what you don't know can hurt you
Showing 1 - 9 of 9 RSS Feed

Files Date: 2002-04-06

Posted Apr 6, 2002

udpShell is a remote shell that uses UDP instead of TCP. It uses a client-server architecture (udpShell as the daemon and udpClient as the client).

tags | remote, shell, udp, tcp
systems | unix
MD5 | 8380c2ac44293ad9db0c5397935726bc
Posted Apr 6, 2002
Site dimlight.org

Linux Security Auditing Tool (LSAT) is a post install security auditing tool for Red Hat. It is modular in design, so new features can be added quickly. It checks inetd entries and scans for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions.

Changes: checkinetd module now checks hosts.allow and hosts.deny files. Lots of documentation has been added to the main file and modules. A changelog has been added.
tags | kernel
systems | linux, redhat
MD5 | ac439a1b22d6463531ae229b1afc6d55
Posted Apr 6, 2002
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: Now has logging of open directory FDs by chrooting processes, and various chroot capability dropping changes and fixes. Split fatal-signal logging into two buckets, so an attacker could not trigger log-throttling by causing an unprivileged segfault right before attacking privileged processes.
tags | root, patch
systems | linux, unix
MD5 | c6b700af0880cb67009535af4f0cb9a4
Posted Apr 6, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Fixes the recent zlib (PPP/IrDA Deflate compression) problem and added fixes for two Alpha-specific bugs introduced in Linux 2.2.20.
tags | overflow, kernel
systems | linux
MD5 | 021cc007b503daa3cad2bb0ef35c4fb5
Posted Apr 6, 2002
Site logwatch.org

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: If you are running v2.4 or below it is imperative that you upgrade! This version supports multiple copies of the same command (such as *remove) in config files, no longer requires an = sign when no arguments are given, and adds some more filtering.
tags | tool, intrusion detection
systems | unix
MD5 | c193360765959f2b6126dee663f3e207
Posted Apr 6, 2002
Site nsfocus.com

Nsfocus Security Advisory SA2002-02 - Xsun, shipped with Solaris 2.6, 2.7, and 2.8 contains a local root vulnerability due to a heap overflow in the -co options.

tags | overflow, local, root
systems | solaris
MD5 | b1cea44377038e7d2125c5ea1743fe13
Posted Apr 6, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

tags | patch
systems | unix
MD5 | e5a4a2ad6f170d1a5f8ab980a3fa8cb9
Posted Apr 6, 2002

Microsoft Security Advisory MS02-017 - A buffer overflow in Windows NT, 2000, and XP Multiple UNC Provider (MUP) allows local users to run code with local system privileges. Microsoft FAQ on this issue available here.

tags | overflow, local
systems | windows, nt
MD5 | 123e98afee31a18af79ffbfaf7d7bf12
Posted Apr 6, 2002

Microsoft Security Advisory MS02-016 - Windows 2000 Group Policy may be bypassed by logging in twice because the first login locks the Group Policy files, preventing Policy from being applied for all users affected by the GPO. Microsoft FAQ on this issue available here.

systems | windows, 2k
MD5 | dd47789a58fc81bf750953c9990f4576
Page 1 of 1

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    2 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    16 Files
  • 13
    Feb 13th
    19 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    33 Files
  • 21
    Feb 21st
    11 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By