ISC DHCPD versions 3.0.1rc12 and 3.0.1rc13 contain an exploitable buffer overflow. This exploit, abuses the buffer overflow to create a format string like vulnerability, which in turn is used to write all the agent code to a known location and then overwrite a GOT entry with a pointer to that code. The dhcpd service doesn't fork, hence, if any of the numbers which must be guessed are missed, the service will die. There are mainly two values which must be guessed: The direct parameter access number for the format string, which is hardcoded to 42, and if wrong will surely make the service crash, and the GOT address, which if missed may make the service crash, but more likely will just make the exploit fail. This exploit first tries all the known GOT addresses corresponding to default installations and RPMs (see supported system notes). If this addresses fail to install the agent, the exploit will finish unsuccessfully.
This module exploits the random number generator in Debian's OpenSSL package being predictable. This vulnerability is used to generate SSH keys and to install an agent into the target host. The exploit will generate the complete vulnerable keyspace, and will try to log as the provided user. If the user is root, the agent will have superuser capabilities.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing DATAC RealWin. A remote user can send specially crafted data to TCP port 910 to trigger a stack overflow and execute arbitrary code on the target system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing DATAC RealWin. A remote user can send specially crafted data to TCP port 910 to trigger a stack overflow and execute arbitrary code on the target system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing CATIA. The vulnerability is caused due to a boundary error when copying a user supplied input to a fixed size stack buffer.The copying procedure stops when a null byte is found and no size check is proceeded.