Remote DoS attack against SSH Secure Shell for Windows Servers Vulnerability

2001-03-15 Thread USSR Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 U.S.S.R labs Buenos Aires, Argentina http://www.ussrback.com Topic: Remote DoS attack against SSH Secure Shell for Windows Servers

Remote DoS attack in Real Networks Real Server Vulnerability

2000-04-20 Thread Ussr Labs
eal Server 7 (linux or Windows) Real Networks Real Server Pro (linux or Windows) Real Networks Real Server Intranet (linux or Windows) Real Networks Real Server Plus (linux or Windows) Real Networks Real Server Basic (linux or Windows) Real Networks Real Server G2 1.0 THE PROBLEM The Ussr Lab

Remote DoS Attack in Windows 2000/NT 4.0 TCP/IP Print Request Server Vulnerability

2000-03-30 Thread Ussr Labs
Windows NT 4.0 Server, Enterprise Edition Microsoft Windows 2000 Professional Microsoft Windows 2000 Server Microsoft Windows 2000 Advanced Server Services Affected: SimpTCP, DHCPServer FTPSvc, LPDSvc, BinlSvc, TCP/IP Print Request Server. THE PROBLEM Ussr Labs found a heap memory problem in TCP/IP

Local / Remote DoS Attack in MERCUR WebView WebMail-Client 1.0 for Windows 98/NT Vulnerability

2000-03-16 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Local / Remote DoS Attack in MERCUR WebView WebMail-Client 1.0 for Windows 98/NT Vulnerability USSR Advisory Code: USSR-236 Release Date: March 16, 2000 Systems Affected: MERCUR WebMail-Client Version 1.0 port (1080) THE PROBLEM UssrLabs

(BisonWare FTP Server V3.5 Roses Labs Security Advisory) is a old reported thing

2000-03-08 Thread Ussr Labs
bs / w00w00 http://www.roses-labs.com Advanced Security Research. - -- - ---- Ussr labs Release the Advisory the day 25/11/1999 reporting the BisonWare FTP Server V3.5 problem, i don

con\con is a old thing (anyway is cool)

2000-03-07 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- - New exploit found by the securax crew on 3/3/error for: windoze 98 maybe 95 too... not for NT4 or win2K When we looked at the new exploit for ie that uses the image

Local / Remote D.o.S Attack in InterAccess TelnetD Server Release 4.0 *ALL BUILDS* for WinNT Vulnerability

2000-02-25 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Local/Remote D.o.S Attack in InterAccess TelnetD Server Release 4.0 *ALL BUILDS* for Windows95/98/WinNT Vulnerability USSR Advisory Code: USSR-234 Release Date: February 24 2000 Systems Affected: InterAccess TelnetD Server 4.0 for WinNT and

Pragma Systems response to USSRLabs report

2000-02-24 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Pragma Systems response to USSRLabs report On February 22, 2000, Pragma Systems received an anonymous email regarding a security issue reported to NT Security News, hosted by Windows 2000 magazine, with our InterAccess TelnetD Server 4.0 for NT. We

Local / Remote Exploiteable Buffer Overflow Vulnerability in InterAccess TelnetD Server 4.0 for Windows NT

2000-02-21 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Local / Remote Exploiteable Buffer Overflow Vulnerability in InterAccess TelnetD Server 4.0 for Windows NT USSR Advisory Code: USSR-233 Release Date: February 22, 2000 Systems Affected: InterAccess TelnetD Server 4.0 for Windows NT and

Windows Api SHGetPathFromIDList Buffer Overflow

2000-02-05 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Windows Api SHGetPathFromIDList Buffer Overflow To all those people who sent email to us asking for more information about the SHGetPathFromIDList Windows Api overflow. Here is a more specific description about the problem. All Structure lengths,

Local / Remote D.o.S Attack in Super Mail Transfer Package (SMTP) Server for WinNT Version 1.9x

2000-01-13 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Local / Remote D.o.S Attack in Super Mail Transfer Package (SMTP) Server for WinNT Version 1.9x USSR Advisory Code: USSR-231 Release Date: January 13, 2000 Systems Affected: Nosque Workshop, Super Mail Transfer Package (PORT 25) Server for

Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1

1999-12-31 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Happy New Year! to All!! Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1 USSR Advisory Code: USSR-99029 Release Date: December 31, 1999 [5/5] (not the original one), original [5/5] will be released

Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A

1999-12-29 Thread Ussr Labs
Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A USSR Advisory Code: USSR-99027 Release Date: December 29, 1999 [3/5] Systems Affected: CSM Mail Server for Windows 95/NT and others old versions. Version: 2000-01A Version: 1999-07M Version: 1999-07I Version:

Local / Remote Remote DoS Attack in Rover POP3 Server V1.1 NT From aVirt

1999-12-27 Thread Ussr Labs
Local / Remote Remote DoS Attack in Rover POP3 Server V1.1 NT From aVirt USSR Advisory Code: USSR-99025 Release Date: December 27, 1999 [1/5] Systems Affected: Rover POP3 Server V1.1 NT and possibly others versions. About The Software: Rover POP3 Server V1.1 NT From aVirt, is a

Local / Remote GET Buffer Overflow Vulnerability in ZBServer 1.5 Pro Edition for Win98/NT

1999-12-23 Thread Ussr Labs
Local / Remote GET Buffer Overflow Vulnerability in ZBServer 1.5 Pro Edition for Win98/NT USSR Advisory Code: USSR-99024 Release Date: December 23, 1999 Systems Affected: ZBServer 1.5 Pro Edition for Win98/NT and possibly others versions. About The Software: ZBServer Pro Edition is a

Remote D.o.S Attack in DNS PRO v5.7 WinNT From FBLI Software Vulnerability

1999-12-21 Thread Ussr Labs
Remote D.o.S Attack in DNS PRO v5.7 WinNT From FBLI Software Vulnerability USSR Advisory Code:22 Release Date: December 21, 1999 Systems Affected: DNS PRO v5.7 and possibly others. About The Software: The first DNS Server for Windows NT - Database engine five time faster. - Tabs now work

Re: Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability

1999-12-15 Thread Ussr Labs
bytes of Random data. u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h http://www.ussrback.com -Original Message- From: Tim [mailto:[EMAIL PROTECTED]] Sent: Wednesday, December 15, 1999 12:16 PM To: Ussr Labs Cc: [EMAIL PROTECTED] Subject: Re: Local / Remote D.o.S

Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability

1999-12-14 Thread Ussr Labs
Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability PROBLEM UssrLabs found a Local/Remote DoS Attack in War FTP Daemon 1.70 the buffer overflow is caused by a Multiples connections at the same time (over 60) in the ftp server , and some characters in the login name. There is not

Re: Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability

1999-12-14 Thread Ussr Labs
- From: Malartre [mailto:[EMAIL PROTECTED]] Sent: Tuesday, December 14, 1999 8:46 PM To: Ussr Labs Cc: [EMAIL PROTECTED] Subject: Re: Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability Ussr Labs wrote: Local / Remote D.o.S Attack in War FTP Daemon 1.70 Vulnerability I am

Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability

1999-12-06 Thread Ussr Labs
Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability PROBLEM UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1, the buffer overflow is caused by a long user name 23870 characters. There is not much to expand on just a simple hole Example:

Remote DoS Attack in Serv-U FTP-Server v2.5a Vulnerability

1999-12-02 Thread Ussr Labs
Remote DoS Attack in Serv-U FTP-Server v2.5a Vulnerability PROBLEM: UssrLabs found a Local/Remote DoS Attack in Serv-U FTP-Server v2.5a, The buffer overflow is caused by a bad Formed (SITE) command For the source / binary of this remote / local D.O.S Go to: http://www.ussrback.com/servu/

Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability

1999-11-29 Thread Ussr Labs
Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability PROBLEM UssrLabs found a Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability Using the string '../' in a URL, an attacker can gain read access to any file outside of the intended

Remote DoS Attack in WorldClient Server v2.0.0.0 Vulnerability

1999-11-26 Thread Ussr Labs
Remote DoS Attack in WorldClient Server v2.0.0.0 Vulnerability PROBLEM: UssrLabs found a buffer overflow in WorldClient Server v2.0.0.0 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question. affected services: WorldClient:

