what you don't know can hurt you
Showing 1 - 25 of 26 RSS Feed

Files Date: 2005-01-27

Clam AntiVirus Toolkit 0.81
Posted Jan 27, 2005
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
MD5 | 60081ddd9f29cbb8f0a2fe575e5a8afa
FLoP-1.4.1.tar.gz
Posted Jan 27, 2005
Authored by DG | Site geschke-online.de

FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.

Changes: Feature enhancements and bug fixes.
tags | tool, sniffer
MD5 | 2e33c55685182751c21622e91320b506
ciphire-mail-0.10.51-osx-ppc.zip
Posted Jan 27, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Mac version.

Changes: 4x speedup for IMAP folder operations, fixed another Yahoo SMTP related problem, SSL .mac and Exchange issue fixed, improved integration with other applications. Reduced CPU usage dramatically, also no spikes in CPU usage anymore unless you are using Norton applications.
tags | encryption
MD5 | 18d549298a0c0e00cb2a7bcadf060ebd
ciphire-mail-0.10.51-linux-i686.tar.gz
Posted Jan 27, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Linux version.

Changes: 4x speedup for IMAP folder operations, fixed another Yahoo SMTP related problem, SSL .mac and Exchange issue fixed, improved integration with other applications
tags | encryption
systems | linux
MD5 | 81fa262d94eba608898c749e3e1f3f88
netspoc-2.3.tar.gz
Posted Jan 27, 2005
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: Fixed a bug in internal handling of NAT. This could lead to missing optimization of subnets and possibly to wrong code.
systems | unix
MD5 | 57faf0992d66eef46a078e4985c0eb87
ie_attack.htm
Posted Jan 27, 2005
Authored by Seth Fogie | Site airscanner.com

Pocket IE on a Windows Mobile Pocket PC suffers from Unicode URL obfuscation, local file access, and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss
systems | windows
MD5 | 4a7aa53d0c4f547a8a6702e988be69d5
uselib24.c
Posted Jan 27, 2005
Authored by timhsu | Site chroot.org

Modified uselib() local exploit for the Linux kernel series. This version has been modified to also work on SMP kernels. Linux kernel versions 2.4 up to and including 2.4.29-pre3, 2.6 up to and including 2.6.10 are affected.

tags | exploit, kernel, local
systems | linux
advisories | CVE-2004-1235
MD5 | 7d1888194c26d9c12a40a81c1aa3e184
Technical Cyber Security Alert 2005-26A
Posted Jan 27, 2005
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA05-026A - Several denial-of-service vulnerabilities have been discovered in Cisco's Internet Operating System (IOS). A remote attacker may be able to cause an affected device to reload the operating system.

tags | advisory, remote, vulnerability
systems | cisco
MD5 | 39577d25159ef7f0cf72da9c95028697
cisco-torch.tar.bz2
Posted Jan 27, 2005
Authored by Arhont Team | Site arhont.com

Cisco Torch mass scanning, fingerprinting, and exploitation tool. First alpha release.

systems | cisco
MD5 | 10de93d7f6267f3ae9fc39a9a5f28ebc
iDEFENSE Security Advisory 2005-01-26.t
Posted Jan 27, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.26.05 - Remote exploitation of a stack based buffer overflow vulnerability in Xelerance Corp.'s Openswan version 2.2.0 could allow attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
MD5 | 4f0ca1f17e6b69b3c25b1838015ce4d6
dsa-660.txt
Posted Jan 27, 2005
Site debian.org

Debian Security Advisory 660-1 - The KDE screensaver can crash under certain local circumstances and can be exploited by an attacker with physical access to the workstation to take over the desktop session.

tags | advisory, local
systems | linux, debian
advisories | CVE-2005-0078
MD5 | 9852f0f73523d677542d7234caeba4e5
Cisco Security Advisory 20050126-les
Posted Jan 27, 2005
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Routers running Internetwork Operating System (IOS) that supports Multi Protocol Label Switching (MPLS) are vulnerable to a Denial of Service (DoS) attack on MPLS disabled interfaces. A system that supports MPLS is vulnerable even if that system is not configured for MPLS. The vulnerability is only present in Cisco IOS release trains based on 12.1T, 12.2, 12.2T, 12.3 and 12.3T. Releases based on 12.1 mainline, 12.1E and all releases prior to 12.1 are not vulnerable.

