|
| 1 | +--- |
| 2 | +- description: The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, |
| 3 | + does not initialize all function pointers for socket operations in proto_ops structures, |
| 4 | + which allows local users to trigger a NULL pointer dereference and gain privileges |
| 5 | + by using mmap to map page zero, placing arbitrary code on this page, and then |
| 6 | + invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage |
| 7 | + function) on a PF_PPPOX socket. |
| 8 | + filename: linux-sendpage3.tar.gz |
| 9 | + name: Linux sock_sendpage() NULL Pointer Dereference Exploit for Linux POWER/PowerPC |
| 10 | + x86 (3) |
| 11 | + published: 2009-09-10 00:00:00.000000000 Z |
| 12 | + resources: |
| 13 | + - name: View on LWN.net |
| 14 | + url: https://lwn.net/Articles/349999/ |
| 15 | + updated: |
| 16 | + url: https://github.com/risesecurity/exploits/raw/HEAD/linux-sendpage3.tar.gz |
| 17 | + vulnerabilities: |
| 18 | + - CVE-2009-2692 |
| 19 | +- description: The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, |
| 20 | + does not initialize all function pointers for socket operations in proto_ops structures, |
| 21 | + which allows local users to trigger a NULL pointer dereference and gain privileges |
| 22 | + by using mmap to map page zero, placing arbitrary code on this page, and then |
| 23 | + invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage |
| 24 | + function) on a PF_PPPOX socket. |
| 25 | + filename: linux-sendpage2.tar.gz |
| 26 | + name: Linux sock_sendpage() NULL Pointer Dereference Exploit for Linux POWER/PowerPC |
| 27 | + x86 (2) |
| 28 | + published: 2009-09-07 00:00:00.000000000 Z |
| 29 | + resources: |
| 30 | + - name: View on LWN.net |
| 31 | + url: https://lwn.net/Articles/349999/ |
| 32 | + updated: |
| 33 | + url: https://github.com/risesecurity/exploits/raw/HEAD/linux-sendpage2.tar.gz |
| 34 | + vulnerabilities: |
| 35 | + - CVE-2009-2692 |
| 36 | +- description: The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, |
| 37 | + does not initialize all function pointers for socket operations in proto_ops structures, |
| 38 | + which allows local users to trigger a NULL pointer dereference and gain privileges |
| 39 | + by using mmap to map page zero, placing arbitrary code on this page, and then |
| 40 | + invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage |
| 41 | + function) on a PF_PPPOX socket. |
| 42 | + filename: linux-sendpage.c |
| 43 | + name: Linux sock_sendpage() NULL Pointer Dereference Exploit for Linux POWER/PowerPC |
| 44 | + x86 |
| 45 | + published: 2009-08-31 00:00:00.000000000 Z |
| 46 | + resources: |
| 47 | + - name: View on LWN.net |
| 48 | + url: https://lwn.net/Articles/349999/ |
| 49 | + updated: |
| 50 | + url: https://github.com/risesecurity/exploits/raw/HEAD/linux-sendpage.c |
| 51 | + vulnerabilities: |
| 52 | + - CVE-2009-2692 |
| 53 | +- description: Stack-based buffer overflow in the _tt_internal_realpath function in |
| 54 | + the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, |
| 55 | + and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, |
| 56 | + allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII |
| 57 | + string to remote procedure 15. |
| 58 | + filename: rpc_ttdbserverd_realpath.rb |
| 59 | + name: ToolTalk rpc.ttdbserverd _tt_internal_realpath Buffer Overflow (AIX) |
| 60 | + published: 2009-06-23 03:49:25.000000000 Z |
| 61 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 62 | + url: https://github.com/risesecurity/exploits/raw/HEAD/rpc_ttdbserverd_realpath.rb |
| 63 | + vulnerabilities: |
| 64 | + - CVE-2009-2727 |
| 65 | +- description: Multiple heap-based buffer overflows in the NDR parsing in smbd in |
| 66 | + Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code |
| 67 | + via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), |
| 68 | + (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount |
| 69 | + (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 |
| 70 | + (lsa_io_trans_names). |
| 71 | + filename: lsa_transnames_heap_linux.rb |
| 72 | + name: Samba lsa_io_trans_names Heap Overflow (Linux) |
| 73 | + published: 2008-10-19 21:03:39.000000000 Z |
| 74 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 75 | + url: https://github.com/risesecurity/exploits/raw/HEAD/lsa_transnames_heap_linux.rb |
| 76 | + vulnerabilities: |
| 77 | + - CVE-2007-2446 |
| 78 | +- description: Stack-based buffer overflow in the adm_build_path function in sadmind |
| 79 | + in Sun Solstice AdminSuite on Solaris 8 and 9 allows remote attackers to execute |
| 80 | + arbitrary code via a crafted request. |
