[Full-Disclosure] Musicqueue multiple local vulnerabilities

2003-10-27 Thread dong-h0un U
INetCop Security Advisory #2003-0x82-020 * Title: Musicqueue multiple local vulnerabilities 0x01. Description Musicqueue is a CGI music jukebox using external tools to play the files. B

[Full-Disclosure] sh-httpd `wildcard character' vulnerability

2003-10-27 Thread dong-h0un U
INetCop Security Advisory #2003-0x82-019 * Title: sh-httpd `wildcard character' vulnerability 0x01. Description About: sh-httpd is a shell script-based Web server that supports GET and

[Full-Disclosure] wu-ftpd-2.6.2 off-by-one remote exploit.

2003-08-04 Thread dong-h0un U
I succeeded in RedHat Linux (x86) wu-2.6.2(1), 2.6.2(2), 2.6.1, 2.6.0. (Most version). This is never fake. Excellent Advisory was already announced (2003/07/31): http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt This information was very useful to me. I'm thankful to them. This works well in

[Full-Disclosure] Re: GNATS (The GNU bug-tracking system) multiple buffer overflowvulnerabilities.

2003-06-23 Thread dong-h0un U
This is GNATS local exploits. :-} -- ___ Get your free email from http://www.hackermail.com Powered by Outblaze 0x82-GNATS.tgz Description: Binary data

[Full-Disclosure] GNATS (The GNU bug-tracking system) multiple buffer overflowvulnerabilities.

2003-06-21 Thread dong-h0un U
INetCop Security Advisory #2003-0x82-018 Title: GNATS (The GNU bug-tracking system) multiple buffer overflow vulnerabilities. 0x01. Description About: GNATS is a portable incident/bu

[Full-Disclosure] Re: Small buffer format string attack

2003-06-12 Thread dong-h0un U
Here is the original Korean version of the previous article in case anyone is interested.. URL: http://x82.inetcop.org/h0me/lectur3/0x82-Small-format-kr.txt And, the following is added contents. (My answer about question) -- All systems is different format string result. Therefore, `%8x', or mu

[Full-Disclosure] Small buffer format string attack

2003-06-08 Thread dong-h0un U
=== Title: Small buffer format string attack Author : dong-hun you (Xpl017Elz) in INetCop <[EMAIL PROTECTED]> Home: http://x82.inetcop.org & http://x82.i21c.net Rough English Translation by KF <[EMAIL

[Full-Disclosure] *BSD passlogd remote root exploit.

2003-04-06 Thread dong-h0un U
Made out *BSD exploit. It works in OpenBSD 3.0, FreeBSD 4.6.2-RELEASE. For reference, FreeBSD includes passlogd-0.1d port: http://www.freebsd.org/cgi/cvsweb.cgi/ports/net/passlogd/ Proof of Concept exploit: http://x82.inetcop.org/h0me/c0de/0x82-Remote.XxxxBSD_passlogd.xpl.c -- Thank you. --

[Full-Disclosure] passlogd sniffer remote buffer overflow root exploit.

2003-04-03 Thread dong-h0un U
Hello. Exploit confirmed possible truth in OpenBSD. But, I did not exploit. Also, did not test in RedHat 8.0. Thank you. -- /* ** ** [*] Title: Remote Multiple Buffer Overflow vulnerability in passlogd sniffer. ** [+] Exploit code: 0x82-Remote.passlogd_sniff.xpl.c ** ** [+] Description -- ** *

[Full-Disclosure] [INetCop Security Advisory] Remote Multiple Buffer Overflowvulnerability in passlogd sniffer.

2003-04-02 Thread dong-h0un U
INetCop Security Advisory #2003-0x82-015 * Title: Remote Multiple Buffer Overflow vulnerability in passlogd sniffer. 0x01. Description About: passlogd(passive syslog capture daemon) is