tags | advisory, denial of service, protocol
systems | cisco
MD5 | ed8114ea56e323b18d2ad09f4fd17a1f
Cisco Security Advisory 20050126-bgp
Posted Jan 27, 2005
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a Denial of Service (DoS) attack from a malformed BGP packet. Only devices with the command bgp log-neighbor-changes configured are vulnerable. The BGP protocol is not enabled by default, and must be configured in order to accept traffic from an explicitly defined peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be difficult to inject a malformed packet.

tags | advisory, denial of service, protocol
systems | cisco
MD5 | 487fb4a386d799e9ed1403658d4a00a8
Cisco Security Advisory 20050126-ipv6
Posted Jan 27, 2005
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Internetwork Operating System (IOS) Software is vulnerable to a Denial of Service (DoS) attack from crafted IPv6 packets when the device has been configured to process IPv6 traffic. This vulnerability requires multiple crafted packets to be sent to the device which may result in a reload upon successful exploitation.

tags | advisory, denial of service
systems | cisco
MD5 | fde29d18474f5fef5d4a642195419ec1
WIPv011.tgz
Posted Jan 27, 2005
Authored by Adrian Pastor aka pagvac

Whitepaper giving an overview of a security assessment against Windows NT machines when penetration testing. Provides insight from both attacker and administrative perspectives.

tags | paper
systems | windows, nt
MD5 | 6c638d17610ae47a614b8c4765cfc7b1
Secunia Security Advisory 14001
Posted Jan 27, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MoinMoin, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 52dd875be3b723067aacffb5681d0c23
bindFlaws.txt
Posted Jan 27, 2005
Site isc.org

Two news flaws have been discovered in BIND. BIND 9.3.0 suffers from a denial of service flaw in its validator. BIND 8.4.4 and 8.4.5 suffer from a denial of service flaw due to an overrun exploitable in the q_usedns array which is used to track queries.

tags | advisory, denial of service, overflow
MD5 | 15759459f558edbe468b6816585ada6a
dsa-659.txt
Posted Jan 27, 2005
Site debian.org

Debian Security Advisory 659-1 - Two problems have been discovered in the libpam-radius-auth package, the PAM RADIUS authentication module. The configuration file gets installed world-readable and the same flaw that exists in mod_auth_radius for Apache is inherent in libpam-radius-auth as well.

tags | advisory
systems | linux, debian
advisories | CVE-2004-1340, CVE-2005-0108
MD5 | dd53da48be0a1099fa16534b2509ed96
siteman.noam.txt
Posted Jan 27, 2005
Authored by Noam Rathaus

Siteman versions 1.1.10 and below remote administrative account addition exploit.

tags | exploit, remote
MD5 | 23d964d6078eb95f5bdac2764881067c
trn-test.txt
Posted Jan 27, 2005
Authored by ZzagorR | Site rootbinbash.com

Local root exploit for /usr/bin/trn. Tested on Mandrake 9.2, Slackware 9.1.0/10.0.0.

tags | exploit, local, root
systems | linux, slackware, mandrake
MD5 | eccb9e46d859b8d7283889195634aa02
ex_gpsd.c
Posted Jan 27, 2005
Authored by Kevin Finisterre, John H. | Site digitalmunition.com

Remote format string exploit for Berlios gpsd, a remake of pygps. On Debian, it achieves uid of gpsd. On Redhat, it achieves root.

tags | exploit, remote, root
systems | linux, redhat, debian
MD5 | 827e4de2273f8b6087f440740e1ddaaf
DMA-2005-0125a.txt
Posted Jan 27, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Berlios gpsd, a remake of pygps, suffers from a format string vulnerability that is remotely exploitable.

tags | advisory
MD5 | 013ee261434ba2fcf05562b5f4b8775c
WebServices_Info_Gathering.pdf
Posted Jan 27, 2005
Authored by Shreeraj Shah | Site net-square.com

Whitepaper discussing the scope of information gathering used against web services. First in a series of papers defining attack and defense methodologies with web services.

tags | paper, web
MD5 | 7bdb1666a45f06233041cbd945e17abf
snort-2.3.0.tar.gz
Posted Jan 27, 2005
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Many bug fixes.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
MD5 | 89cdc22af9516cbafc359b452819947e
kbof_payload.txt
Posted Jan 27, 2005
Authored by qobaiashi

White paper discussing the smashing of the Linux kernel stack.

tags | paper, kernel
systems | linux
MD5 | 9ff825302310cf4ec9d633cbe10b8c33
Page 1 of 2
Back12Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    14 Files
  • 20
    Sep 20th
    20 Files
  • 21
    Sep 21st
    3 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close