exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files from Jun Mao

First Active2007-08-22
Last Active2010-06-17
iDEFENSE Security Advisory 2010-06-16.1
Posted Jun 17, 2010
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 06.16.10 - Remote exploitation of a buffer overflow vulnerability within Samba Project's Samba could allow an attacker to execute arbitrary code with root privileges. This vulnerability exists in a certain function within Samba, where an attacker could trigger a memory corruption by sending specially crafted SMB requests resulting in heap memory overwritten with attacker supplied data, which can allow attackers to execute code remotely. iDefense has confirmed the existence of this vulnerability in Samba version 3.3.12. Previous versions are suspected to be affected.Samba 3.4.0 and newer versions rewrite the whole logic of the vulnerable function and thus are not affected by this vulnerability.

tags | advisory, remote, overflow, arbitrary, root
advisories | CVE-2010-2063
SHA-256 | 0f3906ee46ff98f1da265c6dd01ae1df772e0d26f20fe6ac2c61cfa40c024efd
iDEFENSE Security Advisory 2009-12-08.2
Posted Dec 10, 2009
Authored by iDefense Labs, Sean Larsson, Jun Mao | Site idefense.com

iDefense Security Advisory 12.08.09 - Remote exploitation of an integer overflow vulnerability in Microsoft Corp.'s WordPad could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed the existence of this vulnerability in WordPad version 5.1 for Windows XP SP3 and SP2. Other versions of Windows may also be affected. However, Vista and Server 2008 are not affected as they no longer contain the Word97 converter.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2009-2506
SHA-256 | 4a7ab1715bf7bf9f3e49fd7c137a769d655d1bc36bc533cc4eec0e9fb9cba6a6
iDEFENSE Security Advisory 2009-11-10.1
Posted Nov 17, 2009
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 11.10.09 - Remote exploitation of a stack buffer overflow vulnerability in Microsoft Corp.'s Word could allow attackers to execute arbitrary code with the privileges of the targeted user. This vulnerability occurs when Word parses the File Information Block (FIB) structure inside a Word document. When a malformed FIB structure is processed, a stack buffer overflow will occur which can lead to an exploitable condition. iDefense has confirmed fully patched Microsoft Word 2003 SP3, Microsoft Word XP SP3, Microsoft Word 2000 SP3 are vulnerable. Microsoft Word 2007 SP1 is not affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2009-3135
SHA-256 | fb02e8e8e484eae0536df20cc974d2730b906f2d936448bc99c5357711be4695
iDEFENSE Security Advisory 2009-08-06.1
Posted Aug 7, 2009
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 08.06.09 - Remote exploitation of a heap overflow vulnerability in Adobe Systems Inc's Flash Player could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense confirmed the existence of this vulnerability in Flash Player 10.0.22.87. Other versions may also be affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2009-1868
SHA-256 | 68368b358896f89cb63050bdfd03bdbbcba6a8159915a1c1adb36d4cfba763da
iDEFENSE Security Advisory 2009-06-09.3
Posted Jun 11, 2009
Authored by iDefense Labs, Ryan Smith, Jun Mao | Site idefense.com

iDefense Security Advisory 06.09.09 - Remote exploitation of an integer overflow vulnerability in multiple versions of Adobe Systems Inc's Reader and Acrobat PDF reader and processor could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing a FlateDecode filter inside a PDF file. FlateDecode is a filter for data compressed with zlib deflate compression method. Several parameters can be specified for the FlateDecode filter. Those values are used in an arithmetic operation that calculates the number of bytes to allocate for a heap buffer. This calculation can overflow, which results in an undersized heap buffer being allocated. This buffer is then overflowed with data decompressed from the FlateDecode stream. This leads to a heap-based buffer overflow that can result in arbitrary code execution. Acrobat Reader and Acrobat Professional versions 7.1.0, 8.1.3, 9.0.0 and prior versions are vulnerable.

tags | advisory, remote, overflow, arbitrary, code execution
advisories | CVE-2009-1856
SHA-256 | 48b4c5eb3ef997087bc4e824ebc4d6c72a992fb1b8e45a08db98b531d00f3505
iDEFENSE Security Advisory 2009-06-09.2
Posted Jun 11, 2009
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 06.09.09 - Remote exploitation of a stack buffer overflow vulnerability in Microsoft Corp.'s Windows 2000 operating system could allow an unauthenticated attacker to execute arbitrary code with system-level privileges. This vulnerability exists in the EnumeratePrintShares function in win32spl.dll. The vulnerable function does not correctly validate the length of the printer server's response. When a malformed response is received from the printer server, the stack buffer can be overflowed, resulting in an exploitable condition. iDefense has confirmed the existence of this vulnerability in win32spl.dll version 5.00.2195.7054, as included in Windows 2000 Service Pack 4, with all available patches as of September 2008. All previous versions are suspected vulnerable. Windows XP SP2 and later versions of Windows are not affected.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2009-0228
SHA-256 | 694378c665ee66b058d66c03ea71426d961d982f2df2e76eda8ce2592ff49302
iDEFENSE Security Advisory 2009-04-14.2
Posted Apr 15, 2009
Authored by iDefense Labs, Sean Larsson, Jun Mao | Site idefense.com

iDefense Security Advisory 04.14.09 - Remote exploitation of a stack buffer overflow vulnerability in Microsoft Corp.'s WordPad could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing the content of a Word97 format file. When reading in the data, the code uses a 32-bit integer from the file to check a buffer length while using the lower 16-bit value to do the actual copy. This results in a stack buffer overflow. This stack buffer is overwritten with data from the file. iDefense has confirmed the existence of this vulnerability in Wordpad on Windows 2000 SP4. Windows XP SP3 is not affected. Vista and Server 2008 are not affected as they no longer contain the Word97 converter.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2009-0235
SHA-256 | 619400cb987192e72c2d05da51ff52e996d4d4c10414389a155b0889e87cb2bf
iDEFENSE Security Advisory 2008-12-09.2
Posted Dec 9, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 12.09.08 - Remote exploitation of an integer overflow vulnerability in multiple versions of Microsoft Corp.'s Windows operating system could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed that gdi32.dll file version 5.1.2600.3316, as included in fully patched Windows XP Service Pack 2 as of May 2008, is vulnerable. Other versions of Windows are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2008-2249
SHA-256 | 68501cbdd911465db4d25283b8377fdde05b71c2c0c33e8d6509ecde49f62b47
iDEFENSE Security Advisory 2008-12-09.1
Posted Dec 9, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 12.09.08 -Remote exploitation of a stack buffer overflow vulnerability while handling specific HTML tags in Microsoft Corp.'s Internet Explorer web browser allows attackers to execute arbitrary code within the context of the affected user. As of September 2008, iDefense confirms that Internet Explorer 5.01 on Windows 2000 SP4, is vulnerable. It also causes denial of service for Internet Explorer 6 on Windows XP SP2. Internet Explorer 7 is not affected.

tags | advisory, remote, web, denial of service, overflow, arbitrary
systems | windows
advisories | CVE-2008-4261
SHA-256 | 027f86f331e8ec116d59559fda203fd63d14492947a5f9a5df9279c236cc1782
iDEFENSE Security Advisory 2008-10-14.2
Posted Oct 15, 2008
Authored by iDefense Labs, Jun Mao, Lionel d'Hauenens | Site idefense.com

iDefense Security Advisory 10.14.08 - Several vulnerabilities exist in Microsoft Corp.'s Office Visual Basic for Applications (VBA) which could allow remote exploitation by an attacker. Exploitation could allow the execution of arbitrary code with the privileges of the current user. iDefense confirmed the existence of these vulnerabilities in the following versions of Microsoft Excel: 2000-SP3, XP-SP3, 2003-SP3. Excel 2007 and 2007-SP1 were not vulnerable.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2008-3477
SHA-256 | d12f15eff15b3b3042a7dcff3b85a5cf8da837b3ab17743d6d4c2060072aac0d
iDEFENSE Security Advisory 2008-08-12.7
Posted Aug 13, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 08.12.08 - Remote exploitation of a heap-based buffer overflow vulnerability in multiple versions of Microsoft Corp.'s Windows operating system allows an attacker to execute arbitrary code with the privileges of the current user. This vulnerability specifically exists in the InternalOpenColorProfile function in mscms.dll. When a malformed parameter is supplied, a heap-based buffer overflow can occur, resulting in an exploitable condition. iDefense has confirmed the existence of this vulnerability in the following Microsoft products: Windows 2000 Service Pack 4, Windows XP Service Pack 2, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2008-2245
SHA-256 | 2bab1a50684834c78470b73a0f99d6b62a5bf68c2b11d0ad24caf1a309eff6b6
iDEFENSE Security Advisory 2008-05-13.1
Posted May 13, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 05.13.08 - Remote exploitation of a memory corruption vulnerability in Microsoft Corp.'s Word could allow attackers to execute arbitrary code with the privileges of the logged in user. This vulnerability exists in the way Word handles CSS rules in an HTML document. When the number of CSS selectors is above some specific amount, an unspecified object will be corrupted causing Word to access a memory region that has already been freed. iDefense has confirmed fully patched Microsoft Word 2003 SP2, Microsoft Word XP SP3, Microsoft Word 2000 SP3 are vulnerable. Microsoft Word 2003 SP3 and Microsoft Word 2007 do not appear to be affected. Microsoft reports that all supported versions of Word, Word Viewer, and Outlook 2007 are vulnerable.

