what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-04-20

Technical Cyber Security Alert 2004-111B
Posted Apr 20, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-111B - There is a vulnerability in Cisco's Internetwork Operating System (IOS) SNMP service. When vulnerable Cisco routers or switches process specific SNMP requests, the system may reboot. If repeatedly exploited, this vulnerability could result in a sustained denial of service (DoS).

tags | advisory, denial of service
systems | cisco
SHA-256 | 3fed4b1233387104fb4e7e1bcf2dc6aba32e42412482673afff6ef774107c8b3
Posted Apr 20, 2004
Authored by Niels Provos | Site citi.umich.edu

Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Changes: Several bugs that would cause operating system detection with nmap to fail were fixed along with compilation issues for honeydctl on Linux and *BSD. Support for log rotation via SIGUSR1 was added.
tags | tool, arbitrary, tcp, intrusion detection
systems | unix
SHA-256 | 7d774533010e55a38825fb6cd571a33808e83c5d6691f10ee26527fd93b97646
Posted Apr 20, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 171f0659442c5f4b2c3add675ca0fb1fed6c5140f661990d020b34e8775b61f4
Posted Apr 20, 2004
Authored by Tobin Fricke | Site splorg.org

JPEG Rescue is a small program used to search a formatted/wiped filesystem for JPEG files and extracts them. Designed to work with Compact Flash cards.

tags | tool
systems | unix
SHA-256 | 802d96933d5b0b04de56f8b7429a033f7d15c6374370b066c22ead634e9f1de1
Posted Apr 20, 2004
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.

Changes: Kconfig ifdef cleanup, added back the fastguessing for acl searching, capability fixed up.
tags | kernel, root
systems | linux
SHA-256 | e025e71556bd167fa5f567b20af24a34eb59dcaf730c8e180f0c41520490d2ca
Posted Apr 20, 2004
Authored by x314

Local root exploit for Squirrelmail's chpasswd utility. Tested on Suse 9. Original bug found by Matias Neiff.

tags | exploit, local, root
systems | linux, suse
SHA-256 | 2b92773c507dec11bb83386fb30b5c4db547be150a75c00aec35583c53feee1b
Posted Apr 20, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.

tags | exploit, local, root
SHA-256 | 5f80619f3d14965d61bcf967f0b26ae2e5d1de37280e8076979c4872b7760af0
Posted Apr 20, 2004
Authored by Wojciech Purczynski, Paul Starzetz | Site isec.pl

Linux kernel versions 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 have an integer overflow in setsockopt MCAST_MSFILTER. Proper exploitation of this vulnerability can lead to privilege escalation.

tags | advisory, overflow, kernel
systems | linux
SHA-256 | 836369aad1ed778a870f252f0733e83e6fb921672b010265395c6bb0c30ddc9d
Posted Apr 20, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

Quick and dirty hack to grab the versions from ISC bind 8 and 9 nameservers.

SHA-256 | d1a49379069a489d6405a914d21fcb59edfd323ab4351efa3f15397dc1398ba1
Posted Apr 20, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

A small, but very useful SMB OS-detection tool which gets workgroup, smbserver and operating system. It works for all tested samba versions on different platforms like Mac OSX, AIX, Solaris, Linux, BSD, and all Microsoft Windows platforms.

systems | linux, windows, solaris, bsd, aix, apple
SHA-256 | 15e66dd0f9ffc8a4ba1ade94a6b6fa5ed858378503b48dd688db6c38623db32a
Posted Apr 20, 2004
Authored by Paul Szabo

Eudora 6.1 still has attachment spoofing flaws along with a Nested MIME DoS vulnerability.

tags | exploit, denial of service, spoof
SHA-256 | d3024ea6787aa72ecd301f863e452c672b83f691a325455dd8c7f5b291042e9a
Page 1 of 1

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By