header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

raptor_passwd.c – passwd circ() local, Solaris/SPARC 8/9

Unknown vulnerability in passwd(1) in Solaris 8.0 and 9.0 allows local users to gain privileges via unknown attack vectors (CAN-2004-0360). This exploit uses the ret-into-ld.so technique, to effectively bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system). The exploitation wasn't so straight-forward: sending parameters to passwd(1) is somewhat tricky, standard ret-into-stack doesn't seem to work properly for some reason (damn SEGV_ACCERR), and we need to bypass a lot of memory references before reaching ret. Many thanks to Inode <inode@deadlocks.info>.

raptor_libdthelp.c – libDtHelp.so local, Solaris/SPARC 7/8/9

Buffer overflow in CDE libDtHelp library allows local users to execute arbitrary code via a modified DTHELPUSERSEARCHPATH environment variable and the Help feature (CAN-2003-0834). Possible attack vectors are: DTHELPSEARCHPATH (as used in this exploit), DTHELPUSERSEARCHPATH, LOGNAME (those two require a slightly different exploitation technique, due to different code paths).

SHOUTcast DNAS/Linux v1.9.4 format string remote exploit

This exploit takes advantage of a format string vulnerability in the SHOUTcast DNAS/Linux v1.9.4 software. By sending a specially crafted request, an attacker can execute arbitrary code on the target system. The exploit has been tested on Slackware 9.1 and 10.0. The shellcode used in this exploit is a bindshellcode that opens a port 7000 on the target system. The exploit also provides instructions on how to calculate the address for the shellcode.

Recent Exploits: