what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-06-12

netsec17.txt
Posted Jun 12, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 17 - 12.06.2000 - Covers weekly roundups of security related events. In this issue: DNS security in Austrailia, Cellphone worm, VBS plan worm, Winn Schwartau's war against the net, bots defend networks, Interview with Marcus Ranum of NFR, IE 5 Cross-frame security vulnerability, Kdelibs vulnerability for setuid KDE applications, ColdFusion Web Application Server DoS attack, Sendmail Workaround for Linux Capabilities Bug, and flaws in the SSL transaction handling of Netscape.

tags | worm, web
systems | linux
SHA-256 | bfde7f5ca1c9c62230187fcb5910190e4359ec4b7d5f0a920e30482be68dac6b
pikt-1.10.0.tar.gz
Posted Jun 12, 2000
Authored by Robert Osterlund | Site pikt.uchicago.edu

PIKT is a multi-functional tool for monitoring systems, reporting and fixing problems, and managing system configurations. PIKT is quickly gathering potential as a serious security management system. PIKT comprises an embedded scripting language with unique, labor-saving features.

Changes: Rewrote much of the script processing code in a more modular, readable, and maintainable fashion. Revised the value history mechanism, fixing a serious scalability problem. Fixed several small bugs and made other code improvements. Binaries available here/.
tags | tool
systems | unix
SHA-256 | 47c3b254931e7dd4ce066386de539ef68797d4d01c86e9939d4bb786ee18adf7
oasis2.c
Posted Jun 12, 2000
Authored by Oasis

oasis2.c sends spoofed ICMP_SOURCE_QUENCH packets, telling the victim host to slow down data transmission.

tags | exploit, spoof
SHA-256 | caf38ff30c91e72d083821bc20375b417d1bf05afe59cd3258fa379237529825
CA-2000-11.kerberos
Posted Jun 12, 2000
Site cert.org

CERT Advisory CA-2000-11 - MIT Kerberos vulnerable to denial-of-service attacks. Several new buffer overflow vulnerabilities were found in Kerberos 4, Kerberos 5 with v4 support, KerbNet, and Cygnus Kerberos. Due to the use of static buffers, these vulnerabilities do not allow remote execution of arbitrary code.

tags | remote, overflow, arbitrary, vulnerability
SHA-256 | d96c4bdd107b1255a3004276121d75e0c5c68ad148f76745301d12d5346d2095
freebsd-cdrecord.c
Posted Jun 12, 2000
Authored by Sectorx | Site xorteam.cjb.net

Freebsd cdrecord local root exploit - Tested against FreeBSD 3.3-RELEASE.

tags | exploit, local, root
systems | freebsd
SHA-256 | 69c97fd5a84be42d400615e765ad61662441f2ca88b97bbb52105cfe55f17024
linux-security.1-7.txt
Posted Jun 12, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week June 12 - In this issue: A very serious Linux kernel security bug was recently discovered that allows local users to gain root access, SuSE 6.x: qpop vulnerability, Conectiva: gpm Remote buffer overflow, BRU: local root exploit vulnerability, Solar Designer's OpenWall Kernel Patch, BSD Based Operating Systems: IPCS, RedHat 6.x: kdelibs vulnerability, Debian: mailx local exploit, Linux 101: Basic network security, Bastille Linux: A Walkthrough, OpenSSH 2.2.1 Released, and more.

tags | remote, overflow, kernel, local, root
systems | linux, redhat, suse, bsd, debian
SHA-256 | 58e4d65d069ee0c9790083443a819679b23f181c9a9c60da9e29a3506ff1ab83
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close