| 81 | + filename: sadmind_adm_build_path.rb |
| 82 | + name: Sun Solaris sadmind adm_build_path() Buffer Overflow |
| 83 | + published: 2008-10-14 14:22:34.000000000 Z |
| 84 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 85 | + url: https://github.com/risesecurity/exploits/raw/HEAD/sadmind_adm_build_path.rb |
| 86 | + vulnerabilities: |
| 87 | + - CVE-2008-4556 |
| 88 | +- description: Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 |
| 89 | + through 8.1.0.253, and WI 5.1.1.680 through 8.1.0.257, allow remote attackers |
| 90 | + to execute arbitrary code via (1) a long service attach request on TCP port 3050 |
| 91 | + to the (a) SVC_attach or (b) INET_connect function, (2) a long create request |
| 92 | + on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function, |
| 93 | + (3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f) |
| 94 | + PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database |
| 95 | + or (5) expand_filename2 function. |
| 96 | + filename: ib_inet_connect.rb |
| 97 | + name: Borland InterBase INET_connect() Buffer Overflow |
| 98 | + published: 2007-10-04 03:03:13.000000000 Z |
| 99 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 100 | + url: https://github.com/risesecurity/exploits/raw/HEAD/ib_inet_connect.rb |
| 101 | + vulnerabilities: |
| 102 | + - CVE-2007-5243 |
| 103 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 104 | + sending a specially crafted create request. |
| 105 | + filename: ib_jrd8_create_database.rb |
| 106 | + name: Borland InterBase jrd8_create_database() Buffer Overflow |
| 107 | + published: 2007-10-04 03:03:13.000000000 Z |
| 108 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 109 | + url: https://github.com/risesecurity/exploits/raw/HEAD/ib_jrd8_create_database.rb |
| 110 | + vulnerabilities: |
| 111 | + - CVE-2007-5243 |
| 112 | +- description: Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through |
| 113 | + 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote |
| 114 | + attackers to execute arbitrary code via a long attach request on TCP port 3050 |
| 115 | + to the open_marker_file function. |
| 116 | + filename: ib_open_marker_file.rb |
| 117 | + name: Borland InterBase open_marker_file() Buffer Overflow |
| 118 | + published: 2007-10-04 03:03:13.000000000 Z |
| 119 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 120 | + url: https://github.com/risesecurity/exploits/raw/HEAD/ib_open_marker_file.rb |
| 121 | + vulnerabilities: |
| 122 | + - CVE-2007-5244 |
| 123 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 124 | + sending a specially crafted attach request. |
| 125 | + filename: ib_pwd_db_aliased.rb |
| 126 | + name: Borland InterBase PWD_db_aliased() Buffer Overflow |
| 127 | + published: 2007-10-04 03:03:13.000000000 Z |
| 128 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 129 | + url: https://github.com/risesecurity/exploits/raw/HEAD/ib_pwd_db_aliased.rb |
| 130 | + vulnerabilities: |
| 131 | + - CVE-2007-5243 |
| 132 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 133 | + sending a specially crafted create request. |
| 134 | + filename: fb_isc_attach_database.rb |
| 135 | + name: Firebird Relational Database isc_attach_database() Buffer Overflow |
| 136 | + published: 2007-10-04 03:03:13.000000000 Z |
| 137 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 138 | + url: https://github.com/risesecurity/exploits/raw/HEAD/fb_isc_attach_database.rb |
| 139 | + vulnerabilities: |
| 140 | + - CVE-2007-5243 |
| 141 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 142 | + sending a specially crafted create request. |
| 143 | + filename: fb_isc_create_database.rb |
| 144 | + name: Firebird Relational Database isc_create_database() Buffer Overflow |
| 145 | + published: 2007-10-04 03:03:13.000000000 Z |
| 146 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 147 | + url: https://github.com/risesecurity/exploits/raw/HEAD/fb_isc_create_database.rb |
| 148 | + vulnerabilities: |
| 149 | + - CVE-2007-5243 |
| 150 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 151 | + sending a specially crafted service attach request. |
| 152 | + filename: fb_svc_attach.rb |
| 153 | + name: Firebird Relational Database SVC_attach() Buffer Overflow |
| 154 | + published: 2007-10-04 03:03:13.000000000 Z |
| 155 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 156 | + url: https://github.com/risesecurity/exploits/raw/HEAD/fb_svc_attach.rb |
| 157 | + vulnerabilities: |
| 158 | + - CVE-2007-5243 |
| 159 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 160 | + sending a specially crafted attach request. |
| 161 | + filename: ib_isc_attach_database.rb |
