exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2005-01-22

ethereal-0.10.9.tar.gz
Posted Jan 22, 2005
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Various security related fixes - the COPS dissector could go into an infinite loop, the DLSw dissector could cause an assertion, making Ethereal exit prematurely, the DNP dissector could cause memory corruption, the Gnutella dissector could cause an assertion, making Ethereal exit prematurely, the MMSE dissector could free static memory, and the X11 protocol dissector was vulnerable to a string buffer overflow.
tags | tool, sniffer, protocol
systems | unix
advisories | CVE-2005-0006, CVE-2005-0007, CVE-2005-0008, CVE-2005-0009, CVE-2005-0010, CVE-2005-0084
SHA-256 | 83c87460ca5eb3cd23a880fc3f209dcfa3e7ef5837b70827f5f445ec873dc631
zm-1.20.0.tar.gz
Posted Jan 22, 2005
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Improved and added features, several minor bugfixes.
tags | web
systems | linux
SHA-256 | a4d9001e862b3a39e26a163c96b940d54c4b690e2e2a34834dc8af243ddbc60c
p3scan-2.0.tar.gz
Posted Jan 22, 2005
Authored by laitcg | Site p3scan.sourceforge.net

Pop 3 scan is a full transparent proxy server for POP3 clients. It runs on a Linux box with iptables (for port redirection). It can be used to provide POP3 email scanning from the Internet to any internal network, and is ideal for helping to protect your Other OS LAN from harm, especially when used in conjunction with a firewall and other Internet proxy servers. It is designed to enable scanning of incoming email messages for viruses, worms, trojans, spam, and harmful attachments. Because viewing HTML email can enable a spammer to validate an email address (via Web bugs), it can also provide HTML stripping.

tags | worm, web, trojan
systems | linux, unix
SHA-256 | 0a56b7a930ae363d78d47f70b15740255348708cec1693277c1456897490b0be
Openwall Linux Kernel Patch
Posted Jan 22, 2005
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Adds a number of security fixes, including to the x86/SMP page fault handler and the uselib(2) race conditions, both discovered by Paul Starzetz.
tags | overflow, kernel
systems | linux
advisories | CVE-2004-1235, CVE-2005-0001
SHA-256 | 517d8c63c913c0a9a9f1b1544de6318bdd18841356e2f3754beb64d4647dcc3c
pyflag_0.74.tar.bz2
Posted Jan 22, 2005
Authored by scudette | Site pyflag.sourceforge.net

FLAG, or Forensic and Log Analysis GUI, is an application designed to assist IT security professionals with analyzing log files, tcpdump files and hard disk images for forensic evidence. It utilizes Ethereal and Sleuthkit.

Changes: This release features much more powerful and mature scanner architecture. Revamped documentation on the web site. More robust plugin architecture. See the changelog for more.
tags | tool, forensics
SHA-256 | 8a99e0ec9b3438b56aa3cbce3c4d33deaffa4ad6fabecdf506e2de008ab92730
base-1.0.1.tar.gz
Posted Jan 22, 2005
Authored by Kevin Johnson | Site sourceforge.net

BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.

Changes: Various bug fixes and language additions.
tags | tool, web, sniffer
SHA-256 | 1e57c153c45c04efda93669e385d5e0724a63e6a2828c14b4dc49f6468da06b0
mod_dosevasive_1.10.tar.gz
Posted Jan 22, 2005
Authored by Jonathan Zdziarski | Site nuclearelephant.com

The Apache DoS Evasive Maneuvers Module is a module for both Apache 1.3 and 2.0 that provides functionality for detecting and fighting off DoS attacks and brute force attacks. It does this by adding addresses to a 10-second '403 List' and rejecting rapidly repeated requests for the same URL from the same addresses, using an internal hash table, on a per-child basis. This module can be configured to talk to ipchains, ipfilter, or any other tool designed to push the attack out to the network layer, and provides email notification in the event of an attack.

tags | web
SHA-256 | 8706ff58be35378fce2b7a916cc2bce6249a00c79eaa09e3ebbdb163d4e87bb9
oracle23.txt
Posted Jan 22, 2005
Authored by Stephen Kost | Site integrigy.com

Integrigy Security Advisory - Oracle has released the its first Critical Patch Update (January 2005) and fixes 23 vulnerabilities in the Oracle Database, Oracle Application Server, and Oracle E-Business Suite - Integrigy discovered 5 of these vulnerabilities. The vulnerabilities in the Oracle Database and Oracle E-Business Suite should be considered high risk and organizations should work to apply the necessary patches at the earliest possible opportunity.

tags | advisory, vulnerability
SHA-256 | 2d1a3adf02a15d6881976646e7fb047d6f0e021ee82168b3c88b84ea0793d9ac
Secunia Security Advisory 13843
Posted Jan 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Squid 2.x, which can be exploited by malicious users to bypass certain security restrictions. The issue is caused due to some LDAP implementations ignoring leading/trailing whitespaces in usernames. This can be exploited to bypass certain ACLs based on usernames or trick some log analysis by supplying a username with a whitespace in the beginning or end during the authentication process.

tags | advisory
SHA-256 | c0421bab66434fc8af2056b83c40c2ac1991466832dae520213f099b4877fe65
iDEFENSE Security Advisory 2005-01-19.t
Posted Jan 22, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.19.05 - Two remotely exploitable denial of service conditions have been found to exist in MySQL MaxDB and SAP DB Web Agent products. MaxDB 7.5.00.21 fixes these issues.

