Exploit the possiblities
Showing 1 - 25 of 44 RSS Feed

Files Date: 2000-09-13

Posted Sep 13, 2000
Authored by Samy Kamkar | Site pdump.lucidx.com

Pdump is a sniffer written in perl which dumps, greps, monitors, creates, and modifies traffic on a network. It combines features from tcpdump, ngrep, tcptrace, dsniff (and its webspy and urlsnarf), pfilt, macof, and xpy. It understands tcpdump-like syntax and allows easy modifications via a plug-in system. Readme available here.

Changes: New features added include displaying TCP sequence numbers and configurable packet display to match specific packets with Perl regular expressions. Many bugs have been fixed.
tags | tool, perl, sniffer
MD5 | 12e0f4a8b6033f2e3b24494035fd6099
FreeBSD Security Advisory 2000.51
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:51 - The mailman port, versions prior to 2.0b5, contained several locally exploitable vulnerabilities which could be used to gain root privileges.

tags | root, vulnerability
systems | freebsd
MD5 | 10c180bc0db33c1a2f9f402a313f456f
FreeBSD Security Advisory 2000.50
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:50 - The listmanager port, versions prior to 2.105.1, contained several locally exploitable buffer overflow vulnerabilities which could be used to gain root privileges.

tags | overflow, root, vulnerability
systems | freebsd
MD5 | 8baa672b22f359e3f99b54e1734a2a27
FreeBSD Security Advisory 2000.49
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:49 - The eject port is installed setuid root, and contains several exploitable buffers which can be overflowed by local users, yielding root privileges.

tags | overflow, local, root
systems | freebsd
MD5 | 96b6dae72ab2fe3a285d136a511a5265
FreeBSD Security Advisory 2000.48
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:48 - The xchat IRC client provides the ability to launch URLs displayed in an IRC window in a web browser by right clicking on the URL. However this was handled incorrectly in versions prior to 1.4.3, and prior to 1.5.7 in the 1.5 development series, and allowed a malicious IRC user to embed command strings in a URL which could cause an arbitrary command to be executed as the local user if the URL were to be "launched" in a browser as described above.

tags | web, arbitrary, local
systems | freebsd
MD5 | 3ad77f884b1369f7b70ef91411225a9b
FreeBSD Security Advisory 2000.47
Posted Sep 13, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:47 - The pine4 port, versions 4.21 and before, contained a bug which would cause the program to crash when processing a folder which contains an email message with a malformed X-Keywords header. The message itself could be deleted within pine if identified, but other operations such as closing the folder with the message still present would cause the program to crash with no apparent cause.

systems | freebsd
MD5 | 7f1152a7dca9e542570ffdc0b188d1cf
Posted Sep 13, 2000
Authored by Lionel Cons | Site c.home.cern.ch

Klogd Local Exploit. Envcheck is a Linux kernel module which detects and prevents exploitation of the recent glibc vulnerabilities by intercepting the execve system call and sanitising the enviroment passed. At the cost of a very small performance penalty, it has advantages over a glibc upgrade, including logging of exploit attempts, it works with statically linked binaries, it is transparent to applications that may be sensitive to a change of glibc, and it partially protects libc5.

tags | kernel, local, vulnerability
systems | linux
MD5 | f094b9437a462e5c8b6ef4b047751b0e
Posted Sep 13, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #11 - Lotus Domino ESMTP Service Lotus Domino Release 5.0.2a contains a buffer overflow in the processing of SMTp commands, causing the service to crash. Tested on OS/2 Warp 4.5, it is assumed that other platforms are vulnerable as well.

tags | exploit, overflow
MD5 | 18da5211613756748972b254a49ad0da
Posted Sep 13, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #10 - Intel Express Switch series 500 crashes when a malformed ICMP packet is sent to the Intel Express Switch or a host behind it. The switch looses all routing functionality but continues to function as a switch, except for the fact that learning also crashes, so new connections are not "picked up". Fix available here.

