what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-10-06

ms00-071
Posted Oct 6, 2000

Microsoft Security Bulletin (MS00-071) - Microsoft has released a patch that eliminates the "Word Mail Merge" security vulnerability in Microsoft Word 2000 and 97. If an Access database is specified as a data source via DDE in a Word mail merge document, macro code can run without the user's approval when the user opens that document. If a user could be enticed into opening a specially constructed mail merge Word document, which was provided either as an e-mail attachment or as a link hosted on a hostile web site, it is possible to cause arbitrary code to run on the user's machine. Microsoft FAQ on this issue available here.

tags | web, arbitrary
SHA-256 | 0cd0e76c9fc262e940c3b9329f4e6bdea41b100bfef5268bcee164d6ea8944f1
33_su.c
Posted Oct 6, 2000
Authored by Kil3r of Lam3rz

Immunix OS stackguard evading LC glibc + su + msgfmt local root exploit. Tested on Immunix OS (Stackguarded Redhat 6.2). Patch available here.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | e2922ba11b17fe95138d9bdf5612999e7ad04919271ca894dc28a29b7d779223
slackware.wuftpd.txt
Posted Oct 6, 2000
Site slackware.com

Slackware Security Advisory - Wu-ftpd version 2.6.0 has a remote root hole in it. Upgrade to version 2.6.1.

tags | remote, root
systems | linux, slackware
SHA-256 | f4c05db6315d143fbaaf2f0b26c1d45ca2251c59d6c6289431c39597f229591c
csm.proxy.bypass.txt
Posted Oct 6, 2000
Authored by Hermann Tischendorf

The CSM proxy server's siteblocker feature can be bypassed by setting up your web browser to use an external proxy.

tags | exploit, web
SHA-256 | e7564b58eccb78edb12f6980edcd391652d37e7de62a42f6bb64c4d3abc3abf3
obsd_fun.c
Posted Oct 6, 2000
Authored by anonymous | Site segfault.net

OpenBSD 2.6 local / remote denial of service attack. Sends a large number of ARP packets, causing the kernel to run out of memory and panic. Only works on machines connected to the same network segment.

tags | remote, denial of service, kernel, local
systems | openbsd
SHA-256 | c315e76c3370cc028713b496c13dfe8221b257801769c58c9b190e32627b5f03
lbl-traceroute.txt
Posted Oct 6, 2000
Authored by Dvorak | Site synnergy.net

/usr/bin/traceroute local root format string exploit for LBNL traceroute, distributed with Red Hat 6.1/6.2 and Debian 2.2.

tags | exploit, local, root
systems | linux, redhat, debian
SHA-256 | eac8e33beaa9da34d3ff79bf6a8fd5f9817c277464588facdda8b802d020cab4
xlockx.c
Posted Oct 6, 2000
Authored by noir

OpenBSD 2.6 and 2.7 xlock local root format string exploit.

tags | exploit, local, root
systems | openbsd
SHA-256 | d9c51047e5c8a7f38729c09e87bad09d9750d4d980cea6a7b2e76cf318636dba
guninski23.txt
Posted Oct 6, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #23 - Internet Explorer 5.5/Outlook allow executing arbitray programs after viewing web page or email message. This very serious vulnerability may easily lead to taking full control over user's computer. The problem is the com.ms.activeX.ActiveXComponent java object, which allows creating and scripting arbitrary ActiveX objects, including those not marked safe for scripting. Demonstration available here.

tags | exploit, java, web, arbitrary, activex
SHA-256 | 27e12e35034dfe08d65a2d1ce60a0c62b0edbb7d88eec3dfcb77203e10bad419
How To Become Elite
Posted Oct 6, 2000
Site gmx.net

How to become elite. Obviously, this is all you need.

tags | paper
SHA-256 | b8ed0607831f8395b6ca34498348fc68a40c18df894b0869773ac6d9efd24a55
arping-0.95.tar.gz
Posted Oct 6, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: A man page has been added!
tags | tool
systems | unix
SHA-256 | 673e24e8ac9aae412e3928cd2168aaf7e73e91ed2d72c5ed4a3e244ede61f2e4
Samhain File Integrity Checker
Posted Oct 6, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Bug fix release which fixes problems with IP address caching and null characters in passwords.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 05bcb5c628550e899a35271dbf30846efc2a0a63a58ff46493819bb6fc95698c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close