USSR is an emerging security company based in South America devoted to research about computer & networks security and software protection systems. One of the main objectives of USSR is to develop and implement new security and protection systems based on our knowledge and experience
16 MAR 01

UssrLabs has recently discovered a problem with Windows versions of sshd.
The problem lies with adjacent connection handling where the sshd is
unable to handle 64 simulataneous connections. As a result the sshd will
crash, and no services to the sshd will be accepted.[......]

25 DEC 00

The Ussr Team has recently discovered a Buffer Overflow in 1st Up Mail Server v4.1 where they do not use proper bounds checking. The overflow is in the field "mail from: <", a large number of aaaaaa's "> (over 300).

5 NOV 00

The USSR Team has found a problem in the Microsoft System Monitor ActiveX control (class id: C4D2D8E0-D1DD-11CE-940F-008029004347, sysmon.ocx) in the Value field name "LogFileName", which could be used by malicious user to potentially run code on another userís machine.

30 OCT 00

The USSR Team has found problem with the Ultraseek Search engine. The Ultraseek Search engine is vulnerable to a Denial of Service attack.

Upon connecting to the search engine, which by default runs on port 8765, it is possible to pass a malformed URL to the engine that will cause the process to stop responding to valid requests.

18 OCT 00
The USSR Team has found a buffer overflow in the HyperTerminal telnet client, which is in the code that processes the Telnet URL's, that can enable an attacker to execute arbitrary code on another user's system.
18 OCT 00
The USSR Team has found a buffer overflow in the Broker FTP Server, which can enable an attacker to execute a denial of service attack against it.
26 SEP 00
The USSR Team has found a problem in the Windows Media Player 7 ActiveX control, which could be used in a denial of service attack against RTF-enabled e-mail clients such as Outlook 2000 and Outlook Express.
31 AUG 00
The Ussr Team has found a problem in Eeye IRIS 1.01, There is a heap memory buffer
overflow in IRIS 1.01 that causes not only this network sniffing program to crash,
but also to take system resources up to 100% usage, until it crashes
IRC.USSRBACK.COM IS OPEN!
29 AUG 00
To all of you security and hacking related enthusiasts out there, come chat with us on
our OWN IRC server: irc.ussrback.com port 6667 #ussrback
24 AUG 00
What happens is by performing an attack with a malformed request to port 512 it will
cause the process containing the services to stop responding.
19 JUL 00
"the new generation of virus is here. by sending a malformed e-mail you can run arbitrary
code on the remote machine."

The Ussr Labs team has recently discovered an
exploitable buffer overflow in all versions of Outlook.

Exploit here.
10 JUL 00
What happens is by performing an attack with a malformed request to port 6667 it will
cause the process containing the services to stop responding.
04 JUL 00
What happens is by peforming an attack with a malformed url information to port 80
it will cause the process containing the services to stop responding.
16 JUN 00
What happens is by peforming an attack with a malformed url information to port 80
it will cause the process containing the services to stop responding.
16 JUN 00
Ussr Labs found multiple places in Dragon Server where they do not use proper bounds
checking. The following all result in a Denial of Service against the service
in question.
What's that site running?
Hostname:Help
Example: What's www.microsoft.com:80 running?
Ussr Products
28 NOV 99
Over 900 crackers trying crack protected file with CrunchSp 1.05. many people are commenting about how to do it, how much time can it take,
until now nobody has done it
Ussr Products - SOFTWARE CRACKING CHALLENGE
27 NOV 99

Privacy Statement