This module uses a documented security weakness to execute arbitrary commands on any system running distccd.
This module exploits a stack buffer overflow in Savant 3.1 Web Server. The service supports a maximum of 10 threads (for a default install). Each exploit attempt generally causes a thread to die whether successful or not. Therefore, in a default configuration, you only have 10 chances. Due to the limited space available for the payload in this exploit module, use of the "ord" payloads is recommended.
This module exploits a stack buffer overflow in TFTPD32 version 2.21 and prior. By sending a request for an overly long file name to the tftpd32 server, a remote attacker could overflow a buffer and execute arbitrary code on the system.
The OpenBSD 3.4 exec.c file is vulnerable to remote code execution. An attacker can exploit this vulnerability to execute arbitrary code on the target system. The vulnerability is caused by a lack of input validation in the exec.c file. A remote attacker can send a specially crafted request to the target system, which will trigger a buffer overflow and allow the attacker to execute arbitrary code with the privileges of the user running the affected application. This vulnerability has a CVSS score of 9.8 (Critical).
The Microsoft Windows RPC service contains a flaw that may allow a remote attacker to cause a denial of service. By sending a specifically malformed packet to TCP port 135, the RPC service will be disabled.
Microsoft Outlook Express contains an unchecked buffer in the code that generates warning messages when certain error conditions associated with digital signatures are encountered. Execution of arbitrary code in the security context of the current user is possible.
Cisco VPN 3000 series concentrators are prone to a denial of service condition when receiving an overly long username string during authentication from a VPN client.Successful exploitation will cause the device to reload.
A buffer overflow has been discovered in the _XKB_CHARSET library in Tru64 Unix. This vulnerability allows a local user to execute arbitrary instructions, potentially leading to the execution of attacker-supplied code and elevated privileges.
Some versions of Fake Identd fail to properly handle long client requests, causing an internal buffer to overflow. This can lead to execution of arbitrary code as the Fake Identd server process.
A buffer overflow vulnerability exists in the TFTP server file name handling of Cisco IOS and MGX switches. Insufficient bounds checking on requested file names allows an attacker to send a request for a file name of 700 or more bytes, causing a denial of service and potential code execution. On Cisco IOS, the router crashes and reboots, while on Cisco MGX switches, the TFTP service fails but the device continues to function.