum 5000 Ethernet switch, Some Windows boxes, perhaps others
Date:17 April 1998
Notes:I have appended the original Linux code, a BSD port, an improved Linux version, and a few other messages on the topic.
Exploit & full info:Available here


Overflow in Microsoft Netmeeting
Description:Standard overflow
Author:DilDog <dildog@L0PHT.COM>
Compromise:remotely execute arbitrary commands on the machine of a windows/netmeeting user (the user must click on your neetmeeting .conf file)
Vulnerable Systems:Windows boxes running Micro$oft Netmeeting V. 2.1
Date:16 April 1998
Notes:For a lot more information on this exploit, including a short windows overflow tutorial, see http://www.cultdeadcow.com/cDc_files/cDc-351/ .
Exploit & full info:Available here


MGE UPS serious security holes
Description:Standard security holes are plentiful in the MGE UPS software
Author:Ryan Murray <rmurray@PC-42839.BC.ROGERS.WAVE.CA>
Compromise: root (local)
Vulnerable Systems:Those running vulnerable versions of MGE UPS software. It apparently runs on Solaris, AIX, SCO, etc.
Date:12 April 1998
Exploit & full info:Available here


Major holes in IRIX IPX tools
Description:Sigh, IRIX was trivial to root before, but now thanks to their IPX tools it is even easier. We are talking blatant system() calls here! The story in this message is rather pathetic.
Author:Fabrice Planchon <fabrice@MATH.PRINCETON.EDU>
Compromise: root (local)
Vulnerable Systems:IRIX 6.3, perhaps earlier versions.
Date:8 April 1998
Exploit & full info:Available here


Overflows in various Macintosh mail clients.
Description:Standard overflows.
Author:Chris Wedgwood <chris@CYBERNET.CO.NZ>
Compromise:DOS attack at least, there is at least a possibility of remote code execution (I've never seen this done on a Mac though).
Vulnerable Systems:Macintosh boxes running Stalker Internet Mail Server V.1.6 or AppleShare IP Mail Server 5.0.3 SMTP Server
Date:8 April 1998
Exploit & full info:Available here


Multiple Vulnerabilities in BIND named
Description:There are a number of security holes in some bind 4.9 and 8 releases. One is a remote-root exploit that works if fake-iquery is enabled, the other two are DOS attacks
Author:Unknown
Compromise: root (remote)
Vulnerable Systems:Those running BIND 8 prior to 8.1.2 or BIND 4.9 prior to 4.9.7 .
Date:8 April 1998
Exploit & full info:Available here


BSDI tcpmux DOS
Description:Apparently BSDI 2.0,2.1,3.0,and 3.1 servers with tcpmux enabled can be crashed with a fast portscanner.
Author:Mark Schaefer <marks@SHELL.FLINET.COM>
Compromise:DOS attack
Vulnerable Systems:BSDI 2.0, 2.1, 3.0, and 3.1 with tcpmux enabled and without patch M310-009
Date:7 April 1998
Notes:Note the portscanner he used -- my nmap.
Exploit & full info:Available here


TTCP spoofing problem
Description:Apparently TTCP allows commands to be executed before the full 3-way handshake has been completed. This means an attacker can set up a malicious connection without the trouble of TCP sequence prediction.
Author:Vasim Valejev <vasim@DIASPRO.COM>
Compromise:Exploit trust relationships, avoid logging, all the other benefits that come with "classical" TCP sequencing attacks.
Vulnerable Systems:Those implementing T/TCP (rfc1644). Perhaps FreeBSD allows this attack?
Date:7 April 1998
Exploit & full info:Available here


Yet another SGI pfdispaly CGI hole
Description:As has been demonstrated many times, SGI CANNOT write secure CGI scripts. Nor can they write secure setuid programs. They fixed the last pfdisplay.cgi hole, but the new version is still quite buggy -- as this post demonstrates.
Author:"J.A. Gutierrez" <spd@GTC1.CPS.UNIZAR.ES>
Compromise:run arbitrary commands remotely as the UID running the webserver
Vulnerable Systems:SGI IRIX 6.2 using the performer_tools CGIs.
Date:7 April 1998
Notes:I honestly believe default SGI security is as bad as default Windows NT security. That is sad.
Exploit & full info:Available here


ICQ Spoofer
Description:The ICQ protocol is poorly designed and leads to a number of problems. Included in this message is an ICQ spoofer in C, a Perl version, and an ICQ flooder. A sniffer is also included.
Author:Seth McGann <smm@WPI.EDU> and others
Compromise:Harass ICQ users to no end :).
Vulnerable Systems:People running ICQ, mostly windows users. There is probably a Mac client too.
Date:6 April 1998
Notes:All the code is somewhat jumbled together -- I'm sure you can figure it out.
Exploit & full info:Available here


RedHat 5 metamail hole
Description:Many mail clients, MTA's, etc. are poorly written and can interpret mail in ways that lead to security wholes. One of the bugs in this message demonstrates a way to execute arbitrary commands by sending mail to a Redhat 5 user. The bug is in metamail script processing of MIME messages.
Author:Michal Zalewski <lcamtuf@BOSS.STASZIC.WAW.PL>
Compromise:potential root (remote). The victim must read the mail with Pine (or something else that calls metamail).
Vulnerable Systems:RedHat 5, other linux boxes with vulnerable metamail script.
Date:5 April 1998
Exploit & full info:Available here


Eudora 3.0 and 4.0 DOS
Description:Eudora will crash if it tries to receive an email with an attachment that has a filename of at least 233 characters.
Author:whiz <whizpig@TIR.COM>
Compromise:Stupid DOS attack
Vulnerable Systems:Windows users running Eudora Pro 4.0 or 3.0
Date:29 March 1998
Exploit & full info:Available here


Another WinGate hole -- this time with the LogFile service
Description:The WinGate Logfile service basically puts up a web server on port 8010 giving full read access to the victim's hard drive(!)
Author:HKirk <hkirk@tech-point.com>
Compromise:Remote read access to a Wingate user's hard drive
Vulnerable Systems:Windows users who run Wingate. This program is a huge security hole, a much better (cheaper, more secure, more robust, better performing) solution is to install a Linux gateway with IP masquerading.
Date:29 March 1998
Exploit & full info:Available here


Majordomo tmpfile bug
Description:Standard tmpfile problem
Author:Karl G - NOC Admin <ovrneith@tqgnet.com>
Compromise:Any user on a system running majordomo can append arbitrary data to any file owned by the majordomo account.
Vulnerable Systems:Those running majordomo. This runs on a ton of systems (Solaris, Linux, IRIX, etc.).
Date:26 March 1998
Exploit & full info:Available here


Overflows in the MesaGL OpenGL implementation
Description:There are many overflows in this library, one of which can be used to compromise xlock in some cases
Author:bjorn smedman <bs@ODEN.SE>
Compromise: root (local)
Vulnerable Systems:This exploits is for FreeBSD 2.2.5 although other OSes that use MesaGL are likely to be vulnerable.
Date:24 March 1998
Exploit & full info:Available here


dot bug in MS Personal Web Server
Description:IIS 3.0 had a bug which allowed ASP source to be downloaded by appending a . to the filename. That was eventually fixed by MS but they didn't fix the same hole in their Personal Web Server.
Author:Lynn Kyle <lynn@RAINC.COM>
Compromise:Read ASP file source, could contain passwords, etc.
Vulnerable Systems:Those running vulnerable version of MS Personal Web Server
Date:22 March 1998
Exploit & full info:Available here


Linux Mailhandler overflow
Description:the Mailhandler (mh) ver 6.8.4-5 has an overflow relating to the SIGNATURE environmental variable . I think RedHat 5 among other distributions are vulnerable.
Author:Catalin Mitrofan <md@LSPVS.SOROSIS.RO>
Compromise: root (local)
Vulnerable Systems:Those running mh version 6.8.4-5 suid.
Date:21 March 1998
Exploit & full info:Available here


Another MSIE 4.0 overflow
Description:Standard overflow, this one can almost certainly be exploited by a malicious page to run arbitrary code on a user's system.
Author:Georgi Guninski <guninski@hotmail.com>
Compromise:Run arbitrary code on the machines of Windows users connecting to your web page.
Vulnerable Systems:Windows 95/NT running MSIE 4.0. Perhaps even the Solaris version is vulnerable, though I've never seen anyone run it.
Date:20 March 1998
Exploit & full info:Available here


Win95 "save password" nonsense
Description:Win95 offers dialup users to save their RAS credentials by checking a box when dialing in. Security minded folks generally decline. However, Microsoft saves the password anyway!
Author:Aleph One <aleph1@DFW.NET>
Compromise:Obtain cleartext passwords for dialup accounts. On NT you can sometimes retrieve the lanman and NT hashes (which you can then run a cracker on).
Vulnerable Systems:Windows95, NT.
Date:20 March 1998
Notes:In some cases information on the last SEVERAL logins are stored without permission (!)
Exploit & full info:Available here


Irix pfdispaly CGI hole
Description:Standard .. read-any-file CGI exploit.
Author:"J.A. Gutierrez" <spd@GTC1.CPS.UNIZAR.ES>
Compromise:Read any file (remotely) that user nobody (or whatever web server runs as) can read.
Vulnerable Systems:IRIX 6.2 with performer_tools.sw.webtools (Performer API Search Tool 2.2) installed, check for /var/www/cgi-bin/pfdispaly.cgi.
Date:17 March 1998
Exploit & full info:Available here


LinCity and Conquest Game overflows
Description:Typical buffer overflows
Author:bst@INAME.COM
Compromise: root (local)
Vulnerable Systems:Those running vulnerable versions of LinCity or Conquest setuid (dumb!). This is mostly Linux boxes.
Date:16 March 1998
Exploit & full info:Available here


Ascend Router Insecurities
Description:There is a flaw in the Ascend router OS which allows the machines to be crashed by certain malformed UDP probe packets. Also the routers have a default SNMP "write" community which allows attackers to download the entire Ascend configuration file.
Author:"Secure Networks Inc." <sni@SECURENETWORKS.COM>
Compromise:Download sensitive ascend configuration information (passwords, etc.) plus a remote DOS attack to take out the router.
Vulnerable Systems:Ascend Pipeline and MAX routers including OS release 5.0Ap42 (MAX) and 5.0A (Pipeline).
Date:16 March 1998
Notes:Whee! We've got C exploit, CAPE exploit, IPsend exploit, and a Perl exploit!
Exploit & full info:Available here


Even more IE 4 bugs
Description:3 bugs which range in severity from crashing Internet Explorer to crashing all of windows. These can be put on malicious web pages to take out the IE users.
Author:Aleph One <aleph1@DFW.NET>
Compromise:Stupid DOS attack
Vulnerable Systems:Win95/WinNT running Internet Explorer 4.01 (perhaps earlier)
Date:16 March 1998
Exploit & full info:Available here


Insecure scripts that come with RedHat 5.0 (and other OS's)
Description:The scripts named in this message have standard insecure tmpfile bugs. If someone can predict when these will be run (like if they are in cron) then they can generally overwrite files of the person running the command (could be root).
Author:Michal Zalewski <lcamtuf@BOSS.STASZIC.WAW.PL>
Compromise:Potential for root compromise
Vulnerable Systems:Specifically this list is for RedHat 5 although many other Linux systems and probably some *BSD systems are vulnerable.
Date:14 March 1998
Exploit & full info:Available here


MDaemon/SLMail Mail server overflows
Description:Most Windows servers in generally seem to have horrific security. Here is info on overflows in the MDaemon SMTP/Pop Server and the Seattle labs server. Many Macintosh servers also have these problems, and even UNIX isn't always immune to poor coding.
Author:Alvaro Martinez Echevarria <alvaro-bugtraq@LANDER.ES>
Compromise:Crash the server, perhaps arbitrary code could be executed.
Vulnerable Systems:Windows boxes running a vulnerable version of MDaemon, Seattle Labs SLMail, and several other crappy Windows servers.
Date:11 March 1998
Exploit & full info:Available here


Solaris 2.6 printd tmpfile problem
Description:Standard insecure tmpfile hole
Author:Silicosis <sili@l0pht.com>
Compromise:unprivileged users can overwrite and create system files and print files they shouldn't be able to read.
Vulnerable Systems:Solaris 2.6
Date:11 March 1998
Exploit & full info:Available here


Another TMPfile problem in updatedb script
Description:updatedb creates a tmp file in /tmp, moves it to /var/lib/locatedb, then chowns it to root. The race condition is clear.
Author:Michal Zalewski <lcamtuf@BOSS.STASZIC.WAW.PL>
Compromise: root (local)
Vulnerable Systems:RedHat 5.0, perhaps other systems such as FreeBSD using updatedb.
Date:6 March 1998
Exploit & full info:Available here


info2www CGI hole
Description:Another dumb cgi blidnly using the (magical) perl open()
Author:Niall Smart <njs3@DOC.IC.AC.UK>
Compromise:execute arbitrary commands as web server's UID (remote)
Vulnerable Systems:Those running a vulnerable version of the info2www CGI
Date:3 March 1998
Exploit & full info:Available here


X11Amp playlist bug
Description:When installed SUID root (as suggested in the README), X11Amp creates ~/.x11amp insecurely with root privs. Oops! There are very likely to be many more security bugs in X11Amp. The performance hit of making it suid is probably not worth the security risk (IMHO).
Author:viinikala <kala@DRAGON.CZ>
Compromise: root (local)
Vulnerable Systems:Those running a vulnerable version of X11Amp (.65 and prior) suid. Mostly Linux boxes.
Date:28 February 1998
Exploit & full info:Available here


updatedb on Redhat
Description:RedHat Linux updatedb/sort insecure tmpfiles
Author:viinikala <kala@DRAGON.CZ>
Compromise:become user 'nobody' via updatedb (or root on a really old distro of RedHat) (local)
Vulnerable Systems:Redhat Linux (presumably 5.0) is very vulnerable due to updatedb calling sort regularly, many other systems (such as Solaris) have an insecure sort. Also FreeBSD 2.2.2 is apparently vulnerable to the same updatedb problem.
Date:28 February 1998
Notes:Dave Goldsmith may have found this first, although I cannot currently access his website for more info.
Exploit & full info:Available here


4.4BSD mmap() vulnerability
Description:A 4.4BSD problem allows a read-only descriptor to a char device to be mmap()ed in RW mode. This can allow group kmem to become root and root to lower the system secure-level.
Author:Theo de Raadt and Chuck Cranor
Compromise:User kmem-> root ->modify secure-level->delete audit trail and load evil kernel mods.
Vulnerable Systems:OpenBSD 2.2 and below, FreeBSD 2.2.5 and below, BSDI 3.0 and NetBSD.
Date:26 February 1998
Notes:This is an excellent advisory, I wish other groups and people would use a full-disclosure, detailed, and well organized format like this.
Exploit & full info:Available here


ZIP disk password recovery
Description:ZIP disk passwords provide very little security. Here is a way to bypass their silly little "passwords". If you wish to secure your data, ENCRYPT IT!.
Author:<mentzy@ath.forthnet.gr>
Compromise:Full access to password-protected Iomega ZIP disks.
Vulnerable Systems:People relying on the password protect feature of the ZIP drive.
Date:26 February 1998
Exploit & full info:Available here


Various gaping security holes in QuakeII (and Quake I and QuakeWorld and Quake Client).
Description:These games by ID software are absolutely riddled with glaring security holes and no one should even CONSIDER running them (or any other game for that matter) on a machine that is supposed to be secure. I have stuffed a bunch of quake exploits in this one section although there is one Quake II server hole I will treate separately later.
Author:kevingeo@CRUZIO.COM and others
Compromise: root (remote)
Vulnerable Systems:Those running pretty much any version of quake by id software, the client or server. Quake runs on many Linux boxes as well as Win95/NT.
Date:25 February 1998
Exploit & full info:Available here


Squid access control problem
Description:The squid http proxy allows an administrator to specify banned sites. Unfortunately, users can get around this by using URL hex escapes or specifying an IP address.
Author:"Vitaly V. Fedrushkov" <willy@CSU.AC.RU> and Mauro Lacy <mauro@INTER-SOFT.COM>
Compromise:Bypass some squid access restrictions.
Vulnerable Systems:Those relying on squid access restrictions to keep students, employees, etc. from undesireable sites.
Date:23 February 1998
Exploit & full info:Available here


Solaris /usr/dt/bin/dtappgather symlink problem.
Description:Standard symlink problem allows arbitrary files to be chowned the the attacker's UID.
Author:Mastoras <mastoras@PAPARI.HACK.GR>
Compromise: root (local)
Vulnerable Systems:Solaris 2.5,2.5.1 running CDE version 1.0.2 with suid /usr/dt/bin/dtappgather
Date:23 February 1998
Exploit & full info:Available here


Foolproof stores cleartext passwords in memory
Description:Foolproof security can be completely subverted by using a meory dumper/editor and finding the password sitting their in plaintext right after the string FOOLPROO . Of course, I have never seen a system that CAN secure Win95. The true solution is to upgrade to a decent OS that doesn't allow unprivileged users full access to the disk/memory/etc. I humbly suggest Linux, FreeBSD, OpenBSD, or Solaris.
Author:Mark M Marko <john__wayne@JUNO.COM>
Compromise:Break into Win95 machines protected by Foolproof.
Vulnerable Systems:Anyone relying on Foolproof for security on systems where users can manage to execute arbitrary commands (very difficult to prevent).
Date:21 February 1998
Exploit & full info:Available here


Named Pipe attack
Description:This is not really an "exploit" per se, but just a note about the possibility of exploiting programs that open files insecurely. The usual attack is something like ln -s /etc/passwd /tmp/prog.lock'. Solar Designer's excellent symlink kernel patch stops most of that nonsense. Here the attack uses named pipes to modify the data in the file and feed it back to the app.
Author:"[UNKNOWN-8BIT] Micha³ Zalewski" <lcamtuf@BOSS.STASZIC.WAW.PL>
Compromise:Exploit potential for some insecure file opens and reads (such as gcc 2.7.2)
Vulnerable Systems:general UNIX feature
Date:20 February 1998
Exploit & full info:Available here


Radius spaces-in-password DOS attack.
Description:A number of Radius implementations will crash if the right number of spaces are appended to a username.
Author:"Phillip R. Jaenke" <prj@NLS.NET>
Compromise:Stupid DOS attack
Vulnerable Systems:Several UNIX and NT radius implementations including Livingston 1.16 to 2.01, RadiusNT v2.x, and merit radius 2.4.23C
Date:20 February 1998
Exploit & full info:Available here


NT Login DOS
Description:Uh-Oh! NT isn't correctly checking its input. By sending an SMB logon request with an incorrect data length field you can blue screen the NT box.
Author:"Secure Networks Inc." <sni@SECURENETWORKS.COM>
Compromise:Yet another NT DOS attack
Vulnerable Systems:Windows NT 4.0 up to and including Service Pack 3
Date:14 February 1998
Notes:It shouldn't be hard to write a quick exploit for this. Any volunteers? Just hack SAMBA login request code and experiment with different data lengths. If you do write one, please mail it to me (fyodor@insecure.org).
Exploit & full info:Available here


Wingate telnet redirection
Description:A somewhat common technique for attackers is to install "telnet redirectors" on a system they have compromised. This allows them to telnet to the redirector and then telnet out from there anonymously, masking their true point of origin. These attackers no longer need to bother with penetrating systems, as the Wingate includes anonymous telnet redirection as a feature enabled by default! Just telnet to port 1080 or 23 and then telnet right back out to wreak havok on the internet. And don't worry, it doesn't (by default) log anything! <sigh>
Author:Alans other account <alanb@MANAWATU.GEN.NZ>
Compromise:Intruders can mask their true point of origin by going through Wingate
Vulnerable Systems:Windows boxes running Wingate
Date:11 February 1998
Notes:Many thanks to Dairo Bel <dairo@akrata.org> for translating his spanish article on Wingate and sending it in! Also note that you can use nmap, a network portscanner I wrote to locate hosts on your network that are running Wingate.
Exploit & full info:Available here


Windows share passwords are right there in the registry and poorly encrypted
Description:Share encryption is by a simple XOR and the passwords are stored in registry entries such as SOFTWARE\Microsoft\Windows\CurrentVersion\Network\LanMan\Parm1enc .
Author:a42n8k9@redrose.net
Compromise:With local access to a windoze box you can determine the read-only and full access passwords to the file system/printer/etc. Also these passwords might be the same as for more important access (ie to company servers).
Vulnerable Systems:Windoze 95, NT
Date:9 February 1998
Exploit & full info:Available here


Poor authentication used with NT domain controllers for authenticating SMB requests.
Description:There are a number of problems with the way NT implements authentication of clients accessing an smb fileshare.
Author:Paul Ashton <paul@ARGO.DEMON.CO.UK>
Compromise:Learn a users' password, and cause other mischief
Vulnerable Systems:Windows NT 4.0 and 3.51
Date:6 February 1998
Notes:This probably won't be fixed anytime soon.
Exploit & full info:Available here


NT port binding insecurity
Description:UNIX does not allow normal users to bind ports < 1024. NT apparently has no such concept of privileged ports. It even allows users to bind ports in use by the system and sniff or redirect data from them!!!
Author:Weld Pond <weld@L0PHT.COM>
Compromise:Obtain passwords, sniff information, change information before passing it to the real server, spoof UNIX r-services, etc.
Vulnerable Systems:Windows NT 3.51, 4.0
Date:6 February 1998
Notes:Appended to this message is a SMB redirectory which allows local unprivileged users to redirect smb trafic to a remote server so that the local server doesn't even see it. This obviously has quite severe implications.
Exploit & full info:Available here


Poor device permissions on Redhat 4.0/5.0
Description:Lax device perms on RedHat boxes allow unprivileged users to do nasty things such as peeking at the contents of a floppy in your drive or DOS attacks against the system.
Author:Smart List user <slist@cyber.com.au>
Compromise:Local users can read floppy device, be annoying
Vulnerable Systems:RedHat Linux 4.0 and 5.0
Date:4 February 1998
Exploit & full info:Available here


X11R6.3 Xkeyboard hole
Description:X11R6.3 based Xservers with the XKEYBOARD extension that are setuid can be exploited with the -xkbdir option
Author:Pavel Kankovsky <peak@kerberos.troja.mff.cuni.cz>
Compromise: root (local)
Vulnerable Systems:Those systems running a setuid X11R6.3-based Xserver with XKEYBOARD extension (R6.1 is also probably affected). The XFree86 servers that come with many Linux and *BSD distributions is a good example of this.
Date:3 February 1998
Exploit & full info:Available here


