Twenty Year Anniversary
Showing 1 - 23 of 23 RSS Feed

Files Date: 2001-01-25

Posted Jan 25, 2001
Authored by Vanja Hrustic, Fyodor Yarochkin, Thomas Dullien, Emmanuel Gadaix | Site

S.A.F.E.R. Security Bulletin 010124.EXP.1.11 - A remotely exploitable buffer overflow has been found in the Lotus Domino SMTP Server on all versions up to and including v5.05 which allows a remote attacker to execute code with the privileges that the SMTP server is running as. Perl exploit code included. Fix available here.

tags | remote, overflow, perl
MD5 | 59e910f7e0e7f645be5c3a3e6de36e20
Posted Jan 25, 2001
Authored by Jamie Zawinski | Site

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: This release adds the new hacks "zoom" and "whirlwindwarp", GL improvements, bug fixes, and more.
tags | root
systems | unix
MD5 | f5ab6665fd13e89b90ff94908f354ca9
Posted Jan 25, 2001
Authored by Renaud Deraison | Site

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 531 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: Bug fixes and additional options have been added. Http virtual hosts can now be tested, detached scans can now be stopped from the client, and XML support has been improved.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
MD5 | 1b7a8df94625353518fa9bafecc1319b
Posted Jan 25, 2001

Ramen worm local detection tool. Still in beta.

tags | worm, denial of service, local
MD5 | 15d0fba3d19e400be70b9924aadb4b21
Posted Jan 25, 2001

Debian Security Advisory DSA-015-1 - Versions of sash prior to 3.4-4 did not clone /etc/shadow properly which lead into readable files for anybody.

systems | linux, debian
MD5 | 55a09e98a3b57eea192a269d4c7ce7e9
Posted Jan 25, 2001
Authored by Michel MaXX Kaempf

SplitVT v1.6.4 and below local format string exploit which overflows the -rcfile command line flag. Tested on Slackware 7.1, Debian 2.2.

tags | exploit, overflow, local
systems | linux, slackware, debian
MD5 | 97dcfd07f4dcf6be30fef0197b1c1ca1
Posted Jan 25, 2001

Debian Security Advisory DSA-013-1 - A buffer overflow has been discovered in the Mysql server v3.22.32 which allows remote attackers to gain mysqld privileges.

tags | remote, overflow
systems | linux, debian
MD5 | e5748a33f868012b89ca9355459b1930
Posted Jan 25, 2001
Authored by Balazs Scheidler | Site

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize out of band authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Bug fixes and experimental support for security-related IP options.
tags | tool, tcp, firewall, protocol
systems | unix
MD5 | d7256f2f194917ad2317dbdf448c0c4b
Posted Jan 25, 2001

Debian Security Advisory DSA-012-1 - A remotely exploitable buffer overflow has been found in micq v0.4.6.

tags | overflow
systems | linux, debian
MD5 | 949cd8eb9ed79a73002f78af0b33262f
Posted Jan 25, 2001
Authored by Len Budney | Site

fwipe overwrites your file a specified number of times (default: 5) and then deletes it. It is extremely secure; it will not be confused by filenames containing special characters, and is suitable for use against law enforcement.

Changes: This release was overwriting with zeros but not ones, now uses unbuffered writes reducing CPU consumption, and overall performs the same since I/O is the limiting resource.
systems | unix
MD5 | e8fe6a8c8ac8633fcb388f88aa7e707c
Posted Jan 25, 2001
Authored by Mike Heffner | Site

BFBTester is a utility for doing quick, proactive security checks of binary programs by performing checks of single and multiple argument command line overflows and environment variable overflows. It will also watch for tempfile creation activity to alert the user of any programs using unsafe tempfile names. While BFBTester can not test all overflows in software, it is useful for detecting initial mistakes that can red flag dangerous software. Tested on FreeBSD and Solaris.

Changes: New major rewrite of bfbtester! New features include the ability to watch created tempfiles, a new syntax for specifying binaries, and support for Solaris and Linux platforms. Also many bugfixes have been included.
tags | tool, overflow
systems | unix, solaris, freebsd
MD5 | 73f41bfe1b8498b7bb2967fe7339e8bd
Posted Jan 25, 2001

Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.

Changes: New iptables paths have been added. The interface to nmap is much better now, since it can manage nmap options.
tags | tool, kernel, firewall
systems | linux
MD5 | 3569d4bf323a7bc8af4c30bca27743e4
Posted Jan 25, 2001

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: This release includes a fix for a security bug in the exec(user)-line parameter, and other bug fixes.
systems | unix, bsd
MD5 | 3605d24a6269f3c7624169a678f22d6e
Posted Jan 25, 2001
Authored by Jim Brooks | Site

hypersrc is a GUI program for browsing source code, which uses GTK+. It provides a list widget containing sorted source code tags. A programmer can click a tag to hyperlink to a particular tagged line in a source code file. Screenshot here.

Changes: Hypersrc now displays a tree view of function call relationships in the source code.
systems | linux
MD5 | 5650f70aabbe0c882108300eaa8d9248
Posted Jan 25, 2001
Authored by R. Gregory | Site

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: This release has misc. cleanup and removal of misc. redundant entries. Logging options for reserved drops and dhcp have been added/enhanced. Full highport access is now a toggle. Transparent-proxy options, fixes for passive ftp, and options for bind/domain forwarding have been added. Services now use getservent to determine port selection. misc cleanup.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 01ffe4d74859ec8eb1657295f45979bc
Posted Jan 25, 2001

Mass CGI scanner. From Guile Cool.

tags | cgi
systems | unix
MD5 | 771d290353c4888a83b230a32b6fb27f
Posted Jan 25, 2001
Authored by Vanja Hrustic, Fyodor Yarochkin, Thomas Dullien, Emmanuel Gadaix | Site

S.A.F.E.R. Security Bulletin 010124.EXP.1.11 - Netscape Enterprise Server 3.x and 4.x allows remote users to obtain directory listings on remote sites running web publishing by sending the command "INDEX / HTTP/1.0".

tags | remote, web
MD5 | c6337020c3bef498f7573d3e912120fa
Posted Jan 25, 2001

Red Hat Security Advisory RHSA-2000:136-10 - PHP 3.0.17 can be caused to crash by clients uploading "multipart/form-data" information with form requests. Security holes in versions 4.0.0 through 4.0.4 of the PHP Apache module have been found.

tags | php
systems | linux, redhat
MD5 | 2642831b8d5b5b30b8413c4c41a3c0fd
Posted Jan 25, 2001

Red Hat Security Advisory RHSA-2001:004-04 - A remote format string vulnerability in Icecast v1.3.8beta2 allows remote code execution. Icecast 1.3.7 is not vulnerable.

tags | remote, code execution
systems | linux, redhat
MD5 | a722632155ab6f8add35a419d77f1adb
Posted Jan 25, 2001
Authored by Roelof Temmingh | Site

Unitools.tgz contains two perl scripts - uploads files to a vulnerable IIS site, and includes searches for more executable directories and is more robust and stable.

tags | exploit, perl
MD5 | 31eb60d9e98049816c3c0907cb176c03
Posted Jan 25, 2001
Authored by Hypoclear | Site is a perl script which exploits several vulnerabilities found in Cisco products. Includes the Cisco Catalyst ssh Protocol Mismatch dos, Cisco 675 Web Administration dos, Cisco Catalyst 3500 XL command execution, and the Cisco IOS Software HTTP Request dos.

tags | exploit, web, perl, vulnerability, protocol
systems | cisco
MD5 | d98c376f39aee68581c072f95ed01b71
Posted Jan 25, 2001

Crank is a project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.

Changes: This release contains bugfixes for the autocracker - it now works near perfectly on large enough text samples. The code bas been cleaned.
tags | encryption
MD5 | b2f5c0be8dbcc0f75862c3235a123209
Posted Jan 25, 2001
Authored by Maxim Krasnyansky | Site

VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It is a user space implementation and doesn't need modification of any kernel parts. VTun supports IP, PPP, SLIP, Ethernet, and other tunnel types. VTun is easily and highly configurable; it can be used for various network tasks like VPN, Mobil IP, Shaped Internet access, Ethernet tunnel, IP address saving, etc.

Changes: This is the final stable release!!!Includes a configurable keep-alive, a fix for 0 compression level, and an RPM package and docs update.
tags | tool, kernel, tcp, firewall
systems | unix
MD5 | 4403855f23b7784a7c85b96e6da1704c
Page 1 of 1

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    9 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By