Exploit the possiblities
Showing 1 - 25 of 181 RSS Feed

Files Date: 2001-03-01 to 2001-03-31

iemsdaipp.txt
Posted Mar 30, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #40 - Security bugs in interactions between IE 5.x, IIS 5.0 and Exchange 2000. If a malicious web page is browsed with IE it is possible to list the directories of arbitrary IIS 5.0 servers to which the browsing user has access. Under certain circumstances it is also possible to read the user's email or folders if it is stored on an Exchange 2000 server with web storage (it uses IIS 5.0). It is also possible to create (or probably modify) files on the Exchange 2000 server with web storage. Example exploit included.

tags | exploit, web, arbitrary
MD5 | 85beec7e8445644e67cb4fa185ca6a0c
gShield-2.0.4.tgz
Posted Mar 29, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: There is now a traceroute toggle, the log-level is configurable, the CLOSED chain has been reordered, a "flush" option has been added, additional IANA reserved blocks have been folded in, and there is a miscellaneous cleanup.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | d3c649ab809234854fc917098d8e9230
Openwall Linux Kernel Patch
Posted Mar 29, 2001
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Updated to Linux 2.2.19, which contains security fixes not included in older versions of the patch. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel
systems | linux
MD5 | 944a6566a057ca99a3b1575e67db8aea
linux-2.0.39-ow3.tar.gz
Posted Mar 29, 2001
Authored by Solar Designer | Site openwall.com

The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and privileged IP aliases for kernel 2.0.

Changes: There are important bugfixes, including to an older kernel vulnerability fix. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel, root
systems | linux
MD5 | f444dae268d4523ac7a96cef7b23776c
iplayer-0.1.tgz
Posted Mar 29, 2001
Site trinux.org

Iplayer (pronounced ip-layer) is a libpcap sniffer based on ipgrab. It is useful for building custom TCP/IP packets that will be injected by NASL scripts or by other raw socket-building tools such as sendip.

tags | tool, sniffer, tcp
MD5 | 0f5fa4167ad70082d5d227118803fd99
riley-0.2.tar.gz
Posted Mar 29, 2001
Site bigredrockeater.com

Riley is a file integrity checker written in Perl, somewhat similar to Tripwire.

tags | tool, perl, intrusion detection
systems | unix
MD5 | 77ff27cece3205221f648b46230a3985
lids-0.9.15-2.2.19.tar.gz
Posted Mar 28, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Now works with kernel 2.2.19! Also includes bugfixes in sysctl, and a new lids.conf format checker in lidsadm. Changelog available here.
tags | kernel, root
systems | linux
MD5 | a02f109af93dc7f60b24db9ccafd7873
vmail-0.6.4-devel.tar.gz
Posted Mar 28, 2001
Site virtua-web.co.uk

Vorpal Mail is an easily configurable but flexible replacement for sendmail, supporting advanced features such as virus scanning, virtual domains, etc.

Changes: The bounce and antivirus code has been cleaned up. Bugfixes were implemented.
tags | virus
systems | unix
MD5 | ba5f517444c16d9971e9f876f9c94569
ipa-1.1.1.tar.gz
Posted Mar 28, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: New options added to the IP accounting database viewer.
systems | unix, bsd
MD5 | 9ba45e3677caf322cd6704dd349f4512
libsafe-2.0.tgz
Posted Mar 28, 2001
Authored by Navjot Singh | Site research.avaya.com

The libsafe library protects against buffer overflow and format string attacks. It works by putting a wrapper around dangerous functions that contain any buffer overflows within the current stack frame, so that the return address can not be changed. Libsafe works with any existing pre-compiled executable and can be used transparently, even on a system-wide basis.

Changes: Ability to handle both buffer overflow and format string attacks, and extension of its protection to all the applications running on a system.
tags | overflow
systems | linux
MD5 | 5ef42b946b8eb8d7d5c36a6946419eb4
ms01-019
Posted Mar 28, 2001

Microsoft Security Advisory MS01-019 - Compressed folders, included with Windows ME and Plus 98, has an implementation flaw which records the plain text password used to encrypt the folder in c:\windows\dynazip.log. Microsoft FAQ on this issue available here.

systems | windows, me
MD5 | cc8eb4e5956d61f07cbbee03232eb4d0
ms01-018
Posted Mar 28, 2001

Microsoft Security Advisory MS01-018 - The VB-TSQL debugger object that ships with Visual Studio 6.0 Enterprise Edition has a buffer overflow which can be remotely exploited to execute arbitrary code as the interactively logged-on user running the debugger. The attack uses TCP port 137-139 and 445. Microsoft FAQ on this issue available here.

tags | overflow, arbitrary, tcp
MD5 | 55c2d733d6587a6755c2acf69b71794f
SuperKoD-1.1.tgz
Posted Mar 28, 2001
Authored by Safety