Coredump hole in imapd and ipop3d in slackware 3.4
Description:When fed an unknown username, imapd and ipop3d will dump core in Slackware 3.4. /etc/shadow can be found in the core file.
Author:Peter van Dijk <peter@ATTIC.VUURWERK.NL>
Compromise:Learn the contents of /etc/shadow (which would allow you to crack the passwords and break into other accounts)
Vulnerable Systems:Slackware Linux 3.4 and the imapd in 3.3. possibly others
Date:2 February 1998
Exploit & full info:Available here


Defeating Solar Designer's Non-executable Stack Patch
Description:A very interesting paper on defeating non-executable stack patches. It goes through the steps needed to exploit the XServer <LONGDISPLAY> hole in Linux even with a non-execute patch.
Author:Rafal Wojtczuk <nergal@ICM.EDU.PL>
Compromise: root (local)
Vulnerable Systems:This just shows (as Solar Designer is well aware) that in some cases the non-executable stack patch can be subverted via sneaky techniques.
Date:30 January 1998
Notes:Solar Designer's respons is in the addendum.
Exploit & full info:Available here


Obtaining Domain Admins access on a LAN
Description:There are problems with the NT domain authentication protocol which allow anyone on a Domain to gain Domain access
Author:Paul Ashton <paul@ARGO.DEMON.CO.UK>
Compromise:Gain Domain Admin Access
Vulnerable Systems:NT 4.0
Date:28 January 1998
Exploit & full info:Available here


Htmlscript file access bug
Description:Another stupid .. bug.
Author:Dennis Moore <rainking@FEEDING.FRENZY.COM>
Compromise:read any file the web server can read on the remote system.
Vulnerable Systems:Those running htmlscript (distributed by www.htmlscript.com)
Date:26 January 1998
Exploit & full info:Available here


Quake2 shared library nonsens
Description:Heh, quake2 is suid root and loads shared libraries from the working directory. This exploit overfloads _init.
Author:kevingeo@CRUZIO.COM
Compromise: root (local)
Vulnerable Systems:Those running a vulnerable version of QuakeII
Date:26 January 1998
Exploit & full info:Available here


Microsoft private key recovery
Description:There are a number of flaws in the way Microsoft stores private keys.
Author:Peter Gutmann, pgut001@cs.auckland.ac.nz
Compromise:Obtain a users private keys which can allow you to intercept their email, digitally sign contracts and agreements (in their name), etc.
Vulnerable Systems:Windoze NT and Win95
Date:25 January 1998
Notes:This paper is from Peter Gutmann's web site and can be found at: <http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms.txt>
Exploit & full info:Available here


OpenBSD mkfifo DOS attack
Description:You can run the *BSD kernel out of non-pageable memory by making a fifo (via mkfifo) and forking a bunch of processes trying to cat it.
Author:Jason Downs <downsj@DOWNSJ.COM>
Compromise:Crash the system (stupid DOS attack)
Vulnerable Systems:OpenBSD, presumably NetBSD, FreeBSD, BSDI
Date:25 January 1998
Exploit & full info:Available here


Buffer overflow in the Yapp Conferencing System Version 2.2
Description:standard overflow
Author:satan <satan@FREENET.NETHER.NET>
Compromise:Run arbitrary commands as the uid yapp is running under (often 'yapp').
Vulnerable Systems:This exploit is for x86/Linux . Any other platform running Yapp should be vulnerable.
Date:20 January 1998
Exploit & full info:Available here


Lotus Domino database security problems
Description:Databases under this system do not correctly inherit ACLs, plus some default database ACLs are set to allow unrestricted access to all web users(!). Thus users can can manipulate the files remotely.
Author:mattw <mattw@L0PHT.COM>
Compromise:manipulate server configuration files remotely
Vulnerable Systems:Those running vulnerable versions of Lotus Domino
Date:20 January 1998
Exploit & full info:Available here


ssh-agent RSA authentication problem
Description:SSH doesn't check permissions on credential files enough so that users can trick ssh into using the credentials of other users.
Author:"Secure Networks Inc." <sni@SECURENETWORKS.COM>
Compromise:Trick ssh into using the credentials of another user when you login to a remote server.
Vulnerable Systems:Those running ssh (setuid) on multiple-user systems where RSA authentication is being used.
Date:20 January 1998
Exploit & full info:Available here


Mail Handler 6.8.4 overflow
Description:standard overflow
Author:Cesar Tascon Alvarez <tascon@enete.gui.uva.es>
Compromise: root (local)
Vulnerable Systems:Those running Mail Hanldler 6.8.4 (and presumably earlier versions). Redhat 5.0 is affected.
Date:19 January 1998
Exploit & full info:Available here


Exploit for the gcc tempfile issue
Description:gcc 2.7.2.x (and earlier as far as I know) creates temporary files in /tmp which will follow symlinks and allows you to clobber the files of the person running gcc
Author:"Micha=B3 Zalewski" <lcamtuf@boss.staszic.waw.pl>
Compromise:Overwrite files owned by the user running gcc (possibly root )
Vulnerable Systems:Those running gcc 2.7.2.x this includes most linux, and *BSD boxes. Many admins of Solaris boxes have also added gcc. This problem is finally fixed in gcc 2.8.0
Date:16 January 1998
Notes:This has been mentioned before on Bugtraq but this is the first actual exploit I've seen.
Exploit & full info:Available here


Overflow in MS PWS
Description:typical buffer overflow
Author:Gurney Halleck <gurneyh@ix.netcom.com>
Compromise:Crash the personal web server (it is also possible that you could be able to execute arbitrary code remotely)
Vulnerable Systems:Those running MS Personal Web Server (pws32/2.0.2.1112), it is apparently packaged with FrontPage 97.
Date:15 January 1998
Exploit & full info:Available here


DOS against realvideoserver by Progressive Networks
Description:Another DOS attack
Author:Rootshell
Compromise:remotely crash Progressive Networks Real Video Server
Vulnerable Systems:those running Progressive Networks Real Video Server. This includes the Linux version and the NT version
Date:15 January 1998
Exploit & full info:Available here


mk: URL overflow in Internet Explorer 4.0
Description:Another Internet Explorer overflow, this time in the mk: URL type
Author:DilDog <dildog@L0PHT.COM>
Compromise:run arbitrary code on the machines of IE users who visit your page
Vulnerable Systems:Microsoft Internet Explorer 4.0 and 4.01, Outlook Express, Windows Explorer (it is an explorer library problem)
Date:14 January 1998
Exploit & full info:Available here


inode count integer overflow in Linux kernel
Description:Member i_count in struct inode of the Linux kernel is an unsigned short, which can be overflowed by mapping one file more than 65535 times.
Author:<Jan.Kotas@acm.org>
Compromise: root (local)
Vulnerable Systems:Linux, probably versions up to 2.0.31 (or so)
Date:14 January 1998
Exploit & full info:Available here


DOS attack on backoffice viewcode.asp
Description:You can leave a host running backoffice in a state of not accepting connections by using http://server.com/whetever/viewcode.asp?source=/////////////////<lots more slashes>///
Author:Anonymous
Compromise:DOS attack against web server
Vulnerable Systems:Those running Microsoft Backoffice with viewcode.asp available
Date:14 January 1998
Exploit & full info:Available here


Xserver overflow in the display command-line argument
Description:typical overflow, although this one affects a lot of people.
Author:Pavel Kankovsky <peak@kerberos.troja.mff.cuni.cz>
Compromise: root (local)
Vulnerable Systems:X11R6 (possibly X11R5) based X servers. This includes XFree86. The servers have to be suid, of course (some systems use XDM and have a non-suid server)
Date:13 January 1998
Exploit & full info:Available here


Buffer overflow in the 'deliver' mail delivery program
Description:standard overflow
Author:"KSR[T]" <ksrt@DEC.NET>
Compromise: root (local)
Vulnerable Systems:Slackware 2.x, Debian 1.3.1, possibly other Linux distributions. Basically anything running deliver version 2.0.12 and below.
Date:12 January 1998
Exploit & full info:Available here


Sendmail 8.8.8 HELO problem
Description:By specifying a very long hostname in the HELO command at the beginning of SMTP negotiation, you can cause your real hostname and IP to not be displayed in the header Received: field. This leaves potential for mischief by mail forgers and (unfortuantely) spammers.
Author:Micha³ Zalewski <lcamtuf@boss.staszic.waw.pl>
Compromise:Send forged mail without your IP appearing in the message headers.
Vulnerable Systems:Those running Sendmail 8.8.8 and probably earlier.
Date:12 January 1998
Exploit & full info:Available here


A problem in Amanda backup software V. 2.3.0.4
Description:According to this advisory (which I haven't verified), attackers can remotely access backed up data on an index server. Also attackers with local access to a machine being backed up can access any other machine or any partition being backed up.
Author:joey@CORINNE.CPIO.ORG
Compromise:unauthorized access to index servers and partition data
Vulnerable Systems:Those running Amanda version 2.3.0.4 (probably earlier as well).
Date:10 January 1998
Exploit & full info:Available here


Buffer overflow in the cidentd authlie file
Description:typical overflow
Author:Jackal <jackal@HACK.GR>
Compromise:run arbitrary code as the UID running cidentd (probably user nobody) (local)
Vulnerable Systems:Those running cidentd with ~/.authlie enabled
Date:10 January 1998
Exploit & full info:Available here


Microsoft FrontPage server extensions file permissions problems
Description:Abhorrent permissions are required for some files related to the Microsoft FrontPage server extensions. For example _vti_pvt is a 775 directory which contains mode 664 service.pwd that contains the crypt()ed passwords for users.
Author:Dave Pifke <dave@VICTIM.COM>
Compromise:Not only can local users find out (or sometimes change) the passwords used for web accounts, but determing these passwords may lead to compromise of more important accounts that may use the same passwords.
Vulnerable Systems:Those running Microsoft FrontPage server extensions 3.0.2.1117 under UNIX
Date:9 January 1998
Exploit & full info:Available here


routed trace file exploit
Description:routed has the ability to have trace mode turned on remotely using any arbitrary filename. Thus you can append stuff to arbitrary files remotely.
Author:Rootshell
Compromise:You should be able to leverage this to root remote access.
Vulnerable Systems:Redhat linux; IRIX 5.2-5.3-6.2 is vulnerable, NetBSD 1.2 is vulnerable.
Date:8 January 1998
Exploit & full info:Available here


NT/Win95 8.3 webserver exploit
Description:By default, when a file like "verylongname.html" is created, Windows also creates an 8.3 equivalent ("verylo~1.htm" for example). Unfortunately, when people use Win* webservers to restrict access to long directories and files, the webservers often don't check access on the 8.3 equivalents. So people can grab stuff using the 8.3 names.
Author:Marc Slemko <marcs@ZNEP.COM>
Compromise:Obtain restricted files from NT/Win95 web servers
Vulnerable Systems:IIS 4.0, Netscape Enterprise 3.0x, probably others. Probably ftp servers and so forth too.
Date:8 January 1998
Exploit & full info:Available here


Netware NFS compromise
Description:A flaw in the way NetWare-NFS mode 1 and 2 maps the "Read Only" flag to UNIX allows a root compromise on systems which mount user-writable volumes exported via NetWare NFS
Author:"Andrew J. Anderson" <andrew@DB.ERAU.EDU>
Compromise: root (local)
Vulnerable Systems:Those mounting user-writable volumes exported via NetWare NFS
Date:8 January 1998
Exploit & full info:Available here


Screen cloaking 'feature'
Description:Versions of the popular program 'screen' allow users to cloak themselves out of wtmp/utmp and appear to not be logged on.
Author:Taz <taz@webmaster.com>
Compromise:Cloak yourself from finger/wtmp/utmp etc. using screen
Vulnerable Systems:Those running screen 3.7.4 and probably earlier, maybe later
Date:7 January 1998
Notes:I consider it a good thing when people send me bugs. Also, note that you can effect the same sort of thing as this by running 'xterm -ut' and then logging off
Exploit & full info:Available here


Holes in Apache prior to 1.2.5
Description:The fine folks who work on the Apache web server team kindly advised us of these holes in older versions of Apache. They are fixed in 1.2.5. The most important are probably cfg_getline() overflow which allows local users to run arbitrary commands with the UID of the webserver and the '//////////' hole which allows people to remotely effect a DOS attack on a server by giving a URL with more than 7500 forward slashes in the filename.
Author:Marc Slemko <marcs@ZNEP.COM>
Compromise:local users can run arbitrary commands with the UID of the webserver, remote DOS attack (slows the server to a crawl)
Vulnerable Systems:Those running Apache versions prior to 1.2.5
Date:6 January 1998
Exploit & full info:Available here


The "Bonk" NT/Win95 fragmentation attack
Description:In an attack that is basically the reverse of the teardrop attack, Windows machines that are patched for teardrop can be crashed.
Author:bendi
Compromise:crash Windoze machines remotely
Vulnerable Systems:Windows 95, Windowsw NT
Date:5 January 1998
Exploit & full info:Available here


ccdconfig sgid kmem BSD exploit
Description:ccdconfig is sgid kmem and can be exploited to read /dev/mem . It shouldn't be too tough to leverage this into root access.
Author:Niall Smart <rotel@INDIGO.IE>
Compromise: root (local)
Vulnerable Systems:NetBSD, FreeBSD, older version of OpenBSD
Date:31 December 1997
Exploit & full info:Available here


AIX mount vunlerability
Description:AIX mount has a serious problem that allows people to mount any filesystem on top of any writeable space.
Author:"S. Ryan Quick" <ryan@PHAEDO.COM>
Compromise:Mount filesystems on top of any writeable space (this could allow you to clobber files, among other things).
Vulnerable Systems:AIX 4.1.3, 4.1.4, 4.2.0, 4.2.1
Date:28 December 1997
Exploit & full info:Available here


DOS attack on XTACACS servers
Description:You can crash these servers by sending ICMP unreachable messages to them.
Author:Coaxial Karma <c_karma@HOTMAIL.COM>
Compromise:remotely crash vulnerable XTACACS servers.
Vulnerable Systems:some XTACACS servers
Date:23 December 1997
Exploit & full info:Available here


Vsyslog overflow in Linux libc 5.4.38
Description:Standard overflow (although it is pretty sad to see these things in syslog ...)
Author:Posted by Solar Designer <solar@FALSE.COM>
Compromise: root (local)
Vulnerable Systems:Slackware 3.1, Redhat 4.2, possibly other Linux boxes
Date:21 December 1997
Exploit & full info:Available here


MIRC worm bug
Description:There is a bug in MIRC (a Windoze IRC client) which allows people to send an arbitrary script.irc to MIRC users. This allows arbitrary MIRC scripting commands to be interpreted.
Author:Unknown
Compromise:Windows IRC users can be harassed and their files can be snatched and/or deleted.
Vulnerable Systems:Windows versions running MIRC prior to 5.3
Date:18 December 1997
Exploit & full info:Available here


Overflow in Livingston RADIUS 1.16 and derived code
Description:There is a buffer overflow in the handling of buffers related to inverse IP lookup in RADIUS 1.16 and derived code (including Ascend RADIUS)
Author:"Secure Networks Inc." <sni@SECURENETWORKS.COM>
Compromise: root (remote)
Vulnerable Systems:Those running RADIUS server software derived from Livingston RADIUS 1.x
Date:17 December 1997
Exploit & full info:Available here


EWS (Excite for Web Servers) CGI hole
Description:A classic CGI mistake: CWS launches a shell with query results. They change spaces to $ and somehow think this solves the problem ;)
Author:Marc Merlin <marc_merlin@MAGIC.METAWIRE.COM>
Compromise:run arbitrary commands as the processid that runs the webserver (remote)
Vulnerable Systems:Those running EWS 1.1 on both UNIX and NT
Date:17 December 1997
Exploit & full info:Available here


WordPerfect 7 filepermission problems
Description:Apparently WordPerfect 7 has serious problems with regard to permissions on the files it creates in users directories. It will also follow symlinks when creating them.
Author:Hans Petter Bieker <hanspb@PERSBRATEN.VGS.NO>
Compromise:break into a users account or clobber their files (user could potentially be root )
Vulnerable Systems:Linux boxes running WordPerfect 7 (possibly other *NIXes)
Date:15 December 1997
Exploit & full info:Available here


ICQ so-called protocol
Description:The ICQ protocol is ridiculously simplistic and is riddled with security holes. So is the ICQ software. So ICQ users can be spoofed, have their machine crashed, or have evil haxxors run arbitrary code on their boxes. Geez, these poor users might as well run Internet Explorer!
Author:Alan Cox <alan@CYMRU.NET>
Compromise:Spoof, Crash, or exploit the buffer overflow to run arbitrary code
Vulnerable Systems:Mostly Windows boxes where the user is running ICQ
Date:14 December 1997
Exploit & full info:Available here


Sun ^D DOS attack
Description:By connecting to the telnet port of a Solaris 2.5.1 box, sending some bogus telnet negotiation option and then flooding the channel with ^D, you can (temporarily) slow the machine to a near halt.
Author:Jason Zapman II <zapman@CC.GATECH.EDU>
Compromise:remote DOS attack
Vulnerable Systems:Solaris 2.5.1, 2.6
Date:13 December 1997
Notes:I appended a better version after the first (the second forks extra processes to increase the flood). I also appended an NT port.
Exploit & full info:Available here


gethostbyname() overflow in glibc
Description:Overflow in glibc gethostbyname() allows overflows in ping, rsh, traceroute, etc.
Author:Wilton Wong - ListMail <listmail@NOVA.BLACKSTAR.NET>
Compromise: root (local)
Vulnerable Systems:Redhat 5, presumably others with glibc (GNU HURD?)
Date:13 December 1997
Exploit & full info:Available here


Cisco password overflow
Description:Cisco 76x routers reboot when you telnet to them and feed a very long password.
Author:Laslo Orto <Laslo@CPOL.COM>
Compromise:Reboot the Cisco router
Vulnerable Systems:Cisco 76x series of routers.
Date:11 December 1997
Exploit & full info:Available here


Firewall1 smtpd open access vulnerability
Description:By default, Firewall-1 allows anyone to obtain confidential operation and statistical info from its SNMP daemon.
Author:"Secure Networks Inc." <sni@SECURENETWORKS.COM>
Compromise:The information could help an attacker bypass the firewall as well as giving private network statistical information.
Vulnerable Systems:Those running a Vulnerable version of Checkpoitn Firewall-1
Date:9 December 1997
Exploit & full info:Available here


Dillon crontab 2.2 overflow
Description:standard overflow
Author:"KSR[T]" <ksrt@DEC.NET>
Compromise: root (local)
Vulnerable Systems:Slackware Linux 3.4, other systems that runn dillon crontab / crond ( dcron 2.2 )
Date:9 December 1997
Exploit & full info:Available here


mIRC crash via new socket feature
Description:A problem with the way mIRC handles bound sockets allows mean people to crash the mIRC clients of poor, defenseless Windows users.
Author:Derek Reynolds <startnet@NATION.ORG>
Compromise:Crash an mIRC user and make thier Windows run even slower than usual
Vulnerable Systems:Those running mIRC 5.3 under Windows
Date:7 December 1997
Exploit & full info:Available here


Overflow in cgiwrap-3.5 and 3.6beta1
Description:Standard overflow
Author:Duncan Simpson <dps@IO.STARGATE.CO.UK>
Compromise:Run arbitrary commants with the UID of the webserver process owner
Vulnerable Systems:Those running vulnerable versions of cgiwrap
Date:7 December 1997
Exploit & full info:Available here


Xscreensaver problem
Description:Apparently if you type more then 80 characters into an xscreensaver password window it will die and you will gain access to the desktop. Also not that with XFree86 you can often use CNTRL-SHIFT-BACKSPACE to simply kill the server (and whatever X program is locking it).
Author:Kim San Su <shanx@comp67.snu.ac.kr>
Compromise:Bypass xscreensaver password security
Vulnerable Systems:Those where people run a vulnerable version of xscreensaver to lock their X-Windows sessions.
Date:2 December 1997
Exploit & full info:Available here


Long filesystem paths
Description:One thing you can do to be highly annoying is create very long directory paths. These cause *major* problems to many system utilities. This post provides useful one-liners for the purpose.
Author:Zack Weinberg <zack@RABI.PHYS.COLUMBIA.EDU>
Compromise:Annoying DOS
Vulnerable Systems:Those that allow very long directory paths. I just created one 10002 directories deep on my Linux box (I stopped it, it could have gone further). Fortunately Microsoft OS users don't have this problem due to small filesystem depth restrictions ;)
Date:2 December 1997
Exploit & full info:Available here


Sendmail file-as-username problem
Description:A quirk in Sendmail that could potentially be exploited is that usernames like '/etc/passwd' get written into the file of the same name when mail is received for them. This could be a problem on systems where users can specify their username without sysadmin intervention.
Author:Duck Vader <tiepilot@THEPOND.THEPOND.ML.ORG>
Compromise:Could potentially lead to root access
Vulnerable Systems:Mostly just BBSes or whatever systems allow users to specify a username and then create an /etc/passwd entry for them.
Date:2 December 1997
Exploit & full info:Available here


BSD Termcap overflow
Description:This program creates a malicous termcap file which can cede root access.
Author:Bug originally discovered by Theo de Raadt <deraadt@CVS.OPENBSD.ORG> exploit written by Written by Joseph_K the 22-Oct-1997
Compromise:Theoretically this may allow you to become root remotely You can definately become root locally.
Vulnerable Systems:BSDI, probably FreeBSD/NetBSD/OpenBSD prior to October 1997
Date:1 December 1997
Exploit & full info:Available here


Xyplex terminal login problems
Description:Apparently you can get into some Xyplex terminals by entering ^Z or '?' at the login prompt.
Author:Aleksandr Pilosov <apilos01@UTOPIA.POLY.EDU>
Compromise:Obtain unauthorized access to Xyplex terminals.
Vulnerable Systems:Xyplex terminals
Date:1 December 1997
Notes:Another problem with these terminals, this time with regard to their interaction with scripts is in the addendum.
Exploit & full info:Available here


Solaris 2.5.1 automound hole
Description:standard popen() hole
Author:Anonymous
Compromise: root (local)
Vulnerable Systems:Solaris 2.5.1 without patch 10465[45] applie
Date:26 November 1997
Exploit & full info:Available here


Common XDM and CDE insecurity
Description:Many implementations of these allow any host XDMCP connection access. This can allow people to effectivly login remotely even if they are denied telnet (etc.) access through /etc/hosts.deny of tcp wrappers. Also failed attempts are often not logged so this is useful for brute force password guessing.
Author:Eric Augustus <augustus@stic.net>
Compromise:Brute force password guessing, bypassing tcp wrappers
Vulnerable Systems:Those running vulnerable implementations of XDM or CDE and those with poor access configuration files.
Date:26 November 1997
Exploit & full info:Available here


NT RAS Point to Point Tunneling Protocol hole
Description:You can crash NT boxes running RAS PPTP by sending a pptp start session request with an invalid packet length specified in the header.
Author:Kevin Wormington <kworm@SOFNET.COM>
Compromise:crash NT machines remotely
Vulnerable Systems:Windows NT 4.0 with RAS PPTP running
Date:26 November 1997
Exploit & full info:Available here


Solaris Statd exploit
Description:Solaris 2.5.1 x86 remote overflow for statd. There is apparently an earlier patch which doesn't fix the problem.
Author:Anonymous
Compromise: root (remote)
Vulnerable Systems:Solaris 2.5.1 x86 is what this exploit is written for. According to a later CERT advisory, vulnerable systems include Digital UNIX (4.0 through 4.0c), AIX 3.2 and 4.1, Solaris 2.5, 2.51 and SunOS 4.1.* for both X86 and SPARC
Date:24 November 1997
Exploit & full info:Available here


XFree86 (and apparently other X11R6 XC/TOG derived servers) -config insecurity
Description:XFree86 is setuid root in many cases and takes a -config option to use a different config file. Unfortunately it doesn't check permissions on this file so you can (for example) read the first line of /etc/shadow (printed in the warning message)
Author:plaguez <dube0866@eurobretagne.fr>
Compromise:Read files that you shouldn't have permissions for
Vulnerable Systems:Those with a suid root XFree86 X server as well as some other X servers. This affects many Linux (and probably FreeBSD/OpenBSD)boxes.
Date:21 November 1997
Exploit & full info:Available here


The LAND attack (IP DOS)
Description:Sending a packet to a machine with the source host/port the same as the destination host/port crashes a lot of boxes.
Author:m3lt <meltman@LAGGED.NET>
Compromise:Remote DOS attack (reboots many systems)
Vulnerable Systems:Windows95, Windows NT 4.0, WfWG 3.11, FreeBSD
Date:20 November 1997
Exploit & full info:Available here


Symlink problems with fstab and advfsd in OSF1
Description:These programs create /tmp files that will follow symlinks and lcobber system files
Author:Efrain Torres Mejia <etorres@POLLUX.JAVERIANA.EDU.CO>
Compromise: root (local)
Vulnerable Systems:Digital Unix OSF1 V4.0
Date:18 November 1997
Exploit & full info:Available here


Kernel Buffer Overflow in the ISDN subsystem
Description:When dialing, the old Linux ISDN drivers copied everything after ATD into a 40 char stack buffer (!).
Author:Andi Kleen <ak@muc.de>
Compromise: root (local)
Vulnerable Systems:Linux 2.0.31, perhaps earlier.
Date:16 November 1997
Exploit & full info:Available here


Core file problem with Digital Unix 4.0
Description:With dbx you can cause suid root programs to core dump and clobber system files
Author:John McDonald <jmcdonal@osprey.unf.edu>
Compromise: root (local)
Vulnerable Systems:Digital Unix 4.0 and 4.0B
Date:16 November 1997
Notes:I wish more people would send me their exploits like John did ... this way I'm less likely to miss them.
Exploit & full info:Available here


Terminal hijacking via pppd
Description:pppd offers read/write access to any tty. This allows a man in the middle attack for trojan terminals as well as other mischief. Also it allows users to freely dial out with the modem (often not a good idea).
Author:David Neil <theoe@EUROPA.COM>
Compromise:Hijack terminals, dial arbitrary numbers with the modem, other mischief.
Vulnerable Systems:Those running pppd. Many linunx boxes, perhaps some BSD, solaris.
Date:15 November 1997
Exploit & full info:Available here


Linux and Windows IP fragmentation (Teadrop) bug
Description:Win* and Linux deal with overlapping IP fragments in an incorrect manner which allows the systems to be crashed remotely.
Author:Apparently datagram in flip.c
Compromise:Remote DOS attack
Vulnerable Systems:Windows NT 4.0, Win95 , Linux up to 2.0.32
Date:15 November 1997
Notes:I also included a program called "syndrop" which is a modified version of teardrop (exploits an M$ SYN sequence bug.
Exploit & full info:Available here


Redhat 4.2 X11 /tmp/.X11-unix permissions problem
Description:Any local user can destroy X service by moving (or deleting) the UNIX domain socket redhat puts in /tmp/.X11-unix/X0 . Redhat apparently forgot the sticky bit. I think this works in Redhat 4.0 too.
Author:Carlo Wood <carlo@RUNAWAY.XS4ALL.NL>
Compromise:Screw up X (local)
Vulnerable Systems:Thos running the Redhat 4.2 and 4.0 Linux distributions.
Date:14 November 1997
Exploit & full info:Available here


Overflow in suidperl 5.003
Description:Overflow (via sprintf()) in the mess() function in suidperl
Author:Pavel Kankovsky <peak@kerberos.troja.mff.cuni.cz>
Compromise: root (local)
Vulnerable Systems:Thos running suid-perl 5.003, this includes many Linux, *BSD, Solaris and UNIX boxes in general.
Date:13 November 1997
Exploit & full info:Available here


Digital Unix xterm overflow
Description:Patch kit 5 includes a replacement xterm which can be forced to dump core and clobber system files. A buffer overflow may also exist.
Author:Tom Leffingwell <tom@sba.miami.edu>
Compromise: root (local)
Vulnerable Systems:Digital Unix 4.0B *with* patch kit 5
Date:12 November 1997
Exploit & full info:Available here


Slackware lizards suid-root problem
Description:The lizards game is NOT intended to be suid root, but Slackware 3.4 sets it that way anyway. This makes it trivial to become root through code like system("clear"), etc.
Author:SUID <suid@BOMBER.STEALTH.COM.AU>
Compromise: root (local)
Vulnerable Systems:Linux boxes using the Slackware 3.4 (earlier?) distributions.
Date:12 November 1997
Exploit & full info:Available here


Security Dynamics FTP server core problem
Description:It is possible to cause this server to dump core while ftping in. The core file will clobber files and also contains crypt(3)ed passwords.
Author:sp00n <sp00n@COUPLER.300BAUD.COM>
Compromise: root (local)
Vulnerable Systems:Solaris 2.5 running Security Dynamics' FTP server (Version 2.2) perhaps other versions.
Date:12 November 1997
Exploit & full info:Available here


Core bug in the Security Dynamics ftp server
Description:typical core file bug
Author:sp00n <sp00n@COUPLER.300BAUD.COM>
Compromise: root (local)
Vulnerable Systems:Those running the Security Dynamics FTP server (Version 2.2). This is available at least for solaris boxes.
Date:12 November 1997
Exploit & full info:Available here


Cybercash 2.1.2 insecurities
Description:A number of insecurities in Cybercash
Author:Megan Alexander <malexander@COMMANDCOM.COM>
Compromise:Get credit card numbers, plaintext password registry settings, tons of fun stuff!
Vulnerable Systems:Windows95 and NT systems running Cybercash 2.1.2 or Verifone vPOS
Date:11 November 1997
Exploit & full info:Available here


Cisco password decryption
Description:Cisco passwords can be trivially decrypted although this isn't really the fault of Cisco (since the router itself needs to be able to decrypt them).
Author:Jared Mauch <jared@puck.nether.net>
Compromise:Obtain extra access to Cisco routers
Vulnerable Systems:Cisco routers
Date:11 November 1997
Exploit & full info:Available here


Exchange & Outlook client extensions problem
Description:Anyone can register "extensions" to Exchange Client or Outlook which cause evil things to happen for various events. Typical idiotic Microsoft bug.
Author:Martin Stanek <stanek@DCS.FMPH.UNIBA.SK>
Compromise:Steal mail, cause users to run malicious code, etc.
Vulnerable Systems:Microsoft systems where multiple users run Outlook or Exchange client
Date:9 November 1997
Exploit & full info:Available here


Security hole in iCat Carbo Server 3.0
Description:Another pathetic hole, this one allows people to view any file on the web server (which the web server process owner can view)
Author:Mikael Johansson <Mikael.Johansson@ABC.SE>
Compromise:View files on remote web servers, maybe even filch credit card numbers!
Vulnerable Systems:Those running iCat Carbo Server (ISAPI, Release) Version 3.0.0
Date:8 November 1997
Exploit & full info:Available here


BRU (Backup and Recovery Utility) poor permissions
Description:This commercial UNIX backup program creates the /usr/local/lib/bru directory mode 777. This directory apparently contains sources. Enough said.
Author:Kyle Amon <amonk@GNUTEC.COM>
Compromise: root (local)
Vulnerable Systems:Any running vulnerable version of BRU (There is a Linux version, probably also Solaris and other *NIX).
Date:8 November 1997
Exploit & full info:Available here


Intel "f00f" Pentium bug
Description:A bug in the Intel Pentium (and Pentium + MMX) chips allows usermode processes to crash the system by executing the invalid instruction 0xf00fc7c8
Author:Sent through an anonymous remailer
Compromise:Users who can run code on the system can totally freeze the system
Vulnerable Systems:Those running on a Pentium including versions of Linux, Dos, WinNT, Win95, SolarisX86, etc.
Date:8 November 1997
Exploit & full info:Available here


Attachments to Office files not encrypted
Description:Not only is the "encryption" used for Microsoft Office applications hopelessly weak, but attachments are not encrypted at all.
Author:lustiger@att.com
Compromise:Read attachments to "encrypted" Office documents without having to spend 30 seconds decrypting them.
Vulnerable Systems:Microsoft Office 95 and 97
Date:7 November 1997
Exploit & full info:Available here


Kerberos $KRBTKFILE hole
Description:the rsh, rcp, and rlogin included in the kth-krb4 Kerberos package will blindly use any ticketfile given in $KRBTKFILE, even if it is owned by another user and unreadable by the current user!
Author:Mattias Amnefelt <mattiasa@stacken.kth.se> finally gave real information on the bug (thanks are due to him!). I don't know who discovered it originally.
Compromise:Use other people's ticket files (which are often stored in /tmp , just find one and set $KRBTKFILE appropriately.
Vulnerable Systems:Those runing Kerberos kth-krb4 .
Date:6 November 1997
Exploit & full info:Available here


Kerberos KRBTKFILE ticketfile vulnerability
Description:Suid root programs in the Kerberos 4 suite don't check permissions on $KRBTKFILE before using it for authentication.
Author:Mattias Amnefelt <mattiasa@stacken.kth.se>
Compromise:Spoof Kerberos authentication
Vulnerable Systems:Those running Kerberos 4 with rsh,rcp, or rlogin suid-root .
Date:6 November 1997
Exploit & full info:Available here


ftp mget vulnerability
Description:If the nlist caused by a mget returns a file like /etc/passwd , most ftp clients seem to (try to) overwrite/create it without signaling anything wrong. You can also use files with names like "|sh" to execute arbitrary commands.
Author:I don't recall who found it first, in the appended post af@c4c.com gives an example of the bug using Linus slackware
Compromise:ftp servers can compromise clients who use mget to d/l files
Vulnerable Systems:ftp clients on Linux, AIX, HP/UX, Solaris 2.6, and probably many other systems
Date:3 November 1997 was when this example was posted (the bug was found a while back)
Exploit & full info:Available here


Micro$oft Internet Explorer 4 res:// overflow bug
Description:There is a standard buffer overflow in Microsoft's parsing of the new res:// URL protocol.
Author:DilDog <dildog@L0PHT.COM>
Compromise:Execute arbitrary code on the machines of Windows users who connect to your web pages.
Vulnerable Systems:Windows 95 boxes running IE 4.0
Date:1 November 1997
Exploit & full info:Available here


Security holes in Metamail
Description:Some metamail scripts (such as sun-audio-file) call innapropriate helper-apps (like uudecode) which allow things like overwriting files on the system.
Author:Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
Compromise:Obtain access to the account running metamail.
Vulnerable Systems:Those running vulnerable versions of metamail (often Elm users). Redhat linux 4.x uses metamail in some cases.
Date:24 October 1997
Exploit & full info:Available here


BSD color_xterm xlib overflow
Description:Standard buffer overflow, I believe the root of this is in the X libraries
Author:Ladislav Bukvicka <Ladislav.Bukvicka@EUNET.CZ>
Compromise: root (local)
Vulnerable Systems:Many systems vulnerable, but this particular exploit is for BSD
Date:23 October 1997 is when this exploit was published, but the hole is well known.
Exploit & full info:Available here


BSDI exploit for color_xterm and kterm
Description:standard overflow
Author:Ladislav Bukvicka <Ladislav.Bukvicka@EUNET.CZ>
Compromise: root (local)
Vulnerable Systems:BSDI 2.1
Date:23 October 1997
Exploit & full info:Available here


AIX xdat overflow
Description:Typical buffer overflow, this time with $TZ in AIX's xdat program
Author:Unknown
Compromise: root (local)
Vulnerable Systems:AIX 4.1, 4.2
Date:22 October 1997
Exploit & full info:Available here


Gather all mailing list members through SMTP expn command
Description:In some cases it is possible to determine all the subscribers of a mailing list, even if you have disabled commands like "who" in your majordomo (or other listserv) software.
Author:"Christopher M. Conway" <cmconwa@SANDIA.GOV>
Compromise:unauthorized people can obtain subscriber lists.
Vulnerable Systems:Those running majordomo in a vulnerable fashion
Date:22 October 1997
Exploit & full info:Available here


in.telnetd tgetent buffer overflow
Description:By specifying an alternate terminal capability database with huge entries, you can overflow programs (like telnet, possibly xterm in some cases) which call tgetent() expecting a reasonable-length buffer.
Author:Secure Networks, INC
Compromise:In some cases, root (remote)
Vulnerable Systems:BSD/OS v2.1,Theo de Raadt mentions that you might be able to attack the suid xterm program locally with this hole to gain root access (possibly Linux, as well as other BSDs)
Date:21 October 1997
Notes:I have appended an exploit for BSDI in the addendum section.
Exploit & full info:Available here


Kill syslogd remotely on solaris boxes
Description:There is a problem where syslogd will crash if it can't do a DNS lookup on the source IP it get the message from.
Author:lb - STAFF <lb@POSH.INEXWORKS.NET>
Compromise:Kill syslogd (I'm sure hackers would love to do that before launchign a real attack)
Vulnerable Systems:Solaris 2.5, 2.51 both Sparc and x86
Date:21 October 1997
Exploit & full info:Available here


Overfow in the Ideafix development environment
Description:standard overflow, in $TERM
Author:Bst Perez Companc <bst@INAME.COM>
Compromise: root (local)
Vulnerable Systems:Any systems running flawed version of ideafix, this exploit is for Linux
Date:19 October 1997
Exploit & full info:Available here


NT Syscalls insecurity
Description:In this excellent paper, Solar Designer points out a number of serious flaws in the Micro$oft NT syscall implementations. He demonstrates code that will crash NT boxes, and points out that even more serious holes could probably be found by examining other syscalls.
Author:Solar Designer <solar@FALSE.COM> (This guy rocks!)
Compromise:Crash NT, possibly bypass security
Vulnerable Systems:Windoze NT 4.0 and earlier
Date:19 October 1997
Exploit & full info:Available here


NT SetThreadPriority() hole
Description:NT SetThreadPriority call resets a Thread's time quantum, possibly allowing the process to run forever and hog available resources.
Author:ntinternals.com
Compromise:NT local DoS
Vulnerable Systems:Windoze NT
Date:19 October 1997
Exploit & full info:Available here


PHP mlog.html and mylog.html vulnerabilities
Description:Trivially read any file on the remote system by exploiting these cgi scripts
Author:bryan berg <km@UNDERWORLD.NET>
Compromise:remotely read any httpd-readable file on the remote system
Vulnerable Systems:Those running vulnerable versions of the PHP distribution.
Date:19 October 1997
Exploit & full info:Available here


open() on BSD succeeds and cedes valid fd with the argument "-1"
Description:You can't read a file you shouldn't be able to, but by feeding bad args to open, you can get a valid file descriptor and do inappropriate ioctl's to it. This is especially important for certain devices.
Author:explorer@flame.org
Compromise:DoS, possible other uses
Vulnerable Systems:*BSD
Date:17 October 1997
Exploit & full info:Available here


Bad registry permissions on NT allows users to defeat security restrictions
Description:Users can set registry settings like HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to run programs at startup in a heightened security context.
Author:Unknown (Aleph One?)
Compromise:heighten privileges on NT
Vulnerable Systems:NT 3.5, 3.51, and 4.0 default configuration
Date:17 October 1997
Exploit & full info:Available here


Spy on IE users' files
Description:A hole in IE 4.0 allows web pages to read arbitrary files on a users hard drive.
Author:Jabadoo software (www.jabadoo.de)
Compromise:web servers can steal files from people who visit.
Vulnerable Systems:Those running Micro$oft Internet Explorer 4.0
Date:17 October 1997
Exploit & full info:Available here


Count.cgi remote overflow
Description:standard buffer overflow, this time in Count.cgi
Author:Nicolas Dubee <dube0866@eurobretagne.fr>
Compromise:local or remote execution of arbitrary code
Vulnerable Systems:Those running a vulnerable version of Muhammad A. Muquit's wwwcount
Date:16 October 1997
Exploit & full info:Available here


MS exchange/service user problems
Description:Apparently many people use service accounts for Exchange. Apparently, those also generally don't have auto-account-disabling or password expiration, which makes exchange a great target for brute-force password guessing
Author:Russ <Russ.Cooper@RC.ON.CA> and Geremy Cohen
Compromise:Hack a Windoze box
Vulnerable Systems:Windoze NT running Exchange 5.0 as a service account
Date:15 October 1997
Exploit & full info:Available here


Overflow in Seattle Lab Sendmail v2.5
Description:Overflow in the username given to this program when sending mail
Author:David LeBlanc <dleblanc@ISS.NET> (Who is a loser, BTW)
Compromise:Lame DoS, possible remote execution of commands
Vulnerable Systems:Windoze NT running Version 2.5 (probably earlier also) of Seattle Lab Sendmail for NT
Date:14 October 1997
Exploit & full info:Available here


Micro$oft's attempt at FrontPage 98 server-side extensions for Apache
Description:The setuid root program (fpexe) which comes with the FrontPage extensions is a pathetic joke security-wise, as Marc Slemko demonstrates.
Author:Marc Slemko <marcs@ZNEP.COM>
Compromise: root (remote)
Vulnerable Systems:Those using the Micro$oft FrontPage extensions to Apache under UNIX.
Date:11 October 1997
Exploit & full info:Available here


Count.cgi hole
Description:You can read any .gif or .jpg on a server (readable by httpd daemon, of course) by giving a "image=../../../../path" type argument
Author:Razvan Dragomirescu <drazvan@kappa.ro>
Compromise:read protected .gif and .jpeg files (remote)
Vulnerable Systems:Those running version 2.3 of Muhammad A. Muquit's wwwcount
Date:10 October 1997
Exploit & full info:Available here


imapd core hole
Description:imapd can leave privileged info in core files when crashed by a user.
Author:mudge@L0PHT.COM
Compromise:Obtain shadowed password file
Vulnerable Systems:Those running imap-4.1Beta (or presumably earlier releases) on systems which allow core dumps by processes that have changed UIDs.
Date:8 October 1997
Exploit & full info:Available here


SNMP holes in Windoze NT 4.0
Description:One bug described allows you to dump all domain usernames with smnpwalk. Another allows you to delete WINS database records remotely. Micro$oft is pathetic. Nobody should by their products. Get Linux, or OpenBSD, or Solaris.
Author:"Rouland, Christopher J" <CRouland@EXAMNYC.lehman.com>
Compromise:Determine usernames, potenet DoS
Vulnerable Systems:Those running WindoZe 4.0 Server with snmp
Date:8 October 1997
Exploit & full info:Available here


DNS Games
Description:Some games you can play with resolvers (if you control a DNS server) Phillip Jaenke shows some examples.
Author:"Phillip R. Jaenke" <prj@NLS.NET>
Compromise:Trick resolvers
Vulnerable Systems:Those with flaky resolvers (like gethostbyname()) (I guess). It is a wierd sort of problem.
Date:6 October 1997
Exploit & full info:Available here


xsecurekeyboard problem
Description:Many people think that by clicking "secure keyboard" on their xterm, they are safe froom snoopers. This is not always true, as Christopher Creutzig demonstrates by making 100 connect attempts per second
Author:Christopher Creutzig <christopher@nescio.foebud.org>
Compromise:read someone's keystrokes if you can connect to their Xserver, even if they are using the "secure keyboard" feature
Vulnerable Systems:XFree86, probably other implementations
Date:6 October 1997
Exploit & full info:Available here


Redhat Linux 4.2 printfilter problems
Description:Redhat 4.2 uses the "printfilter" software package called by lpd to determine the type of a file, unfortunately this program calls others which were not made to handle malicious data (such as groff).
Author:"KSR[T]" <ksrt@dec.net>
Compromise: root (local)
Vulnerable Systems:Redhat Linux 4.2 (maybe earlier)
Date:6 October 1997
Exploit & full info:Available here


JetDirect printer card problem
Description:The JetDirect card with TCP/IP enabled will by default open high ports (9099 and 9100) which can be used to print arbitrary files
Author:Klaus Steding-Jessen <jessen@AHAND.UNICAMP.BR>
Compromise:DoS Attack (send 500 page documents), or free printing if you have access to the printer in question
Vulnerable Systems:Those using JetDirect with TCP/IP enabled and the default unrestricted connections.
Date:4 October 1997
Notes:Cool! He used my here


Security problems in the lpd protocol
Description:The protocol for lpd (Line Printer Daemon, RFC 1179) seems to have a number of insecurities, as discussed in this post
Author:Bennett Samowich <a42n8k9@REDROSE.NET>
Compromise: root (remote)
Vulnerable Systems:Those running a vulnerable version of lpd, many Linux and *BSD versions are vulnerable
Date:2 October 1997
Exploit & full info:Available here


mSQL authentication holes
Description:mSQL has a number of problems in its attempts at authentication, as well as another serious problem if the user doesn't use ACLs
Author:"John W. Temples" <john@KUWAIT.NET>
Compromise:remotely manipulate a mSQL database
Vulnerable Systems:Those running vulnerable versions of mSQL, many Linux boxes run this
Date:27 September 1997
Exploit & full info:Available here


