header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Exim < 4.86.2 Local Root Privilege Escalation Exploit

The vulnerability stems from Exim in versions below 4.86.2 not performing sanitization of the environment before loading a perl script defined with perl_startup setting in exim config. To perform the attack, attacker can take advantage of the exim's sendmail interface which links to an exim binary that has an SUID bit set on it by default. The attacker can then create a malicious perl script and set it as the perl_startup variable in exim config. When the exim binary is executed with the SUID bit set, it will load the malicious perl script and execute it with root privileges.

BWS Captcha Multiple Vulnerabilities

The variable can be passed in using a get as well as a post. An attacker could send unsuspecting authenticated admin a url crafted like such: http://wwww.victim.com/wp-admin/admin.php?page=captcha.php&action=whitelist&s=%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E or they can send a form (no CSRF token check) <form method="post" action="http://victim.com/wp-admin/admin.php?page=captcha.php&action=whitelist"><input type="hidden" name="s" value="<script>alert(1);</script>"><input type="submit" name="Search IP" value="Click here to claim your prize!"></form> and it would execute XSS as long as they were logged in to the site.

Nitro PDF Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Nitro PDF 10 (10.5.7.32). User interaction is required to exploit this vulnerability in that the target must open a malicious file. A specially crafted PDF with a specific FunctionType 0 and an invalid /Domain key can cause a stack-based buffer overflow, resulting in arbitrary code execution.

Memory Corruption Vulnerability in IPT_SO_SET_REPLACE

A memory corruption vulnerability exists in the IPT_SO_SET_REPLACE setsockopt in the netfilter code for iptables support. This setsockopt is can be triggered by an unprivileged user on PF_INET sockets when unprivileged user namespaces are available (CONFIG_USER_NS=y). In the mark_source_chains function (net/ipv4/netfilter/ip_tables.c) it is possible for a user-supplied ipt_entry structure to have a large next_offset field. This field is not bounds checked prior to writing a counter value at the supplied offset, leading to an out of bounds 32-bit write in a 64kb range from the allocated heap entry, with a controlled offset and a partially controlled write value. Furthermore, a recent refactoring of this codepath introduced an integer overflow in xt_alloc_table_info, which on 32-bit systems can lead to small structure allocation and a copy_from_user based heap corruption.

Local RedHat Enterprise Linux DoS â?? RHEL 7.1 Kernel crashes on invalid USB device descriptors (cdc_acm driver)

The Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the cdc_acm driver. The bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo (github.com/schumilo) using the following device descriptor. This is the configuration descriptor containing only one interface descriptor. The cdc-acm driver assumes that there will be at least two interface- descriptors with associated endpoint-descriptors. Since the cdc-acm driver is expecting a second interface descriptor, the driver tries to dereference a null-pointer. This results in a crash of the system.

Local RedHat Enterprise Linux DoS â?? RHEL 7.1 Kernel crashes on invalid USB device descriptors (cypress_m8 driver)

The Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device which requires the requiring the cypress_m8 driver. The bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo (github.com/schumilo) using the following device descriptor: [bLength: 0x12, bDescriptorType: 0x1, bcdUSB: 0x200, bDeviceClass: 0x3, bDeviceSubClass: 0x0, bDeviceProtocol: 0x0, bMaxPacketSize: 0x40, idVendor: 0x4b4, idProduct: 0x5500, bcdDevice: 0x100, iManufacturer: 0x1, iProduct: 0x2, iSerialNumbers: 0x3, bNumConfigurations: 0x1]. This is the configuration descriptor containing only one interrupt-endpoint-descriptor (IN-direction). The cypress_m8 driver assumes that there will be at least two endpoint-descriptors configured for interrupt-transfer and each used for one direction. Since there is no sanity check, it is possible that the kernel tries to dereference a null-pointer. This results in a crash of the system.

Local RedHat Enterprise Linux DoS â?? RHEL 7.1 Kernel crashes on invalid USB device descriptors (mct_u232_m8 driver)

The Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the mct_u232_m8 driver. The bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo (github.com/schumilo) using the following device descriptor: [bLength: 0x12, bDescriptorType: 0x1, bcdUSB: 0x200, bDeviceClass: 0x3, bDeviceSubClass: 0x0, bDeviceProtocol: 0x0, bMaxPacketSize: 0x40, idVendor: 0x50d, idProduct: 0x109, bcdDevice: 0x100, iManufacturer: 0x1, iProduct: 0x2, iSerialNumbers: 0x3, bNumConfigurations: 0x1]. This is the configuration descriptor containing only one interrupt-endpoint-descriptor (IN-direction). The mct_u232 driver assumes that there will be at least two endpoint-descriptors configured as interrupt-in. Since there is no sanity check, it is possible that the kernel tries to dereference a null-pointer. This results in a crash of the system.

Recent Exploits: