exploit the possibilities
Showing 1 - 9 of 9 RSS Feed

Files Date: 2002-04-06

Posted Apr 6, 2002

udpShell is a remote shell that uses UDP instead of TCP. It uses a client-server architecture (udpShell as the daemon and udpClient as the client).

tags | remote, shell, udp, tcp
systems | unix
MD5 | 8380c2ac44293ad9db0c5397935726bc
Posted Apr 6, 2002
Site dimlight.org

Linux Security Auditing Tool (LSAT) is a post install security auditing tool for Red Hat. It is modular in design, so new features can be added quickly. It checks inetd entries and scans for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions.

Changes: checkinetd module now checks hosts.allow and hosts.deny files. Lots of documentation has been added to the main file and modules. A changelog has been added.
tags | kernel
systems | linux, redhat
MD5 | ac439a1b22d6463531ae229b1afc6d55
Posted Apr 6, 2002
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: Now has logging of open directory FDs by chrooting processes, and various chroot capability dropping changes and fixes. Split fatal-signal logging into two buckets, so an attacker could not trigger log-throttling by causing an unprivileged segfault right before attacking privileged processes.
tags | root, patch
systems | linux, unix
MD5 | c6b700af0880cb67009535af4f0cb9a4
Posted Apr 6, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Fixes the recent zlib (PPP/IrDA Deflate compression) problem and added fixes for two Alpha-specific bugs introduced in Linux 2.2.20.
tags | overflow, kernel
systems | linux
MD5 | 021cc007b503daa3cad2bb0ef35c4fb5
Posted Apr 6, 2002
Site logwatch.org

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: If you are running v2.4 or below it is imperative that you upgrade! This version supports multiple copies of the same command (such as *remove) in config files, no longer requires an = sign when no arguments are given, and adds some more filtering.
tags | tool, intrusion detection
systems | unix
MD5 | c193360765959f2b6126dee663f3e207
Posted Apr 6, 2002
Site nsfocus.com

Nsfocus Security Advisory SA2002-02 - Xsun, shipped with Solaris 2.6, 2.7, and 2.8 contains a local root vulnerability due to a heap overflow in the -co options.

tags | overflow, local, root
systems | solaris
MD5 | b1cea44377038e7d2125c5ea1743fe13
Posted Apr 6, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

tags | patch
systems | unix
MD5 | e5a4a2ad6f170d1a5f8ab980a3fa8cb9
Posted Apr 6, 2002

Microsoft Security Advisory MS02-017 - A buffer overflow in Windows NT, 2000, and XP Multiple UNC Provider (MUP) allows local users to run code with local system privileges. Microsoft FAQ on this issue available here.

tags | overflow, local
systems | windows, nt
MD5 | 123e98afee31a18af79ffbfaf7d7bf12
Posted Apr 6, 2002

Microsoft Security Advisory MS02-016 - Windows 2000 Group Policy may be bypassed by logging in twice because the first login locks the Group Policy files, preventing Policy from being applied for all users affected by the GPO. Microsoft FAQ on this issue available here.

systems | windows, 2k
MD5 | dd47789a58fc81bf750953c9990f4576
Page 1 of 1

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By