exploit the possibilities
Showing 1 - 22 of 22 RSS Feed

Files Date: 2002-04-25

FreeBSD Security Advisory 2002.18
Posted Apr 25, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:18 - A programming error in zlib may cause segments of dynamically allocated memory to be released more than once (double-freed), allowing attackers to send specially crafted data to applications that use zlib, crashing the application.

systems | freebsd
MD5 | f9a566d99804698e4e9e3c6101ca7f87
Posted Apr 25, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: GPS support has been added. It is possible to enable/disable the acoustic beacon indicator. This release uncovers non-broadcasting networks by just waiting until a probe response passes the network (someone joins the network). A new acoustic event has been added for uncovering an essid. There is massive code cleanup and speed improvements.
tags | tool, perl, wireless
systems | linux, bsd
MD5 | e341cb0bd0812fc86b29b2c9867881c2
Posted Apr 25, 2002
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed. Changelog available here.

Changes: Fixed the security vulnerability noted in CVE-2002-0061 (mitre.org) regarding the escaping of command line args on Win32. Prevented invalid client hostnames from appearing in the log file.
systems | unix
MD5 | ebea6588c3954731fcc318d29bc82409
Posted Apr 25, 2002
Authored by Cult

This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions.

tags | exploit
MD5 | d53cc8ba199088d13beffe904c1f9450
FreeBSD Security Advisory 2002.22
Posted Apr 25, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:22 - Local users can cause the FreeBSD system to crash due to a bug in the virtual memory management system involving a failure to check for the existence of a VM object during page invalidation. This bug could be triggered by calling msync(2) on an anonymous, asynchronous memory map (i.e. created using the mmap flags MAP_ANON and MAP_NOSYNC) which had not been accessed previously, causing the system to crash.

tags | local
systems | freebsd
MD5 | 60895e0707038d7543f12cf88b6df18c
Posted Apr 25, 2002
Authored by Alex Hernandez

Slrnpull, which is installed sgid root on RedHat 6.2, contains an exploitable buffer overflow in the -d parameter.

tags | overflow, root
systems | linux, redhat
MD5 | e727d27dc99c824a299ee980cd83a57b
Posted Apr 25, 2002
Authored by Aidan Carty | Site entropy.ie

Building an Intrusion Detection System Using Snort - Covers installing RedHat Linux 7.1,Compiling/Installing and configuration of MySql/Apache/ACID/Snort, setup of snort rules, and hardening the machine.

tags | paper
systems | linux, redhat
MD5 | 76ba61fd4ec82916de4b1b4bf0e145ca
Posted Apr 25, 2002
Authored by Oscar Gallego Sendin | Site robota.net

K9 is a Windows tool for passive OS detection. It uses WinPCAP to capture network traffic and a user friendly interface to handle results, fingerprint database, etc.

systems | windows
MD5 | d3be655ac792af0cab135030a967cf03
Posted Apr 25, 2002
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 900 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: This release has SSL support, better scalability, tons of new features, bugfixes, and more.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
MD5 | a9ee95a060a7b33502ea6f4daa4ce14a
Posted Apr 25, 2002
Authored by Nawok

PsyBNC v2.3 has a problem dealing with oversized passwords, making it possible to tie up all the connection slots and consume a lot of CPU on the server.

tags | exploit
MD5 | 72882c16409c851c3e19cdd8edf515a6
Posted Apr 25, 2002
Authored by Autor Herman | Site bruring.com

Alcatel.zip is a Windows tool for getting the challenge response for easy offline config of an alcatel modem. Often used for "patching" a speedtouch home to pro, as discussed on http://brunning.com.

tags | web
systems | windows
MD5 | d20b862383bca011585fd66738ba9152
Posted Apr 25, 2002
Authored by NTSleuth | Site ntsleuth.0catch.com

NetBIOS Enumeration Utility v1.2 (command line version) is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.

