Computer Security
[EN] no-pyccku

Microsoft Windows Vista Internet Explorer applications execution
SecurityVulns ID:7454
Threat Level:
Description:By clicking the link to the local file with the same name as local folder, file is executed.
Affected:MICROSOFT : Windows Vista
CVE:CVE-2007-1658 (Windows Mail in Microsoft Windows Vista might allow user-assisted remote attackers to execute certain programs via a link to a (1) local file or (2) UNC share pathname in which there is a directory with the same base name as an executable program at the same level, as demonstrated using C:/windows/system32/winrm (winrm.cmd) and migwiz (migwiz.exe).)
Original documentdocumentkingcope_(at), [Full-disclosure] Microsoft Windows Vista - Windows Mail Client Side Code Execution Vulnerability (23.03.2007)
Files:Microsoft Windows Vista remote application launch PoC

dproxy DNS proxy buffer overflow
updated since 23.03.2007
SecurityVulns ID:7455
Threat Level:
Description:Buffer overflow on oversized DNS request UDP packet (UDP/53).
Affected:DPROXY : dproxy 0.5
 DPROXY : dproxy-nexgen
CVE:CVE-2007-1866 (Stack-based buffer overflow in the dns_decode_reverse_name function in dns_decode.c in dproxy-nexgen allows remote attackers to execute arbitrary code by sending a crafted packet to port 53/udp, a different issue than CVE-2007-1465.)
 CVE-2007-1465 (Stack-based buffer overflow in dproxy.c for dproxy 0.1 through 0.5 allows remote attackers to execute arbitrary code via a long DNS query packet to UDP port 53.)
Original documentdocumentmu-b, [Full-disclosure] dproxy-nexgen remote (31.03.2007)
 documentAlexander Klink, [Full-disclosure] dproxy - arbitrary code execution through stack buffer overflow vulnerability (23.03.2007)
Files:MetaSploit exploit for remote buffer overflow issue in dproxy
 dproxy-nexgen remote root exploit (x86-lnx)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod