exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 44 RSS Feed

Files Date: 2000-09-13

pdump-0.780.tar.gz
Posted Sep 13, 2000
Authored by Samy Kamkar | Site pdump.lucidx.com

Pdump is a sniffer written in perl which dumps, greps, monitors, creates, and modifies traffic on a network. It combines features from tcpdump, ngrep, tcptrace, dsniff (and its webspy and urlsnarf), pfilt, macof, and xpy. It understands tcpdump-like syntax and allows easy modifications via a plug-in system. Readme available here.

Changes: New features added include displaying TCP sequence numbers and configurable packet display to match specific packets with Perl regular expressions. Many bugs have been fixed.
tags | tool, perl, sniffer
SHA-256 | f312f47fbf5e181eaef1e1785de4fa33f18d686d8cdfcb40874a22fd732570eb
FreeBSD Security Advisory 2000.51
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:51 - The mailman port, versions prior to 2.0b5, contained several locally exploitable vulnerabilities which could be used to gain root privileges.

tags | root, vulnerability
systems | freebsd
SHA-256 | dedb3bb4a1ce3ca995f2fb71a6dfc4cc5f55e619fc981e278494f0f87dd01815
FreeBSD Security Advisory 2000.50
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:50 - The listmanager port, versions prior to 2.105.1, contained several locally exploitable buffer overflow vulnerabilities which could be used to gain root privileges.

tags | overflow, root, vulnerability
systems | freebsd
SHA-256 | 3e32fb931fa234b663d485febacb30965ed690394c9e151c22d8c8c63ec013ce
FreeBSD Security Advisory 2000.49
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:49 - The eject port is installed setuid root, and contains several exploitable buffers which can be overflowed by local users, yielding root privileges.

tags | overflow, local, root
systems | freebsd
SHA-256 | 031b23226b8c3145fcc2d633e190d78e52aa482d69c5e45788560e7f54bc4834
FreeBSD Security Advisory 2000.48
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:48 - The xchat IRC client provides the ability to launch URLs displayed in an IRC window in a web browser by right clicking on the URL. However this was handled incorrectly in versions prior to 1.4.3, and prior to 1.5.7 in the 1.5 development series, and allowed a malicious IRC user to embed command strings in a URL which could cause an arbitrary command to be executed as the local user if the URL were to be "launched" in a browser as described above.

tags | web, arbitrary, local
systems | freebsd
SHA-256 | aed685a66de97edce6729dc5e82feed39ad7397a61a60b4b457ceaf446493e6d
FreeBSD Security Advisory 2000.47
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:47 - The pine4 port, versions 4.21 and before, contained a bug which would cause the program to crash when processing a folder which contains an email message with a malformed X-Keywords header. The message itself could be deleted within pine if identified, but other operations such as closing the folder with the message still present would cause the program to crash with no apparent cause.

systems | freebsd
SHA-256 | fef7796ba9f4008ae05e32e357e31610d2560144adcb1cfbe8ecff674325874c
envcheck.tgz
Posted Sep 13, 2000
Authored by Lionel Cons | Site c.home.cern.ch

Klogd Local Exploit. Envcheck is a Linux kernel module which detects and prevents exploitation of the recent glibc vulnerabilities by intercepting the execve system call and sanitising the enviroment passed. At the cost of a very small performance penalty, it has advantages over a glibc upgrade, including logging of exploit attempts, it works with statically linked binaries, it is transparent to applications that may be sensitive to a change of glibc, and it partially protects libc5.

tags | kernel, local, vulnerability
systems | linux
SHA-256 | 3c854c738a6a76ef40141f865055426a01aff9e74874c43676c3a699869312f9
VIGILANTE-2000011.txt
Posted Sep 13, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #11 - Lotus Domino ESMTP Service Lotus Domino Release 5.0.2a contains a buffer overflow in the processing of SMTp commands, causing the service to crash. Tested on OS/2 Warp 4.5, it is assumed that other platforms are vulnerable as well.

tags | exploit, overflow
SHA-256 | 899917d16df031887b0b09207f33847668e2d85bd87d183da90737c8950ead90
VIGILANTE-2000010.txt
Posted Sep 13, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #10 - Intel Express Switch series 500 crashes when a malformed ICMP packet is sent to the Intel Express Switch or a host behind it. The switch looses all routing functionality but continues to function as a switch, except for the fact that learning also crashes, so new connections are not "picked up". Fix available here.