tags | exploit
MD5 | 6ac00171120e36eb538ff313acaf9744
Posted Sep 13, 2000

Microsoft Security Bulletin (MS00-063) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server (IIS). The vulnerability could enable a malicious user to prevent an affected web server from providing useful service by sending a particular type of invalid URL. Microsoft FAQ on this issue available here.

tags | web
MD5 | c318f5afc480ae98e4fa457350d09c7d
Posted Sep 13, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #9 - Internet Information Server (IIS) 4.0 for Windows NT 4.0 is vulnerable to a denial of service attack as described in ms00-063 in which a certain series of requests can cause INETINFO.EXE to gradually consume all system ressources (99-100% CPU and all memory). When the pagefile can't expand any further, INETINFO.EXE is killed by the operating system.

tags | exploit, denial of service
systems | windows, nt
MD5 | 21d4fc37da4f7d6a4a66b337359e2015
Posted Sep 13, 2000
Site redhat.com

Red Hat Security Advisory - The mgetty-sendfax package contains a vulnerability which allows any user with access to the /var/tmp directory to destroy any file on any mounted filesystem. A malicious user can create a symbolic link named /var/spool/fax/outgoing/.lastrun which points to any file on a mounted filesystem, and that file's contents will be destroyed the next time faxrunq is run.

systems | linux, redhat
MD5 | d95573bb1f5c00936bd6d192632edd90
Posted Sep 13, 2000
Site atstake.com

Atstake Security Advisory - Netegrity's SiteMinder is a web access control product for Solaris and Windows NT that implements various authentication mechanisms to protect content on websites. Due to an error in SiteMinder's URL parsing, it is possible for an attacker to bypass the authentication phase and view protected web pages directly.

tags | web
systems | windows, nt, solaris
MD5 | 510cf4d3d8534014692f2aae39b78de6
Posted Sep 13, 2000
Authored by LSD | Site lsd-pl.net

A serious vulnerability has been found in IRIX telnetd which can give remote root access to any IRIX 6.2-6.5.8[m,f] system. The vulnerability occurrs when one of the environment variables contains a format string which is passed on to the syslog() function. Proof of concept exploit included (updated version - compiler and little endian fixes). Fix available here.

tags | exploit, remote, root, proof of concept
systems | irix
MD5 | 22385913d3970f9f00addf76aa299fee
Posted Sep 13, 2000

SuSE Security Advisory - pam_smb is a package that allows Linux/Unix user authentication using a Windows NT server. Versions 1.1.5 and before contain a buffer overflow that would allow a remote attacker to gain root access on the target host. In addition, Zope needs updating again and the Xchat IRC client can be tricked to execute arbitrary commands if the user clicks on an URL. SuSE security site here.

tags | remote, overflow, arbitrary, root
systems | linux, windows, unix, nt, suse
MD5 | aa2fc49b9ed60ab28f3a9e42a0750819
Posted Sep 13, 2000
Authored by Ofir Arkin | Site sys-security.com

ICMP Usage in Scanning v2.01 - This paper outlines what can be done with the ICMP protocol regarding scanning. The paper deals with plain Host Detection techniques, Advanced Host Detection techniques, Inverse Mapping, Trace routing, OS fingerprinting methods with ICMP, and which ICMP traffic should be filtered on a Filtering Device.

