Twenty Year Anniversary
Showing 1 - 6 of 6 RSS Feed

Files Date: 2003-01-17

w00nf-stunnel.c
Posted Jan 17, 2003
Authored by ^sq/w00nf | Site w00nf.org

Stunnel v3.15 - 3.21 remote format string exploit. Tested against Red Hat 7.2, 7.3, 8.0, Slackware 8.1, Debian GNU 3.0, and Mandrake 9.0. More information on the bug available here.

tags | exploit, remote
systems | linux, redhat, slackware, debian, mandrake
advisories | CVE-2002-0002
MD5 | 036f5e357caf9ea94e601b435e2e825d
CA-2003-01.dhcpd
Posted Jan 17, 2003
Site cert.org

CERT Advisory CA-2003-01 - There are multiple stack-based buffer overflows in ISC DHCP that are exploitable by sending a DHCP message containing a large hostname value allowing remote attackers to execute code with the privileges of the user running dhcpd.

tags | remote, overflow
MD5 | d17c624c49bad511e5dac22b8cce69a6
ftester-0.8.tar.gz
Posted Jan 17, 2003
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be tested with the 'connection spoofing' option. Requires: Net::RawIP, Net::PcapUtils, NetPacket.

Changes: Compatible with Perl 5.8.0, documentation updates, and bug fixes.
tags | tool, perl, spoof, firewall
systems | unix
MD5 | fffe605984da88178e68fe079f02836b
RHSA-2003:006-06
Posted Jan 17, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:006-06 - Unpatched versions of libpng 1.2.1 and earlier do not correctly calculate offsets, which leads to a buffer overflow and arbitrary code execution. This can be exploited by an attacker creating a carefully crafted PNG file which executes arbitrary code when the victim views it.

tags | overflow, arbitrary, code execution
systems | linux, redhat
MD5 | 84720d8fd70f0fd0fc5666b1f88c7383
RHSA-2002:295-07
Posted Jan 17, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2002:295-07 - Eight vulnerabilities have been fixed in the CUPS printer software included with Red Hat 7.3 and 8.0.

tags | vulnerability
systems | linux, redhat
MD5 | 718cc1c99119f1e7ee3d025c335c88d4
sendip.txt
Posted Jan 17, 2003
Authored by Dataclast | Site dataclast.filetap.com

Tutorial on ICMP DOS attacks implemented with Sendip.

tags | paper
MD5 | 9c7e06dbbbdf3a71538d0efbfea43a0d
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    9 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    34 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close