what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 302 RSS Feed

Files Date: 2000-07-01 to 2000-07-31

dune_poc.c
Posted Jul 20, 2000
Authored by vade79, realhalo | Site realhalo.org

The Dune Webserver v0.6.7 has remotely exploitable buffer overflows. This code is a proof of concept exploit for linux/x86.

tags | exploit, overflow, x86, proof of concept
systems | linux
SHA-256 | 959582ca4a5d776e191b1bf9c713d5e8b9a9f1b81e495b3b70a6368fbe9afa9f
tomcat-3.1.path.txt
Posted Jul 20, 2000
Authored by Efrain Torres, lownoise

Tomcat v3.1 from the Apache Software Foundation displays the full path of the web server.

tags | exploit, web
SHA-256 | 5db9188e04c6196fa5da09380ae76d6c9cd1be4273d6f1aaeb04095b15504e03
Internet Security Systems Security Alert
Posted Jul 20, 2000
Site xforce.iss.net

On July 18th, details of a high-risk remote buffer overflow vulnerability were made public. This vulnerability has the potential to expose millions of email users to malicious attack and compromise. All current versions of Microsoft Outlook and Microsoft Outlook Express are vulnerable.

tags | remote, overflow
SHA-256 | 3f47095b21cc976d9a3e6f8b8281dae78538c0a86f2a7910eb933c1511a6b1b4
xscreensaver-3.25.tar.gz
Posted Jul 19, 2000
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Improvments to about a dozen modules, and a new module, nerverot.
tags | root
systems | unix
SHA-256 | 47693caee2ceae1d822ec08f5060574217f4d110c178ad2438892dcd950190c5
VIGILANTE-2000004.txt
Posted Jul 19, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #4 - HP Jetdirect FTP service has a remote denial of service vulnerability affecting versions 8.20 and below. A long quote command causes the printer to crash, requiring a power cycle.

tags | exploit, remote, denial of service
SHA-256 | 1760e48ed7729a901d201f966befad75e524963895c62e5c4145172f6c551d13
outlook.advisory.txt
Posted Jul 19, 2000
Authored by Aaron Drew

Microsoft Outlook Advisory and Remote Exploit - A bug in a shared component of Microsoft Outlook and Outlook Express mail clients can allow a remote user to write arbitrary data to the stack. This bug has been found to exist in all versions of MS Outlook and Outlook Express on both Windows 95/98 and Windows NT 4. Includes in depth discussion and proof-of-point exploit that, when placed in the header field of a message or MIME attached message, will download and execute an executable from the web.

tags | exploit, remote, web, arbitrary
systems | windows
SHA-256 | 924dc94a7e9e122649116ef845008adf1d26be73434d2b03a7a0aebee8190822
labs50.txt
Posted Jul 19, 2000
Site ussrback.com

Advisory #50 - An exploitable buffer overflow has been found in all versions of Microsoft Outlook. The vulnerability could enable a malicious sender of an e-mail message with a malformed header to cause and exploit a buffer overrun on a user's machine. The buffer overrun could crash Outlook Express, Outlook e-mail client, or cause arbitrary code to run on the user's machine. The danger in this vulnerability is that the buffer overrun would occur even if the user does not open or preview the e-mail message.

tags | overflow, arbitrary
SHA-256 | 3ac1c77969b0584ae303da959fdb8a320f93d58dd3415315da364ebff37b560f
outoutlook.zip
Posted Jul 19, 2000

Microsoft Outlook remote exploit - Tested on Outlook Express 5.0, Outlook 2000, Outlook 97.0, and Outlook 98. Includes Unix Perl version and windows source / binary. The included shellcode causes the victim computer to visit http://www.ussrback.com.

tags | remote, web, perl, shellcode
systems | windows, unix
SHA-256 | 085dddfa2bd4ab473d84d0b82e4c65819d4e26e0cd1c0a68942ef5f759e74c63
ip-fil3.4.7.tar.gz
Posted Jul 19, 2000
Authored by Darren Reed | Site coombs.anu.edu.au

IP Filter is a TCP/IP packet filter suitable for use in a firewall environment. To use, it can either be run as a loadable kernel module (recommended) or incorporated into your UNIX kernel. Scripts are provided to install and patch system files as required.

