An excellent analysis of Process Table Denial of Service attacks that can be waged against numerous network services on a variety of different UNIX systems. This is not "new" news but the problems still exist and are being widely exploited, so it's time for an updated repost.
0df06b4b618c78a583077f375dfb2a76d748e73cc5da4e0e361c43d571934b1f
Denial of Service attack, coded in perl, against quakeworld servers running under win32.
aadfd797bb901f3a9443379fda2b6a598c54913b1708b11366add1bd281a0c8f
Rainbow Six Multiplayer network game server can be crashed with a buffer overflow in the "Nick" field.
4eda921ccfdbf81012ec06728fd1709f9670bb265a69c4f9a461484249f58890
Memory leak in RealServer G2 causes FreeBSD 3.0-stable to crash/reboot randomly.
dba82a4e6a7cdc15df7c6037baef30d316d91f8018563936ecda50d65880fe58
REBOOT.INI file created by Microsoft BackOffice 4.0 Setup utility exposes passwords in plaintext.
1c8b835323c8900395185b8f9942c3c596a32a7fa2cd445035edf235a4b0bb1a
Potential Denial of Service attack against wide variety of routers. Preliminary alert, exploit code included, Cisco and other vendors are investigating.
616ce10bedf84b312c9a001898b5694c41a6a1e36351030248a169de04bdaabf
Seagate Backup Exec virus scanning software (McAfee) "accidentally" deletes "non-infected" Visual Basic class files, due to bad signature file from Network Associates.
b3f4c2e025264f3c2c7fa2e056533748d00406f9b55b16d980afbe678300f436
Buffer overflow in Serve-U FTP software can result in simple Denial of Service attack. Exploit example included.
7736fe5d78820b7c1ed1f53a2e99f51d2d82720244b4b8c960719c4bac1f3895
sl0scan v0.1 is a spoofer/scanner coded in perl that allows you to portscan remote hosts, hiding the true source of the scans by mixing in decoys (fake hosts). [ED NOTE: Yeah, I know we posted this on the site over a month ago, but miff just posted it to BugTraq, so we are posting it again, with miff's additional comments included]
e6c40e1f9dc5212c3e550a067aa807a8d61c7cb6353f4f9c2bb120a8fe1b9c42
Security hole in SLMail v3.2 or v3.1 with the Remote Administration Service enabled allows anyone to remotely bypass NTFS file system permissions and read any file on the system that hasn't already been locked by another process.
32bf9c64f951f2805b9c64f8e2830479c3a66c813e6426597c6330a22ffd65b9
Several Denial of Service attacks exist in SLMail 3.1 due to buffer overflows. Exploit description included; no fix from vendor yet.
3cf92391815a10ddc7152fe4e034692853521fcd3eb56b7c3509084370ee348e
Digital Unix Buffer Overflow Exploits - Digital Unix 4.0x with the new executable bits on the stack and heap contains numerous remote and local buffer overflows, resulting in remote and local root compromises.
f6c4d7c6af40560f45140b5c4865f1c84819ab34214b0b1605fc52c195f60a13
Sniffit buffer overflow in all versions results in simple remote Denial of Service attack. Exploit code included.
d03d5c9fb1eff0d9afe8f2ac0a1f18ba390bbf384ff50153075d5f20441230df
Buffer overflow in snplog.
832272bc823e44add906dcf4f3dcde71c230f9c63d99b54d2b9a4b0744612c73
Buffer Overflow in "Super" package in Debian Linux may allow local attackers to compromise root access.
8e428ab582247ed732d5e87fc09f82026ea3cabc526ca223e17cf475694cd905
RedHat sysklogd buffer overflow still exists in any Linux distribution running an old sysklogd package, namely all RedHat versions.
381e3e92dc41e0910e18d85a8345e46d868a6d9811994845eebdb1c683073b37
TCP Chorusing in the Windows 9x TCP/IP Stack - Flaws in the Windows 9x TCP/IP Stack can lead to Denial of Service attacks - this issue is not new, but the problems described by Dan Kaminsky in this article are.
86110a839ed3b556156227bd89e253bc4841d4f1fa9afec14790bc6261ee825f
Easily exploitable buffer overflow exists in Tetrix 1.13.16.
b8105c1dd312a16f7decc59fa217a7fdae5cb2c54c37b7a5d552edf35b9c7e21
Weak password encryption in TOPdesk, simple decryption method described.
f4b9bf0006c6fca2403791d7ccd429e2b99619ee2fe71243e62a3fe61bdfd81f
Flaws in traceroute allow any user (since it's often suided) to use traceroute as a udp, or (only for versions from 1.4) also icmp flooder. Detailed descriptions of problems and exploit code included.
c79ca4055420afba94c5ac3b2e2ffe655c49fd3922fa50d2b348afb3a5a8104e
Triactive's Remote Management Software uses poor authentication methods and stores passwords in plaintext.
5af809518a0f9e048cc3272e44fafc0c76b1fddc1606d624ea5c8bd5df816ae9
FileSystemObject can be used to view or alter any files on an ASP (Active Server Page) web server. Exploit code example included.
ff62cb692d4e99e9995a506a6f5201270924de12d34800fe1db62bf2345a31c8
Retrieve and "decrypt" MS Access 97 Passwords from Access 97 database (*.mdb). UNIX source code.
ff118bb56ed342ebdae0cd90dedea754e11b3406161a36dfd40286d5cd9725fd
Retrieve and "decrypt" MS Access 97 Passwords from Access 97 database (*.mdb). Win32 executable.
ccf9ce4908f355b398e9be1c401fdef98858173329d8de2fff292b97e6ee4ae8
Allaire Forums GetFile.cfm bug allows anyone to access any file on servers running Allaire Forums software.
6811ef7bfca7cd872c8789ab6ffab236d278ef42896acc3d92b53cc8741f94af