This exploit abuses an integer overflow condition present in sshd's authentication for bsdauth and skey authentication modes. After successful exploitation an agent will be deployed. The agent will be installed with root privileges. Tests performed in our lab required up to 1 hour to find the needed address in the raw brute forcing mode.
The vulnerability is caused due to a boundary error within the authentication process. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted password to the affected server.
Omni-NFS Enterprise is a suite of network related tools, including an NFS Server. That server is vulnerable to stack-based buffer overflow caused by malicious NFS requests, and this module exploits that vulnerability in order to install an agent on the target machine.
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing the web interface of Now SMS MMS Gateway. The vulnerability is caused due to a boundary error within Now SMS MMS Gateway web interface which listens on port 8800 and allows the users to use the gateway for sending various types of messages. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the web interface. Authentication is not required to exploit this vulnerability.