Changes: Bug fixes.
tags | tool, kernel, tcp, firewall
systems | unix
SHA-256 | 01365d6ccef85bdc33799b5b0784e8dfefcd84217b0ecc5ac0a1e23c7e491057
syslog-ng-1.4.5.tar.gz
Posted Jul 18, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Fixes memory leaks which caused syslog-ng to use more than 10MB of ram. Requires libol-0.2.17.
tags | system logging
systems | unix
SHA-256 | f5d009993e6e8c9f192198f1bef41d0252364f3c2312671091188b4649437a5a
linux-security.1-12.txt
Posted Jul 18, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week July 17 - In this issue: Advisories were released on cvsweb, FreeBSD ip-options, popper, canna, wu-ftpd, dump, dhclient, tnef, Big Brother, ftpd setproctitle, and Apache::ASP. The feature article this week is "Jay Beale and the Bastille Linux Project". Also contains articles on Buffer Overflows, Securing Sendmail on four types of systems, Tripwire / AIDE, Installing djbdns (DNScache) for Name Service, SSH Tutorial, OpenSSH, Making an Unbreakable Code, E-signatures can be easily forged, and more.

tags | overflow, asp
systems | linux, freebsd
SHA-256 | 3d9e8653af3e06043bbc68e1407563828783838c308899fc17267a6998ad378d
nmap-web-1.5.tar.gz
Posted Jul 18, 2000
Authored by Alek O. Komarnitsky | Site sni.net

nmap-web is a nifty web interface to nmap. It's some simple Perl/CGI script(s) you install on your web server which allows you to submit nmap commands (and receive the responses) through a web interface.

Changes: CLI interface to nmap-web which allows you to run it periodically and compare diffs to see if anything changed (ala a Tripwire for network ports). Screen shots available here.
tags | tool, web, cgi, perl, nmap
systems | unix
SHA-256 | 8f7d22280a31f6940efb7d06c368256b208945f7d9ff869ef772f13c22a4756d
icq-german.html
Posted Jul 18, 2000
Authored by Marc Ruef | Site computec.ch

Die Sicherheit von ICQ - This document explains ICQ security problems, in German.

SHA-256 | 8ceea704b4e028b03aa776a13d90a6f18d352741f933ea5b1b1a837d369c7b2e
firestarter-0.3.0.tar.gz
Posted Jul 18, 2000
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: Major release - Now you can click on a firewall hit entry to change the rules on the fly, stronger default firewall, and updates and enhancments. Screenshot available here.
tags | tool, firewall
systems | linux
SHA-256 | cec2e9db32f95c21911f4cc05761a1994101882ecdb4addb14f812dc479a15b2
anomy-sanitizer-1.20.tar.gz
Posted Jul 18, 2000
Authored by Bjarni R. Einarsson | Site mailtools.anomy.net

The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.

Changes: Bug fixes and more informative exit codes.
tags | trojan, perl, javascript, virus
systems | unix
SHA-256 | 97fb0c161fd83ee285ca3a6e100aca84682d0452e7d57add92eefa88624ed967
alibaba.txt
Posted Jul 18, 2000
Authored by Prizm

Alibaba is a http server for Windows 95/98/NT which contains buffer overflows and allow remote users to execute commands remotely.

tags | exploit, remote, web, overflow
systems | windows
SHA-256 | b99bb1a99ff7c7b7a142a18a90997c406e9cfb78dc1e3847ae576d5ecfc3d442
wu-ftpd26.c
Posted Jul 17, 2000
Authored by glitch | Site hack.co.za

Remote root exploit for Wu-ftpd 2.6.0 from the ports collection running on FreeBSD v3.3, 3.4 and 4.0.

