exploitdb
WORKING POC
VERIFIED
by logikal · clocallinux
https://www.exploit-db.com/exploits/249
This exploit targets a format string vulnerability in the `su` command on older Red Hat systems (5-7). It leverages environment variables and crafted input to achieve arbitrary code execution, ultimately spawning a root shell.
Classification
Working Poc 95%
Target:
su (Red Hat Linux 5-7)
No auth needed
Prerequisites:
Write access to /tmp · Presence of /usr/bin/msgfmt and /usr/bin/objdump · Vulnerable version of su
exploitdb
WORKING POC
VERIFIED
by sk8 · clocallinux
https://www.exploit-db.com/exploits/215
This exploit targets a format string vulnerability in the mount utility (CVE-2000-0844) to achieve remote code execution by manipulating locale files and environment variables. It uses shellcode to spawn a shell with elevated privileges.
Classification
Working Poc 95%
Target:
mount (glibc locale bug, versions including mount-2.10f)
No auth needed
Prerequisites:
Access to the target system to create malicious locale files · Ability to execute the mount command with crafted arguments
exploitdb
WORKING POC
VERIFIED
by warning3 · clocalsolaris
https://www.exploit-db.com/exploits/210
This exploit targets a format string vulnerability in the locale subsystem of Solaris 2.6/7.0, bypassing noexec stack protections. It crafts a malicious environment to manipulate stack frames and execute arbitrary code via `execl()`.
Classification
Working Poc 95%
Target:
Solaris 2.6/7.0 (locale subsystem in /usr/bin/passwd)
No auth needed
Prerequisites:
Access to vulnerable Solaris system · Ability to execute /usr/bin/passwd · Write permissions for creating malicious files
exploitdb
WORKING POC
VERIFIED
by localcore · clocallinux
https://www.exploit-db.com/exploits/209
This exploit targets a vulnerability in glibc (CVE-2000-0844) by overwriting the .dtors section of /bin/su with shellcode, achieving privilege escalation. It uses a format string attack to manipulate memory and execute arbitrary code.
Classification
Working Poc 95%
Target:
glibc (affecting /bin/su on Red Hat 6.2, 6.1, SuSE 6.2)
No auth needed
Prerequisites:
Write access to /tmp · Read access to /bin/su · Presence of /usr/bin/msgfmt and /usr/bin/objdump
exploitdb
WORKING POC
VERIFIED
by Solar Eclipse · clocalsolaris
https://www.exploit-db.com/exploits/197
This exploit targets a format string vulnerability in Solaris/SPARC 2.7 / 7 via the `/usr/bin/eject` binary. It leverages environment variable manipulation and a crafted `messages.po` file to trigger the vulnerability, leading to arbitrary code execution via shellcode.
Classification
Working Poc 95%
Target:
Solaris 2.7 / 7 (SPARC) /usr/bin/eject
No auth needed
Prerequisites:
Access to the target system · Ability to execute `/usr/bin/eject` · Write permissions in the current directory
exploitdb
WORKING POC
VERIFIED
by warning3 · clocalsolaris
https://www.exploit-db.com/exploits/20186
This exploit targets a format string vulnerability in the locale subsystem of various UNIX systems, including Solaris 2.6/7.0. It leverages the vulnerable `passwd` binary to execute arbitrary code (e.g., `/bin/ksh`) by manipulating environment variables and stack addresses.
Classification
Working Poc 95%
Target:
UNIX locale subsystem (Solaris 2.6/7.0, others)
No auth needed
Prerequisites:
Access to a vulnerable UNIX system with a SUID binary like `/usr/bin/passwd` · Ability to set environment variables
exploitdb
WORKING POC
VERIFIED
by warning3 · clocalsolaris
https://www.exploit-db.com/exploits/20188
This exploit targets a format string vulnerability in the locale subsystem of various UNIX systems, including Solaris 2.6/7.0. It leverages the 'eject' binary to execute arbitrary shellcode via a crafted environment variable and malicious message catalog.
Classification
Working Poc 95%
Target:
UNIX locale subsystem (e.g., Solaris 2.6/7.0, various Linux distributions)
No auth needed
Prerequisites:
Ability to write files to the target system · Presence of a vulnerable SUID binary (e.g., eject) · Access to compile and execute the exploit
exploitdb
WORKING POC
VERIFIED
by warning3 · clocallinux
https://www.exploit-db.com/exploits/20185
This exploit leverages a format string vulnerability in the locale subsystem of various UNIX systems (CVE-2000-0844) to execute arbitrary code via a crafted messages database. It targets SUID programs like 'su' by manipulating environment variables and injecting shellcode.
Classification
Working Poc 95%
Target:
glibc/locale subsystem (affects multiple UNIX systems including RedHat 6.2, Debian 2.x, Solaris 2.x/7/8, etc.)
No auth needed
Prerequisites:
Ability to write to a directory (e.g., /tmp) · Presence of vulnerable SUID binary (e.g., /bin/su) · Target system must support locale subsystem with format string vulnerability
exploitdb
WORKING POC
VERIFIED
by anonymous · clocalunix
https://www.exploit-db.com/exploits/20190
This exploit leverages a format string vulnerability in the locale subsystem of various UNIX operating systems to execute arbitrary code as root. It manipulates the gettext/catgets functions via a maliciously crafted messages database to overwrite memory addresses and achieve remote code execution.
Classification
Working Poc 95%
Target:
UNIX-based systems (Debian 2.x, RedHat 5.x/6.x, Solaris 2.x/7/8, etc.) with vulnerable locale subsystem
No auth needed
Prerequisites:
Ability to place a malicious messages database on the target system · Presence of SUID programs or vulnerable services like telnetd
exploitdb
WORKING POC
VERIFIED
by Synnergy.net · clocalunix
https://www.exploit-db.com/exploits/20189
This exploit targets a format string vulnerability in the locale subsystem of various UNIX operating systems, leveraging SUID programs like /bin/su to execute arbitrary code as root. It uses a GOT overwrite technique to bypass protections like StackGuard and StackShield.
Classification
Working Poc 95%
Target:
Locale subsystem in various UNIX OS (e.g., RedHat 5.x/6.x, Solaris 2.x/7/8, IRIX 6.x)
No auth needed
Prerequisites:
Presence of vulnerable SUID binary (e.g., /bin/su) · Ability to place custom messages database on target · /usr/bin/msgfmt executable · awk, grep, objdump tools
exploitdb
WORKING POC
VERIFIED
by Kil3r of Lam3rZ · clocalimmunix
https://www.exploit-db.com/exploits/20187
This exploit leverages a format string vulnerability in the locale subsystem of various UNIX systems (CVE-2000-0844) to achieve arbitrary code execution. It crafts a malicious message database to manipulate the output of printf-like functions, bypassing StackGuard protections in ImmunixOS.
Classification
Working Poc 95%
Target:
Multiple UNIX systems (e.g., RedHat 6.2, ImmunixOS) with vulnerable locale subsystem
No auth needed
Prerequisites:
Ability to write to /tmp directory · Presence of vulnerable SUID binary (e.g., /bin/su)