Changes: Quite a large number of new OS fingerprinting methods using ICMP, which I have discovered are introduced with this revision. Among those methods, some can be used in order to identify Microsoft Windows 2000 machines; One would allow us to distinguish between Microsoft Windows operating system machines and the rest of the world; Another would allow us to distinguish between SUN Solaris machines and the rest of the world. More methods are introduced in the paper.
tags | paper, protocol
MD5 | 9664f0faa4fbc75852ba09891fb6f8fe
Posted Sep 13, 2000
Authored by Ofir Arkin | Site sys-security.com

This is a list of the ports which trojans run on. Updated Aug 2000, lists 350 trojans and thier default port. Newest version of this list available here. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | 84b0310ef73e1ace0c127207b8f332c9
Posted Sep 13, 2000
Authored by grimR | Site r00taccess.dhs.org

Beginners guide to unix hacking. Includes host enumeration, buffer overflows, firewalls, common mistakes, log cleaning, and more.

tags | paper, overflow
systems | unix
MD5 | 3cb19371e145efb78bc1e66a2f0735d0
Posted Sep 13, 2000
Authored by Vic Abell

Lsof is an extremely powerfiul unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port.

Changes: Support for Solaris 9 (SunOS 2.9) and Linux 2.4, and bug fixes.
tags | tool, intrusion detection
systems | unix
MD5 | 10674b09649c19015134585c6dca3eee
Posted Sep 13, 2000
Authored by Simon Edwards | Site simonzone.com

GuardDog is a firewall configuration utility for KDE on Linux. GuardDog is aimed at two groups of users - novice to intermediate users who are not experts in TCP/IP networking and security, and those users who don't want the hastle of dealing with cryptic shell scripts and ipchains parameters. Features an easy to use goal oriented GUI and the ability to generate ipchains scripts as output. Screenshot here.

Changes: RealPlayer support was added. Small changes were made to the GUI to fix a few layout problems. The manual is much more complete, and it now includes a tutorial and FAQ section.
tags | tool, shell, tcp, firewall
systems | linux
MD5 | 08413db8cbba184e7e299d57d9ed0fb2
Posted Sep 13, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: LIDS is now based on Linux kernel version 2.2.17.
tags | kernel, root
systems | linux
MD5 | 41f14a26da45ecfe89219500459f59ba
Posted Sep 13, 2000
Authored by IhaQueR

Screen 3.9.5 BSD local root exploit. Tested against OpenBSD.

tags | exploit, local, root
systems | bsd, openbsd
MD5 | f416fa1a25c5913328174118f2553ea6
Posted Sep 13, 2000
Authored by Warning3 | Site nsfocus.com

locale.c is a local root exploit for the glibc / locale format string bug. Tested against RedHat 6.2 with kernel 2.2.16.

tags | exploit, kernel, local, root
systems | linux, redhat
MD5 | e835180623ab433656b281294e40da5d
Posted Sep 13, 2000
Authored by IhaQueR

Screen 3.7.6 (and others) local root exploit.

tags | exploit, local, root
MD5 | 6627dd18a514a420bbd09c1737c6d29d
Posted Sep 13, 2000
Authored by Kostas Petrakis | Site synnergy.net

Yabb 9.1.2000 and prior for Windows and Unix is a web based BBS system which has a vulnerability in YaBB.pl which allows remote attackers to view any file on the system.

tags | exploit, remote, web
systems | windows, unix
MD5 | 417baa3dec8d2a3a129d39871ec03053
Page 1 of 2

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

March 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    14 Files
  • 2
    Mar 2nd
    12 Files
  • 3
    Mar 3rd
    1 Files
  • 4
    Mar 4th
    3 Files
  • 5
    Mar 5th
    15 Files
  • 6
    Mar 6th
    23 Files
  • 7
    Mar 7th
    15 Files
  • 8
    Mar 8th
    15 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    2 Files
  • 11
    Mar 11th
    1 Files
  • 12
    Mar 12th
    16 Files
  • 13
    Mar 13th
    20 Files
  • 14
    Mar 14th
    14 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    15 Files
  • 17
    Mar 17th
    5 Files
  • 18
    Mar 18th
    2 Files
  • 19
    Mar 19th
    7 Files
  • 20
    Mar 20th
    15 Files
  • 21
    Mar 21st
    19 Files
  • 22
    Mar 22nd
    16 Files
  • 23
    Mar 23rd
    11 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By