tags | exploit
SHA-256 | 7256e8c0df1d7ce12f4af0950cdfe91032004217c0851024af0a141e17c70d5a
ms00-063
Posted Sep 13, 2000

Microsoft Security Bulletin (MS00-063) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server (IIS). The vulnerability could enable a malicious user to prevent an affected web server from providing useful service by sending a particular type of invalid URL. Microsoft FAQ on this issue available here.

tags | web
SHA-256 | 12d25552be38868a8fa36ffe9023fb0e2764f085ac7e10c191b403366e1535b4
VIGILANTE-2000009.txt
Posted Sep 13, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #9 - Internet Information Server (IIS) 4.0 for Windows NT 4.0 is vulnerable to a denial of service attack as described in ms00-063 in which a certain series of requests can cause INETINFO.EXE to gradually consume all system ressources (99-100% CPU and all memory). When the pagefile can't expand any further, INETINFO.EXE is killed by the operating system.

tags | exploit, denial of service
systems | windows
SHA-256 | f88b454e98f58dc0cab36e2079df258a10823f10487e75deb9870d645da092ca
rhsa.2000-059-02.mgetty
Posted Sep 13, 2000
Site redhat.com

Red Hat Security Advisory - The mgetty-sendfax package contains a vulnerability which allows any user with access to the /var/tmp directory to destroy any file on any mounted filesystem. A malicious user can create a symbolic link named /var/spool/fax/outgoing/.lastrun which points to any file on a mounted filesystem, and that file's contents will be destroyed the next time faxrunq is run.

systems | linux, redhat
SHA-256 | 6729a1a0b2737e85ae4f5ba7398a377fec561d503a17dd3698e11dd59d09872e
A091100-1
Posted Sep 13, 2000
Site atstake.com

Atstake Security Advisory - Netegrity's SiteMinder is a web access control product for Solaris and Windows NT that implements various authentication mechanisms to protect content on websites. Due to an error in SiteMinder's URL parsing, it is possible for an attacker to bypass the authentication phase and view protected web pages directly.

tags | web
systems | windows, solaris
SHA-256 | e0d3f793315991d1bfe7a1596da57ae4a879f58a9bf6b103ecee5c49798552b3
irix.telnetd.txt
Posted Sep 13, 2000
Authored by LSD | Site lsd-pl.net

A serious vulnerability has been found in IRIX telnetd which can give remote root access to any IRIX 6.2-6.5.8[m,f] system. The vulnerability occurrs when one of the environment variables contains a format string which is passed on to the syslog() function. Proof of concept exploit included (updated version - compiler and little endian fixes). Fix available here.

tags | exploit, remote, root, proof of concept
systems | irix
SHA-256 | f3757ed7c83366e37236fcd1468ac10d93f1b85113d1d44c9616dc8a918135d9
suse.pam_smb.txt
Posted Sep 13, 2000

SuSE Security Advisory - pam_smb is a package that allows Linux/Unix user authentication using a Windows NT server. Versions 1.1.5 and before contain a buffer overflow that would allow a remote attacker to gain root access on the target host. In addition, Zope needs updating again and the Xchat IRC client can be tricked to execute arbitrary commands if the user clicks on an URL. SuSE security site here.

tags | remote, overflow, arbitrary, root
systems | linux, windows, unix, suse
SHA-256 | 5a5cc35d33db367672c5f0cd1d3602494bd48a405273b950e7dabe93aac239c6
ICMP_Scanning_v2.01.pdf
Posted Sep 13, 2000
Authored by Ofir Arkin | Site sys-security.com

ICMP Usage in Scanning v2.01 - This paper outlines what can be done with the ICMP protocol regarding scanning. The paper deals with plain Host Detection techniques, Advanced Host Detection techniques, Inverse Mapping, Trace routing, OS fingerprinting methods with ICMP, and which ICMP traffic should be filtered on a Filtering Device.

