what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 322 RSS Feed

Files Date: 2000-04-01 to 2000-04-30

Nmap Scanning Utility 2.30 BETA 21
Posted Apr 24, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Added a bunch of new OS fingerprints, fixed a bug that completely broke RPC scanning in BETA19, listed the port ranges scanned at the top of the machine log, fixed important target IP range parsing bug, nmapfe fixes, fixed a bug which could cause Nmap to mark a port filtered based on ICMP dest. unreachable packets relating to a different host than the one being scanned, fixed output problem relating to ident scan, better netbsd compatibility, and misc bug fixes.
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | 4c9cb2a6a8c1bf58251b9e7976b690741e13813f3a85b79b11751d4a272dd128
ISS Security Advisory April 24, 2000
Posted Apr 24, 2000

Internet Security Systems (ISS) X-Force has identified a backdoor password in the Red Hat Linux Piranha product. Piranha is a package distributed by Red Hat, Inc. that contains the Linux Virtual Server (LVS) software, a web-based GUI, and monitoring and fail-over components. A backdoor password exists in the GUI portion of Piranha that may allow remote attackers to execute commands on the server. If an affected version of Piranha is installed and the default backdoor password remains unchanged, any remote as well as local user may login to the LVS web interface. From here LVS parameters can be changed and arbitrary commands can be executed with the same privilege as that of the web server.

tags | remote, web, arbitrary, local
systems | linux, redhat
SHA-256 | 61d620c67900aae2e66e83528048b341915c2605077b43b58e0a2baedc393854
incognitomail2.c
Posted Apr 24, 2000
Authored by Chandler

incognitomail2.c sends fake mail using a wingate proxy to obscure the true origin of the message.

SHA-256 | 2db83f0aa98b6e3f8d8a8da4354b8fb4d3e12832b720864635806f9cb449ef61
lcdproc-exploit.c
Posted Apr 24, 2000
Authored by Andrew Hobgood

LCDproc is a system to display system information and other data on an LCD display which uses client / server communication. The server is vulnerable to remote buffer overflow allowing an attacker to remotely execute arbitrary code or cause the LCDproc server to crash. Patch available here.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 14eb38e3f0574a9702bdc7ae0cfe610a25f981b43a50cbfb49142d570cf2b5a2
CISADV000420.txt
Posted Apr 24, 2000
Authored by David Litchfield

Cerberus Information Security Advisory CISADV000420 - Windows NT/2000 cmd.exe overflow. Web servers that will execute batch files as CGI scripts on behalf of a client are therefore opened up to a Denial of Service attack. By providing an overly long string as an argument to a CGI based batch file it is possible to crash the command interpreter in the "clean up" stages.

tags | web, denial of service, overflow, cgi
systems | windows
SHA-256 | 0dcbdc1ab5da7d7148582f2f06ad1011474b95363fe58c05094dfee1821bee25
wmaker.c
Posted Apr 24, 2000
Authored by Sectorx | Site xorteam.cjb.net

Windowmaker 0.62.0 buffer overflow exploit - Although wmaker is not suid by default, this code will overflow the $DISPLAY environment variable.

tags | exploit, overflow
SHA-256 | b98763e09a49cfb34054e919d503acf4584f861224878015ea7919bd5bb66904
porkbind-0.99b.tar.gz
Posted Apr 23, 2000
Authored by S

Porkbind retrieves version information for the nameservers of a domain and produces a report that describes possible vulnerabilities of each.

tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 01a44bdfaa6dfb80b04ef2c830604c4afaa45a6a9b4cae13d918a5c240ce64ee
BufOverA.tar.gz
Posted Apr 23, 2000
Authored by Massimo Bernaschi | Site iac.rm.cnr.it

BufOverA is a set of small Linux kernel patches which detect and block buffer overflows. The archive includes a whitepaper.

tags | overflow, kernel
systems | linux
SHA-256 | 6873b3b05bf24f3ad3363c6fe3363bb5cd9821c8371ec918495eede637eb5e40
cisco.00-04-20.telnet
Posted Apr 23, 2000

Cisco Security Advisory: Cisco IOS Software TELNET Option Handling Vulnerability. A defect in multiple Cisco IOS software versions will cause a Cisco router to reload unexpectedly when the router is tested for security vulnerabilities by security scanning software programs. The defect can be exploited repeatedly to produce a consistent denial of service (DoS) attack. Vulnerable releases include 11.3AA, 12.0(2) up to and including 12.0(6), and 12.0(7).

tags | denial of service, vulnerability
systems | cisco
SHA-256 | c2a046bca26844dbd75fc3680a4d278a190f831a1a15035f2023514a4fc60462
cisco.00-04-19.enable
Posted Apr 23, 2000

Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability. Cisco Catalyst software permits unauthorized access to the enable mode in the 5.4(1) release. Once initial access is granted, access can be obtained for the higher level "enable" mode without a password.

tags | bypass
systems | cisco
SHA-256 | 2d3c392effc4cfb5fa8f42000720057f1235a6fe463f1b5a07f2fc28ba873093
ADV-150400.txt
Posted Apr 23, 2000
Authored by Narrow | Site legion2000.cc

Microsoft Frontpage CERN Image Map Dispatcher (/cgi-bin/htimage.exe) comes by default and has three vulnerabilities. The full path to the root directory is revealed, a buffer overflow was found - remote code execution may be possable, and files on the server may be accessed.

tags | exploit, remote, overflow, cgi, root, vulnerability, code execution
SHA-256 | b0db99f7c34bff25675016b7d686dc44f9d1f5c8eb5ad9df8136433793fbd28a
wpc-0_2.tar.gz
Posted Apr 23, 2000

No information is available for this file.

tags | web
SHA-256 | 3908fa0feb2cffe5b002a944b067e1833c7d826002be6ef1240ffec9a4908f80
seawall-2.7.tar.gz
Posted Apr 23, 2000
Authored by Tom Eastep | Site seawall.sourceforge.net

Seawall is an ipchains firewall that supports IP masquerading and can be used on a standalone system, on a dedicated firewall system or on a multi-use gateway/server. It supports VPN via IPIP tunnels and PPTP, has an easy to edit configuration file, and can be extended without modifying the base product. It also includes realtime monitoring with an audible alarm that sounds when suspect packets are detected.

Changes: ICQ clients may run on standalone systems, a reduced number of rules where both PPTP clients and a server are masqueraded, and standard accept rule may be overridden.
tags | tool, firewall
systems | linux
SHA-256 | c6b7ecad2f952ce2c74e786d6f6d7be95a099120087e94f981c5f8b643938bc3
kill_nwtcp.c
Posted Apr 23, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Novell Netware 5.1 Remote Administration Service contains a buffer overflow that could allow an attacker to launch a denial of service attack against the system, or possibly inject code into the operating system for execution. DoS exploit included.

tags | exploit, remote, denial of service, overflow
SHA-256 | daeeaaf07bbd7be2d103ab1cd49ffde2eb56484860d53f34ddeeccce4add2867
RUS-CERT.200004-01.txt
Posted Apr 23, 2000

RUS-CERT Advisory 200004-01: GNU Emacs 20 - Several vulnerabilities were discovered in all Emacs versions up to 20.6, including allowing unprivileged local users to eavesdrop the communication between Emacs and its subprocesses, Emacs Lisp tempfile problems, and the history of recently typed keys may expose passwords. The following systems were tested vulnerable: Linux, FreeBSD (and probably other *BSD variants), HP-UX 10.x, 11.00, and AIX 4. Solaris and DG/UX are unaffected.

tags | exploit, local, vulnerability
systems | linux, solaris, freebsd, bsd, aix, hpux
SHA-256 | fe08f79241b1678c1e36b5f1440264f0c9a684e418e8196b305527daa89884be
razor.dvwssr.txt
Posted Apr 23, 2000
Authored by Simple Nomad | Site razor.bindview.com