tags | advisory, remote, arbitrary
advisories | CVE-2008-1434
SHA-256 | 28de6edcab5bca871b515513d06ce332b7e6948f6328c74f3c8fa3cc3e056b41
iDEFENSE Security Advisory 2008-04-08.3
Posted Apr 9, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 04.08.08 - Remote exploitation of a heap based buffer overflow vulnerability in multiple versions of Microsoft Corp.'s Windows operating system could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed the existence of this vulnerability in Windows 2000 Service Pack 4, Windows XP Service Pack 2, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, and Windows Vista.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2008-1083
SHA-256 | 7f0b5f5daff1e693ba3c2e9e4c1d40241602f4f0f1bd639eeb6348752f914329
iDEFENSE Security Advisory 2008-04-08.2
Posted Apr 9, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 04.08.08 - Remote exploitation of an integer overflow vulnerability in multiple versions of Microsoft Corp.'s Windows operating system could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed the existence of this vulnerability in Windows 2000 SP4 and Windows XP SP2.

tags | advisory, remote, overflow, arbitrary
systems | windows
advisories | CVE-2008-1083
SHA-256 | 03d39e0c171617bc6bed7fb6be3e14daf1be8b9c372dfa5615c0ba6aa4d0858e
iDEFENSE Security Advisory 2008-01-15.5
Posted Jan 16, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 01.15.08 - Remote exploitation of a heap corruption vulnerability in Apple Computer Inc.'s QuickTime media player could allow attackers to execute arbitrary code in the context of the targeted user. The vulnerability specifically exists in the handling of Macintosh Resources embedded in QuickTime movies. When processing these records, a length value stored in the resource header is not properly validated. When a length value larger than the actual buffer size is supplied, potentially exploitable memory corruption occurs. iDefense Labs confirmed this vulnerability exists in QuickTime Player version 7.3.1. Previous versions are suspected to be vulnerable.

tags | advisory, remote, arbitrary
systems | apple
advisories | CVE-2008-0032
SHA-256 | 6d73e3ce9736dc59d009c05ff809807ae8052bbc094fde1bd0def439d35351b7
iDEFENSE Security Advisory 2007-12-11.2
Posted Dec 12, 2007
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 12.11.07 - Remote exploitation of a stack buffer overflow vulnerability in Microsoft Corp.'s DirectShow could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability exists in the DirectShow SAMI parser, which is implemented in quartz.dll. When the SAMI parser copies parameters into a stack buffer, it does not properly check the length of the parameter. As such, parsing a specially crafted SAMI file can cause a stack-based buffer overflow. This allows an attacker to execute arbitrary code. iDefense has confirmed Microsoft DirectX 7.x and Microsoft DirectX 8.x are vulnerable. Microsoft DirectX 9.0c or newer is not vulnerable.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2007-3901
SHA-256 | 13a7ee86d40260d7b3d9c10a605bff89d2993050d850639780f669cac844978c
iDEFENSE Security Advisory 2007-08-21.2
Posted Aug 22, 2007
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 08.21.07 - Remote exploitation of an integer overflow vulnerability in Trend Micro Inc.'s ServerProtect anti-virus software could allow attackers to execute arbitrary code with system level privilege. iDefense has confirmed the existence of this vulnerability in ServerProtect for Windows 5.58 Build 1176 (Security Patch 3). Previous versions, as well as versions for other platforms, are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary, virus
systems | windows
advisories | CVE-2007-4219
SHA-256 | 0badcd607791682d475786e7044f11133932aec3bac74b33d0fa143a261cbaa8
iDEFENSE Security Advisory 2007-08-21.1
Posted Aug 22, 2007
Authored by iDefense Labs, Code Audit Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 08.21.07 - Remote exploitation of multiple buffer overflow vulnerabilities in Trend Micro Inc.'s ServerProtect anti-virus software could allow attackers to execute arbitrary code with system level privilege. iDefense has confirmed the existence of these vulnerabilities in ServerProtect for Windows 5.58 Build 1176 (Security Patch 3). Previous versions, as well as versions for other platforms, are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary, vulnerability, virus
systems | windows
advisories | CVE-2007-4218
SHA-256 | 7f1808fdb1f4124d8b15e150fb6b841b986420fed5f6e4237994682cf8784611
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close