Samba Remote buffer overflow
Description:Samba reads in a user's password into a fixed length buffer, allowing execution of arbitrary code on the target machine
Author:ADM
Compromise: root (remote)
Vulnerable Systems:Those running the SAMBA SMB server versions earlier than 1.9.17p2. The exploit is for Linux/X86
Date:26 September 1997
Notes:ADM send me this before it went out on Bugtraq, and then they sent me a newer version (appended). Thanks!
Exploit & full info:Available here


kerneld auto-load of modules requested by unprivileged users
Description:If an unprivileged user types 'ifconfig <devname>' the system will try to load the kernel module /lib/modules/<kernel ver>/fs/devname.o . Thus any unprivileged user can load any modules in your module directory.
Author:Zygo Blaxell <zblaxell@fiction.org>
Compromise:Could be a DoS, or a more serious security problem, depending on the modules you have available.
Vulnerable Systems:Linux with vulnerable version of kerneld installed
Date:26 September 1997
Exploit & full info:Available here


M$ IIS 3.0 newdsn.exe problem
Description:newdsn.exe under MS IIS 3.0 allows creation of arbitrary files (just names, not contents) in the wwwroot directory tree
Author:Vytis Fedaravicius <vytix@FLOYD.KTU.LT>
Compromise:create bogus files on webservers, it isn't clear if you can overwrite files. A DoS attack at minumum
Vulnerable Systems:Those running Micro$oft IIS v.3.0 with newdsn.exe installed. This includes a number of WinNT machines.
Date:25 September 1997
Exploit & full info:Available here


HP/UX newgroup hole
Description:Standard buffer overflow
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable newgroup,HP 9000 Series 700/800s running versions of HP-UX 9.X & 10.X
Date:25 September 1997
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


Oracle webserver insecurities
Description:Anyone who is given control of an oracle webserver account can trivially become root
Author:hurtta+zz@OZONE.FMI.FI
Compromise: root (local)
Vulnerable Systems:Those running Oracle Wbserver 2.1 or Oracle Webserver 1.0 (included to Oracle7 Server and Oracle7 Workgroup Server)
Date:19 September 1997
Exploit & full info:Available here


ARP and ICMP redirection games
Description:This excellent article/code from Yuri points out a number of (mostly known) problems with the ARP and ICMP protocols/implementations
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise:spoof as a trusted host, redirect trafic through your host, DoS
Vulnerable Systems:Many versions of Linux, numerous hubs/routers. AFAIK, IRIX, HP-UX, *BSD, and probably Windoze can be spoofed with gratuitous ARP
Date:19 September 1997
Exploit & full info:Available here


Asynchronous I/O signal handling
Description:Two problems in the Asynchronous I/O handling of many *NIX boxes. The most important ones allows SIGIO, SIGURG, and possiby other signals to be sent to arbitrary processes on the system (from unpriviliged code)
Author:"Thomas H. Ptacek" <tqbf@RDIST.ORG> wrote the advisory, Alan Peakall found the original problem
Compromise:In some cases you can kill or disrupt many system processes
Vulnerable Systems:*BSD, IRIX, probably others
Date:15 September 1997
Exploit & full info:Available here


wu_ftpd recursive nlist DOS
Description:An attacker can long into a wu_ftpd server and do a recursive nlist that hogs a tremendous amount of system resources
Author:Josef Karthauser <joe@pavilion.net>
Compromise:lame DOS
Vulnerable Systems:Those running wu_ftpd, most Linux and *BSD systems run this
Date:9 September 1997
Exploit & full info:Available here


AIX bugfiler hole
Description:running -b bugfiler <user> <directory> allows you to create wierd files in the directory (owned by <user>).
Author:Johannes Schwabe <schwabe@rzaix530.rz.uni-leipzig.de>
Compromise:In some cases root privileges can be gained (local)
Vulnerable Systems:AIX 3.*
Date:8 September 1997
Exploit & full info:Available here


CC:Mail password vulnerability
Description:CC:Mail stores cleartext passwords in a "hidden" batch file which is apparently read/writeable by all users on NT (and of course is on W95)
Author:Carl Byington <carl@five-ten-sg.com>
Compromise:Take over a CC:Mail postoffice
Vulnerable Systems:Windoze NT/95 running cc:Mail release 8
Date:8 September 1997
Exploit & full info:Available here


SunOS rlogin overflow
Description:Aparrently an overflow in parsing argv
Author:I have no clue, _PHANTOM_ <phantom@lhab-gw.soroscj.ro> sent it to me
Compromise: root (apparently) (local)
Vulnerable Systems:SunOS
Date:8 September 1997
Notes:Someone confirmed to me that this works with Solaris 2.5.1 but not 2.6. Anyoen care to try SunOS 4.x?
Exploit & full info:Available here


Uploader.exe insecurity
Description:pathetic insecurity in uploader.exe that comes with O'reilly's webserver 'website'
Author:Herman de Vette <herman@info.nl>
Compromise:run arbitrary commands on the web server (by placing arbitrary cgi scripts there)
Vulnerable Systems:Those running O'reilly's webserver, website. Mostly Windoze NT and W95 boxes. Some versions of 1.1 and 2.0beta have this vulnerability.
Date:4 September 1997
Exploit & full info:Available here


Pico symlink vulnerability
Description:Typical symlink problem, in pico (the editor used by pine)
Author:dynamo@IME.NET
Compromise:overwrite files owned by the user running pico
Vulnerable Systems:Those running a vulnerable version of pico
Date:2 September 1997
Exploit & full info:Available here


Linux exploit code for the already known buffer overflow in sperl 5.003
Description:Linux exploit code for the already known buffer overflow in sperl 5.003
Author:ggajic@FREENET.NETHER.NET
Compromise: root (local)
Vulnerable Systems:Those with sperl 5.003 installed suid, the exploit is for linux
Date:2 September 1997
Exploit & full info:Available here


Pathetic hole in HP/UX 10.20 CUE
Description:the cue (character-based User Environment) program that ships with HP/UX 10.20 uses $LOGNAME to verify who the user is!@#$@#!$ and it has an exploitable symlink problem
Author:Leonid S Knyshov <wiseleo@JUNO.COM>
Compromise: root (local)
Vulnerable Systems:HP-UX 10.20, probably others
Date:1 September 1997
Exploit & full info:Available here


Hole in the vacation program
Description:The standard UNIX vacation program doesn't do enough checking on its input (specifically the From: line in the mail) before sending it to other programs (sendmail) for processing
Author:bukys@CS.ROCHESTER.EDU apparently reported it to CERT & SUN on June 1, 1994 but nothing happened. This vulnerability report is from "Secure Networks Inc." <sni@SILENCE.SECNET.COM>
Compromise:Run arbitrary commands remotely as the user running vacation
Vulnerable Systems:At least some versions of AIX, FreeBSD, NetBSD, and OpenBSD. Other systems if they have installed the vacation program themselves or a different version of sendmail.
Date:1 September 1997
Exploit & full info:Available here


Hole in the vacation program
Description:The standard UNIX vacation program doesn't do enough checking on its input (specifically the From: line in the mail) before sending it to other programs (sendmail) for processing
Author:bukys@CS.ROCHESTER.EDU apparently reported it to CERT & SUN on June 1, 1994 but nothing happened. This vulnerability report is from "Secure Networks Inc." <sni@SILENCE.SECNET.COM>
Compromise:Run arbitrary commands remotely as the user running vacation
Vulnerable Systems:At least some versions of AIX, FreeBSD, NetBSD, and OpenBSD. Other systems if they have installed the vacation program themselves or a different version of sendmail.
Date:1 September 1997
Exploit & full info:Available here


MAC tcp stack syn problem
Description:Apparently some Macintoshes crash from a high rate of TCP SYN packets (IE through a portscan)
Author:nomad@APOLLO.TOMCO.NET
Compromise:crash a mac
Vulnerable Systems:Mac TCP system 7.1 and 7.8
Date:31 August 1997
Notes:According to Jake Luck this problem was solved with OpenTransport 1.2
Exploit & full info:Available here


Security problems in CVS
Description:If CVS is run as root with pserver as suggested in the info page, any user can access any account (with the possible exception of root)
Author:Elliot Lee <sopwith@REDHAT.COM>
Compromise:access any nonuser account (remote)
Vulnerable Systems:Those running a vulnerable version of CVS pserver as suggested in the CVS info page. CVS 1.9.14 has this fixed
Date:29 August 1997
Exploit & full info:Available here


Overwrite people's files through IE3 with malicious forms
Description:MS Internet Exploder 3 will overwrite local files if the remote form asks it to.
Author:Andrew McNaughton <andrew@SQUIZ.CO.NZ>
Compromise:Malicious web page can overwrite files belonging to visitors who use M$ IE3
Vulnerable Systems:Microsoft Explorer version 3.0 PPC running on a mac, probably other IE3 versions.
Date:29 August 1997
Exploit & full info:Available here


Eggdrop set owner vulnerability
Description:Apparently some versions of eggdrop allow people with master access to become owner with .set owner <nick>. You can then do stuff like .tcl exec cat /etc/passwd
Author:-*- Chotaire -*- <chotaire@CHOTAIRE.NET>
Compromise:obtain complete access to account running eggdrop bot (if you have master access already)
Vulnerable Systems:Those running vulnerable versions of eggdrop (an IRC bot)
Date:29 August 1997
Exploit & full info:Available here


Linux setrlimit and sysctl integer overflows
Description:setrlimit() Linux kernel call (up to 2.0.29) does a signed comparison only on the resource changes, which allows users to increase their resource limits by passing negative numbers. Also, a sysctl() problems allows generation of kernel faults by unpriviliged users.
Author:Solar Designer <solar@FALSE.COM>
Compromise:bypass resource limits
Vulnerable Systems:Linux <= 2.0.29
Date:28 August 1997
Exploit & full info:Available here


syslogd spoofing
Description:remote syslogd uses udp and is easily spoofable, as Yuri demonstrates in this excellent paper. Also, there isn't an easy way to turn off remote listening from AIX boxes.
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise:spoof syslogd, add fake log messages, overflow it, etc.
Vulnerable Systems:Those that have syslogd listening for remote messages, AIX is especially vulnerable.
Date:27 August 1997
Exploit & full info:Available here


UNIX Oracle stores "system" account passwords in plaintext
Description:plaintext passwords are stored in $ORACLE_HOME/network/config/sql/add*_net.sql
Author:Markus Fleck <fleck@informatik.uni-bonn.de>
Compromise:With these plaintext passwords, database information can be manipulated
Vulnerable Systems:Those running Oracle 7.1, 7.2, and probably earlier versions
Date:24 August 1997
Notes:I like it when people send me security holes like this. I wish it would happen more often! <hint, hint, mail me.
Exploit & full info:Available here


Check for existance of files on systems runninng mountd
Description:Some mountd implementations apparently give different error messages depending on whether the mountpoint requested exists or not.
Author:Peter <deviant@UNIXNET.ORG>
Compromise:query for existance of arbitrary files (by name). This could help determine security flaws present on a remote system.
Vulnerable Systems:Those running vulnerable mountd. This includes at least some versions of AIX, Linux, *BSD, SunOS, Solaris, etc.
Date:24 August 1997
Exploit & full info:Available here


A perl eval error in majordomo allows remote execution of arbitrary commands
Description:A Perl eval() in Majordomo is not quite paranoid enough, allowing user commands to slip through with clever use of IFS.
Author:Razvan Dragomirescu <drazvan@KAPPA.RO>
Compromise:Run commands as whatever Majordomo runs as (often group daemon). (remote)
Vulnerable Systems:Those running a vulnerable version of majordomo
Date:24 August 1997
Exploit & full info:Available here


SPOOLSS.EXE memory leak
Description:DOS attack by remotely exploiting \\server\PIPE\SPOOLSS
Author:"Holas, Ondøej" <OHolas@EXCH.DIGI-TRADE.CZ>
Compromise:Stupid DOS attack
Vulnerable Systems:WindoZE machines such as NT
Date:21 August 1997
Notes:Holas' message comes first, then the exploit he mailed to me.
Exploit & full info:Available here


Overflow in bash's PS1 (promptline) and a neat overflow program
Description:An overflow in bash, but since it isn't setuid the repercusions aren't entirely clear. Maybe someone can find something useful to do with this. At a minimum, the "eggo" buffer overflow code ought to be useful.
Author:Razvan Dragomirescu <drazvan@kappa.ro>
Compromise:none (actually it might be able to get you out of some captive shells, and it might have other potential).
Vulnerable Systems:Those running bash 2.0 or earlier.
Date:21 August 1997
Exploit & full info:Available here


root bug in IRIX game spaceware
Description:Root hole in SpaceWare trackball software
Author:"J.A. Gutierrez" <spd@GTC1.CPS.UNIZAR.ES>
Compromise: root (local)
Vulnerable Systems:Presumably any system running spaceware 7.3 v1.0 (probably earlier). I don't know if it is IRIX specific. From the message it sounds like there are likely other holes in the program.
Date:20 August 1997
Exploit & full info:Available here


Write to arbitrary files (owned by your UID) from pine
Description:The Pine 3.95 & 3.96 attachment viewer will overwrite any file owned by the user running pine in his directory. You can put arbitrary data in this file. This "hole" is obviously only useful if Pine is being used as a restricted shell (there are numerous other problems with this, too).
Author:Jesse Brown <bextreme@POBOX.COM>
Compromise:break out of restricted pine "shell"
Vulnerable Systems:Systems offering pine 3.95 & 3.96 restricted accounts to untrusted users
Date:20 August 1997
Exploit & full info:Available here


DG/UX in.fingerd hole
Description:Apparently (and amazingly) current dgux ships with a finger daemon that allows remote users to pipe commands. IE you can 'finger "|/bin/id@host'. This is made worse because many of these systems apparently run in.fingerd as root (!).
Author:George Imburgia <gti@HOPI.DTCC.EDU>
Compromise: remotely run arbitrary programs with UID that is running in.fingerd. Sometimes this means you can remotely become root .
Vulnerable Systems:dgux, versions unknown.
Date:11 August 1997
Notes:If this is true it is rather pathetic!
Exploit & full info:Available here


lpr LIBC RETURN exploit
Description:Solar Designer has done it again! Here he proves the viability of overflow exploits returning into libc functions. He includes lpr and color_xterm exploits.
Author:Solar Designer <solar@FALSE.COM>
Compromise: root (local)
Vulnerable Systems:Systems running Linux with vulnerable lpr or color_xterm suid. Even if they have stack execution disabled in some cases.
Date:10 August 1997
Notes:Solar Designer is amazing! He comes through again with another neat proof-of-concept sploit.
Exploit & full info:Available here


*BSD procfs forc() mem device hole
Description:Under the *BSD proc filesystem, /proc/#/mem access is controlled by the permissions on the file. Thus you can fork(), have the childe run something suid, and then modify that file's memory.
Author:Brian Mitchell <brian@FIREHOUSE.NET>
Compromise: root (local)
Vulnerable Systems:FreeBSD 2.2.1, probably 3.x. OpenBSD 2.1-RELEASE. Possibly BSDI.
Date:10 August 1997
Exploit & full info:Available here


NT LSA secrets
Description:This program allows you to obtain verious LSA secrets such as service passwords, cached password hashes of recent users, and a bunch of others.
Author:Paul Ashton <paul@ARGO.DEMON.CO.UK>
Compromise:The administrator (or someone who has hacked admin) of an NT box can find a lot of juicy information which M$ tried to hide.
Vulnerable Systems:Presumably just NT (4.0, maybe 3.51) boxes.
Date:9 August 1997
Exploit & full info:Available here


Trivial "encryption" (obfuscation) in ws_ftp.ini
Description:WS_FTP offers the facility for morons to store their ftp password to remote systems. It keeps this information in ws_ftp.ini in obfuscated form which is easy to decode. Additionally, some idiots have their ws_ftp.ini (including passwords) available on public internet ftp sites.
Author:Milosch Meriac <anotherPI@studbox.uni-stuttgart.de>
Compromise:Obtain cleartext passwors from ws_ftp.ini files
Vulnerable Systems:People who save passwords w/ws_ftp and keep the .ini file where it is accessible to others.
Date:9 August 1997
Notes:I have appended a simple program to "decrypt" the ini file.
Exploit & full info:Available here


The VERY popular imapd remote overflow
Description:A buffer overflow in popular imapd packages allows remote root access. This has been very widely exploited on the internet.
Author:I am not sure who discovered it, savage@apostols.org wrote the Linux/Intel exploit I have put first. I have appended another exploit to that.
Compromise: root ( remote ) (Ohhhh, shit!)
Vulnerable Systems:This exploit is for linux, but a lot of other systems using the vulnerable IMAP are susceptible.
Date:7 August 1997
Exploit & full info:Available here


Popper and qpopper symlink hole
Description:qpopper and popper use an insecure lockfile creation mechanism that allows you to read other people's mail.
Author:dynamo@IME.NET
Compromise:Read other people's mail when they fetch it via pop.
Vulnerable Systems:Those running vulnerable versions of popper and qpopper. Probably those below version 2.2
Date:7 August 1997
Exploit & full info:Available here


Block reserved ports with XFree86
Description:Unprivileged users can black reserved ports by using a high display number which wraps arround the highest possible port (65535) and causes X to listen on a <1023 port.
Author:Willy TARREAU <tarreau@AEMIAIF.LIP6.FR>
Compromise:Block privileged ports
Vulnerable Systems:Those running XFree86 as an X-server. This probably most affects systems like Linux and {Open,Free,Net}BSD.
Date:6 August 1997
Exploit & full info:Available here


Vulnerability with -C in *IBM's* version of sendmail
Description:Supposedly, /usr/lib/sendmail -C <anyfile> while display the file specified regardless of permissions. This is also true on versions of sendmail prior to 8.8.7 if they are installed setgid. They shouldn't be setgid, but an errant makefile sets them that way.
Author:"DI. Dr. Klaus Kusche" <Klaus.Kusche@OOE.GV.AT>
Compromise:Read files beyond your permissiosn.
Vulnerable Systems:the IBM sendmail on AIX 4.1.5 and sendmail prior to 8.8.7 which is installed setgid.
Date:6 August 1997
Notes:A post from Troy Bollinger at IBM clarified that you have to be in the "system" group (gid 0) in order to use the -C trick. This limits the exploit potential A LOT! Also, A post by Eric Allman is appended to Dr. Kusche's post.
Exploit & full info:Available here


SGI NIS Domain Name disclosure
Description:In what seems to be YET ANOTHER stupid SGI bug, the system is apparently "nice" enough to create a "home page" for new users in public_html/index.html or public_html/index.html.N if they already have an index.html. The problem is that this file often discloses the NIS domain name of the host, which obviously has serious repercusions.
Author:Joerg Kuemmerlen <joku@BTGIX8.BGI.UNI-BAYREUTH.DE>
Compromise:Leak of the NIS domain name.
Vulnerable Systems:SGI O2 machines, presumably IRIX 6.3, 6.4
Date:5 August 1997
Exploit & full info:Available here


Internet Explorer keeps a record of every page you've visit since it was installed!
Description:*.DAT files in the Win95/NT "Temporary Internet Files" directory store every move you make on the web.
Author:From something called "technet"
Compromise:Huge potential privacy violation if you can get physical access to a computer running IE. Also some URLs have access information encoded in them.
Vulnerable Systems:Those running M$ Internet Explorer 4.0 or earlier. Mostly W95/NT boxes.
Date:5 August 1997
Notes:Apparently %SystemRoot%\History also contains .DAT files with the same information. Asking IE to clear the cache doesn't eliminate this, see the post in the addendum.
Exploit & full info:Available here


Hole in the *BSD implementation of rfork()
Description:The rfork() system call allows the creation of a new process which can share file descriptor tables with its parent. Unfortunately a suid program exec'd by the child still shares those descriptors with the parent! The implecations are rather obvious (and scary).
Author:"Thomas H. Ptacek" <tqbf@enteract.com>,Danny
Compromise:Dulai
Vulnerable Systems:All 4.4BSD operating systems, including OpenBSD 2.1, FreeBSD 3.0, possibly
Date:2 August 1997
Notes:This is another kick-ass advisory! Will CERT ever realize the benefits of providing details and offering credit where it is due??? Also note that plan9 is NOT vulnerable.
Exploit & full info:Available here


SSH localforward vulnerability
Description:SSH forgets to check that a user is root before forwarding privileged ports as directed by the users ~/.ssh/config . This could cause a number of very serious security holes.
Author:Kristof Van Damme <aeneas@sesuadra.org>
Compromise:Redirect privileged ports to arbitrary ports on other (or the same) hosts.
Vulnerable Systems:Anything running ssh 1.2.20 (probably earlier versions too).
Date:2 August 1997
Notes:Also note that some implementations of sshd will allow you to give a portno like 65616, which is really port 80 when the 2 byte unsigned short is wrapped around. And remember that in some cases you can fool these things by giving them a negative number, but fortunately ssh catches that (albeit probably accidentally with (port < 1024) check.
Exploit & full info:Available here


Another stupid SGI hole
Description:By default SGIs (IRIX 6.3, probably 6.4) will take files of type application/x-sgi-exec or application/x-sgi-task and allow them to run /sr/sysadm commands. Thus you can put a malicous file on your web page and hack root on SGI boxes that connect to it.
Author:Arthur Hagen <art@kether.global-one.no>
Compromise:Trojan a webpage to gain access to the accounts of SGI users who visit it.
Vulnerable Systems:SGI IRIX 6.3, probably 6.4
Date:1 August 1997
Exploit & full info:Available here


WINS nameservice (137/UDP) flood DOS attack
Description:You can take out WINS service by sending random shit to 137/udp NETBIOS Name Service. Of course, this is true of most Micro$oft services.
Author:"Holas, Ondxej" <OHolas@EXCH.DIGI-TRADE.CZ>
Compromise:Stupid DOS attack
Vulnerable Systems:Windows systems (NT 4.0, probably 3.5 and Win95) that aren't protected by a firewall/packet filter that blocks 137/udp.
Date:1 August 1997
Exploit & full info:Available here


Remote INND buffer overflow exploit
Description:Standard overflow, nice exploit
Author:Method <method@arena.cwnet.com>
Compromise:root (remote)
Vulnerable Systems:Systems running INND versions < 1.6, the exploit seems to be for Linux x86
Date:1 August 1997
Exploit & full info:Available here


mSQL overflow and poor hostname authentication checks
Description:mSQL has several buffer overflows which allow intruders to remotely execute arbitrary code. msql2d and msqld are specific vulnerable programs. Also, mSQL doesn't do a forward lookup after resolving an IP->hostname, so it is trivial to spoof authentication by having your DNS return the hostname of an actual host.
Author:"Secure Networks Inc." <sni@SILENCE.SECNET.COM>
Compromise:run arbitrary commands remotely. Spoof access to an mSQL server.
Vulnerable Systems:Those running the mSQL server software, msqld or msql2d. Version 2.0 is vulnerable, probably earlier versions.
Date:27 July 1997
Exploit & full info:Available here


Overflow in Mailhandler 6.8.3
Description:The suid MH-6.8.3 package has several buffer overflow bugs (among other holes). Also some BSD ruserpass() libc functions have the same hole.
Author:Matt Conover <shok@COBRA.ONLINEX.NET>
Compromise: root (local)
Vulnerable Systems:Redhat Linux 4.1, although you may have to specifically enable something. Also old versions of the *BSD libc function ruserpass().
Date:26 July 1997
Notes:I appended Alan Cox's post about *BSD ruserpass() to the end. I also put some new information from Matt Conover (who sent the original post) in the addendum.. Also note that the vulnerable programs are bbc,inc,mhn,msgchk, and popi. Redhat's package mh-6.8.3-13.i386.rpm installs /usr/bin/mh/inc and /usr/bin/mh/msgchk suid ROOT.
Exploit & full info:Available here


request-route script tempfile symlink problem.
Description:The request-route script which is used with kerneld has a serious symlink /tmp file vulnerability. It always uses /tmp/request-route as its lockfile, so you don't even have to predict anything!
Author:Nicolas Dubee <dube0866@EUROBRETAGNE.FR>
Compromise:It is pretty easy to become root on vulnerable hosts.
Vulnerable Systems:Those linux boxes with kerneld/request-route set up. Redhat 4.1 and 3.0.3 are vulnerable if the sysadmin has installed this.
Date:26 July 1997
Exploit & full info:Available here


NT file execution path
Description:NT has a HORRIBLY insecure path, and there is nothing you can do about it!
Author:Jeremy Allison <jallison@WHISTLE.COM> quotes some M$ documentation which confirms the ugly rumors.
Compromise:Can you say TROJAN HORSE!
Vulnerable Systems:Windoze NT 4.0, probably earlier.
Date:25 July 1997
Exploit & full info:Available here


Solaris dtlogin core vulnerability
Description:Dtlogin apparently explicityly sets its umask 027 and when it dumps core it can leave both encrypted and UNENCRYPTED passwords of remote users available via 'strings'.
Author:Arve Kjoelen <akjoele@SIUE.EDU>
Compromise:Narf passwords from dtlogin /core
Vulnerable Systems:Solaris 2.5.1 CDE with vulnerable dtlogin.
Date:24 July 1997
Exploit & full info:Available here


NT chargen flood DOS
Description:Systems with the Simple TCP/IP Services installed will respond to broadcast UDP datagrams sent to the subnet broadcast address. You could presumably use this to attack someone else (by using your target's source address in the broadcast) or take down the NT network by having the source be port 19 of the same broadcast address.
Author:Unknown
Compromise:stupid DOS attack
Vulnerable Systems:Micro$oft NT with the Simple TCP/IP services installed. M$ has a post-SP3 fix available.
Date:23 July 1997
Exploit & full info:Available here


Expect password spy vulnerability
Description:Expect is frequently used to automate login sessions, and it is possible to spy on the information transferred through it (often passwords).
Author:Austin Schutz <tex@COLLEGENET.COM>
Compromise:Gather authentication information passwd by expect.
Vulnerable Systems:Those running expect 5.14, probably older and newer versions too.
Date:22 July 1997
Exploit & full info:Available here


AIX /usr/sbin/lchangelv overflow
Description:Standard buffer overflow
Author:"Bryan P. Self" <bryan@SCOTT.NET> ( BeastMaster V)
Compromise:gid or egid system -> root
Vulnerable Systems:AIX 4.x (at least 4.2). PowerPC platform.
Date:21 July 1997
Exploit & full info:Available here


AIX /usr/bin/X11/xlock exploit
Description:standard overflow
Author:Well known vulnerability, but "Bryan P. Self" <bryan@SCOTT.NET> posted the exploit for it.
Compromise: root (local)
Vulnerable Systems:AIX 4.x PowerPC architecture
Date:21 July 1997
Exploit & full info:Available here


Exim ~/.forward :include: overflow
Description:Standard buffer overflow.
Author:djb@koobera.math.uic.edu (D. J. Bernstein)
Compromise: root (local)
Vulnerable Systems:Anything running exim 1.62 (probably earlier). This exploit is for BSD/OS
Date:21 July 1997
Exploit & full info:Available here


AIX ping overflow
Description:standard overflow, AIX 4.2/PPC ping
Author:"Bryan P. Self" <bryan@SCOTT.NET>
Compromise: root (local)
Vulnerable Systems:Systems?: AIX 4.2, exploit for PPC platform
Date:21 July 1997
Exploit & full info:Available here


Routed broadcast ping DOS attack
Description:If you spoof a PING packet FROM your target and TO the subnet-wide broadcast address of another network, you can flood your target with all the ICMP echo replies from the hosts on the broadcast subnet.
Author:Edward Henigin <ed@texas.net>
Compromise:Stupid DOS attack
Vulnerable Systems:everybody (minimized if your provider filters out ICMP upstream, which causes major problems of its own).
Date:19 July 1997
Notes:In the addendum you'll find Tfreak's original "smurf" code for exploiting this, as well as Jimbo Bahooli's port to *BSD. I also put a UDP version by T. Freak in the addendum. Also, my program nmap will locate these evil addresses on your network with the ping (-P) scan
Exploit & full info:Available here


ld-linux.so.1.9.2 overflow
Description:Error handling code in ld.so has a buffer overflow problem. This exploit uses LD_PRELOAD to get by various problems with other methods.
Author:Was originally a KSR[T] Advisory (#2), exploit written by Dan McGuirk <mcguirk@INDIRECT.COM>
Compromise: root (local)
Vulnerable Systems:Linux boxes running ld-linux.so.1.9.2. Various people have suggested that the solaris /usr/lib/libdl.so may have a similar vulnerability. If anyone has any info on this, please mail me.
Date:19 July 1997
Notes:I've put another exploit in the addendum
Exploit & full info:Available here


JavaWebServer viewable source bug
Description:You can view the source of .jhtml files by appending a '.' or '\' to their name. ie http://target.com/authenticate.jhtml. .
Author:Brian Krahmer <brian@KRAHMER.COM>
Compromise:View the source code of .jhtml files which in some cases should be secret
Vulnerable Systems:Those running vulnerable versions of JavaWebServer for win32
Date:16 July 1997
Exploit & full info:Available here


campus cgi hole
Description:A hole very similar to the standard phf hole alows people to execute arbitrary commands through the campus cgi.
Author:Francisco Torres <ftorres@CASTOR.JAVERIANA.EDU.CO>
Compromise:Execute arbitrary commands remotely as the owner of the cgi-running process (commonly nobody or daemon).
Vulnerable Systems:Those running a vulnerable version of the campus cgi. Version 1.2 is vulnerable. It may be distributed with the NCSA server.
Date:15 July 1997
Exploit & full info:Available here


L0phtcrack 1.5 Lanman / NT password hash cracker
Description:The Lanman password hash is used by NT for authenticating users locally and over the network (MS service packs are now out that allow a different method in both cases). L0phtcrack can brute-force these hashes (taken from network logs or progams like pwdump) and recover the plaintext password. l0phtcrack 1.5 also breaks the new NT style password hashes.
Author:Mudge <mudge@l0pht.com>
Compromise:Compromise account passwords (remotely if you can sniff a server challenge.
Vulnerable Systems:NT 4.0, 3.51. I believe NT4 Service Pack 3 SYSKEY fix will defeat pwdump style utilities. MS also has a fix out to disable Lanman authentication over the network, but this breaks compatibility w/W95 and 3.11.
Date:12 July 1997
Notes:First comes a very interesting message from mudge about M$ "authentication", then comes the readme file for l0phtcrack 1.5. Next comes the source distribution in uuencoded form. You can get executables at their webpage, www.l0pht.com.
Exploit & full info:Available here


Overflow in solaris passwd (and yppasswd and nispasswd)
Description:Standard overflows
Author:Cristian SCHIPOR (skipo@SUNDY.CS.PUB.RO)
Compromise: root (local)
Vulnerable Systems:Solaris 2.X, including 2.4 and 2.5
Date:12 July 1997
Notes:I somehow missed this in my collection, thanks to the fellow (who wishes to be anonymous) who reminded me of this beauty!
Exploit & full info:Available here


WebGais forgot to strip single quotes in query string ... Oops!
Description:Webgais takes a query string, and quotes it in the perl code. But you can just close the quotes yourself, as it doesn't strip them from your query!
Author:Razvan Dragomirescu <drazvan@KAPPA.RO>
Compromise:run arbitrary commands remotely as the owner of the cgi running process.
Vulnerable Systems:Anything running a vulnerable version of WebGais
Date:10 July 1997
Notes:Remember to change the email address in the exploit!
Exploit & full info:Available here


NT fragmentation attack
Description:A flaw in the NT fragment reassembly algorithm allows you to smuggle packets to NT boxes through packet-filtering firewalls. You "hide" the TCP header in an offset IP fragment and just neglect to send the first (zero offset) packet. NT (Pre-SP3) will still happily reassemble your packet, placing the fragment with the lowest-offset at the front.
Author:Thomas Lopatic
Compromise:Talk to NT boxes behind packet-filtering firwalls
Vulnerable Systems:NT 4.0 w/o SP3 installed, and probably 3.51
Date:10 July 1997
Notes:I *LOVE* this advisory. Fully detailed ... includes source code so I don't have to spend 5 hours reproducing this. Thanks Thomas!
Exploit & full info:Available here


Overflows in libxview
Description:Standard environmental variable buffer overflows
Author:Nicolas Dubee <dube0866@EUROBRETAGNE.FR>
Compromise: root (local)
Vulnerable Systems:Those running X11 and xview 3.2p1.4, all older 3.x varified, probably earlier ones vulnerable.
Date:10 July 1997
Exploit & full info:Available here


snprintf(3c) redefined by libdb-1.85.4
Description:This idiotic library redefines snprintf() and vsnprintf() to ignore the length parameter! Thus any programs which use *nprintf() for bounds checking and link to libdb.so can be subverted! Sendmail may very well be vulnerable.
Author:Thomas Roessler <roessler@guug.de>
Compromise:subvert programs which use libdb.so
Vulnerable Systems:Linux programs using libdb.so.1.85.4, as well as other versions.
Date:8 July 1997
Exploit & full info:Available here


SunOS 4.x overflows! This example is for xterm
Description:Willy has created SunOS 4.x buffer overflow code, and gives the appended example, which overflows the X libraries.
Author:Willy TARREAU <tarreau@AEMIAIF.LIP6.FR>
Compromise: root (local)
Vulnerable Systems:SunOS 4.x for this particular exploit. Many other systems are vulnerable (see my other pages on the topic).
Date:8 July 1997
Notes:This is in uuencoded form. Be sure to copy & paste, don't save as a file because it has html codez in it.
Exploit & full info:Available here


NT case insensitive filename problems
Description:]You can create trojan directories in all lowercase, which will in some cases be accessed before the Mixed case directories and files NT likes to create.
Author:Paul Ashton <paul@ARGO.DEMON.CO.UK>
Compromise:This has the potential to cause an administrator level compromise.
Vulnerable Systems:Windoze NT 4.0
Date:4 July 1997
Notes:Paul Ashton also suggested the idea of creating a trojan parallel help directory, with hard links to all the original Help files, except one could call a special DLL to compromise NT. Also not that the POSIX subsystem doesn't need to be installed. You can create a files of the same name but different case by calling the Win32 function CreateFile() with the FILE_FLAG_POSIX_SAMANTICS flag specified (also noted by Paul Ashton).
Exploit & full info:Available here


websendmail cgi hole
Description:websendmail, a cgi-bin that comes with WEBgais, doesn't make any real attempts to check its input in some cases. Thus you can execute arbitrary commands.
Author:Razvan Dragomirescu <drazvan@kappa.ro>
Compromise:Run arbitrary commands as the user who owns the webserver cgi proccess. (remote)
Vulnerable Systems:Any runnning an unpatched version of websendmail in their cgi directory.
Date:4 July 1997
Exploit & full info:Available here


The ever popular getadmin exploit
Description:Someone posted this executable to several newsgroups. It allows any normal user to join the administrator group! Woop! M$ tried to fix the bug, but, not surprisingly, their hotfix didn't help.
Author:Konstantin Sobolev
Compromise:Become administrator on a NT box
Vulnerable Systems:NT 4.0, I think service pack 3 must be installed.
Date:4 July 1997
Notes:First I give the source to the program, then the source to the program which works even after the hotfix. Then I give the uuencoded getadmin.zip which was posted to the newsgroups.
Exploit & full info:Available here


Another BSD & Linux lpr overflow
Description:Standard overflow. Is this the same as the earlier ones? They did lpr -C <overflow-code>, while this just does lpr <overflow code>. Well, I'll include it incase they are different.
Author:a42n8k9 <a42n8k9@REDROSE.NET>
Compromise: root (local)
Vulnerable Systems:Linux 2.0.0, BSD 4.4 is also vulnerable, although you obviously need a new exploit.
Date:4 July 1997
Exploit & full info:Available here


Glimps HTTP evil inadequate evil char filter
Description:Glips HTTP, a web interface to the Glimps search program, doesn't adequately check its input for evil characters. By tricking it to open a pipe instead of a file, you can remotely execute arbitrary commands on the server.
Author:Razvan Dragomirescu <drazvan@kappa.ro>
Compromise:Execute arbitrary commands on a server running Glimps HTTP (remote).
Vulnerable Systems:Anything running a vulnerable and unmodified version of Glimpse HTTP. Runs on most systems.
Date:2 July 1997
Notes:Razvan Dragomirescu claims that he is getting "angry" at all the idiots who send him passwd files by not modifying his example exploit. But *I* wouldn't mind! So I've modified the exploit to use my address instead of his. DON'T FORGET TO CHANGE IT!
Exploit & full info:Available here


ircd overflow DOS
Description:You can overflow the third argument to the SERVER irc command, and crash IRC servers. With all the lamer wannabe hackers on IRC, I would hope this is already fixed on all servers of any consequence.
Author:Aaron Campbell <aaron@UG.CS.DAL.CA> wrote the exploit
Compromise:Stupid DOS attack
Vulnerable Systems:Those running ircd2.8.21 and probably older versions.
Date:2 July 1997
Exploit & full info:Available here


Linux smbmount buffer overflow
Description:Standard overflow ...
Author:Gerald Britton <gbritton@NIH.GOV>
Compromise:root, but only if smbmount is suid root (it isn't suid at all in Redhat Linux.
Vulnerable Systems:Linux systems that use default source distributions, probably other linux distributions.
Date:27 June 1997
Exploit & full info:Available here


Many RAS Service packet filtering rules are insecure.
Description:Because it has no notion of an established connection, allowing connections often require two rules to specify the allowed source and destination ports. But allowing data back from, say, port 25 to allow outgoing mail, also allows a malicious attacker to come in from a source port of 25, even though you never initiated a connection with that host.
Author:Russ <Russ.Cooper@RC.ON.CA>
Compromise:Bypass silly NT packet filters (when will people learn not to use NT as a firewall????)
Vulnerable Systems:Windows NT running the Routing and RAS Service (Steelhead)
Date:26 June 1997
Exploit & full info:Available here


ULTRIX 4.4 dxterm file linking hole
Description:dxterm, which is suid root, allows the user to specify a file to log output too. Unfortunately it will follow a hardlink to append your stuff to files you shouldn't be able to write to.
Author:Trevor Schroeder <tschroed@CHEETAH.WSC.EDU>
Compromise: root (local)
Vulnerable Systems:Ultrix 4.4, probably 4.5
Date:26 June 1997
Exploit & full info:Available here


Ascend MAX 4000 IP address theft flaw
Description:The Ascend MAX 40000 software (4.x up to at least 5.0Ap8) has a bug which allows any user to request any IP address they want.
Author:Joe Shaw <jshaw@INSYNC.NET>
Compromise:Use of an unauthorized IP address.
Vulnerable Systems:Ascend MAX 4000 series with at least 4.x and 5.0Ap13 versions.
Date:26 June 1997
Exploit & full info:Available here


Solaris local ping DOS attack
Description:You can reboot solaris boxes with ping -sv -i 127.0.0.1 224.0.0.1
Author:Adam Caldwell <adam@ATL.ENI.NET>
Compromise:Stupid DOS attack, plus you need to be a local user.
Vulnerable Systems:Apparently all versions of Solaris up to (but not including) 2.6
Date:26 June 1997
Exploit & full info:Available here


4.4BSD procfs hole
Description:A bug in the procfs filesystem code allows people to modify the (priviliged) init process and reduce the system securelevel.
Author:Alex Nash, exploit by Tim Newsham
Compromise:Lower the security level kernal veriable, allowing to bypass certain restrictions, like the filesystem immuteable flag.
Vulnerable Systems:4.4BSD including OpenBSD 2.0 and 2.1, FreeBSD, NetBSD, probably BSDI.
Date:24 June 1997
Notes:If only all security advisories contained exploit code, the world would be a safer place!
Exploit & full info:Available here


Linux imapd remote overflow
Description:Apparently a remote buffer overflow of imapd for linux. I think this is sort of old, and many other systems are affected.
Author:Akylonius (aky@galeb.etf.bg.ac.yu)
Compromise: root (local)
Vulnerable Systems:The exploit is for Linux, but I believe that many systems using older IMAP daemons are vulnerable.
Date:24 June 1997 was when this was posted, but I think this is much older
Exploit & full info:Available here


Obtain unauthorised list of mailing lists from majordomo 1.94.1
Description:Majordomo 1.94.1 allows you to disable the 'lists' command, but people can still obtain it by 'unsubscribe * jdoe@fairy.net' and getting an unsubscribe failure for every list.
Author:The Spectre <spectre@NAC.NET>
Compromise:obtain unauthorised data from majordomo list server.
Vulnerable Systems:Anything running unpatched majordomo 1.94.1, possibly other versions.
Date:23 June 1997
Exploit & full info:Available here


Obtain an interactive shell through lynx
Description:It is possible to obtain an interactive shell via special LYNXDOWNLOAD URLs. This is a big security hole for sites that use lynx "guest accounts" and other public services.
Author:Unknown
Compromise:run unauthorized arbitrary commands
Vulnerable Systems:Sites trying to keep visitors captive in a lynx session.
Date:23 June 1997
Exploit & full info:Available here


M$ IIS DOS long URL vulnerability
Description:If you send a specially formatted URL of about 8K to IIS, you can crash the server
Author:Todd Fast (loser) found the bug, and Andrea Arcangeli <arcangeli@mbox.queen.it> ported the exploit to gcc.
Compromise:Stupid DOS attack
Vulnerable Systems:Anything running unpatched M$ IIS, mostly just NT.
Date:21 June 1997
Notes:The exploit is appended to the "advisory" cruft. Don't check his webside, these details and the code have been removed.
Exploit & full info:Available here


Inetd udp port spoofing DOS attack
Description:This has been very well known for a long time, it even had a CERT advisory quite a while ago. Yet Willy seems to have just found it. Here is the code he sent.
Author:Willy TARREAU <tarreau@AEMIAIF.IBP.FR>
Compromise:Stupid DOS attack
Vulnerable Systems:Netware, Most UNIX variants with shitty admins who don't properly close these trivial UDP services.
Date:21 June 1997 was when this message was sent, but it is really an *OLD* bug.
Exploit & full info:Available here


B-DASH 0.31 $HOME overflow
Description:Standard pathetic suid-for-svgalab-totally-insecure application overflow.
Author:Nicolas Dubee <dube0866@EUROBRETAGNE.FR>
Compromise: root (local)
Vulnerable Systems:Mostly old versions of Linux. Possibly current Slackware. Anything with B-DASH v0.31
Date:21 June 1997 was when he posted his OLD exploit, ignore the date in the header, it is bogus.
Exploit & full info:Available here


BSDI 3.0 symlink hole
Description:BSDI 3.0 apparently allows you to cause a code dump and the core file will overwrite what you symlink it to.
Author:Stacey Son <sson@ISERVER.COM> and Ariel Biener <ariel@FIREBALL.TAU.AC.IL>
Compromise: root (local)
Vulnerable Systems:BSDI 3.0, other versions don't seem to be affected.
Date:20 June 1997
Exploit & full info:Available here


IRIX fails to correctly patch /cgi-bin/handler exploit
Description:In an apparent attempt to prevent breakins through the common handler cgi technique, IRIX changed the code. They now check the end of a string for a pipe (trying to make sure perl opens the file as a plain file), but you can still get away with putting tabs after the pipe, to hide it.
Author:Razvan Dragomirescu <drazvan@kappa.ro>
Compromise:remotely run commands through this pathetic CGI
Vulnerable Systems:IRIX 6.3 and 6.4, the older versions are vulnerable to an even easier version of the same problem.
Date:19 June 1997
Exploit & full info:Available here


zgv $HOME overflow
Description:zgv, which is setuid r00t on many systems, takes untrusted environmental information ($HOME) and copies it into an automatic character buffer, thus allowing a standard buffer overflow.
Author:ksrt <ksrt@DEC.NET> sent the advisory, beastmaster wrote the exploit code
Compromise: root (local)
Vulnerable Systems:Linux, Redhat 3.0.3 - 4.1, anything else running zgv setuid root
Date:19 June 1997
Notes:Note that the exploit is appended to the advisory.
Exploit & full info:Available here


Buffer overflows in the listserv mailing list manager.
Description:Stander buffer overflow stuff, although this may not be exploitable.
Author:PLaGuEZ <root@MEAT.PLAGUEZ.ORG>
Compromise:Possibly just a DOS attack, unless you can make an exploit out of it.
Vulnerable Systems:Systems running unpatched versions of listserv.
Date:19 June 1997
Notes:This is NOT the L-Soft "listserv" program, instead it is a significantly less popular (and less powerful) listserv program available on sunsite.
Exploit & full info:Available here


BSDI 3.x corefile problem
Description:BSDI 3.0 apparently allows any program to overwrite/create files through a core dump link.
Author:Nir Soffer <scorpios@CS.HUJI.AC.IL>
Compromise:Definately DOS, possibly become r00t
Vulnerable Systems:BSDI 3.0
Date:19 June 1997
Notes:Several people mentioned that he was wrong about overwriting files. If the mode is 0600, you CAN overwrite them. This includes a lot of files you might want to overwrite ;).
Exploit & full info:Available here