| 162 | + name: Borland InterBase isc_attach_database() Buffer Overflow |
| 163 | + published: 2007-10-04 03:03:13.000000000 Z |
| 164 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 165 | + url: https://github.com/risesecurity/exploits/raw/HEAD/ib_isc_attach_database.rb |
| 166 | + vulnerabilities: |
| 167 | + - CVE-2007-5243 |
| 168 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 169 | + sending a specially crafted create request. |
| 170 | + filename: ib_isc_create_database.rb |
| 171 | + name: Borland InterBase isc_create_database() Buffer Overflow |
| 172 | + published: 2007-10-04 03:03:13.000000000 Z |
| 173 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 174 | + url: https://github.com/risesecurity/exploits/raw/HEAD/ib_isc_create_database.rb |
| 175 | + vulnerabilities: |
| 176 | + - CVE-2007-5243 |
| 177 | +- description: This module exploits a stack buffer overflow in Borland InterBase by |
| 178 | + sending a specially crafted service attach request. |
| 179 | + filename: ib_svc_attach.rb |
| 180 | + name: Borland InterBase SVC_attach() Buffer Overflow |
| 181 | + published: 2007-10-04 03:03:13.000000000 Z |
| 182 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 183 | + url: https://github.com/risesecurity/exploits/raw/HEAD/ib_svc_attach.rb |
| 184 | + vulnerabilities: |
| 185 | + - CVE-2007-5243 |
| 186 | +- description: This module triggers a heap overflow in the LSA RPC service of the |
| 187 | + Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon |
| 188 | + and Adriano), which only works with Samba versions 3.0.21-3.0.24. Additionally, |
| 189 | + this module will not work when the Samba "log level" parameter is higher than |
| 190 | + "2". |
| 191 | + filename: lsa_transnames_heap_solaris.rb |
| 192 | + name: Samba lsa_io_trans_names Heap Overflow (Solaris) |
| 193 | + published: 2007-07-08 04:11:53.000000000 Z |
| 194 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 195 | + url: https://github.com/risesecurity/exploits/raw/HEAD/lsa_transnames_heap_solaris.rb |
| 196 | + vulnerabilities: |
| 197 | + - CVE-2007-2446 |
| 198 | +- description: This module triggers a heap overflow in the LSA RPC service of the |
| 199 | + Samba daemon. This module uses the szone_free() to overwrite the size() or free() |
| 200 | + pointer in initial_malloc_zones structure. |
| 201 | + filename: lsa_transnames_heap_osx.rb |
| 202 | + name: Samba lsa_io_trans_names Heap Overflow (OSX) |
| 203 | + published: 2007-07-05 01:41:39.000000000 Z |
| 204 | + updated: 2020-10-02 16:38:06.000000000 Z |
| 205 | + url: https://github.com/risesecurity/exploits/raw/HEAD/lsa_transnames_heap_osx.rb |
| 206 | + vulnerabilities: |
| 207 | + - CVE-2007-2446 |
| 208 | +- description: Buffer overflow in the Strcmp function in the XKEYBOARD extension in |
| 209 | + X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris |
| 210 | + 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment |
| 211 | + variable value. |
| 212 | + filename: sco-x86-xkb.c |
| 213 | + name: X11R6 XKEYBOARD Extension Strcmp() Stack-based Buffer Overflow Exploit for |
| 214 | + SCO UnixWare 7.1.3 x86 |
| 215 | + published: 2006-09-07 00:00:00.000000000 Z |
| 216 | + updated: |
| 217 | + url: https://github.com/risesecurity/exploits/raw/HEAD/sco-x86-xkb.c |
| 218 | + vulnerabilities: |
| 219 | + - CVE-2006-4655 |
| 220 | +- description: Buffer overflow in the Strcmp function in the XKEYBOARD extension in |
| 221 | + X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris |
| 222 | + 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment |
| 223 | + variable value. |
| 224 | + filename: sol-sparc-xkb.c |
| 225 | + name: X11R6 XKEYBOARD Extension Strcmp() Stack-based Buffer Overflow Exploit for |
| 226 | + Solaris 8 9 10 SPARC |
| 227 | + published: 2006-09-07 00:00:00.000000000 Z |
| 228 | + updated: |
| 229 | + url: https://github.com/risesecurity/exploits/raw/HEAD/sol-sparc-xkb.c |
| 230 | + vulnerabilities: |
| 231 | + - CVE-2006-4655 |
| 232 | +- description: Buffer overflow in the Strcmp function in the XKEYBOARD extension in |
| 233 | + X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris |
| 234 | + 8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment |
| 235 | + variable value. |
| 236 | + filename: sol-x86-xkb.c |
| 237 | + name: X11R6 XKEYBOARD Extension Strcmp() Stack-based Buffer Overflow Exploit for |
| 238 | + Solaris 8 9 10 x86 |
| 239 | + published: 2006-09-07 00:00:00.000000000 Z |
| 240 | + updated: |
| 241 | + url: https://github.com/risesecurity/exploits/raw/HEAD/sol-x86-xkb.c |
| 242 | + vulnerabilities: |
| 243 | + - CVE-2006-4655 |
0 commit comments