BindView RAZOR Team Analysis of DVWSSR.DLL - The risks of having dvwssr.dll are not as severe as originally reported in media outlets Friday morning, but still severe enough that system administrators responsible for NT systems to investigate. The risks involve whether or not a certain DLL is loaded, how rights are set, and potentially how Front Page 98 is used.

tags | exploit
SHA-256 | 8ae1ac958cdd839a071092f69cb028444e52101f3979ebfa78fac418bae535d2
panda-sec.zip
Posted Apr 23, 2000
Authored by Deepzone Security | Site ntsecurity.net

Panda Security 3.0 for Windows 95 and 98 can be bypassed. Panda Security 3.0 is vulnerable to indirect registry key modifications, which allow Panda Security keys to be manipulated by any logged-on user. Because of a lack in system integrity checks, the entire software package could be uninstalled by a user. This zipfile contains demonstration exploit code.

tags | exploit, registry
systems | windows
SHA-256 | 4b4ab65d6eacf95103362259811926559f9117aa0fb5e6e59d149556106746a2
regback.asm
Posted Apr 23, 2000
Authored by Freddy Laplaine | Site asmbeginer.com

regback.asm is a backdoor for NT written in pure asm.

SHA-256 | bd616e1d07cd327035e514a318277f4e261bebd2ecf13fd9c7c0b7b66b029a75
sentinel-0.8.tar.gz
Posted Apr 23, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now threaded!
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 2707d108aa34be6d15b939d6e07fd00586e3b50f6bcb2e2ddeecb06a9e8e9ab4
rdist-bsd.c
Posted Apr 22, 2000
Authored by El8 | Site hack.co.za

rdist-bsd.c is a /usr/bin/rdist local exploit for freebsd.

tags | exploit, local
systems | freebsd, bsd
SHA-256 | 3c39ee0b6efc6bfe91006e554d30a0bbd9c36dc3d95f708823389f5965f0fa06
ypghost050.tar.gz
Posted Apr 22, 2000
Authored by Arny | Site hack.co.za

ypghost is a remote NIS exploit that spoofs UDP packets. Uses libpcap.

tags | exploit, remote, udp, spoof
SHA-256 | bb87cfbb877aa971c1b35751bd4906f5ec29a359da65516c007562b506662dab
sunkill.c
Posted Apr 22, 2000
Site hack.co.za

sunkill.c - Remote solaris 2.5.1 dos exploit. Opens a telnet connection on the victim machine and sends a few bad telnet negotiation options, then flooods the port with lots of ^D characters, using all available kernel memory.

tags | exploit, remote, kernel
systems | solaris
SHA-256 | 8fe99b8546ca54ea717e39b38445c9396fcd270d2358ac63e6f901fe719dcd3d
hupux.sh
Posted Apr 22, 2000
Site hack.co.za

hupux.sh hp-ux 09.04 local exploit - Takes advantage of default world writable /usr/local/bin.

tags | exploit, local
systems | hpux
SHA-256 | ff4ceda14a87f72936c2cccf417ed823558617ad5fcbae45178ab2582ae2440b
labs38.htm
Posted Apr 22, 2000
Site ussrback.com

USSR Advisory #38 - Remote DoS attack in Real Networks Real Server. The Ussr Labs team has recently discovered a memory problem in the RealServer 7 Server. By sending specially-malformed information to port 7070 the proccess containg the service will die.

tags | remote
SHA-256 | 767c71c7cc59bbd6cb2d7075cf31625110e4ad3bfc58b5529615f609cce8ae9c
ms00-028
Posted Apr 22, 2000

Microsoft Security Bulletin (MS00-028) - Procedure Available to Eliminate "Server-Side Image Map Components" Vulnerability. The FrontPage 97 and 98 Server Extensions include two components, Htimage.exe and Imagemap.exe, both contain unchecked buffers that could be used to run arbitrary code. Although part of the Server Extensions, these components also install as part of several other web server products. Microsoft FAQ on this issue here.

tags | web, arbitrary
SHA-256 | 2e69640f35ba3d473e24e33b8187613991fb8153ebd7058644650e4f8fd410c7
Page 3 of 13
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close