Solaris root socket descriptor bug
Description:You can swipe control of a root owned socket descriptor from user-owned inetd processes like rshd.
Author:Alan Cox (alan@LXORGUK.UKUU.ORG.UK)
Compromise:control of a root owned socket
Vulnerable Systems:Solaris 2.5.1, probably earlier versions. I hear that 2.6 if fixed. Sun doesn't seem interested in fixing this, for some reason.
Date:19 June 1997 was the data of this post, although Alan has been complaining about the bug for ages.
Notes:You may have to change your interface to le0, hme0, or whatever to make it work.
Exploit & full info:Available here


symlink problem in mj_key_cache program
Description:This perl prog, which is part of MajorCool, which is apparently related to the Majordomo listserver software, has a standard symlink problem.
Author:Benjamin J Stassart <dszd0g@DASB.FHDA.EDU>
Compromise:corrupt files writeable by the user/group mj_key_cache runs as (usually through cron). This user is usually majordom.
Vulnerable Systems:Anything running MajorCool 1.0.3 or below with mj_key_cache cron'd
Date:18 June 1997
Exploit & full info:Available here


Seyon calls system(xterm), Krad!
Description:seyon, which is setgid uucp on RedHat 4 at least, calls system(xterm) if it can't find seyon-emu. The exploit is obvious, 'nuff said
Author:Shawn Hillis <shillis@CLCSMAIL.KSC.NASA.GOV>
Compromise:root on some systems, like IRIX. Otherwise join the UUCP group, or whatever seyon is setgid to.
Vulnerable Systems:Redhat Linux 4.0, Irix 6.3, anything else with vulnerable version of seyon installed
Date:17 June 1997
Notes:system(xterm) from a setuid root prog? Is this really 1997???
Exploit & full info:Available here


Netscape gives away user's files!
Description:A hole in the handling of the INPUT TYPE="FILE" tag allows a malicious website operator to download your files (if the filename is known). This apparently works on all platforms, and with Netscape up to Netscape Communicator.
Author:"Paul T. Kooros" <kooros@TITAN.SRRB.NOAA.GOV>
Compromise:Steal people's shit!
Vulnerable Systems:Clients running Netscape Communicator 4.0 and earlier, as well as netscape navigator 3.* and probably earlier. This includes the Windoze, Macintosh, and UNIX platforms.
Date:16 June 1997
Notes:This is a great advisory! Show your thanks by buying his JavaScript book! I would if JavaScript wasn't such a lame language ;).
Exploit & full info:Available here


Shotgon 1.1b overflows
Description:Shotgon 1.1b, an svgalib based Linux file manager, apparently has "more than 10 buffer overflows".
Author:PLaGuEZ <dube0866@EUROBRETAGNE.FR>
Compromise: root (local)
Vulnerable Systems:Linux, apparently anything running shotgun, although I suspect that is almost exclusively linux.
Date:16 June 1997 (Ignore his fucked up date)
Exploit & full info:Available here


IRIX handler cgi hole
Description:another prog that uses a perl open() with untrusted filenames, allowing the pipe symbol to be used to create a pipe instead. I think this is a serious problem with perl which should be fixed (perl is supposed to make programming securely EASIER than C does.)
Author:Razvan Dragomirescu <drazvan@kappa.ro>
Compromise:Run arbitrary commands as the owner of the httpd process
Vulnerable Systems:IRIX 6.2, the later versions try to fix this, but without success (see the other handler entry). It also works on 5.3
Date:15 June 1997
Exploit & full info:Available here


poison the DNS cache by returning a bogus IP as a CNAME for a real server
Description:You can poison DNS cache by returning a bogus IP as a CNAME for a real server.
Author:Johannes Erdfelt outlined this type of attack originally.
Compromise:Subvert DNS
Vulnerable Systems:Almost all current DNS servers, including bind 8.1 and M$ DNS
Date:14 June 1997 (It was actually discovered in April, apparently)
Exploit & full info:Available here


sshd and rshd leak usernames.
Description:sshd and rshd leak usernames. A lot of sites security-consious enough to run sshd probably don't want username validation to be this easy
Author:Christophe Kalt <kalt@STEALTH.NET> and David Holland
Compromise:Test validity of suspected system usernames
Vulnerable Systems:Linux, NetBSD, Digital UNIX 4.0, all from rshd, as well as any systems running a vulnerable version of sshd. Remember to use the VERBOSE (-v) flag if you try to exploit sshd.
Date:13 June 1997
Notes:The syntax quoted at the bottom is not correct, you need to give an actual command (like ls) for the rsh problem to be demonstrated.
Exploit & full info:Available here


qmail rcpt DOS attack
Description:qmail lets you send messages to an unlimited number of people, so you can actually run the system out of swap space by feeding recipients until it crashes.
Author:wietse@wzv.win.tue.nl (Wietse Venema)
Compromise:Stupid DOS attack
Vulnerable Systems:Systems running unpatched qmail. This includes a lot of Linux boxes as well as many other systems.
Date:12 June 1997
Exploit & full info:Available here


QMAIL DOS attack #1
Description:A denial of service (DOS) attack against QMAIL, which doesn't set a maximum limit on command length.
Author:wietse@wzv.win.tue.nl (Wietse Venema)
Compromise:Stupid DOS attack.
Vulnerable Systems:Systems running unpatched qmail. This includes a lot of Linux boxes as well as many other systems.
Date:12 June 1997
Exploit & full info:Available here


NT password replacement program
Description:Micro$oft tried to obfuscate the NT password storage method, but it has been broken and this program allows you to reset any user's password. Administrator might be a good example.
Author:pnordahl@eunet.no
Compromise:Administrator, if you have physical access.
Vulnerable Systems:NT 4.0 (probably earlier) without service pack 3 syskey enabled.
Date:11 June 1997
Notes:A uuencoded of the source distribution is attached below. His web site also offers disk images.
Exploit & full info:Available here


Another way to crash NT DNS server.
Description:Apparently sending a flood of characters to port 53 (DNS) will crash the server. The MS advisory even gives advice for the lamers on how to do this.
Author:Unknown
Compromise:stupid DOS attach
Vulnerable Systems:NT 4.0 without the postSP3 hotfix. Service Pack 4 will probably fix this.
Date:10 June 1997
Exploit & full info:Available here


AIX 4.2 HOME environmental variable overflow
Description:Typical environmental variable overflow.
Author:Georgi Guninski <guninski@hotmail.com>
Compromise: root (local)
Vulnerable Systems:AIX 4.2, probably other versions
Date:10 June 1997
Exploit & full info:Available here


cgi-bin/test-cgi allows arbitrary remote file listing
Description:If you give test-cgi an argument which includes a *, you can get a directory listing from the SERVER_PROTOCOL field. In other words, it is another pathetic cgi.
Author:Jason Uhlenkott <jasonuhl@usa.net>
Compromise:remotely obtain directory listings
Vulnerable Systems:Systems running Apache/1.2b2, probably earlier versions, many systems that have test-cgi installed.
Date:6 June 1997
Exploit & full info:Available here


Solaris rpcbind listens on undocumented high UDP port
Description:rcpbind for solaris, which belongs on UDP port 111, is also found on a UDP port above 32770. Thus many packet filters aren't effective.
Author:Oliver Friedrichs <oliver@silence.secnet.com> (Secure Networks Inc.)
Compromise:Access rcpbind, even from sites that filter it at their firwall or packet filter.
Vulnerable Systems:Unpatched Solaris 2.X up to 2.5.1
Date:4 June 1997
Notes:Apparently rpcbind also lists on high solaris *TCP* ports sometimes. I've included a a hacked rcpinfo client below the secnet advisory.
Exploit & full info:Available here


Trojan in fake v1.2b version of the AtlantiS IRC script
Description:Simple trojan. Use /ctcp <target_nick> jupe <command> to exploit.
Author:raf@licj.soroscj.ro
Compromise:Remotely fuck with a Atlantis IRC script user
Vulnerable Systems:Anyone running the AtlantiS script v1.2, other versions are also affected, though the author notes that v1.1 is clean.
Date:31 May 1997
Notes:This trojan was *NOT* inserted by the author, so don't flame Deathnite. Some lamer put it in. I haven't seen any evidence that the post author is correct about other versions being vulnerable
Exploit & full info:Available here


Microsoft's Win95 stores your password in plaintext in the system registry.
Description:Bill Stout notes several locations in the W95 registry where user's passwords are stored in plain text.
Author:Bill Stout <stoutb@pios.com>
Compromise:Find out a user's W95 password (which is often also their password on real machines)
Vulnerable Systems:Microsoft Windoze 95
Date:30 May 1997
Exploit & full info:Available here


X11R6 library GetDatabase vulnerability
Description:There is a security hole in the GetDatabase function of the X11 libraries, which appears to be present in every distribution of X11. The attached exploit is for Solaris xterm, not that you will only get a shell with your own uid if xterm is not suid
Author:David Hedley <hedley@CS.BRIS.AC.UK>
Compromise: root (local)
Vulnerable Systems:many systems are vulnerable, including Linux and *BSD. This particular exploit is for Soaris 2.5.1 xterm
Date:28 May 1997
Exploit & full info:Available here


IRIX /usr/sbin/printers and /usr/bin/X11/xterm overflows
Description:two more buffer overflows for IRIX, this time in xterm and printers.
Author:David Hedley <hedley@CS.BRIS.AC.UK>
Compromise: root (local)
Vulnerable Systems:IRIX 5.x, 6.x
Date:27 May 1997
Notes:Note that David Hedley thinks the xterm problem is more general. He was able to overflow xlockmore on a FreeBSD machine. The xterm exploit post is right after the printers post below.
Exploit & full info:Available here


Buffer overflow in /usr/sbin/iwsh for Irix 5.3
Description:This overflow of /usr/sbin/iwsh is specifically taylored for IRIX 5.3. It is also possible to write a similar overflow for 6.x.
Author:David Hedley <hedley@CS.BRIS.AC.UK>
Compromise: root (local)
Vulnerable Systems:IRIX 5.3 (6.x would work with another exploit)
Date:27 May 1997
Exploit & full info:Available here


Overflows in IRIX /usr/sbin/X11/xconsole, /usr/sbin/X11/cdplayer, /usr/sbin/xwsh, and /usr/sbin/monpanel.
Description:As he mentions, there must be some bad IRIX library which is causing all of these IRIX progs to overflow. Anyway, this is a standard overflow which works on all of the above.
Author:"Patrick J. Paulus" <pjp@STEPAHEAD.NET> posted the exploit which was a _very_ slighty modified version of David Hedley's code posted earlier.
Compromise: root (local)
Vulnerable Systems:IRIX 5.3, probably 6.x
Date:27 May 1997
Notes:Someone reported to me that he couldn't get these to work. Has anyone used them successfully?
Exploit & full info:Available here


IRIX /bin/login overflow
Description:Overflow in /bin/login on IRIX 5.3-6.4
Author:David Hedley <hedley@CS.BRIS.AC.UK>
Compromise: root (local)
Vulnerable Systems:IRIX 5.3 through 6.4
Date:26 May 1997
Exploit & full info:Available here


Overflow in IRIX /usr/lib/desktop/permissions
Description:standard IRIX overflow, in /usr/lib/desktop/permissions
Author:David Hedley <hedley@CS.BRIS.AC.UK>
Compromise:Gain egid sys
Vulnerable Systems:IRIX 6.2, 5.x is probably vulnerable, but needs a rewritten exploit due to stack position.
Date:26 May 1997
Exploit & full info:Available here


AIX lquerylv overflow
Description:standard overflow
Author:Georgi Guninski <guninski@hotmail.com>
Compromise: root (local)
Vulnerable Systems:AIX 4.2 tested on a RS/6000 box. All 4.x, 3.x probably affected.
Date:26 May 1997
Exploit & full info:Available here


3 More IRIX buffer overflows, courtesy of LsD
Description:Apparently, the "anonymous friend" who sent exploit code to Yuri may have swiped it from the polish group LsD. Anyway, they sent in 3 more exploits which are very similar (actually almost exactly the same) as those Yuri's polish friend sent.
Author:Sent from a hacked account by LsD, Last Stage of Delirium
Compromise: root (local)
Vulnerable Systems:IRIX, presumably up to 6.3
Date:25 May 1997
Exploit & full info:Available here


cfingerd search username vulnerability
Description:With cfingerd 1.2.2 (and probably earlier), a "feature" lets you get all the usernames on a system with finger search.*@host . Even after that was fixed, you can do it with search.**@host . Also, the author even admits that there are probably buffer overflows in there because sprintf() is used instead of snprintf().
Author:Rodrigo Barbosa <rodrigob@MORCEGO.LINKWAY.COM.BR> mentioned the search.*@ , and "Edward S. Marshall" <emarshal@COMMON.NET> mentioned search.**@
Compromise:Remotely obtain all the usernames on a system.
Vulnerable Systems:Systems running all versions of cfingerd. The author says he won't fix the problem.
Date:24 May 1997
Notes:Three relevent messages are appended below.
Exploit & full info:Available here


PMDF 5.107 debug mode vulnerability
Description:PMDF 5.1-7 sendmail (NO relation to standard sendmail) has a debugging mode that can be entered by setting environmental variable PMDF_SENDMAIL_DEBUG. This then allows a standard symlink vulnerability in which you can put arbitrary binary data into the pdmf owned file of your choosing.
Author:Jonathan Rozes <jrozes@GUMBO.TCS.TUFTS.EDU>
Compromise:quash files owned by user pmdf with arbitrary data.
Vulnerable Systems:Digital Unix 4.0B reported by the author. Probably any systems running PDMF sendmail
Date:23 May 1997
Exploit & full info:Available here


Macintosh At Ease Apple Share automated login "feature"
Description:By default, At Ease will automate the login process to AppleShare servers, and store the login and password in clear text in the At Ease Preference file. You can usually read this file trivially by exploiting applications (like netscape file:// URLs).
Author:Paul Melson <melson@SCNC.HOLT.K12.MI.US>
Compromise:Unauthorised access to an AppleShare fileserver.
Vulnerable Systems:Macintoshes, running At Ease and using the Auto Login "feature".
Date:21 May 1997
Exploit & full info:Available here


AIX 4.2 /usr/dt/bin/dtterm buffer overflow
Description:Standard buffer overflow. Possibly in the X library.
Author:Georgi Guninski <guninski@hotmail.com> (and who says all hotmail users are idiots?)
Compromise: root (local)
Vulnerable Systems:AIX 4.2, possibly others. Exploit for a RS/6000 box.
Date:20 May 1997
Exploit & full info:Available here


SunOS 4.1.4 crashes when (l)users read /dev/tcx0
Description:Sparcstations running 4.1.4 (probably other versions too) crash when users read /dev/tcx0 with something like 'cat'. Not that this is a VERY generall problem. There are a lot of devices on many devices that will crash if you do wierd things to them. Especially cat'ing binary files to them. I am not going to write up a page on each.
Author:Dixon Ly <dly@BAYNETWORKS.COM> mentioned this particular problem.
Compromise:DOS attack, obviously annoy people. You could also do more devious thing, taking down the machine so you can IP spoof "from" it without it sending thos damn RST's!
Vulnerable Systems:Sparc 5,10,20,etc. running SunOS 4.1.4 probably other versions.
Date:19 May 1997
Exploit & full info:Available here


Data Buffer overrun in Solaris 2.5.1, 2.5.0 in ps and chkey
Description:The solaris ps (both /usr/bin and /usr/ucb) and chkey programs are insecure, and it is possible to exploit them via a rather complicated data buffer overrun. This overrun is probably present in many other programs.
Author:Joe Zbiciak <jzbiciak@DALDD.SC.TI.COM> wrote the ps exploit. Adam Morrison <adam@MATH.TAU.AC.IL> provided a lot of information and mentioned that chkey was also vulnerable. Adam also posted a cool stdio overflow program which will get its own entry.
Compromise: root (local)
Vulnerable Systems:Solaris 2.5.1, 2.5.0, possibly earlier versions.
Date:19 May 1997
Notes:There were a bunch of interesting postings on this topic which help to exploit the vulnerability. I've included the best ones below.
Exploit & full info:Available here


Program for exploiting data overrun conditions
Description:This isn't an exploit per se, (although, as mentioned in another exploit, it works for chkey and ps). Now you can exploit these overruns when you find them yourself!
Author:adam@math.tau.ac.il (Adam Morrison), Joe Zbiciak <jzbiciak@DALDD.SC.TI.COM> also contributed a useful script for finding the proc_link value for an overflow.
Compromise: root (local)
Vulnerable Systems:This program works for Solaris on SPARC. Other OSes are vulnerable to similar overflows, although this program obviously won't work.
Date:19 May 1997
Notes:I've included Adam Morrison's original post as well as Joe Zbiciak's supplimentary script below.
Exploit & full info:Available here


IRIX stupid xhost + default
Description:For X sessions, IRIX (I think up to 6.3) by default gives global access (ie xhost +). Duh. Of course this fits in very well with their default non-passworded guest account and their security-filled default crontab (see those other exploit entries for more information).
Author:Well known, but Matt Harrigan <matth@CONNECTNET.COM> posted interesting comments on exploiting the hole to someone who mentioned the problem.
Compromise:Take over an X session
Vulnerable Systems:IRIX, up to 6.3 I believe, using default IRIX default X access permissions.
Date:19 May 1997
Exploit & full info:Available here


Failure of Solaris and old BSD versions to honor the filesystem permissions of unix domain sockets.
Description:Solaris (including SunOS) and old (4.3 and earlier) versions of BSD don't honor permissions on the filesystem representations of unix domain sockets. A lot of programmers might not realize that anyone can send data to their programs by writing to the "file".
Author:Thamer Al-Herbish <shadows@whitefang.com> posted this to bugtraq, but it was somewhat well known.
Compromise:write malicious data to unsuspecting applications
Vulnerable Systems:Solaris 2.5 and earlier (not sure about 2.5.1). Version 2.6 will supposedly not be vulnerable.
Date:17 May 1997
Exploit & full info:Available here


Assorted IRIX WWW vulnerabilities
Description:IRIX has serious problems with some of their CGI's and other WWW programs like handler. Yuri explores these and exposes a lot of problems.
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise:Become owner of httpd process, read files that are "protected" by .htaccess.
Vulnerable Systems:Irix 6.2
Date:16 May 1997
Notes:Woo! I'm glad to see Yuri isn't out of the scene like I was afraid he was.
Exploit & full info:Available here


Ascom Timeplex Router Backdoor
Description:You can enter a backdoor 'debug' mode in these routers by sending a bunch of cntrl-d characters to the device.
Author:Brent Huston <bhuston@NETWALK.COM>
Compromise:Change the router setup, this would obviously be bad ;)
Vulnerable Systems:Ascom Timeplex Routers
Date:15 May 1997
Exploit & full info:Available here


IRIX default guest account
Description:Apparently, all IRIX systems come by default with a unpassworded guest account. Almost as stupid as HP/UX's staticly passworded uid 0 sam_exec accounts.
Author:well known, but Mike Neuman <mcn@RIPOSTE.ENGARDE.COM> mentioned it on bugtraq
Compromise:remotely obtain local user privileges.
Vulnerable Systems:IRIX, apparently all versions up to 6.3
Date:15 May 1997
Exploit & full info:Available here


LibXt XtAppInitialize() overflow *xterm exploit.
Description:overflow in libXt from XFree86 allows exploitation of suid *xterm s.
Author:Ming Zhang <mzhang@softcom.net> useful info also contributed by Marcin Bohosiewicz <marcus@venus.wis.pk.edu.pl>
Compromise: root (local)
Vulnerable Systems:Systems running XFree86-3.2-9, probably lower who have suid cxterm, mxterm, xterm, etc. Includes RedHat 4.0, Slackware 3.1 and 3.2
Date:14 May 1997
Notes:I have appended useful info from Marcin Bohosiewicz <marcus@venus.wis.pk.edu.pl>
Exploit & full info:Available here


HP/UX 10.X /var/tmp/outdata symlink hole
Description:Typical symlink problem
Author:David Hyams <nhyamd@ASCOM.CH>
Compromise:Wipe SAM data to arbitrary files, I don't know what happens with existing files. If you can clobber existing files, you can obviously become root.
Vulnerable Systems:HP/UX 10.X
Date:14 May 1997
Exploit & full info:Available here


Elm 2.3 and 2.4 curses overflow
Description:Buffer overflow with environmental veriable TERM
Author:Wojciech Swieboda <wojtek@AJAX.UMCS.LUBLIN.PL>
Compromise:GID mail
Vulnerable Systems:Many linux boxes, anything else with vulnerable ELM 2.3, 2.4
Date:13 May 1997
Exploit & full info:Available here


IRIX sadc symlink vulnerability
Description:the IRIX program /usr/lib/sa/sadc is sgid sys and writes to /tmp/sa.adrfl, even if that is a symlink.
Author:Well known, but Jaechul Choe <poison@COSMOS.KAIST.AC.KR> posted this warning that IRIX is still vulnerable.
Compromise:GID sys
Vulnerable Systems:IRIX 5.3, 6.2
Date:9 May 1997
Exploit & full info:Available here


Socks5 symlink bug
Description:Just do a standard symlink to /tmp/socks5.pid and connect() to port 1080.
Author:Trevor Schroeder <tschroed@CHEETAH.WSC.EDU>
Compromise:obtain access of the owner of the socks daemon (probably nobody or daemon).
Vulnerable Systems:Systems running Socks5 beta-0.17.2 from NEC and probably earlier versions.
Date:9 May 1997
Exploit & full info:Available here


IRIX addnetpr race condition
Description:IRIX's addnetpr program has a symlink race condition that allows the clobbering of arbitrary files.
Author:Jaechul Choe <poison@COSMOS.KAIST.AC.KR>
Compromise:cause addnetpr to write to arbitrary files. It is unclear whether it appends or overwrites to already existing files. Could probably lead to root access.
Vulnerable Systems:IRIX 5.3, 6.2
Date:9 May 1997
Exploit & full info:Available here


Windows NT/95/3.11 Out Of Band (OOB) data barf
Description:Windows NT will completely crash if you send Out of Band (MSG_OOB) data to its port 139. Win95 will blue screen and network connectivity is usually lost, applications may crash. Win 3.11 with the M$ TCP/IP stack crashes too. Other ports like MS DNS may also be affected.
Author:myst <myst@LIGHT-HOUSE.NET>
Compromise:Stupid DOS attack, but it can be humorous.
Vulnerable Systems:WinNT 4.0, 3.51, Win95 , WFWG 3.11
Date:9 May 1997
Notes:I'm also appending the perl exploit code and the visual basic code. The M$ FIX in service pack 3 and the Hotfix does NOT work! You just have to change the code a bit, or use the Macintosh exploit. Change the TCP Urgent pointer if you want to exploit the post-servicepacke 3 conditon from a UNIX box.
Exploit & full info:Available here


