accept no compromises
Showing 1 - 25 of 3,030 RSS Feed

Files Date: 2002-08-01 to 2002-08-31

ms02-041
Posted Aug 30, 2002
Site microsoft.com

Microsoft Security Bulletin MS02-041 - Unchecked Buffer in Content Management Server Could Enable Server Compromise. Three security vulnerabilities: A buffer overrun in a low-level function that performs user authentication, a vulnerability resulting from the confluence of two flaws affecting a function that allows files to be uploaded to the server, and a SQL injection vulnerability affecting a function that services requests for image files and other resources.

tags | overflow, vulnerability, sql injection
MD5 | 498036cdbf8a68759a2cc107ae3c2aee
ms02-040
Posted Aug 30, 2002
Site microsoft.com

Microsoft Security Bulletin MS02-040 - Unchecked Buffer in MDAC Function Could Enable SQL Server Compromise. A security vulnerability results because the MDAC functions underlying OpenRowSet contain an unchecked buffer. An attacker who submitted a database query containing a specially malformed parameter within a call to OpenRowSet could overrun the buffer, either for the purpose of causing the SQL Server to fail or causing the SQL Server service to take actions dictated by the attacker.

tags | overflow
MD5 | 3013475beb013aae436dad1a91da8c67
ms02-039
Posted Aug 30, 2002
Site microsoft.com

Microsoft Security Bulletin MS02-039 - Buffer Overruns in SQL Server 2000 Resolution Service Could Enable Code Execution. Sending a carefully crafted packet to the Resolution Service, an attacker could cause portions of system memory (the heap in one case, the stack in the other) to be overwritten. Overwriting it with random data would likely result in the failure of the SQL Server service. Overwriting it with carefully selected data could allow the attacker to run code in the security context of the SQL Server service.

tags | overflow, code execution
MD5 | a5e92caf1119e0111fa1b55eeda181d9
ms02-038
Posted Aug 30, 2002
Site microsoft.com

Microsoft Security Bulletin MS02-038 - Unchecked Buffer in SQL Server 2000 Utilities Could Allow Code Execution. This advisory documents SQL injection vulnerabilities and buffer overruns in SQL Server 2000 and MSDE 2000.

tags | overflow, vulnerability, code execution, sql injection
MD5 | c05f8dc87750a4ce38dbfd0fd450bb1f
ms02-037
Posted Aug 30, 2002
Site microsoft.com

Microsoft Security Bulletin MS02-037 - Server Response To SMTP Client EHLO Command Results In Buffer Overrun. A security vulnerability results because of an unchecked buffer in the IMC code that generates the response to the EHLO protocol command. If the total length of the message exceeds a particular value, the data would overrun the buffer. If the buffer were overrun with random data, it would result in the failure of the IMC. If, however, the buffer were overrun with carefully chosen data, it could be possible for the attacker to run code in the security context of the IMC, which runs as Exchange5.5 Service Account.

tags | overflow, protocol
MD5 | c00ec0823955eb23ffc6657a2e7497f0
ms02-036
Posted Aug 30, 2002
Site microsoft.com

Microsoft Security Bulletin MS02-036 - Authentication Flaw in Microsoft Metadirectory Services Could Allow Privilege Elevation. A flaw exists that could enable an unprivileged user to access and manipulate data within Microsoft Metadirectory Services (MMS) that should, by design, only be accessible to MMS administrators. Specifically, it is possible for an unprivileged user to connect to the MMS data repository via an LDAP client in such a way as to bypass certain security checks. This could enable an attacker to modify data within the MMS data repository, either for the purpose of changing the MMS configuration or replicating bogus data to the other data repositories.

