Exploit the possiblities
Showing 1 - 25 of 36 RSS Feed

Files Date: 2005-08-26

fileutils-4.1.txt
Posted Aug 26, 2005
Authored by Carlos Carvalho | Site nutshell.gotfault.net

Fileutils 4.1 programs crash when working with huge directory trees. Proof of concept included.

tags | advisory, proof of concept
MD5 | 8d11ce8e13758daa563d592ec2422e80
PSA-05-014.txt
Posted Aug 26, 2005
Authored by Paul J Docherty | Site portcullis-security.com

HP OpenView Network Node Manager 6.41 and 7.5 running on Solaris 8 and possibly other versions suffer from an input sanitization vulnerability leading to command execution.

tags | advisory
systems | solaris
MD5 | 20b75a814ea5bf71160fd0add41195cc
rt-sa-2005-014.txt
Posted Aug 26, 2005
Authored by RedTeam Pentesting | Site redteam-pentesting.de

The new iTAN security feature for online banking promoted by german banks does not protect against phishing attacks and trojans as claimed.

tags | advisory, trojan
MD5 | 5682bd253e59cf397473750eb8b43d52
notSPIKEfile.tgz
Posted Aug 26, 2005
Authored by Adam Greene | Site labs.idefense.com

notSPIKEfile is a Linux based file format fuzzing tool. It was designed to automate the launching of applications and detection of exceptions caused by fuzzed files. It operates on an existing valid file and creates fuzzed files. It utilizes ptrace to pick up interesting signals and dump register state.

tags | fuzzer
systems | linux
MD5 | 8198bd8a3d5b18b5aa36335ab8cd3ec2
FileFuzz.zip
Posted Aug 26, 2005
Authored by Michael Sutton | Site labs.idefense.com

FileFuzz is a graphical, Windows based file format fuzzing tool. FileFuzz was designed to automate the creation of abnormal file formats and the execution of applications handling these files. FileFuzz also has built in debugging capabilities to detect exceptions resulting from the fuzzed file formats.

tags | fuzzer
systems | windows
MD5 | f424d673b608d1a5fbf00594c5b553f1
SPIKEfile.tgz
Posted Aug 26, 2005
Authored by Adam Greene | Site labs.idefense.com

SPIKEfile is a Linux based file format fuzzing tool, based on SPIKE 2.9. It was designed to automate the launching of applications and detection of exceptions caused by fuzzed files. It uses standard SPIKE scripts to generate files and utilizes ptrace to pick up interesting signals and dump register state.

tags | fuzzer
systems | linux
MD5 | c57a794dbfb7c950abb0047b13bb8b5e
airt-0.4.2.tar.bz2
Posted Aug 26, 2005
Authored by madsys | Site sourceforge.net

AIRT (Advanced incident response tool) is a set of incident response assistance tools for Linux. Tools allow you to look for hidden modules, processes, and ports. Additionally, two tools will dump and analyze hidden modules.

Changes: Bugfix release
tags | tool, forensics
systems | linux
MD5 | 3eef5fb824a4cee1d01ca01f38e99c8b
gsasl-0.2.7.tar.gz
Posted Aug 26, 2005
Authored by Simon Josefsson

GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.

Changes: Various minor fixes and additions.
tags | imap, library
MD5 | ed52f2e5ac997503d0953be978e7a2f1
sysmask-1.04.tgz
Posted Aug 26, 2005
Authored by XIAO Gang | Site wims.unice.fr

Sysmask is a security package for Linux systems that can prevent arbitrary malicious codes from causing permanent damage. It protects the system against daemon exploits and user accounts against viruses and worms, whether known or unknown, without requiring the recompilation of existing software.

Changes: Some minor fixes and improvements.
tags | worm, arbitrary
systems | linux
MD5 | 180cca0394264f471ca36e24b8e5197b
Evil.Shell.Backdoor_1.0.5.c
Posted Aug 26, 2005
Authored by Lympex | Site l-bytes.tk

Password protected windows bind/reverse shell backdoor written in Visual C++ Archive password is set to p4ssw0rd. Use at your own risk.

tags | shell, trojan
systems | windows
MD5 | 0475009407cb1326228f33e0edd9b896
astaro-6.0.txt
Posted Aug 26, 2005
Authored by Oliver Karow | Site oliverkarow.de

Astaro Security Linux 6.0.0.1 suffers from several vulnerabilities.

tags | advisory, vulnerability
systems | linux
MD5 | f05bd41d27cc4b9d1532d4f4bc61396e
Mandriva Linux Security Advisory 2005.152
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

tags | advisory, overflow, arbitrary, perl
MD5 | a28d486cb28637f3ef32ae7694f5b116
Mandriva Linux Security Advisory 2005.151
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

tags | advisory, overflow, arbitrary, perl
MD5 | e42d382fef18abee62cecfce6cd4e17b
Mandriva Linux Security Advisory 2005.150
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

A vulnerability in bluez-utils was discovered by Henryk Plotz. Due to missing input sanitizing, it was possible for an attacker to execute arbitrary commands supplied as a device name from the remote bluetooth device.

tags | advisory, remote, arbitrary
MD5 | fe2caebfe7d7ed0677fe18f00741634b
Mandriva Linux Security Advisory 2005.149
Posted Aug 26, 2005
Authored by Mandriva | Site mandriva.com

Javier Fernandez-Sanguino Pena discovered that the pwmconfig script in the lm_sensors package created temporary files in an insecure manner. This could allow a symlink attack to create or overwrite arbitrary files with full root privileges because pwmconfig is typically executed by root.

tags | advisory, arbitrary, root
MD5 | fac33b1afec2e19fbf901f619ae825ab
Debian Linux Security Advisory 785-1
Posted Aug 26, 2005
Authored by Debian | Site debian.org

It has been discovered that libpam-ldap, the Pluggable Authentication Module allowing LDAP interfaces, ignores the result of an attempt to authenticate against an LDAP server that does not set an optional data field.

tags | advisory
MD5 | 24d9f63b118ba99b9f5663dd095700d8
Debian Linux Security Advisory 784-1
Posted Aug 26, 2005
Authored by Debian | Site debian.org

A problem has been discovered in the Courier Mail Server. DNS failures were not handled properly when looking up Sender Policy Framework (SPF) records, which could allow attackers to cause memory corruption. The default configuration on Debian has SPF checking disabled, so most machines are not vulnerable. This is explained in the "courier" manpage, section SENDER POLICY FRAMEWORK KEYWORDS.

tags | advisory
systems | linux, debian
MD5 | 39464c5bd43f4511dcb26dc8a99e96dd
Gentoo Linux Security Advisory 200508-17
Posted Aug 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-17 - libpcre fails to check certain quantifier values in regular expressions for sane values. Versions less than 6.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-2491
MD5 | a70445ef46a03147538306ef75d5afdc
050819-securing-mac-os-x-tiger.pdf
Posted Aug 26, 2005
Authored by Stephen de Vries | Site corsaire.com

Corsaire (www.corsaire.com/white-papers/) has released a fully updated version of their guide to securing Mac OS X to cover the new security features offered by Mac OS X 10.4 Tiger (such as ACLs) as well as incorporating additional security guidelines that were omitted in the original (10.3) guide.

systems | apple, osx
MD5 | 021cca9d23a8be3656a5f08e6bc300ec
Secunia Security Advisory 16494
Posted Aug 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or bypass certain security restrictions.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
MD5 | 154251b5f484b961d8631a7b58bc5432
Secunia Security Advisory 16534
Posted Aug 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maksymilian Arciemowicz has discovered a vulnerability in PostNuke, which can be exploited by malicious administrative users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | a10144f2c05c50faf99366b493147f9c
Secunia Security Advisory 16540
Posted Aug 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for tor. This fixes a vulnerability, which potentially can be exploited by malicious people to disclose or modify certain sensitive information.

tags | advisory
systems | linux, gentoo
MD5 | e1fe885e4bc1dce0465b9858819084af
Secunia Security Advisory 16556
Posted Aug 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Donato Ferrante has discovered a vulnerability in Home FTP Server, which can be exploited by malicious users to access arbitrary files on a vulnerable system.

tags | advisory, arbitrary
MD5 | 25f07814960e3381ac1b6565b0ca6240
Secunia Security Advisory 16558
Posted Aug 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in phpGroupWare, which can be exploited by malicious administrative users to conduct script insertion attacks, or by malicious people to bypass certain security restrictions or compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 15be81e92f14a91fc761cee42a9c44b2
Secunia Security Advisory 16559
Posted Aug 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Filip Sneppe has reported a vulnerability in Apache, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 21b7499b9644f6be713f23102f6e6ca5
Page 1 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close