what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-11-02 to 2000-11-03

Samhain File Integrity Checker
Posted Nov 2, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Bug fix release which includes enhancments!
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | d9ed906ca9c641206d8da7958e625115650b13d904f827efaab285b62ff78ec0
dump-exp.sh
Posted Nov 2, 2000
Authored by Fish Stiqz

Dump v0.4b15 for Linux on Redhat and others contains a trivial local root vulnerability.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | 1cc730edaf82d8cf8af5f2a4f514fb02bdc686371b3f7ccea5653645df6e3c84
dump.sh
Posted Nov 2, 2000
Authored by JW Oh

Dump v0.4b15 and below for Linux contains a trivial local root vulnerability. Includes proof of concept exploit tested on Redhat 6.2.

tags | exploit, local, root, proof of concept
systems | linux, redhat
SHA-256 | 619ad6db79eab76deef0e838677432fc6d3bd08d012469e9ae413de13b917212
0010-exploits.tgz
Posted Nov 2, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for October, 2000.

tags | exploit
SHA-256 | f1145b6d659bf5ec559a08dd9096cf689913972f0351e3538d9060762579d13c
StJudeModel.pdf
Posted Nov 2, 2000
Authored by Tim Lawless | Site sourceforge.net

This paper describes how the StJude kernel module stops local and remote exploits from being successful. The Saint Jude model for improper privilege transitions terminates program execution when it is exploited even if the exploit is unknown.

tags | paper, remote, kernel, local
systems | unix
SHA-256 | 32a264782ffbeb3b1d5ac2fe7295419e164d7bcced7404713c2fa709c85c1ee7
StJude_LKM-0.04.tar.gz
Posted Nov 2, 2000
Authored by Tim Lawless | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for 2.2.11 and greater kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occuring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: Fixed bugs, added a Makefile, hid the old execve better, added a homepage.
tags | remote, kernel, local, root
systems | linux
SHA-256 | 37643ba93bc57afffa0b2696e08bb971606429da0f856cdd4260620c42f1b387
iss.00-11-01.netmon
Posted Nov 2, 2000
Site xforce.iss.net

ISS Security Advisory - An exploitable buffer overflow has been found in Microsoft's Network Monitor utility. The vulnerability allows code to be executed on the remote computer with the privilege levels of the administrator. Windows NT, 2000, and SMS 1.2 and 2.0 are affected.

tags | remote, overflow
systems | windows
SHA-256 | 62cd0a353baa2b76a80fd2668586982a383c7b7773616bd881ac0df773aaa1f1
ms00-083
Posted Nov 2, 2000

Microsoft has released a patch that eliminates the "Netmon Protocol Parsing" vulnerability in Microsoft Windows NT and 2000 server and SMS which allows remote users to gain control of an affected server. Protocol parsers in Network Monitor (Netmon) contain unchecked buffers which allow malicious users to execute arbitrary code by sending a malformed frame to a server which is monitoring traffic. Microsoft FAQ on this issue available here.

tags | remote, arbitrary, protocol
systems | windows
SHA-256 | 631236ac7c0e16c53931fdfc3f74466ee5528d93d9b6d8b318260308729b617b
Page 1 of 1
Back1Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close