[36292] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Full-Disclosure] [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers

daemon@ATHENA.MIT.EDU (bashis)
Thu Aug 26 23:45:43 2004

Message-Id: <200408240353.i7O3rP3w002125@ns.wcd.se>
To: bugtraq@securityfocus.com
Date: Tue, 24 Aug 2004 05:53:25 +0200 (CEST)
From: bashis <mcw@wcd.se>
Reply-To: mcw@wcd.se
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

 
 > password issues known to exist..
 Yes.
 
 > http://www.google.com/search?hl=en&lr=&ie=UTF-8&newwindow=1&safe=off&q=axis+camera+exploit
 >
 > http://www.google.com/search?hl=en&lr=&ie=UTF-8&newwindow=1&safe=off&q=axis+camera+vulnerability
 > 
 > or...
 > http://www2.corest.com/common/showdoc.php?idx=329&idxseccion=10
 > http://www.securityfocus.com/bid/3640/exploit/
 Not the same stuff..
 
 'axis-wh00t.sh' adding a new user 'wh00t' with password 'wh00t' with Admin
 priviliges, as anonymous viewer. No matter what password root have.
 
 Read it, try it, understand it, before useless postings..
 
 > >To: security@axis.com
 > >Date: Mon, 16 Aug 2004 22:48:38 +0200 (CEST)
 > 
 > try the contact page?
 > http://www.axis.com/corporate/contact.htm
 
 No mailer-daemon received on 'security@axis.com' post.
 
 Have a nice day
 /bashis

home help back first fref pref prev next nref lref last post