IGMP windows DoS attack. Results in bluescreens and sometimes reboot. Source included.

tags | denial of service
systems | windows
MD5 | 9e4b45b4f7a299162f5f9122f412859c
crew.tgz
Posted Mar 28, 2001

Crew.tgz is the executable package for the lion worm. Includes 1i0n.sh and helper binaries.

tags | worm
MD5 | 8e791aeee8bddf7f4f75edac002b525e
sara-3.3.5.tar.gz
Posted Mar 27, 2001
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Now detects the SunOS snmpXdmid remote root bug, and te lion worm. We also enhanced our SSH detection logic to address not only the new vulnerabilities but also its use as a backdoor.
tags | tool, cgi, scanner
systems | unix
MD5 | 927099d329810e19a0eaf2432e6381b3
bind_scan.pl
Posted Mar 27, 2001
Authored by Nemes||y

Bind Scan is a perl script which scans for vulnerable BIND servers. Uses dig to get information.

tags | tool, scanner, perl
systems | unix
MD5 | dc636fc6aef159698372708090a6b958
apache_1.3.19+ssl_1.42.tar.gz
Posted Mar 27, 2001
Site apache-ssl.org

Apache-SSL is a set of patches for Apache to create a secure Webserver, based on SSLeay/OpenSSL. It is designed to be small, secure, and efficient.

tags | encryption
MD5 | ab733a762102c1bef13d01795f1bdbcf
mdcrack-0.7.tar.gz
Posted Mar 27, 2001
Authored by Gregory Duchemin | Site mdcrack.multimania.com

MDcrack is a brute forcer for MD5 hashes. Many programs send MD5 hashes of passwords over the wire for security, not realizing that brute forcing MD5 hashes is as simple as brute forcing our old UNIX DES password. MDcrack has been built with performance in mind, and is capable of breaking up to 6 characters in length hashes in hours, 8 character passwords can be cracked in a couple days.

Changes: Now includes a human readable form output so grep can be used to search through results, a -F option to write in non-human form speeding up performance by 60%, and bug fixes.
systems | unix
MD5 | ac04a22be0afb437791f49dfcdf07539
ICQMachineGun.zip
Posted Mar 27, 2001
Authored by AleXXL | Site project.od.ua

ICQ MachineGun v1.0b is an ICQ spamer/bomber.The messages send through the ICQ server to any (Online/Offline) users. It's may be normal or uin messages. Tested on Windows 98SR2.

systems | windows
MD5 | d023db4af14bd823c783de2d6c9f735d
chkrootkit-0.30.tar.gz
Posted Mar 27, 2001
Authored by Nelson Murilo | Site chkrootkit.org

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD.

Changes: Now detects RK17 and the lion worm. New tests - Now checks for patched versions of basename, dirname, traceroute, rpcinfo, rexedcs, date, echo, env, timed, identd, pop2, pop3, write, tar, mail, biff, and grep.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
MD5 | 2f1c9ec3c3bf62d50c70e25a52ddc1d7
adore-0.34.tgz
Posted Mar 27, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved 2.4 support, better authentication checking, permanent PID removal, configure script, experimental exec redirection for i386.
systems | linux
MD5 | 69b3453f1fb1650388fc63297652d221
ddnsf.tar.gz
Posted Mar 27, 2001
Authored by Extirpater

Distributed DNS Flooder v0.1b - A powerful attack against DNS servers.

tags | denial of service
MD5 | 3672dfbec5c48d4a4a8aef930a29c8fa
ASPSeek.txt
Posted Mar 27, 2001
Authored by Tack

ASPSeek by SWSoft allows remote users to view any file on the webserver via a /../ bug.

tags | exploit, remote
MD5 | 46cec92ad366b836aa5f1751d55f8f0b
FreeBSD Security Advisory 2001.30
Posted Mar 26, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:30.ufs-ext2fs - A bug in the UFS filesystem allows users to obtain access to areas of the filesystem containing data from deleted files. The filesystem code is supposed to ensure that all filesystem blocks are zeroed before becoming available to user processes, but in a certain specific case this zeroing does not occur, and unzeroed blocks are passed to the user with their previous contents intact. Thus, if the block contains data which used to be part of a file or directory to which the user did not have access, the operation results in unauthorized access of data.

systems | freebsd
MD5 | f493d4622ae7dc321d22468b5d4abc7e
RHSA-2001:022-03.licq
Posted Mar 26, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:022-03 - licq as shipped with Red Hat Linux 7 is vulnerable to two security problems: An overrunnable buffer in its logging code, and an unguarded system() call to execute an external browser when receiving an URL.

tags | overflow
systems | linux, redhat
MD5 | 02bfcdae06e70fc67ce4d2466525b640
Page 1 of 8
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close