MD5 | c8c8fb8dff759b8b62fb28034b96e7a1
ms02-035
Posted Aug 30, 2002
Site microsoft.com

Microsoft Security Bulletin MS02-035 - SQL Server Installation Process May Leave Passwords on System. A security vulnerability results because of two factors: The files remain on the server after the installation is complete. Except for the setup.iss file created by SQL Server 2000, the files are in directories that can be accessed by anyone who can interactively log on to the system. The password information stored in the files is either in clear text (for SQL Server 7.0 prior to Service Pack 4) or encrypted using fairly weak protection. An attacker who recovered the files could subject them to a password cracking attack to learn the passwords, potentially compromising the sa password and/or a domain account password.

MD5 | ee0221f7926cf9ac9cdf3d8fe8699892
iss.smb-dos.txt
Posted Aug 30, 2002
Site iss.net

ISS Security Advisory - Windows NT, 2000, and XP can be crashed remotely by sending a malformed packet to port 139, triggering a heap overflow. MS02-045.

tags | denial of service, overflow
systems | windows, nt
advisories | CVE-2002-0724
MD5 | c1a41e51ef34733065164f72ef91735d
pmids-1.5.tar.gz
Posted Aug 30, 2002
Authored by Redox | Site autosec.sourceforge.net

Poor Mans IDS is a couple of scripts which check certain files on your host (any you like) for changes in content, ownership, and mode. Rather than only mailing if something is wrong (like other IDSs), this lean IDS will send you a daily (or weekly or hourly, depending on how you set-up your cron job) security audit, containing details of what it found.

Changes: Bug fixes and some cool improvements.
tags | tool, intrusion detection
systems | unix
MD5 | bd319ae6afaabd837ee24d4c0c4fa04d
sonar-1.0BETA4.tar.gz
Posted Aug 30, 2002
Site autosec.sourceforge.net

Sonar is a network reconnaissance utility which runs all its scans from plugins. The currently supported plugins are an ICMP scan and an ACK scan which can see if hosts that don't respond to ICMP are online.

Changes: This release fixes a few annoying bugs. The ICMP scan has been made more versatile, allowing you to choose an ICMP type and ICMP code. Upgrades from older releases are recommended.
tags | tool, scanner
systems | unix
MD5 | 4e9e0b1360114b56f9282576feab1935
zorp-1.4.6.tar.gz
Posted Aug 30, 2002
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize out of band authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Some bugfixes were made and a new feature was implemented.
tags | tool, tcp, firewall, protocol
systems | unix
MD5 | fb824b4e2bfc4073d0fc2ce741eeb09d
prelude-manager-0.8.3.tar.gz
Posted Aug 30, 2002
Site prelude.sourceforge.net

Prelude Manager is the main program of the Prelude Hybrid IDS suite. It is able to register local or remote sensors, let the operator configure them remotely, receive alerts, and store alerts in a database or any format supported by reporting plugins, thus providing centralized logging and analysis.

tags | tool, remote, local, intrusion detection
systems | unix
MD5 | b9097c765fd7e396dca45398dc84ab88
prelude-nids-0.8.1.tar.gz
Posted Aug 30, 2002
Site prelude.sourceforge.net

Prelude NIDS is the network sensor part of the Prelude Hybrid IDS suite. It provides network monitoring with fast pattern matching (Boyer-Moore) to detect attacks against a network. Includes protocol and detection analysis plugins featuring Telnet, RPC, HTTP, and FTP decoding and preprocessors for cross-platform polymorphic shellcodes detection, ARP misuse detection, and scanning detection. It supports IP fragmentation and TCP segmentation to track connections and detect stateful events.

