exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files Date: 2004-11-10

Samhain File Integrity Checker
Posted Nov 10, 2004
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Fixes a buffer overflow condition.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | feb230813d221faf79a1196325a4df8f3616d44fb54212a4cd41cbfb1ed57c84
logcheck_1.2.31.tar.gz
Posted Nov 10, 2004
Authored by Todd Troxell | Site logcheck.org

Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.

tags | tool, intrusion detection
systems | unix
SHA-256 | 8c0430d579bab11eaa1f923ffc2abab4bcfb5db6116cf7099435f580ea7267d3
gsasl-0.2.0.tar.gz
Posted Nov 10, 2004
Authored by Simon Josefsson

GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.

Changes: Various bug fixes.
tags | imap, library
SHA-256 | ed85ad660e60b3cffa0341e6201d6ef480069e963296b3370cceda204297362c
chkrootkit-0.44.tar.gz
Posted Nov 10, 2004
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: del counter fixed, better support for Linux threads, Madalin now detected, lots of minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | a6d2f67e1ec0e015cc4054c00654d076ede9156b89ed9bb360dbd47c8dd0d208
758884.html
Posted Nov 10, 2004
Authored by Roy Arends, Jakob Schlyter | Site uniras.gov.uk

NISCC Vulnerability Advisory 758884/NISCC/DNS - Several vulnerabilities have been discovered within the Domain Name System (DNS) protocol by two DNS experts.

tags | advisory, vulnerability, protocol
SHA-256 | f5067cbeef82c7e9ebe4319e90b7534d271c600b27efa839a3fc53279645a68f
57665.html
Posted Nov 10, 2004
Site sunsolve.sun.com

Sun Security Advisory - A security vulnerability in iPlanet Messaging Server/Sun ONE Messaging web-based e-mail may allow a remote unprivileged user the ability to gain unauthorized access to a webmail user's e-mail using a specially crafted e-mail message.

tags | advisory, remote, web
SHA-256 | 9960b64c657d1f090674bbc783b9277a42f87da8827b7db07a02cdf095dd27bc
MS04-039.html
Posted Nov 10, 2004
Authored by Martijn de Vries, Thomas de Klerk | Site microsoft.com

Microsoft Security Advisory MS04-039 - A spoofing vulnerability exists that can enable an attacker to spoof trusted Internet content. Users could believe they are accessing trusted Internet content when in reality they are accessing malicious Internet content, for example a malicious Web site.

tags | advisory, web, spoof
advisories | CVE-2004-0892
SHA-256 | 064efe33186d9c48dd686d2d40f88f2be3bece822a8b4753e81a66b11827539c
Gentoo Linux Security Advisory 200411-17
Posted Nov 10, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-17 - mtink is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the utility.

tags | advisory, arbitrary, local
systems | linux, gentoo
SHA-256 | 0cb52e0b8edaf71f97709c5e924fe329859a89bb0d5dfad80190af0c49686ec8
eEye.kerio.txt
Posted Nov 10, 2004
Authored by Karl Lynn | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a severe denial of service vulnerability in the Kerio Personal Firewall product for Windows. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet. Physical access is required in order to bring an affected system out of this "frozen" state. This specific flaw exists within the component that performs low level processing of TCP, UDP, and ICMP packets. Kerio Personal Firewall 4.1.1 and prior.

tags | advisory, remote, denial of service, udp, tcp
systems | windows
SHA-256 | fc6f56e7525fecf78e38a0422cab20e07b4c2aaa3e3c445f0184c3b32f6f9403
Gentoo Linux Security Advisory 200411-16
Posted Nov 10, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-16 - zip contains a buffer overflow when creating a ZIP archive of files with very long path names. This could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
SHA-256 | 15b7427391c292b38aca553baa876a691747809daa18db5a46144518b0c17eb3
dsa-590.txt
Posted Nov 10, 2004
Site debian.org