IRIX rmail system() and LOGNAME hole
Description:rmail is setgid mail and apparently does a system() involving the contents of untrusted user environmental variable LOGNAME. Duh.
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise:Group mail, the uses of this are obvious
Vulnerable Systems:IRIX, 5.3, 6.2, possibly 6.3
Date:7 May 1997
Notes:Too bad Yuri Volobuev is retiring. There wouldn't be a IRIX section without him. Good job Yuri!
Exploit & full info:Available here


IRIX inpview hole
Description:inpview is part of a video conferencing package. Wow, in 1997 we've got a system() without absolute path vulnerability. Haven't seen something that pathetic in a while, except for the M$ OOB problem.
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise: root (local)
Vulnerable Systems:IRIX, presumably 5.3, 6.2, and 6.3
Date:7 May 1997
Exploit & full info:Available here


IRIX webdist CGI vulnerability
Description:Stupid cgi
Author:Grant Kaufmann <grant@CAPE.INTEKOM.COM>
Compromise:remotely execute arbitrary commands as httpd process owner (usually nobody or daemon)
Vulnerable Systems:IRIX 6.2, 6.3
Date:7 May 1997
Exploit & full info:Available here


IRIX xfsdump hole
Description:standard symlink problem.
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise: root (local)
Vulnerable Systems:IRIX, presumably 5.3, 6.2, 6.3
Date:7 May 1997
Exploit & full info:Available here


IRIX crontab problems
Description:IRIX's default crontab contains some bad stuff. Like find that execs rm. Check the bugtrac archives for ways to leverage this to delete anything from the filesystem.
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise:Delete any files on the (probably root) filesystem. You should be able to leverage root access from this.
Vulnerable Systems:IRIX, probably 5.3, 6.2, and 6.3
Date:7 May 1997
Exploit & full info:Available here


A bunch of IRIX holes found by Yuri Volubuev
Description:I have made a lot of these into their own pages, but I didn't include the more obscure ones, and I didn't have a good place to include his IRIX bashing. So I'm putting the whole post here.
Author:Yuri Volobuev <volobuev@T1.CHEM.UMN.EDU>
Compromise: root (local)
Vulnerable Systems:IRIX 5.3, 6.2, 6.3
Date:7 May 1997
Exploit & full info:Available here


KDE unsecured TCP socket vulnerability
Description:the KDE desktop apparently uses network TCP sockets for process comunication instead of AF_UNIX domain sockets. The TCP sockets have no authentication, so you can send malicious commands to the port for copying files, etc.
Author:Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
Compromise:Subvert the user running KDE
Vulnerable Systems:Anything running unpatched KDE
Date:5 May 1997
Exploit & full info:Available here


Failed logouts in Windows NT and '95
Description:Some people "logout" of their NT boxes and leave, but NT sometimes fails due to hung processes and give the option to abort the logout.
Author:Peter da Silva <peter@BAILEYNM.COM>
Compromise:Take over someone's local console login
Vulnerable Systems:Windows NT 3.51, 4.0 and I believe Win95 is vulnerable
Date:3 May 1997
Notes:Not too big of a deal, but it should still be fixed
Exploit & full info:Available here


Soaris lp and lpsched symlink vulnerabilities
Description:A typical symlink-to-.rhosts exploit
Author:Chris Sheldon (csh@viewgraphics.com)
Compromise: root (local)
Vulnerable Systems:Solaris 2.51, possibly others
Date:3 May 1997
Exploit & full info:Available here


CERN httpd server authorization bypass
Description:You can bypass password authorization by adding extra forward slashes in the URL. ie: http://www.server.com//secret.html.
Author:Peter Lord <plord@perrin.demon.co.uk>
Compromise:Unauthorized viewing of passworded html files
Vulnerable Systems:Systems running CERN httpd, apparently up to their last version.
Date:30 April 1997
Exploit & full info:Available here


FreeBSD exploits for the Perl 5.003 (and earlier) overflow bug.
Description:Buffer overflow in Perl, already discussed in another entry. These are FreeBSD exploits for perl4.036, and 5.00X
Author:Deliver <deliver@FREE.POLBOX.PL> wrote the exploits
Compromise: root (local)
Vulnerable Systems:FreeBSD with vulnerable perl (Version <= 5.003) installed.
Date:21 April 1997
Exploit & full info:Available here


Narf NT usernames from an untrusted NT Domain Controller
Description:Through an NT Domain Controller, you can get a full list of usernames on other servers by failing a logon and then examining the target with Explorer.
Author:webroot <webroot@WEBROOT.COM> (Steve Thomas)
Compromise:List usernames of remote server including full names, descriptions, and group memberships.
Vulnerable Systems:NT 4.0, probably 3.51 too.
Date:19 April 1997
Exploit & full info:Available here


Sperl 5.003 hole
Description:Another hole in sperl, this time a buffer overflow.
Author:Willy Tarreau (tarreau@aemiaif.ibp.fr)
Compromise: root (local)
Vulnerable Systems:Systems with Sperl 5.003, this exploit is for Linux x86.
Date:17 April 1997
Notes:I have appended the uuencoded exploit src&bin after this post. Debian is vulnerable if you use offset of 1169 instead of those tried by the exploit, according to David Luyer (luyer@ucs.uwa.edu.au)
Exploit & full info:Available here


NCSA PHP/FI CGI *2 HOLES*
Description:First of all, this rather pathetic cgi allows anyone to trivially read any file on the system which is readabl by the owner of the httpd process (usually nobody or daemon). It also has a buffer overflow.
Author:Shamanski <jshaman@M-NET.ARBORNET.ORG> posted the read-any-file exploit, The SNI advisory is by David Sacerdote
Compromise:read files and execute code as the httpd process owner (remote)
Vulnerable Systems:Those with php.cgi 2.0beta10 or earlier, distributed with NCAA httpd, possibly others.
Date:16 April 1997
Exploit & full info:Available here


WU-FTPD core dump vulnerability (the old patch doesn't work)
Description:A common problem with many OS's is that you can cause ftpd (or other network services) to crash and find remnants of the shadowed password file in the resultant corefile. wu-ftpd was patched, but is apparently still broken.
Author:Vadim Kolontsov <vadim@tversu.ac.ru>
Compromise:read crypt(8)ed passwords, which could lead to root (local)
Vulnerable Systems:Systems running wu-ftpd v2.1, 2.2, 3.0, possibly others.
Date:13 April 1997
Exploit & full info:Available here


RedHat 4.1 amd-920824upl102-6.i386.rpm nodev hole.
Description:The above mentioned distribution fails to prevent devices on mounted drives, even if the nodev option is specified.
Author:Bradley M Keryan <keryan@andrew.cmu.edu>
Compromise: root with a little work (local)
Vulnerable Systems:Redhat 4.1, anyone who uses amd-920824upl102-6.i386.rpm, possibly other distributions
Date:7 April 1997
Exploit & full info:Available here


NT 4.0 Stupid default SMB mount permissions
Description:If you have an account on a NT box, you are by default allowed to mount any drive r/w by mounting \\server\c$ (replace 'c' with the drive letter).
Author:Well known, but this post was by Yiorgos Adamopoulos <Y.Adamopoulos@noc.ntua.gr>
Compromise:Mount any NT drive r/w (local)
Vulnerable Systems:NT 4.0 with no service packs, 3.51?
Date:7 April 1997
Exploit & full info:Available here


/usr/bin/filter NLSPATH buffer overflow
Description:Standard buffer overflow, filter is sometimes setgid mail.
Author:Mikhail Iakovlev <miakovle@SN.NO>. Sploit by "Dmitry E. Kim" <jason@REDLINE.RU>
Compromise:group mail (local)
Vulnerable Systems:Systems with vulnerable /usr/bin/filter setgid mail. Include slackware 3.1, possibly 3.0
Date:6 April 1997
Exploit & full info:Available here


Novell Netware PERL.NLM vulnerability
Description:Netware 4.1 puts a special version of perl on TCP port 8002.
Author:Axel Dunkel <ad@Dunkel.de>
Compromise:access, read, modify or delete any file on Netware 4.1 or Intranetware systems
Vulnerable Systems:Novell Netware 4.1, Intranetware
Date:5 April 1997
Exploit & full info:Available here


AIX LC_MESSAGES /usr/sbin/mount and /bin/host holes
Description:Standard buffer overflow, using LC_MESSAGES
Author:Georgi Guninski (guninski@linux2.vmei.acad.bg)
Compromise: root (local)
Vulnerable Systems:AIX 4.2, possibly 4.1 and more
Date:3 April 1997
Exploit & full info:Available here


XFREE86 Console Hacking
Description:You can often break out of a Xlock session from the console with <CTRL><ALT><Backspace>. You can also do <CTRL><ALT><F1> and then ^C (sometimes ^Z works better) to get to a shall.
Author:Roman Garcia <nykros@sol.info.unlp.edu.ar>
Compromise:Obtain interactive shell as the user who used 'startx' to start an X session
Vulnerable Systems:XFree86 sessions started with startx from a shell, rather than with XDM
Date:1 April 1997
Exploit & full info:Available here


NT crash via extra long username in Winpopup
Description:You can crash an NT box (possibly W95 too) by sending a very long username in a Winpopup message. This is easy to do from UNIX with 'smbclient -U LOTSandLOTSofcrap -M host'.
Author:Well known.
Compromise:Crash Windows boxes
Vulnerable Systems:Windows NT 4.0 and earlier, fixed in NT 4.0 Service pack 3. Win95 may be vulnerable.
Date:April 1997
Exploit & full info:Available here


Windows NT NTML Auto-Authentication
Description:Internet Explorer running on NT will attemt to authenticate using your (hashed) password to anyone who asks! Worse, it doesn't even tell you that it is doing this. Even if you have a very strong password, a man-in-the-middle attack is possible. The server can request a challenge from another server, and then feed it back to you for encryption!
Author:Paul Ashton <paul@argo.demon.co.uk>
Compromise:WWW servers can obtain authentication information (username and Lanman password hash) from clients who connect using Internet Explorer from an NT box.
Vulnerable Systems:NT 4.0, probably 3.51
Date:April 1997 or so
Notes:See Paul Ashton's demonstration at http://www.efsl.com/security/ntie/ . Also not that this isn't fixed as of 7/27/97. Will it ever be?
Exploit & full info:Available here


Linux inetd port theft vulnerability
Description:Inetd clos()es its sockets sometimes which (if they are unpriviliged) allows a user to just swipe them to put up a trojan service or whatever. Note that users can generally cause inetd to close the port by connecting over and over rapidly to make inetd think there is a loop.
Author:Marc Slemko (marcs@znep.com) posted this, it might have originally been discovered by someone else and I don't have the original post.
Compromise:Steal unpriviliged services from INETD
Vulnerable Systems:Linux, possibly others
Date:28 March 1997
Exploit & full info:Available here


ELM NLSPATH overflow
Description:Elm , which is often setgid mail, has a buffer overflow with the NLSPATH variable. This is NOT the same as the libc NLSPATH bug.
Author:"Dmitry E. Kim" <jason@REDLINE.RU>
Compromise:GID mail (local)
Vulnerable Systems:Linux with vulnerable setGID mail ELM
Date:26 March 1997
Notes:Joining group mail *CAN* be very helpful to hackers, some linux boxes allow you to write to mail spool and read other people's mail if you achieve this. Also, if anyone has a working exploit please mail it this way, I don't feel like writing & testing right now.
Exploit & full info:Available here


Win95 Cleartext SMB authentication hole
Description:Win95 is that it will connect to SMB servers and try the user's plaintext password first. You can also direct this through a web page with a linke like file://\\server/hackmicrosoft/sploit.gif. You also have to inform it of your name (can be done through SAMBA's nmbd utility).
Author:Steve Birnbaum (sbirn@security.org.il)
Compromise:Grab Win95 Passwords (remote)
Vulnerable Systems:Win95, Internet Explorer to a slight degree
Date:25 March 1997
Exploit & full info:Available here


Linux tftpd vulnerability
Description:Linux tftpd doesn't check corectly for requests beginning with ../
Author:Alex Belits (abelits@phobos.illtel.denver.co.us)
Compromise:Access directories beyond permissions REMOTELY
Vulnerable Systems:Idiots on Linux running tftpd
Date:23 March 1997
Exploit & full info:Available here


Solaris /bin/fdformat overflow sploit
Description:Buffer overflow in find_media() in /bin/fdformat
Author:Cristian Schipor (skipo@Math.PUB.Ro)
Compromise: root (local)
Vulnerable Systems:Solaris 2.4, 2.5
Date:23 March 1997
Exploit & full info:Available here


Windows NT password hash retrieval
Description:Jeremy Allison has successfully de-obfuscated the NT LANMAN and md4 hashes from the registry. This has many useful implications, including allowing us to hack the real password, or use the hash to longin via SAMBA. To make things even better, the "encryption" has a LOT of problems.
Author:Jeremy Allison <jra@cygnus.com>
Compromise:Grab NT password hashes, which can then be cracked. You must be administrator or at least have the loser run your trojan.
Vulnerable Systems:Windows NT 4.0 and 3.51 at least
Date:22 March 1997
Notes:The README for follows, and afterwords I have included the code. Also there are a lot of crackers available. Try NTCrack. Or you can get l0phtcrack, try www.l0pht.com
Exploit & full info:Available here


Sendmail 8.8.[34] dead.letter exploit
Description:A hard-link vulnerability
Author:C0WZ1LL4@NETSPACE.ORG
Compromise: root (local)
Vulnerable Systems:SOME systems running sendmail 8.8.[34] possibly 8.8.5 in some situations.
Date:22 March 1997
Notes:This doesn't always work, it depends among other things on if they have POSTMASTER of MAIL_DAEMON defined in /etc/aliases. Remember if /var is on another partition, ln to a file in /var ... there are plenty to choose from ;)
Exploit & full info:Available here


Linux SuperProbe vulnerability
Description:Buffer overflow in SuperProbe, which should NOT be suid root!
Author:Solar Designer
Compromise: root (local)
Vulnerable Systems:Linux with vulnerable SuperProbe SUID root
Date:21 March 1997 (I could have swarn it was known before this)
Exploit & full info:Available here


ANOTHER pathetic IIS 3.0 vulnerability
Description:Microsoft CANNOT seem to handle dots at all in their programs, after fixing the name.asp. bug, the great guys at the l0pht found that their "fix" introduced another '.' bug. This time using the hex representation.
Author:Weld Pond <weld@l0pht.com&rt
Compromise:Remotely obtain .asp, .ht, .id, .PL files etc.
Vulnerable Systems:Those running vulnerable M$ IIS 3.0 web server
Date:21 March 1997
Exploit & full info:Available here


Buffer overflow in AOL Instant Messenger 1.7.466
Description:Overflow in message <TITLE>. Trivial DOS attack, probably could be exploited for remote access.
Author:Karl Koscher <mrsaturn@TEENCITY.ORG>
Compromise:DOS attack with strong possibility of remotely running arbitrary code.
Vulnerable Systems:People running AOL's Instant Messenger V.1.7.466 or before
Date:20 March 1997
Exploit & full info:Available here


WinNT/Win95 Automatic Authentication Vulnerability (IE Bug #4)
Description:Win95 will automatically try to authenticate the logged in user to an SMB server. Thus (through a web page, in this example), you can direct people to the server and then grab their username and "encrypted" LANMAN password.
Author:Aaron Spangler <pokee@MAXWELL.EE.WASHINGTON.EDU>
Compromise:Obtain LANMAN hashed passwords (remote)
Vulnerable Systems:Win95, WinNT 3.51 & 4.0
Date:14 March 1997
Exploit & full info:Available here


INND header control characters hole
Description:This hole allows someone to attack THOUSANDS of news servers at once by inserting special characters into post headers. This has been widely exploited.
Author:Been known for a while
Compromise:You can REMOTELY execute arbitrary commands under UID of news server.
Vulnerable Systems:Systems running versions of INND prior to and including 1.5, some sites with later versions are vulnerable if they forgot to delete some scripts in the new installation
Date:Was widely exploited in March 1997
Notes:Here are some examples of exploit postings
Exploit & full info:Available here


SCO Openserver 5 expired password hole
Description:SCO OpenSERVER 5 apparently doesn't prompt users for their expired password before making them change it. Duh.
Author:ultima@CORINNE.MAC.EDU
Compromise: root (local)
Vulnerable Systems:SCO OpenSERVER5
Date:22 February 1997 (could be pretty old)
Exploit & full info:Available here


Many Windows FTP servers are not very robust
Description:This is an example of how tocrash War FTPD 1.65 for Win 95/NT, you can do similar things with ServU and most other ftpd's I have seen.
Author:Well known, but here is a post to Bugtraq from rootshell
Compromise:crash the Windows ftpd
Vulnerable Systems:Those runnign Windows ftp servers
Date:4 February 1997
Notes:I have appended a serv-U crasher. Note that this may be the fault of Windows and not Serv-U.
Exploit & full info:Available here


A collection of 6 Internet Explorer bugs
Description:6 security holes in our favorite web browser (NOT), all in one neat package
Author:Assorted, mentioned in package
Compromise:Run commands as the user running IE, NT idiots often run as ADMINISTRATOR.
Vulnerable Systems:Systems running Internet Explorer, the vicinity of 3.0. Microsoft Win95/NT mostly.
Date:February 1997 might be a good average
Notes:How many admins would respond to an email message promising "wet hot sex!" or something else enticing at a certain URL? Except for indiscriminate attacks, this would take a little social engineering. The appended UUencoded version probably looks funny in your web browser. Just "save as".
Exploit & full info:Available here


Irix netprint vulnerability
Description:standard system() call/path hole
Author:Yuri Volobuev <volobuev@t1.chem.umn.edu&rt;
Compromise: root (local)
Vulnerable Systems:IRIX with vulnerable Netprint
Date:4 January 1997
Exploit & full info:Available here


xdm UNIX Ware exploit
Description:standard tempfile vulnerability in setuid root xdm on UNIX Ware systems with X, possibly others.
Author:Angel Ortiz <angelo@tawny.ssd.hcsc.com>
Compromise: root (local)
Vulnerable Systems:Systems with vulnerable xdm setuid (at least some UNIXware systems)
Date:2 January 1997
Notes:See addendum.
Exploit & full info:Available here


Linux Doom sndserver vulnerability
Description:This one is pathetic. The user can configure a soundserver in .doomrc, and this program that the user chose, runs as root!
Author:Joe Zbiciak <im14u2c@cegt201.bradley.edu>
Compromise: root (local)
Vulnerable Systems:Linux running an insecure version of doom setuid root.
Date:17 December 1996
Exploit & full info:Available here


Doom killmouse/startmouse vulnerability
Description:Doom calls insecure shell scripts as root, leading to easy root compromise.
Author:Bo (bo@ebony.iaehv.nl)
Compromise: root (local)
Vulnerable Systems:Linux, including Slackware 3.0. Possibly other distributions.
Date:14 December 1996
Notes:If anyone runs suid root GAMES on a system they want secure, they DESERVE to be hacked! I've appended the obvious exploit to the end of this.
Exploit & full info:Available here


Modstat exploit
Description:Standard buffer overflow in modstat, which is distributed with many BSD variants (althought apparently not BSDI).
Author:Mudge <mudge@l0pht.com>
Compromise: root (local)
Vulnerable Systems:Windows versions running MIRC prior to 5.3
Date:9 December 1996
Exploit & full info:Available here


dataman/cdman hole
Description:system() call vulnerability in the dataman program (cdman is a symlink to it) in IRIX
Author:Yuri Volobuev (volobuev@t1.chem.umn.edu)
Compromise: root
Vulnerable Systems:Windows95 and NT systems running Cybercash 2.1.2 or Verifone vPOS
Date:9 December 1996
Exploit & full info:Available here


Solaris chkperm vulnerability
Description:Solaris 2.4's /usr/vmsys/bin/chkperm creates $VMSYS/.facerc in a laughably insecure fashion.
Author:Duncan Simpson <dps@IO.STARGATE.CO.UK>
Compromise:bin, which trivially leads to root (local)
Vulnerable Systems:Solaris 2.4, NOT 2.5 or 2.5.1, the author is apparently wrong about this.
Date:5 December 1996
Exploit & full info:Available here


IRIX suid_exec hole
Description:suid_exec, a program apparently distributed with ksh, has a number of security holes, including trusting the user's $SHELL variable.
Author:Yuri Volobuev (volobuev@t1.chem.umn.edu)
Compromise: root (local)
Vulnerable Systems:Irix 5.3 and 6.2, possibly AIX and others.
Date:2 December 1996
Exploit & full info:Available here


HP/UX chfn bug
Description:Standard buffer overflow
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable chfn (probably 9.x, 10.x)
Date:December 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


IRIX fsdump hole
Description:/var/rfindd/fsdump handles lock files poorly, which can lead to root access.
Author:Yuri Volobuev (volobuev@t1.chem.umn.edu)
Compromise: root (local)
Vulnerable Systems:Irix 5.3 and some 6.2 systems (its apparently optional in 6.2)
Date:28 November 1996
Notes:There is a better exploit at the addendum
Exploit & full info:Available here


IRIX /usr/etc/LicenseManager hole
Description:/usr/etc/LicenseManager handles log files poorly, which can lead to root access.
Author:Yuri Volobuev (volobuev@t1.chem.umn.edu)
Compromise: root (local)
Vulnerable Systems:Irix 5.3 and 6.2 systems (possibly other Irix systems)
Date:22 November 1996
Exploit & full info:Available here


IRIX /usr/bin/X11/cdplayer hole
Description:/usr/bin/X11/cdplayer is setuid on IRIX and is very insecure in file/directory creation, which can lead to root access.
Author:Yuri Volobuev (volobuev@t1.chem.umn.edu)
Compromise: root
Vulnerable Systems:at least Irix 5.3 and 6.2
Date:21 November 1996
Exploit & full info:Available here


Solaris gethostbyname() exploit
Description:gcc 2.7.2.x (and earlier as far as I know) creates temporary files in /tmp which will follow symlinks and allows you to clobber the files of the person running gcc
Author:Jeremy Elson (jelson@helix.nih.gov)
Compromise:Overwrite files owned by the user running gcc (possibly root )
Vulnerable Systems:Solaris 2.5 and 2.5.1
Date:18 November 1996
Notes:See addendum
Exploit & full info:Available here