Changes: New enumeration routines, better HTML reporting, support for IP input file.
tags | local
systems | windows, nt
MD5 | 2dea94401be86154c64562fa34a34027
Posted Apr 25, 2002
Authored by Filip Maertens | Site filip.compsec.be

Microsoft IIS .HTR heap overflow checker. Determines remotely if patch MS02-018 has been applied.

tags | exploit, overflow
MD5 | 2b2edd24b76ee0b58d5186d14b8d3923
Posted Apr 25, 2002
Authored by Gobbles Security

Screen v3.9.11 local root linux/x86 exploit for braille module bug.

tags | exploit, x86, local, root
systems | linux
MD5 | bf834c1357f2a2f6814bd7bf51ecea1d
Posted Apr 25, 2002
Site sympatico.ca

Five vulnerabilities have been found in Intellisol Xpede v4.1.

tags | vulnerability
MD5 | e19de9b862f8cac67e3e22c95c0f9dbb
Posted Apr 25, 2002
Authored by Peter Grundl

Microsoft Distributed Transaction Coordinator DoS - A flaw in the way MSDTC handles malformed packets could allow an attacker to hang the service and exhaust resources on the Server. If an attacker sends 20200 null characters to the MSDTC service, which listens on TCP port 3372, server resources are allocated poorly. This attack can result in MSDTC.EXE spiking at 100% cpu usage, MSDTC refusing connections and kernel resources being exhausted. This was fixed with MS02-018, although the security bulletin does not mention this vulnerability.

tags | kernel, tcp
MD5 | e25b02dc80600cec84dac5e0cc8955a5
Posted Apr 25, 2002
Authored by Peter Grundl

A format string bug in Foundstone Fscan v1.12 for Windows can result in a malicious service banner overwriting the stack and the EIP on the PC performing the scanning, if banner grabbing is enabled. Fix available here.

systems | windows
MD5 | 2de3733540166fe27765c7a79b8f3da9
Posted Apr 25, 2002
Authored by Frederic Raynal

How to Remotely Exploit Format String Bugs - A practical tutorial. Includes info on guessing the offset, guessing the address of the shellcode in the stack, using format string bugs as debuggers, examples, etc.

tags | paper, shellcode
systems | unix
MD5 | 8d086961f802114fdecba45f4f33283f
FreeBSD Security Advisory 2002.23
Posted Apr 25, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:23 - Setuid or setgid applications can be used for privilege elevation due to insecure handling of stdio file descriptors on FreeBSD releases up to and including 4.5-RELEASE. It is known that the 'keyinit' set-user-id program is exploitable using this method. This vulnerability was discovered by Joost Pol.

systems | freebsd
MD5 | af9b03df14e62e8c4b9fdf23ef6b6305
Posted Apr 25, 2002
Authored by netric, Atje | Site netric.org

Local root exploit for the "Suid application execution bug" (< FreeBSD 4.5-STABLE) that was discovered by Joost Pol from Pine.

tags | exploit, local, root
systems | freebsd
MD5 | 6e686fc543c6ddbad436bfb0f81fd5be
Posted Apr 25, 2002
Authored by Rodrigo Gutierrez | Site trustix.com

PHP Nuke v5.5 contains 8 new and 9 old cross site scripting vulnerabilities.

tags | php, vulnerability, xss
MD5 | 2a63943705c465c396b7b7575f6e3503
Posted Apr 25, 2002
Authored by phased

Iosmash.c is an exploit for the stdio kernel bug that resides in all releases of FreeBSD up to and including 4.5-RELEASE. The exploit uses keyinit, which is part of the S/key package, to create 5 valid root passwords that give instant root access trough S/key.

tags | exploit, kernel, root
systems | freebsd
MD5 | 5a17bababe3ea7ff5e73ed68e8bf079d
Page 1 of 1

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    10 Files
  • 23
    Apr 23rd
    22 Files
  • 24
    Apr 24th
    11 Files
  • 25
    Apr 25th
    15 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By