tags | exploit, remote, root
systems | freebsd
SHA-256 | b33a52130ecae7c08a7f0c4dcb7e6ef28378351b56b083cae7ad55d2438dc515
openssh-2.1.1p4.tar.gz
Posted Jul 17, 2000
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Fixes from the CVS branch.
tags | encryption
systems | linux, openbsd
SHA-256 | fcb9fbd5c09bc4255d43422c629f5ab6a44e3cbd21d8d0ff47741191605eaded
netsec22.txt
Posted Jul 17, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 22 - 17.07.2000 - Covers weekly roundups of security related events. In this issue: Excel 2000 vulnerability, Apache::ASP hole fixed, Big Brother vulnerability, Netscape administration server password disclosure, Feartech FTP browser problem, IIS vulnerabilities, Microsoft Office 2000 (Excel and PowerPoint) and in PowerPoint 97 IE Script vulnerability, Cvsweb vulnerability, Armoring linux, Armoring Solaris, Armoring NT, The US may announce new encryption rules, Introduction to PGP, New Excel bug, Kevin Mitnick allowed back online, Win95 Smash virus, NmapNT, and more.

tags | vulnerability, virus, asp
systems | linux, windows, solaris
SHA-256 | ab6ee8fd4f90b938aa24a81a207029831725ac88b08dea86613b6e5c4ea75712
suse.nkitb.txt
Posted Jul 17, 2000
Site suse.de

SuSE Security Announcement - A security hole was discovered in the FTP server in nkitb version less than 2000.7.11-0 contains a remote root vulnerability. The standard ftp server does directly pass untrusted data from a DNS server to the setproctitle() function in a unsecure manner, allowing an attacker to modify his/her DNS record to execute abitrary machine code as root while connecting to the standard ftp daemon.

tags | remote, root
systems | linux, suse
SHA-256 | 736fef8cf6af36ad331b57ed0ef2b54ea785d6ef402650a95644b54305ef2a9c
debian.nfs-common.txt
Posted Jul 17, 2000
Site debian.org

Debian Security Advisory - The version of nfs-common distributed in Debian GNU/Linux 2.2 is vulnerable to a remote root compromise involving rpc.statd.

tags | remote, root
systems | linux, debian
SHA-256 | 5b12e7f0218b416192ef89b0230faf8815a97e17df1ef3c4ee6d162b145fbf14
telsrv.txt
Posted Jul 17, 2000
Authored by Prizm

GAMSoft's TelSrv 1.4/1.5 contains a remote denial of service vulnerability. If supplied with a very large login name, the service will crash.

tags | exploit, remote, denial of service
SHA-256 | d31d36019b70a0193ce995c7d0dfaa0d973ba38791905be7948fcc5321627aab
chkrootkit-0.16.tar.gz
Posted Jul 17, 2000
Authored by Nelson Murilo

chkrootkit V. 0.16 locally checks for signs of a rootkit. Includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux 2.0.x, 2.2.x and FreeBSD 2.2.x, 3.x and 4.0.

Changes: Add tests for new and popular variations of rootkits, better port for Solaris and performance patches.
tags | tool, integrity, rootkit
systems | linux, unix, freebsd
SHA-256 | dce1bb35a3eae94ae776ffa1b6b40a4695555ca9c51dec2103f00d0a70dce590
Wipe0ut.c
Posted Jul 17, 2000
Authored by Xphere | Site casema.net

WipeOut v1.0 is a log cleaner which uses temporary files to remove the entry not just zeroing the entry out. All other cleaners only look for the login name and doesn't check the hostname, so it is possible to cloak the wrong user. This tool does check if the hostname is the correct one.

tags | tool, rootkit
systems | unix
SHA-256 | ede3c9c209f66b8fdbb5b4903f5fb8f97f467aaf7062dc46c018197b0e345a69
debian.cvsweb.txt
Posted Jul 17, 2000
Site debian.org

Debian Security Advisory - The versions of cvsweb distributed in Debian GNU/Linux 2.1, are vulnerable to a remote shell exploit. An attacker with write access to the cvs repository can execute arbitrary code on the server, as the www-data user.

tags | remote, arbitrary, shell
systems | linux, debian
SHA-256 | bde093ff911197907af689c349320d1215735f41782f40c7e69166fcde98e03c
Page 5 of 13
Back34567Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close