Digital Unix /usr/tcb/bin/dxchpwd hole
Description:In Digital Unix, /usr/tcb/bin/dxchpwd creates log files in a very insecure manner.
Author:Eric Augustus (augustus@mail.stic.net)
Compromise: root (local)
Vulnerable Systems:at least Digital Unix v3.x with c2 security package installed
Date:17 November 1996
Exploit & full info:Available here


Sendmail HUP bug
Description:smtpd, part of the sendmail distribution, can be tricked into executing arbitrary programs as root after receiving a hang-up signal.
Author:Leshka Zakharoff (leshka@leshka.chuvashia.su)
Compromise: root (local)
Vulnerable Systems:systems running Sendmail versions 8.7-8.8.2
Date:16 November 1996
Exploit & full info:Available here


More SOD HP/UX RemWatch vulnerabilities
Description:A number of internal HP/UX RemWatch binaries, including checkcore, rwiDCOM, and showdisk are vulnerabile. Several exploits included
Author:SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable RemWatch binaries, probably 9.x, 10.x
Date:6 November 1996 and earlier
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


SOD HP/UX /tmp/fpkg2swpk bug
Description:Standard buffer overflow
Author:Dog Catcher
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable fpkg2swpk, probably just 10.x
Date:November 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


SOD /usr/diag/bin/[cm]stm buffer overflow
Description:Standard buffer overflow
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable [cm]stm, probably 9.x 10.x
Date:November 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


(Another) SOD HP/UX RemoteWatch hole
Description:pathetic daemon
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root or whatever remwatch runs as (remote!)
Vulnerable Systems:HP/UX with vulnerable Remote Watch running, probably 9.x, maybe 10.x
Date:November 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


IRIX systour package security holes
Description:The "systour" packaged shipped with IRIX contains numerous security holes.
Author:Tung-Hui Hu (hhui@STARDOT.NET)
Compromise: root (local)
Vulnerable Systems:At least Irix 5.3 and 6.2 with systour installed
Date:30 October 1996
Exploit & full info:Available here


Linux & *BSD lpr holes
Description:A standard buffer overflow exists Berleley derived lpr
Author:Vadim Kolontsov (vadim@tversu.ac.ru) wrote the exploits at least
Compromise: root (local)
Vulnerable Systems:Systems with vulnerable lpr setuid (many Linux and BSD distributions)
Date:25 October 1996
Exploit & full info:Available here


Ping of Death
Description:gazillions of machines can be crashed by sending IP packets that exceed the maximum legal length (65535 octets)
Author:The page included was created by Malachi Kenney. The programs have attribution.
Compromise:Stupid DOS
Vulnerable Systems:I have heard that NT and 95 can actually lock up hard from the programs below. Also, early 2.0.x Linux, Solaris x86, and Macintosh systems are often vulnerable.
Date:21 October 1996 was when this page came up.
Notes:The Ping O' Death page is included first, then comes BSD source code, then comes a version of the above which is modified to compile on Linux 2.X. I also appended jolt.c, which IP spoofs to. Woop!
Exploit & full info:Available here


Solaris /usr/bin/solstice bug
Description:/usr/bin/solstice is setgid bin and gives this privilege away freely.
Author:Unknown (it was known before the attached post)
Compromise:group bin, which leads quickly to root (local)
Vulnerable Systems:Systems with vulnerable /usr/bin/solstice (Solaris 2.5, 2.5.1)
Date:18 October 1996 (known prior to this)
Notes:See addendum.
Exploit & full info:Available here


Another hpux ppl bug by SOD
Description:standard symlink/core vulnerability
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable ppl, probably 9.x 10.x
Date:15 October 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


Solaris (and others) ftpd core dump bug
Description:Solaris ftpd (as well as others) can be made to core dump and divulge shadowed passwords
Author:Unknown
Compromise:Can obtained crypt()ed root password
Vulnerable Systems:Solaris (at least 2.5) and others including wu.ftpd. If enclosed doesn't work, try killing the process yourself.
Date:15 October 1996
Notes:See addendum
Exploit & full info:Available here


Linux ldt kernel bug
Description:see exploit.
Author:Marin Purgar - PMC (pmc@asgard.hr) wrote this exploit
Compromise: root
Vulnerable Systems:Unpatched Linux 1.2.* systems (possibly some 1.3.x)
Date:11 October 1996
Exploit & full info:Available here


swinstall symlink exploit
Description:Standard symlink hole
Author:"Salty"
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable swinstall, mostly 10.x, some 9.x
Date:6 October 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


HP/UX passwd hole
Description:Standard buffer overflow
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:Those running O'reilly's webserver, website. Mostly Windoze NT and W95 boxes. Some versions of 1.1 and 2.0beta have this vulnerability.
Date:October 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


HP OpenCall SCP /opt/OV/bin/OpC/opcragt exploit
Description:Standard /tmp symlink vulnerability
Author:Dog Catcher
Compromise: root on a potentially very cool system! (local)
Vulnerable Systems:many phone network operators use OpenCall SCP
Date:October 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


Windows Screensaver bug
Description:Some versions of Win/Win95/WinNT seem to allow people to bypass screensaver password "security" with control-alt-delete and contol-ESC
Author:Common knowledge
Compromise:Take over "passworded" winbloze machines (local)
Vulnerable Systems:Some Win95 and WinNT boxes
Date:October 1996
Exploit & full info:Available here


HP/UX SOD glance bug
Description:symlink bug due to poor error file creation
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable /usr/perf/bin/glance , probably just 9.x
Date:October 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


HP/UX ppl symlink problem
Description:ppl insecurely creates log files in world writeable directory, I'm sure you can see where this is headed.
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable ppl, 9.x 10.x
Date:October 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


Race condition exploit for HP/UX SAM
Description:standard /tmp symlink race condition with HP/UX SAM
Author:John W. Jacobi (jjacobi@nova.umuc.edu)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable SAM, at least HP-UX 9.04 & 9.05 on 9000/700 & 9000/800
Date:25 September 1996
Notes:for more HP bugs see the SOD HP Bug of the Week page
Exploit & full info:Available here


Sendmail gecos buffer overflow vulnerability
Description:A quirk in Sendmail that could potentially be exploited is that usernames like '/etc/passwd' get written into the file of the same name when mail is received for them. This could be a problem on systems where users can specify their username without sysadmin intervention.
Author:mudge@l0pht.com found this hole in a l0pht advisory. This exploit for FreeBSD written by Alexey Zakharov (leshka@chci.chuvashia.su)
Compromise: root (local)
Vulnerable Systems:Any systems using Sendmail ~8.6.12, possibly up to 8.75 that allow user-specified /etc/passwd gecos fields (ie through chfn(1)). This exploit will work for FreeBSD
Date:23 September 1996
Notes:The original L0pht Security Advisory is in addendum
Exploit & full info:Available here


Xt library bug xterm exploit
Description:The Xt library has a number of buffer overflow vulnerabilities which can be exploited on the suid root programs linked to it.
Author:"b0z0 bra1n"
Compromise: root (local)
Vulnerable Systems:This exploit will work for FreeBSD and with tweaking other x86 operating systems (eg linux). Most systems running any version of X11 prior to Aug '96 are vulnerable
Date:24 August 1996
Exploit & full info:Available here


Linux & *BSD umount holes
Description:A standard buffer overflow exists in Linux and *BSD umount
Author:bloodmask (bloodmask@mymail.com) claims to have found the vulnerability. Paulo Jorge Alves Oliveira (pjao@dux.isec.pt) wrote the freebsd/linux exploits included first.
Compromise: root (local)
Vulnerable Systems:Systems with vulnerable umount setuid (many Linux and BSD distributions)
Date:13 August 1996
Notes:If mount is fixed, try ncpmount/ncpumount and possibly wuftpd. Another mount exploit is in addendum.
Exploit & full info:Available here


HP/UX Rdist exploit
Description:SOD HP/UX rdist exploit
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable rdist, probably 9.x 10.x
Date:10 August 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


IRIX day5notifier hole
Description:Hehe, the good folks at SGI apparently tried to avoid the system() call security problems, by an execve("/sbin/sh", "sh", "-c", "command..."). Ha!
Author:Mike Neuman <mcn@RIPOSTE.ENGARDE.COM>
Compromise: root (local)
Vulnerable Systems:IRIX 6.2
Date:Mike reported it on 6 August 1996, but they apparently didn't get around to fixing it.
Exploit & full info:Available here


IRIX 5.3 chost vulnerability
Description:IRIX 5.3 chost apparently fails to drip privileges sufficiently when an invalid root password is entered
Author:Grant Kaufmann (gkaufman@cs.uct.ac.za)
Compromise: root (local)
Vulnerable Systems:IRIX 5.3 with vulnerable chost.
Date:6 August 1996
Notes:The SGI patch may not always plug the hole!
Exploit & full info:Available here


setgid Core dumping vulnerability in Solaris 2.4
Description:Solaris 2.4 prior to kernel jumbo patch 35 in many circumstances allows setgid programs to dump core which is especially bad since Solaris has WAY too many group-writable files.
Author:Jungseok Roh <beren@cosmos.kaist.ac.kr>
Compromise:It is easy to overwrite files writeable by group bin, which leads quickly to root access (local)
Vulnerable Systems:Solaris 2.4 prior to kernel jumbo patch -35
Date:3 August 1996
Exploit & full info:Available here


Solaris admintool and /usr/openwin/bin/kfcs_* tmpfile vulnerabilities
Description:Standard insecure tempfile creation, symlink to /.rhosts exploit
Author:Jungseok Roh (beren@cosmos.kaist.ac.kr) posted the kcms_* stuff, Leif Hedstrom (leif@netscape.com) posted that admintool had the same problem.
Compromise: root (local)
Vulnerable Systems:Solaris 2.5.[01]
Date:26 July 1996
Exploit & full info:Available here


Microsoft IIs '..' hole
Description:ANOTHER stupid MS '..' bug, this time in their web server.
Author:possibly Thomas Lopatic (lopatic@dbs.informatik.uni-muenchen.de)
Compromise:Gain unauthorized access to files outside the public html directories.
Vulnerable Systems:Systems running a vulnerable IIs http server, mostly Windows NT boxes.
Date:26 July 1996
Exploit & full info:Available here


DG/UX ospf_monitor vulnerability
Description:It is suid and contains a command to write to file, which it does w/o dropping privileges. Brilliant.
Author:Brian Mitchell (brian@saturn.net)
Compromise: root (local)
Vulnerable Systems:Tested on DG/UX 5.4r3.10
Date:23 July 1996
Exploit & full info:Available here


Linux sliplogin hole
Description:sliplogin does system() as root w/o clearing environment, so you can do things like set IFS='/'.
Author:David Holland <dholland@hcs.HARVARD.EDU>
Compromise: root (local)
Vulnerable Systems:Any with sliplogin older than 2.1.0, mostly linux systems (many BSD distributions have the program, but it apparently can't be exploited to another error).
Date:16 July 1996
Exploit & full info:Available here


Rdist buffer overrun (BSD Code)
Description:Another vulnerability in rdist, standard buffer overflow
Author:found in [8lgm]-Advisory-26.UNIX.rdist.20-3-1996, *BSD exploit written by Brian Mitchell (brian@saturn.net)
Compromise: root (local)
Vulnerable Systems:Solaris 2.x, Sunos 4.*, some *BSD systems. Included exploit only for *BSD.
Date:10 July 1996
Exploit & full info:Available here


Novell httpd convert.bas cgi hole
Description:Another '..' bug, this time by Novell
Author:TTT Group <ttt@broder.com&rt;
Compromise:read any file on server
Vulnerable Systems:systems running vulnerable versions of Novell's httpd
Date:3 July 1996
Exploit & full info:Available here


HP/UX Remote Watch hole
Description:Standard /tmp symlink exploit
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable , probably 9.x 10.x
Date:June 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


suid_perl 5.001 vulnerability
Description:On systems that support saved set-user-IDs, perl isn't thorough enough in giving up its root priviledges.
Author:Jon Lewis (jlewis@inorganic5.fdt.net) wrote this basic exploit, though it has been modified. It is unclear who found the hole.
Compromise: root (local)
Vulnerable Systems:Systems that support saved set-user-IDs and set-group-IDs and have suid_perl 5.001 (and possibly below) installed. Many linux and *BSD boxes.
Date:June 1996
Exploit & full info:Available here


Microsoft Internet Information Server abracadabra.bat bug
Description:abracadabra.{bat,cmd} are insecure CGIs
Author:www.omna.com
Compromise:Execute arbitrary commands on the remote IIS Server
Vulnerable Systems:Microsoft IIS http server v.1.0, 2.0b
Date:June 1996
Exploit & full info:Available here


xrw bug
Description:shelling from a xrw telnet session cedes EUID 0
Author:Ess Jay
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable xrw, probably 9.x 10.x
Date:23 May 1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


test-cgi vulnerability
Description:Some of the test-cgi scripts distributed with some http servers are buggy
Author:Mudge <mudge@l0pht.com>
Compromise:remotely obtain directory listings
Vulnerable Systems:systems with vulnerable test-cgi (many web servers)
Date:April 1996
Notes:If this exact exploit doesn't work, try slightly modified query strings.
Exploit & full info:Available here


PC Web site interpretor in cgi-bin directory vulnerability
Description:A lot of idiots with PC web servers put perl.exe in their cgi-bin directory.
Author:tchrist@perl.com wrote this exploit
Compromise:Execute arbitrary perl code on a PC (remote)
Vulnerable Systems:Mostly PC web servers. Wherever anyone is stupid enough to leave perl.exe in cgi-bin dir
Date:28 March 1996
Notes:You can find vulnerable site via altavista. More information on this program available at http://www.perl.com/perl/news/latro-announce.html
Exploit & full info:Available here


Solaris /bin/eject Buffer overflow
Description:Solaris /bin/eject takes a device name (floppy, etc) for argv[2] which can be overflowed via standard techniques.
Author:Cristian SCHIPOR (skipo@SUNDY.CS.PUB.RO)
Compromise: root (local)
Vulnerable Systems:Unpatched Solaris 2.4, 2.5
Date:13 March 1996
Exploit & full info:Available here


Solaris 2.5.1 sdtcm_convert hole
Description:sdtcm_convert is kind enough to watch the permissions of your calendar file and if you change them it will change them back ... even following symlinks ;)
Author:Cristian SCHIPOR (skipo@SUNDY.CS.PUB.RO)
Compromise: root (local)
Vulnerable Systems:Solaris at least 2.5.1
Date:22 February 1996
Exploit & full info:Available here


Microsoft Active Server Pages IIS server hole
Description:Microsoft really has a problem with clients that send "." don't they? Well here again they let people download asp source by appending a '.' to the url
Author:Mark Joseph Edwards (mark@NTSHOP.NET)
Compromise:Read raw unprocessed asp files which may contain privileged information (remote)
Vulnerable Systems:Systems running M$ IIS web server
Date:20 February 1996
Exploit & full info:Available here


*BSD (and others) SetUID core vulnerabilities
Description:A 4.4BSD problem allows a read-only descriptor to a char device to be mmap()ed in RW mode. This can allow group kmem to become root and root to lower the system secure-level.
Author:Theo de Raadt and Chuck Cranor
Compromise:User kmem-> root ->modify secure-level->delete audit trail and load evil kernel mods.
Vulnerable Systems:OpenBSD 2.2 and below, FreeBSD 2.2.5 and below, BSDI 3.0 and NetBSD.
Date:17 February 1996 for this posting
Exploit & full info:Available here


Apache httpd 1.1.3 apache_status vulnerability
Description:Older versions of Apache httpd would blindly follow symlinks and overwrite files with its /tmp/apache_status file.
Author:Dean Gaudet (dgaudet@ARCTIC.ORG)
Compromise: root (local)
Vulnerable Systems:systems running Apache httpd v1.1.3 or lower on some architectures
Date:16 February 1996
Exploit & full info:Available here


Linux NLSPATH libc overflow
Description:Standard Buffer overflow in libc, neat shellcode though
Author:solar@IDEAL.RU posted exploit, libc had already been fixed
Compromise: root (local)
Vulnerable Systems:Linux with libc around or before 5.3.12, 5.4.7 not vulnerable. SOME versions of Redhat 4.0 are vulnerable
Date:14 February 1996
Exploit & full info:Available here


sudo.bin exploit for NLSPATH vulnerability
Description:Another NLSPATH exploit, this time for sudo.bin
Author:_Phantom_ <vali@lhab.soroscj.ro>
Compromise: root (local)
Vulnerable Systems:Linux with libc around or before 5.3.12, 5.4.7, and sudo.bin installed (Slackware 3.1 and 3.0 maybe?)
Date:13 February 1996 was when we started seeing this class of exploits
Notes:I wish more people would email me exploits like _Phantom_ did! He has also sent in a bunch of other NLSPATH sploits. If the system doesn't have this particular binary, pick another suid program and just change the execl
Exploit & full info:Available here


Insecure Solaris default nissetup password table permissions!
Description:The nissetup.sh program for setting up NIS+ databases leaves insecure permissions on the password table. This allows you to, for example, use nistbladm to change your UID!
Author:Well known
Compromise: root (local)
Vulnerable Systems:Unpatched Solaris 2.5.1 systems (possibly earlier versions of Solaris).
Date:10 February 1996
Notes:Here is an anonymous posting reminding us of the problem. Also, Casper Dik (casper@HOLLAND.SUN.COM) mentioned that just installing the Solaris patch doesn't fix the problem. You need to manually reset the bad permissions. How many people do you think forgot to do that?
Exploit & full info:Available here


AIX powerPC gethostbyname() and /bin/host exploits
Description:standard buffer overflow in gethostbyname
Author:Georgi Guninski (guninski@technologica.bg)
Compromise: root (local)
Vulnerable Systems:AIX systems on PowerPC with vulnerable gethostbyname(). AIX 4.1, possibly 3.x, 4.x.
Date:13 January 1996
Exploit & full info:Available here


AUTOSOFT/RTS holes
Description:A BUNCH of pathetic security holes in AUTOSOFT/RTS (an inventory control system).
Author:Brian Mitchell <brian@saturn.net>
Compromise: root (local)
Vulnerable Systems:Any running unfixed vunerable versions of AUTOSOFT/RTS
Date:9 January 1996
Exploit & full info:Available here


IRIX/usr/Cadmin/bin/csetup vulnerability
Description:standard dumb tmpfile creation vulnerability in csetup
Author:Discovered by Jay (srinivas@t2.chem.umn.edu)
Compromise: root (local)
Vulnerable Systems:IRIX with vulnerable suid csetup
Date:6 January 1996
Exploit & full info:Available here


WebSite v1.1e for Windows NT & 95 buffer overflows
Description:Cool. Win95/NT Buffer overflows with WebSite v1.1e for Windows NT and '95.
Author:solar@ideal.ru
Compromise:Run arbitrary commands remotely.
Vulnerable Systems:Systems running WebSite v1.1e for Windows NT and '95.
Date:6 January 1996
Exploit & full info:Available here


Telnetd Environmental variable passing problem
Description:A "feature" of most telnetd programs is that they will pass environmental variables (like TERM, DISPLAY, etc) for you. Unfortunately this can be a problem if someone passes LD_PRELOAD and causes /bin/login to load trojan libraries!
Author:Well known, squidge (squidge@onyx.infonexus.com) wrote this, but I doubt you can reach him. Isn't he in jail now?
Compromise:root REMOTELY!
Vulnerable Systems:Older Linux boxes, I think SunOS systems, probably others.
Date:January 1996 maybe? Quite old but lives forever like phf.
Notes:Appended is a uuencoded version of squidge's telnetd_ex.tar.gz
Exploit & full info:Available here


/cgi-bin/phf vulnerability
Description:A VERY well known character escaping vulnerabity in some phf cgi scripts.
Author:Unknown
Compromise:Generally 'nobody' or 'daemon', but sometimes root . Whatever httpd is running. (REMOTE)
Vulnerable Systems:Many old web server distributions came with phf installed
Date:January 1996 or something like that.
Notes:Since some systems have vulnerable bash, you can also try http://host.com/cgi-bin/phf?Qalias=%ff/bin/cat%20/etc/passwd. Also see addendum for a fake phf script to fool would-be crackers. After that I've put a phf exploit with a little more obfuscation.
Exploit & full info:Available here


Resolv+ Linux library bug
Description:The libresolv+ library can give out too much information and possibly to crash the system
Author:Possibly Jared Mauch (jared@puck.nether.net)
Compromise:users can read first line of any file (ie /etc/shadow) and they can possibly crash the system.
Vulnerable Systems:Many Linux distributions.
Date:1996
Exploit & full info:Available here


HP/UX sam_exec user vulnerability
Description:In a particularly dumb move, HP/UX's remote administration program, SAM, adds a user 'sam_exec' with UID 0 and a standard password.
Author:bogus technician (bogus@command.com.inter.net) (apparently it is SOD again) was the first to find the 10.x password.
Compromise: root (local)
Vulnerable Systems:HP/UX 9.x,10.x where SAM has been used
Date:1996
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


xwcreate/destroy vulnerability
Description:xwcreate and xwdestroy let you delete any file on system!
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise:delete any file on system, this can lead to root if you take out /etc/passwd, but BE CAREFUL! (local)
Vulnerable Systems:HP/UX with vulnerable xwcreate/xwdestroy 9.x and possibly 10.x
Date:Unknown
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


Old HPUX subnetconfig vulnerability
Description:trojan in path vulnerability in subnetconfig
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable netconfig, possibly just 9.0
Date:OLD
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here


Linux lilo vulnerabilities
Description:Lilo offers a lot of ways to get root by people who have physical access to the machine. This should be obvious, as these are advertiese features of lilo. If some one has physical access, they can get in somehow anyway. But these make it easy to do inconspicuously.
Author:These are quite well known, though BeastMaster V apparently wrote the textfile.
Compromise: root (local)
Vulnerable Systems:Linux systems running lilo which allow physical access to untrusted users (really dumb!).
Date:Old (very), but still applicable to many systems, as it is a feature and thus hasn't been "patched".
Notes:BeastMaster doesn't mention that you can also boot with "linux single" to get a root single-user-mode shell on many linux boxes. I've added another post about lilo "vulnerabilities" in the addendum section.
Exploit & full info:Available here


More HP/UX glance vulnerabilities
Description:A couple more old glance vulnerabilities
Author:Colonel Panic of SOD (sod@command.com.inter.net)
Compromise: root (local)
Vulnerable Systems:HP/UX with vulnerable glance, maybe 9.x or 10.x
Date:Unknown
Notes:See the SOD HP Bug of the Week page
Exploit & full info:Available here



This page Copyright © Fyodor 1996, 1997, 1998
[Back] to Fyodor's Exploit World main index

[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]