SonicWALL Comprehensive Internet Security
Home
SonicALERT
Search
Search TipsSitemap

Support

 

EXPLOIT  All Categories


  Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password.
  Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
  Buffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution.
  The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.
  Buffer overflow in MDBMS database server allows remote attackers to execute arbitrary commands via a long string.
  Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
  Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
  Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
  nlps x86 Solaris overflow
  Redhat 7.0 lprd overflow
  VQServer admin
  ntalkd x86 Linux overflow
  Buffer overflow in calserver in SCO OpenServer allows remote attackers to gain root access via a long message.
  Buffer overflow in Samba smbd program via a malformed message command.
  Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics.
  CDE dtspcd exploit attempt
  CHAT IRC Ettercap parse overflow attempt
  The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.
  Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
  Buffer overflow in Van Dyke SecureCRT SSH client before 3.4.6, and 4.x before 4.0 beta 3, allows an SSH server to execute arbitrary code via a long SSH1 protocol version string.
  Format string vulnerability in Network Solutions Rwhoisd 1.5.x allows remote attackers execute arbitrary code via format string specifiers in the -soa command.
  Buffer overflow in ToxSoft NextFTP client through CWD command.
  Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument.
  Buffer overflow in the HTML parser for Netscape 4.75 and earlier allows remote attackers to execute arbitrary commands via a long password value in a form field.
  CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow.


Relevant Information
IPS Alert Level
Low
Medium
High


Home | Products | Applications | Markets | Support | How to Buy | Channel Partners | Company

Comprehensive Internet Security ® 2003 SonicWALL, Inc. | Privacy Statement