Changes: Quite a large number of new OS fingerprinting methods using ICMP, which I have discovered are introduced with this revision. Among those methods, some can be used in order to identify Microsoft Windows 2000 machines; One would allow us to distinguish between Microsoft Windows operating system machines and the rest of the world; Another would allow us to distinguish between SUN Solaris machines and the rest of the world. More methods are introduced in the paper.
tags | paper, protocol
SHA-256 | 1ff9c1a751e358458994c2d61f241f21e90f086d7913e3155237dfdc53b0edab
trojan_list.txt
Posted Sep 13, 2000
Authored by Ofir Arkin | Site sys-security.com

This is a list of the ports which trojans run on. Updated Aug 2000, lists 350 trojans and thier default port. Newest version of this list available here. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 3e1809812271d23eb04ede26e54c8aa3db1ba2160ff2c809ca459101541ee74a
Beginners Guide To Unix Hacking
Posted Sep 13, 2000
Authored by grimR | Site r00taccess.dhs.org

Beginners guide to unix hacking. Includes host enumeration, buffer overflows, firewalls, common mistakes, log cleaning, and more.

tags | paper, overflow
systems | unix
SHA-256 | ea3139e78e2968521486618e39ab47156557263a1b247cf7ca40e4dfc47ca6c6
lsof_4.51_W.tar.gz
Posted Sep 13, 2000
Authored by Vic Abell

Lsof is an extremely powerfiul unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port.

Changes: Support for Solaris 9 (SunOS 2.9) and Linux 2.4, and bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | dbf618652685f94befe85ab1fcbe56c7cc178f174f75e966f269a3b022932bf9
guarddog-0.9.2.tar.gz
Posted Sep 13, 2000
Authored by Simon Edwards | Site simonzone.com

GuardDog is a firewall configuration utility for KDE on Linux. GuardDog is aimed at two groups of users - novice to intermediate users who are not experts in TCP/IP networking and security, and those users who don't want the hastle of dealing with cryptic shell scripts and ipchains parameters. Features an easy to use goal oriented GUI and the ability to generate ipchains scripts as output. Screenshot here.

Changes: RealPlayer support was added. Small changes were made to the GUI to fix a few layout problems. The manual is much more complete, and it now includes a tutorial and FAQ section.
tags | tool, shell, tcp, firewall
systems | linux
SHA-256 | 1172c166fc36a5ea8ebc0eddde3e51a29b810b9013715e79bcc5f06d91eac949
lids-0.9.8-2.2.17.tar.gz
Posted Sep 13, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: LIDS is now based on Linux kernel version 2.2.17.
tags | kernel, root
systems | linux
SHA-256 | b40ffca783d988cd32bc8a1f948667fe2f25abad1c4aa33bdea0a3ae60db0e7e
explbsd395.c
Posted Sep 13, 2000
Authored by IhaQueR

Screen 3.9.5 BSD local root exploit. Tested against OpenBSD.

tags | exploit, local, root
systems | bsd, openbsd
SHA-256 | 8ee52045aae8ee9d02f7529addb6cb4f32eb283bdbcc2dfabb8ab07255fc01c5
locale.c
Posted Sep 13, 2000
Authored by Warning3 | Site nsfocus.com

locale.c is a local root exploit for the glibc / locale format string bug. Tested against RedHat 6.2 with kernel 2.2.16.

tags | exploit, kernel, local, root
systems | linux, redhat
SHA-256 | 04c4435735e287f9fd1e709e762aa900e3d60c3d7b0792743e6936a569fb926e
screen-expl.c
Posted Sep 13, 2000
Authored by IhaQueR

Screen 3.7.6 (and others) local root exploit.

tags | exploit, local, root
SHA-256 | 62f1c82f1876f11bcc563d044cc998f0f0b3ce2061a32bad1588595b8a773e53
yabb.txt
Posted Sep 13, 2000
Authored by Kostas Petrakis | Site synnergy.net

Yabb 9.1.2000 and prior for Windows and Unix is a web based BBS system which has a vulnerability in YaBB.pl which allows remote attackers to view any file on the system.

tags | exploit, remote, web
systems | windows, unix
SHA-256 | b2141b021a48b28bf0bb81210dfbaa6fe7aae1817ab3d9c84bb3511551d57e91
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close