Metasploit modules that can be used to exploit SGI products
-
Sendmail SMTP Address prescan Memory Corruption
Disclosure Date: 2003-09-17First seen: 2020-04-26auxiliary/dos/smtp/sendmail_prescanThis is a proof of concept denial of service module for Sendmail versions 8.12.8 and earlier. The vulnerability is within the prescan() method when parsing SMTP headers. Due to the prescan function, only 0x5c and 0x00 bytes can be used, limiting the likelihood for arbitrary code execution. Authors: - aushack <patrick@osisecurity.com.au> -
Samba 2.2.2 - 2.2.6 nttrans Buffer Overflow
Disclosure Date: 2003-04-07First seen: 2020-04-26exploit/multi/samba/nttransThis module attempts to exploit a buffer overflow vulnerability present in versions 2.2.2 through 2.2.6 of Samba. The Samba developers report this as: "Bug in the length checking for encrypted password change requests from clients." The bug was discovered and reported by the Debian Samba Maintainers. Authors: - hdm <x@hdm.io> -
Solaris in.telnetd TTYPROMPT Buffer Overflow
Disclosure Date: 2002-01-18First seen: 2020-04-26exploit/solaris/telnet/ttypromptThis module uses a buffer overflow in the Solaris 'login' application to bypass authentication in the telnet daemon. Authors: - MC <mc@metasploit.com> - cazz <bmc@shmoo.com> -
System V Derived /bin/login Extraneous Arguments Buffer Overflow
Disclosure Date: 2001-12-12First seen: 2020-04-26exploit/dialup/multi/login/manyargsThis exploit connects to a system's modem over dialup and exploits a buffer overflow vulnerability in it's System V derived /bin/login. The vulnerability is triggered by providing a large number of arguments. Authors: - I)ruid <druid@caughq.org> -
Irix LPD tagprinter Command Execution
Disclosure Date: 2001-09-01First seen: 2020-04-26exploit/irix/lpd/tagprinter_execThis module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix. Authors: - optyx <optyx@no$email.com> - hdm <x@hdm.io>
5 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details