Multiples Remotes DoS Attacks in MDaemon Server v2.8.5.0 Vulnerability

1999-11-24 Thread Ussr Labs
Multiples Remotes DoS Attacks in MDaemon Server v2.8.5.0 Vulnerability PROBLEM: UssrLabs found multiple places in MDaemon v2.8.5.0 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question. affected services: WorldClient: Port

Remote DoS Attack in Vermillion FTP Daemon (VFTPD) v1.23 Vulnerability

1999-11-22 Thread Ussr Labs
Remote DoS Attack in Vermillion FTP Daemon (VFTPD) v1.23 Vulnerability PROBLEM UssrLabs found a Local/Remote DoS Attack in Vermillion FTP Daemon (VFTPD) v1.23, The buffer overflow is caused by a 3 times long cwd, 504 characters, Example: [gimmemore@itsme]$ telnet example.com 21 Trying

Re: WordPad/riched20.dll buffer overflow

1999-11-22 Thread Ussr Labs
Well i work in the exploit of the WordPad/riched20.dll buffer overflow, and i have to say something bad, IT CANT BE EXPLOITABLE FOR TWO REASONS. 1: the filter of the riched20.dll, only accepts letters from "a" to "z" or "A" TO "Z", that says you only can change the returned EIP to address from :

Remote D.o.S Attack in G6 FTP Server v2.0 (beta 4/5) Vulnerability

1999-11-17 Thread Ussr Labs
Remote D.o.S Attack in G6 FTP Server v2.0 (beta 4/5) Vulnerability PROBLEM UssrLabs found a Local/Remote DoS Attack in G6 FTP Server v2.0 (beta 4/5), the buffer overflow is caused by a long user name, 2000 characters. the G6FTP start to do infinites loops in the main program,and start eating

NetCPlus SmartServer3 POP 3.51.1 EXPLOIT

1999-11-14 Thread Ussr Labs
NetCPlus SmartServer3 POP 3.51.1 EXPLOIT Problem: The POP server that is part of the NetcPlus SmartServer3 email server has an unchecked buffer that could allow an attacker to execute code on the server. If the USER command is followed by an argument of over 800 characters, the input buffer

Multiples Remotes DoS Attacks in Artisoft XtraMail v1.11 Vulnerability

1999-11-10 Thread Ussr Labs
Multiples Remotes DoS Attacks in Artisoft XtraMail v1.11 Vulnerability PROBLEM: UssrLabs found multiple places in XtraMail v1.11 where they do not use proper bounds checking. The following all result in a Denial of Service against the service in question. Example: The pop3 (110) service has an

Remote DoS Attack in TransSoft's Broker Ftp Server v3.5 Vulnerability

1999-11-09 Thread Ussr Labs
Remote DoS Attack in TransSoft's Broker Ftp Server v3.5 Vulnerability PROBLEM UssrLabs found a Remote DoS Attack in TransSoft's Broker Ftp Server v3.5, the buffer overflow is caused by a long user name 2730 characters. If TransSoft's Broker Server is running as a service the service will start

Remote D.o.S Attack in ZetaMail 2.1 Mail POP3/SMTP Server Vulnerability

1999-01-17 Thread Ussr Labs
Remote D.o.S Attack in ZetaMail 2.1 Mail POP3/SMTP Server Vulnerability PROBLEM UssrLabs found a Local/Remote DoS Attack in ZetaMail 2.1 Mail POP3/SMTP Server, the buffer overflow is caused by a long user name/password, 3500 characters. There is not much to expand on just a simple hole

Eserv 2.50 Web interface Server Directory Traversal Vulnerability

1999-01-03 Thread Ussr Labs
Eserv 2.50 Web interface Server Directory Traversal Vulnerability Product: Eserv/2.50 is the complete solution to access Internet from LAN: - Mail Server (SMTP and POP3, with ability to share one mailbox on the ISP, aliases and mail routing support) - News Server (NNTP) - Web Server (with

FTGate Version 2.1 Web interface Server Directory Traversal Vulnerability

1999-01-03 Thread Ussr Labs
FTGate Version 2.1 Web interface Server Directory Traversal Vulnerability Product: FTGate Version 2.1 FTGate has many advanced features including: - Proxy Support , Kill List , Advanced delivery options, Logging , Address Mapping- - Domain Aliases, File import , Full Multithreading, HTML