An off by one overflow has been discovered in the channel code of OpenSSH versions 2.0 - 3.0.2. Users with an existing user account can abuse this bug to gain root privileges. Exploitability without an existing user account has not been proven but is not considered impossible. A malicious ssh server could also use this bug to exploit a connecting vulnerable client. Fix available here.
f862fbf462b1a8965de529058ff2c189f2e7ad5ad9d1c0dde44d02b7424b0163
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
d3ea0d0c55eccf07ffd42350e1df1b108f38e0605fa9b7343e4db28c1417fb9f
ICMP-Chat is an encrypted console chat program that uses ICMP packets. ICMP-Chat uses enigma (crypt) for encryption. It is a peer-to-peer chat program that enables you to hide your chat or to chat through many firewalls.
187cd3d7e58024fa85e43c48821723f85596cb3e58d9f0aa0460386303e5e554
PHP 3.0.16/4.0.2 remote root format string overflow exploit for Linux/x86. Included shellcode adds a root shell on tcp port 1524 to inetd.conf.
bd2179b0230478789cc9cadd205ee72f2c69c586fee39b3401c11b80fc6d9a40