tags | advisory, web, denial of service
advisories | CVE-2005-0081, CVE-2005-0082
SHA-256 | 41d6628bc065fa8e77e30ed2f6500b691ce1330b4cd9302a821d8f957a190e6e
fm-nacho.c
Posted Jan 22, 2005
Authored by nemo

Mac OSX versions 10.3.x with a Darwin Kernel equal to or below 7.7.0 are susceptible to a denial of service flaw that may allow for possible privilege escalation.

tags | exploit, denial of service, kernel
systems | apple
SHA-256 | 237a3224700bab126e3d93c2630bea4ae47220dea9a8923e14614ec3c58c12e9
real-03full.txt
Posted Jan 22, 2005
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - Two vulnerabilities have been discovered in RealPlayer which may potentially be leveraged to allow remote code execution, or may used in combination with the Real Metadata Package File Deletion vulnerability to reliably delete files from a users system. RealPlayer 10.5 (6.0.12.1040) and older versions are affected.

tags | advisory, remote, vulnerability, code execution
SHA-256 | 5c0369393320c3bc4942c495e3418f09710027a42e9c22a5dd5a498b9a15bf83
real-02full.txt
Posted Jan 22, 2005
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - A vulnerability has been discovered in RealPlayer which can allow an attacker to delete arbitrary files from a users system through a specially crafted webpage with little user interaction. RealPlayer 10.5 (6.0.12.1040) and older versions are affected.

tags | advisory, arbitrary
SHA-256 | b462f3260253fe793321c8e2dfeaaaa00172ff31bc7e9284b32f1a9c98fb0224
real-01full.txt
Posted Jan 22, 2005
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - A vulnerability has been discovered in the RealPlayer ActiveX component which can allow remote code execution when visiting a specially crafted webpage or when opening a specially crafted skin file. RealPlayer 10.5 (6.0.12.1040) and older versions are affected.

tags | advisory, remote, code execution, activex
SHA-256 | d332699dfef5d8bd70ed59b5f1cffff864fb02bf8b2f613b89ac2599be623d18
msinsengfull.txt
Posted Jan 22, 2005
Authored by Peter Winter-Smith | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - All versions of Microsoft Windows, with Microsoft Internet Explorer, come packaged with the Microsoft Active Setup/Install Engine components. These components are marked as safe for scripting and can be invoked by default from any basic web-page. The Install Engine control has been found to be vulnerable to an integer overflow, leading to a heap based buffer overflow which could allow an attacker to run arbitrary code on a vulnerable system through a specially crafted web-page or through a specially crafted HTML email if scripting is enabled.

tags | advisory, web, overflow, arbitrary
systems | windows
SHA-256 | d9a90dc6d979b15bba061d46b49298b04958b6f90ae6a35aadb861dcce281d1e
heartbeatfull.txt
Posted Jan 22, 2005
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - A vulnerability has been discovered in the MSN Heartbeat ActiveX component which can allow remote code execution through Internet Explorer. This component is installed by some MSN gaming sites and is marked safe for scripting by default.

tags | advisory, remote, code execution, activex
SHA-256 | 437cb0444e747bd19c3d33d21dc1c6e7f5bed0c0cc0ce510e105d1b9021bdcd7
athoc-01full.txt
Posted Jan 22, 2005
Authored by Mark Litchfield, John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - Multiple vulnerabilities have been discovered in the AtHoc toolbar which can allow remote code execution through Internet Explorer when browsing to a specially crafted webpage.

tags | advisory, remote, vulnerability, code execution
SHA-256 | 47bfb3702c540e74e290ac45de0ac6236c9dac1d8ea51d84b10c5a95b4edf519
Secunia Security Advisory 13877
Posted Jan 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Algol has reported a vulnerability in ExBB, which potentially can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 5cd5c175262f03c766ea250a7993e44045f69eca10098b81a1ec6bb938084392
Cisco Security Advisory 20050119-itscme
Posted Jan 22, 2005
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Internetwork Operating System (IOS) Software release trains 12.1YD, 12.2T, 12.3 and 12.3T, when configured for the Cisco IOS Telephony Service (ITS), Cisco CallManager Express (CME) or Survivable Remote Site Telephony (SRST) may contain a vulnerability in processing certain malformed control protocol messages. A successful exploitation of this vulnerability may cause a reload of the device and could be exploited repeatedly to produce a Denial of Service (DoS).

tags | advisory, remote, denial of service, protocol
systems | cisco
SHA-256 | 5bea86fd0a9be77566af5aa1ae885dbd6484b3f734c0143947c827f9bdd05e2e
Secunia Security Advisory 13862
Posted Jan 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 23 vulnerabilities have been reported in various Oracle products. Some have an unknown impact and others can be exploited to disclose sensitive information, gain escalated privileges, conduct PL/SQL injection attacks, manipulate information, or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, sql injection
SHA-256 | 668ec5286dd5e1e306f99888b2f7f1c893748d03d44489fa9a973377dc222737
dsa-647.txt
Posted Jan 22, 2005
Site debian.org

Debian Security Advisory 647-1 - Javier Fernandez-Sanguino Pena from the Debian Security Audit Project discoverd a temporary file vulnerability in the mysqlaccess script of MySQL that could allow an unprivileged user to let root overwrite arbitrary files via a symlink attack and could also could unveil the contents of a temporary file which might contain sensitive information.

tags | advisory, arbitrary, root
systems | linux, debian
advisories | CVE-2005-0004
SHA-256 | 3f234ded7db9c9584336ad353fa9dd37bbf4d1c0ed7f7be3046a316ce671ec03
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close