tags | tool, web, tcp, shellcode, protocol, intrusion detection
systems | unix
MD5 | ffaa17e6694f12b8d5ede91c1fbdf22d
Samhain File Integrity Checker
Posted Aug 30, 2002
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: This release fixes a bug that may cause filename truncation if a filename with special (e.g. non-ASCII) characters is logged to an SQL database.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 1c093de9806603868856393247c6f61f
mimedefang-2.19.tar.gz
Posted Aug 30, 2002
Authored by David F. Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: The quarantine notification message was improved and some less important syslog messages were lowered from 'info' to 'debug'. Default permissions on /etc/mail/mimedefang-ip-key were tightened.
systems | windows, unix
MD5 | 7be1744ce6aae957e8bae21e7c597c5b
incident-2.3.tar.gz
Posted Aug 30, 2002
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: When showing an excerpt of logs, the number of matching lines is now shown to express the severity of attack. A bug was also fixed that would consider certain FQDNs as IPs.
tags | tool, remote, sniffer
MD5 | 41d2385db00ec530293f43697d44b317
httptype-1.3.9.tar.gz
Posted Aug 30, 2002
Site staff.ncst.ernet.in

Httptype is a program that returns the http host software of a website. It is written in Perl.

Changes: New stable version. You can now use URLs in a host file as well. Unsupported URL schemes will return a warning and be skipped. This version also tries to figure out the server type of SSL hosts.
tags | web, perl
MD5 | 6941ca3c2c8dd990f6e56dfce2fd9668
cheops-ng-0.1.10.tgz
Posted Aug 30, 2002
Site cheops-ng.sourceforge.net

Cheops-ng is a graphical network management tool for mapping and monitoring your network. It has host/network discovery functionality, OS detection, and it also does a port scan of each computer to tell what services are running, so you can use or administer them.

tags | tool, scanner
systems | unix
MD5 | 8c8d9f694ef002f38e658ff2001aeed9
adp.forum.2.0.2.htm
Posted Aug 30, 2002
Authored by Condor

The ADP Forum v2.0.2 contains vulnerabilities which allow remote users to delete accounts, read encrypted passwords, and take admin access.

tags | remote, vulnerability
MD5 | bb945a868804931cf0290b29e35f5117
cgivti2.V2.pl
Posted Aug 30, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

Cgivti2.V2.pl uses a webserver host list provided by the user to scan for cgi, vti, msadc and several other vulnerabilities. Like cgivti.V2.pl, this script is easily configured to include other vulnerabilities.

tags | cgi, vulnerability
systems | unix
MD5 | f743fb6b423ff1082ef30ebbdbd6c7ad
port-bind.c
Posted Aug 30, 2002
Authored by Killah | Site hack.gr

Port-binding shellcode that binds to tcp port 8975 for Linux on Sparc.

tags | tcp, shellcode
systems | linux
MD5 | 90dfc688a5c9bc23e32d733ab284c9ba
ipac-ng-1.23.tar.gz
Posted Aug 30, 2002
Site sourceforge.net

IP Accounter is an IP accounting package for Linux. It collects, summarizes, and nicely displays IP accounting data. Its output can be a simple ASCII table, or graph images. Ipchains and iptables are supported. Logs are stored in files, gdbm, or even a PostgreSQL database.

Changes: Some bugs were fixed, the Web interface was improved, the configure script option 'dropzero' was dropped, the TODO list was updated, and the batch mode was rewritten.
systems | linux
MD5 | 20704903055df2e399849a41c333c4b6
fakedate-v1.0.tar.gz
Posted Aug 30, 2002
Authored by Phundie

FakeDate consists of tools and libraries for supplying a fake date, time, and alarm signals to target programs using LD_PRELOAD. The supplied time can be constrained to a user selectable interval.

systems | unix
MD5 | 79857be4e3626898fa8b2f13b9dec1f9
sendmail.8.12.6.tar.gz
Posted Aug 30, 2002
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: Several minor problems have been fixed.
systems | unix
MD5 | 73e18ea78b2386b774963c8472cbd309
sub.txt
Posted Aug 30, 2002
Authored by Hexxeh

Substitution Ciphers - This paper discusses the five classic substitution ciphers and how they are solved.

tags | paper
MD5 | 34f7299219516aa6383c1b2658d339c7
Page 1 of 122
Back12345Next

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    14 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close