what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-12-02 to 2000-12-03

Posted Dec 2, 2000
Site debian.org

Debian Security Advisory - Fsh, a tool to run remote commands over ssh, has a tempfile vulnerability which has been fixed in version 1.0.post.1-3potato.

tags | remote
systems | linux, debian
SHA-256 | 77a600041d29c2f51518dfb8465750aa716fde0d1a7e44b1f2c1f82ae4315ed7
Posted Dec 2, 2000
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #198 - The Java Runtime Environment (JRE) may allow an untrusted Java class to call into a disallowed class. Other vendors Java implementations which are derived from Sun's Java Development Kit (JDK) source base are also vulnerable. JDK/JRE 1.2.2_05 or earlier is affected. Fix available here.

tags | java
SHA-256 | 7253ce1f14e7df586479f34fb9fa398650709c8601968ecc3134789cbad541e5
Posted Dec 2, 2000
Authored by Mixter | Site mixter.void.ru

LibMix is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

Changes: Added exclude database function, to add and match classless ranges of IP addresses (for network scanners, access control, etc.), added new packet headers, updated manpages.
tags | spoof
SHA-256 | e91e91671ec8107ea5c701f575aa40fbaca42f747a3f260f3c34ab05a4de7de7
Posted Dec 2, 2000
Authored by Mixter | Site 1337.tsx.org

NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.

Changes: Added range-based scan target exclusion, fixed cgi scanning for unicode urls, improved logfile output and bind version scanning, updated internal API.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | 2ff2b2e8427ca17da865ad632118aa02872136a6622b836076a13a274e08ef09
Posted Dec 2, 2000
Authored by napalm, Kynik | Site napalm.firest0rm.org

Napalm Magazine issue #8 - In this issue: Fun with Nortel M1231 Millennium Payphones, AT&T Assembly Syntax, IPSEC Bridging Under OpenBSD, Security Holes in Sun Cluster 2.x, and more.

tags | magazine
systems | openbsd
SHA-256 | c168c3be9207193a8dbdfa615e49553217ca950d9e2f465cf3902aa4b51f2f8f
Posted Dec 2, 2000
Site debian.org

Debian Security Advisory - GNU ed (the classic line editor tool) does not use temp files safely. This has been fixed in version 0.2-18.1.

systems | linux, debian
SHA-256 | de73eac3bb5038d499dda4eb013fca17699e19ae8aee81a35ef379ea784bf3b8
Posted Dec 2, 2000
Authored by Rob J Meijer | Site spoofaudit.op.nu

SpoofAudit is a perl tool which helps you determine what basic spoofing filters are present between two test points on two networks, and what anti spoofing filters are missing. They tools are designed to work between endpoints that would not normally have any filtering between them except for anti-spoofing filters. Uses the Net-RawIP perl module.

tags | perl, spoof
systems | unix
SHA-256 | d24939fab4e2a383f222b852d705b17528f5b893c01d42f66d230c1b29914370
Posted Dec 2, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Bugfixed the file ACLs inherit, add EXEC domain support in kernel and lidsadm, and other bug fixes.
tags | kernel, root
systems | linux
SHA-256 | db8320d45e7a0db0ca98db363d063caa4bd32e4326e601e5c8b3aaad36301fd3
Posted Dec 2, 2000
Site slctech.org

Netwatch allows monitoring of an Ethernet segment or PPP line and examine activity on the network, highlighting hostnames in colors to indicate activity on the bus network based on time. The monitor includes packet statistics and a TOP mode which allows a sorted list of hosts based on IP usage. All info is updated on a per second basis.

Changes: New features include configuration files for logging and colors, a passive mode for logging, a Netbus and Back orifice Packet watch, Mac Ethernet Address watch, HTTP and FTP server types, and many other features.
tags | tool, sniffer
SHA-256 | 3a3678f5b5d7a885f2c0bc74002b0b1ae00fa242783dce35f8bca05c38525ad7
Posted Dec 2, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - More portable and includes minor bug fixes. Requires libol-0.2.20.
tags | system logging
systems | unix
SHA-256 | 9d810856626f72994c9d17225f07b01eda27b431bfffb19542431eacbdaab251
Posted Dec 2, 2000
Authored by Bjarni R. Einarsson | Site mailtools.anomy.net

The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.

Changes: This release fixes a serious bug in the code handling inline uuencoded attachments, improves the testcase framework and adds more tests, fixes bugs in the filename rewriting code, adds policy support for unnamed Microsoft TNEF attachments, and now has decreased requirements from Perl 5.005 to 5.004.
tags | trojan, perl, javascript, virus
systems | unix
SHA-256 | f0cb033e6de5d86b5648d22498606a3b5ac37b7859a46f9f166c9b81feb17272
Posted Dec 2, 2000
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

Changes: Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.
tags | tool, firewall, protocol
systems | linux
SHA-256 | 90040ac8439a863152d8d719c1fd0e2a6992cc81331ad83204cb70bd1aa4129e
Posted Dec 2, 2000
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: Major Bugfixes!
tags | tool, arbitrary, udp, tcp
systems | unix
SHA-256 | ae371f90a1bc756db90b2efb3ba99421677b32c2d217c21d4a13debed24f69ab
Posted Dec 2, 2000
Site libre.act-europe.fr

GVD is a general purpose graphical debugger frontend. It features advanced data display and visualization capabilities, and allows the debugging of multi-process/multi-threaded applications in the same debugging session. GVD works with native and cross-debuggers and can handle several languages in the same debugging session and the same application. C and Ada are supported. GVD can run on a host different from the machine where the debugger is running and provides friendly support for cross-debuggers (VxWorks, Lynx, etc.). For instance, you can use Linux or Windows to debug an application running on a Power PC board with a debugger running on a Sun workstation.

systems | linux, windows
SHA-256 | f64f511f0fca1fbd9d0ec8ffed761392d45aaeaf37065995d45c7e36a435d1f2
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By