Debian Security Advisory 590-1 - Khan Shirani discovered a format string vulnerability in gnats, the GNU problem report management system. This problem may be exploited to execute arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0623
SHA-256 | 003edaa09e05f34991c3b13efb82a96a16b8b67162fd2a345235220b28eb9b6c
Secunia Security Advisory 13135
Posted Nov 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SQLgrey Postfix greylisting service, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 61841bdae0e827e307486597a0d94776db9d3d0d0f0d93f8e93978b9a496419d
Secunia Security Advisory 13137
Posted Nov 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Infuseum ASP Message Board, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection, asp
SHA-256 | 9d564683d836a04b4f7739d2a82591711e258f736c3f0e228ebe3c6ea8d5dd02
Secunia Security Advisory 13130
Posted Nov 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Samhain, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to a boundary error in the database update code. This can be exploited to cause a buffer overflow when a malicious directory is checked with Samhain. The vulnerability has been reported in versions 1.8.9 through 2.0.1.

tags | advisory, overflow, local
SHA-256 | d3cbc48d883a21087ebecd4355fae7ab4303c6a2ad69919784fe94d2334cc6d9
Secunia Security Advisory 13136
Posted Nov 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Nucleus, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 00c5308514f15323bb450a8b79c4fd05accf5b06b3170cb826de444057fe790b
netgearDG384.txt
Posted Nov 10, 2004
Authored by Dr. Insane

Netgear DG834 is susceptible to a denial of service attack and URL filtering bypass vulnerabilities.

tags | advisory, denial of service, vulnerability
SHA-256 | 5a9f33401454c1dd2cd894c887ab4df056a377c097ac5e4c9d56c45c802d51de
Echo Security Advisory 2004.8
Posted Nov 10, 2004
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

JAF CMS is susceptible to path disclosure and directory traversal attacks.

tags | exploit
SHA-256 | 7072af4eb62c08137389015e4f2b4cd7805e59cbb744ba7cd4239a01a4338488
iDEFENSE Security Advisory 2004-11-08.t
Posted Nov 10, 2004
Authored by Karol Wiesek, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 11.08.04 - Remote exploitation of an input validation error in Samba could allow an attacker to consume system resources and potentially cause the target system to crash.

tags | advisory, remote
advisories | CVE-2004-0930
SHA-256 | 131548f64663e091c700d9c86eed756350dffa82c05ce5da3dfe0dec012e41a5
trusteXSS.txt
Posted Nov 10, 2004
Authored by Andrew Smith

truste.org is susceptible to cross site scripting flaws.

tags | advisory, xss
SHA-256 | 76d0098145229faa2de84016e96ea7c0a415314736ee1baafb2ca0847c857008
Secunia Security Advisory 13104
Posted Nov 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in JAF CMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 52eca8656b068c07e67ee83aebf6a55f4be17338eb0917b94569a2a8d4c2cd8b
Secunia Security Advisory 13111
Posted Nov 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Mantis, which can be exploited by malicious users to gain knowledge of potentially sensitive information.

tags | advisory, vulnerability
SHA-256 | c26acae6d4f5d4a2bb53bac2c9834814ab643d5c3f00629c9c6d87bf15808248
jreDoS.txt
Posted Nov 10, 2004
Authored by Kurt Huwig

Java Runtime Environment versions 1.4.2, 1.5.0, and possible others are susceptible to a remote denial of service attack.

tags | advisory, java, remote, denial of service
SHA-256 | 0834f0d8c97e493e37382431176c3e2b024f4b9c11cb1d4bb30104ea6d9bcaef
Gentoo Linux Security Advisory 200411-15
Posted Nov 10, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-15 - groffer, included in the Groff package, and the der_chop script, included in the OpenSSL package, are both vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the utility.

tags | advisory, arbitrary, local
systems | linux, gentoo
SHA-256 | 5025e3a05de356f4a2bd6b79e20a9aeefb98a062e3e5bdcaac7dab2552bedf0f
dsa-586.txt
Posted Nov 10, 2004
Site debian.org

Debian Security Advisory 586-1 - The upstream developers of Ruby have corrected a problem in the CGI module for this language. Specially crafted requests could cause an infinite loop and thus cause the program to eat up cpu cycles.

tags | advisory, cgi, ruby
systems | linux, debian
advisories | CVE-2004-0983
SHA-256 | 2806acec54a192be97e35fa9729590802c0f92926e29bd6b5388f7a2a57ba55b
votehack.txt
Posted Nov 10, 2004
Authored by Thom Hartmann | Site CommonDreams.org

Article about evidence mounting that the vote was hacked. The FBI has been called in to Florida.

tags | paper
SHA-256 | 4e6b3faab1f4246e83aeaa66d635bec477d9bbbb64ccb1f0d68befd79bd414fd
Page 1 of 2
Back12Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close