what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files Date: 2004-10-16

bmon.sh
Posted Oct 16, 2004
Authored by Idan Nahoum

This is a simple local exploit for FreeBSD/OpenBSD with bmon < 1.2.1_2 installed. It depends on the fact that bmon doesn't use an absolute path to commands that it calls. This particular exploit uses 'netstat'.

tags | exploit, local
systems | freebsd, openbsd
SHA-256 | 9dc0b346d9fd4262adc9c83e19f1ef804883bb558ed5e2ce720089f496d91be6
Fedora Legacy Update Advisory 1237
Posted Oct 16, 2004
Authored by The Fedora Legacy project | Site gaim.sourceforge.net

Fedora Legacy Update Advisory - FLSA:1237. Updated gaim package resolves security issues. Corrects multiple buffer overflows in Gaim 0.75 and earlier, including Yahoo cookie buffer overflows, YMSG protocol overflows, and flaws in URL and proxy handling.

tags | advisory, overflow, protocol
systems | linux, fedora
advisories | CVE-2004-0006, CVE-2004-0007, CVE-2004-0008, CVE-2004-0500, CVE-2004-0754, CVE-2004-0784, CVE-2004-0785
SHA-256 | ca255088e62203b2056c9b6e0c12bf80d6c3d07e7f6a7f94fbf462e401e315de
Fedora Legacy Update Advisory 2072
Posted Oct 16, 2004
Authored by The Fedora Legacy project | Site cups.org

Fedora Legacy Update Advisory - FLSA:2072. Updated CUPS packages fix security vulnerability. Updated cups packages that fix a denial of service vulnerability are now available. In versions of CUPS prior to 1.1.21, an attacker can craft packets to the IPP port which will result in a Denial of Service on the CUPS service.

tags | advisory, denial of service
systems | linux, fedora
advisories | CVE-2004-0558
SHA-256 | 1404d77b7ac79de9e4d35a002670c95dd25db7bbd4aebc48cc40859dedbc6358
proftp-userdisc.c
Posted Oct 16, 2004
Authored by Leon Juranic | Site security.lss.hr

Side-channel username verification against ProFTPd. Sends the USER command, and sees how long the server takes to respond, indicating whether the user exists or not. Obviously, this may produce false positives on slow network connections.

tags | exploit
SHA-256 | 4c187c9a5ac561e7d40e6812cf15bf9b2bcd4aaf7a0db96b65136cfb08a387f5
Debian Linux Security Advisory 568-1
Posted Oct 16, 2004
Authored by Debian | Site debian.org

Debian Security Advisory DSA 568-1 - A vulnerability has been discovered in the Cyrus implementation of the SASL library, the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. The library honors the environment variable SASL_PATH blindly, which allows a local user to link against a malicious library to run arbitrary code with the privileges of a setuid or setgid application.

tags | advisory, arbitrary, local, protocol
systems | linux, debian
advisories | CVE-2004-0884
SHA-256 | 94dfb416a2d838aac6036c6e0afd7a491195e67628c775de9243c1d4b0f6e946
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close