seeing is believing
Showing 1 - 25 of 30 RSS Feed

Files Date: 2001-03-16 to 2001-03-17

mimedefang-1.0.tar.gz
Posted Mar 16, 2001
Authored by David F. Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.10 / 8.11 and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Added logging, process limiting, and more.
systems | windows, unix
MD5 | c2d0a7ee150ec6c1aeb91d3a7e6002b3
arping-0.96.tar.gz
Posted Mar 16, 2001
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: Minor fixes.
tags | tool
systems | unix
MD5 | 953eac4fc53aa1cc62874a583c4a6de3
inflex-1.0.0d.tar.gz
Posted Mar 16, 2001
Authored by Paul L Daniels | Site inflex.co.za

Inflex is an email scanner which encapsulates your existing sendmail server setup. It scans both incoming and outgoing email and it does not alter your current /etc/sendmail.cf file. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe). It can also be used to scan for text snippets within emails.

systems | unix
MD5 | d1614a1dc997a89697de29f1773d9ab7
mindtermbin-v199.zip
Posted Mar 16, 2001
Authored by Mats Andersson | Site mindbright.se

MindTerm is a complete ssh-client in pure java which can be used either as a standalone java-application or as a java-applet. Includes a vt102/xterm-terminal with the ssh protocol and also "drop-in" socket replacements to use ssh tunnels transparently from a java application/applet.

Changes: Integrated SSH2 code into MindTerm, only works with auth types publickey and password. Fixed bugs.
tags | java, protocol
MD5 | a8319a11979efb1140bea1ebc7e8f138
labs2001-01.txt
Posted Mar 16, 2001
Site ussrback.com

USSR Advisory USSR-2001001 - The Windows SSH server (sshd) v2.4 is vulnerable to a denial of service attack. It can not handle more than 64 simultaneous connections. Fixed in v2.5.

tags | denial of service
systems | windows
MD5 | 6f7d2103ddf5cd7250c6dfc9dddf2f19
stick.htm
Posted Mar 16, 2001
Site eurocompton.net

The Stick DDOS tool is a resource starvation attack against IDS systems. Many IDS systems are affected.

tags | denial of service
MD5 | 2c5d68195d4c598cc87cc2fad2b59d88
iss.00-03-14.stick
Posted Mar 16, 2001
Site xforce.iss.net

The Stick ddos tool overloads IDS systems with false positives, causing them to fail. Paper on stick available here.

MD5 | 8288054dff36679726c41d2a59603aa4
RHSA-2001:027-02.sgml-tools
Posted Mar 16, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:027-02 - The sgml-tools uses temp files in an insecure fashion. Upgrade to the newest version.

systems | linux, redhat
MD5 | aaec7bf24ed2aa9a2a0147bf535dfc4a
RHSA-2001:029-02.mutt.imap
Posted Mar 16, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:029-02 - Format string vulnerabilities have been found in the IMAP code included with the mutt mail reader previous to v1.2.5, allowing a compromised or malicious IMAP server to execute code on the local machine.

tags | local, vulnerability, imap
systems | linux, redhat
MD5 | 5ccbc09c0da34eb39573aa13a8e1f3fb
RHSA-2001:028-02.slrn
Posted Mar 16, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:028-02 - An overflow exists in the slrn package as shipped in Red Hat Linux 7 and Red Hat Linux 6.x, which leads to remote users executing arbitrary code as the user running slrn.

tags | remote, overflow, arbitrary
systems | linux, redhat
MD5 | 78f148c5b06ae94593f4eed5d333ac8a
Synapsys-lkm.tar.gz
Posted Mar 16, 2001
Authored by Berserker | Site neural-collapse.org

Synapsis is a LKM rootkit for Linux which features file hiding, process hiding, user hiding, magic UID, and netstat hiding.

tags | tool, rootkit
systems | linux, unix
MD5 | aa9aeedd64b1d79407698c5703d358fc
checkp.sh
Posted Mar 16, 2001
Authored by Deepin | Site nsfocus.com

Checkp.sh checks which sun recommended patches need to be installed. Useful for Solaris admins! Uses the 2.6 patch list, but you can change it for others.

systems | unix, solaris
MD5 | e41347240d8946e7ff4a290d4a9876a9
ms01-016
Posted Mar 16, 2001

Microsoft Security Advisory MS01-016 - A remote denial of service attack has been discovered in WebDAV, and extension to the HTTP protocol included in Windows 2000 IIS 5.0. Microsoft FAQ on this issue available here.

tags | remote, web, denial of service, protocol
systems | windows, 2k
MD5 | f5c7593dd29178ccb2faf420a9bf550d
RNmap 0.5 Beta
Posted Mar 16, 2001
Authored by Tuomo Makinen | Site sourceforge.net

Remote Nmap is a python client/server package which allows many authorized clients to connect to a centralized nmap server to do their port scanning. This could be useful for security companies who want to have all their scans come from a dedicated machine.

Changes: Now rnmap supports encrypted communications with optional modules. Protocol has changed to support plain/ciphertext communications.
tags | tool, remote, nmap, python
systems | unix
MD5 | 2a38e37ef3c4092c4eb0ab283895f97f
debian.mailx.txt
Posted Mar 16, 2001

Debian Security Advisory DSA-044-1 - The mail program (a simple tool to read and send email) as distributed with Debian GNU/Linux 2.2 has a buffer overflow in the input parsing code. Since mail is installed setgid mail by default this allowed local users to use it to gain access to mail group. Since the mail code was never written to be secure fixing it properly would mean a large rewrite. Instead of doing this we decided to no longer install it setgid. This means that it can no longer lock your mailbox properly on systems for which you need group mail to write to the mailspool, but it will still work for sending email. Debian security homepage: http://www.debian.org

tags | web, overflow, local
systems | linux, debian
MD5 | ea2e4113857feb74daccd04a13cfeaea
suq_diq.zip
Posted Mar 16, 2001
Authored by Xor37h, Darkman

Suq Diq v1.00 is a remote exploit for IBM Net.Commerce, WebSphere and possibly other IBM and Lotus applications as well. These products use Tripple DES with a fixed key by default, allowing remote users to gain the usernames and plaintext passwords of all Net.Commerce accounts. Exploit URL's included.

tags | exploit, remote
MD5 | b23af7e5a65ee8fcd01f9846db2e10a6
chkrootkit-0.23.tar.gz
Posted Mar 16, 2001
Authored by Nelson Murilo | Site chkrootkit.org

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD.

Changes: Lrk6 detection, rh[67]-shaper detection, RSHA detection, Romanian rootkit detection, test for shell history file anomalies, and a better bindshell test.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
MD5 | 989001de68edd7104baa50287d246c2c
FreeBSD Security Advisory 2001.29
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:29.rwhod - Malformed packets sent to the rwhod daemon via UDP port 513 could cause it to crash, thereby denying service to clients.

tags | udp
systems | freebsd
MD5 | 7b5cba14d4fddfbbcd57118866a9f05a
FreeBSD Security Advisory 2001.28
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:28 - Malformed packets sent to the timed daemon on UDP port 525 could cause it to crash, thereby denying service to clients.

tags | udp
systems | freebsd
MD5 | 966eb434860dcea9e93ca3134e57b93f
FreeBSD Security Advisory 2001.27
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:27 - The cfengine port, versions prior to 1.6.1, contained several format string vulnerabilities which allow a remote attacker to execute arbitrary code on the local system as the user running cfengine, usually user root.

tags | remote, arbitrary, local, root, vulnerability
systems | freebsd
MD5 | e4dba87acf45fc7dc236b41d82793082
FreeBSD Security Advisory 2001.26
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:26 - The interbase port has a hard coded backdoor which has full read and write access to databases stored on the server, and also gives the ability to write to arbitrary files on the server as the user running the interbase server (usually user root). Remote attackers may connect to the database on TCP port 3050.

tags | remote, arbitrary, root, tcp
systems | freebsd
MD5 | 1757f4c716432f5a102856a2e81db743
FreeBSD Security Advisory 2001.23
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:23 - The icecast port, versions prior to 1.3.7_1, contains multiple format string vulnerabilities, which allow a remote attacker to execute arbitrary code as the user running icecast, usually the root user.

tags | remote, arbitrary, root, vulnerability
systems | freebsd
MD5 | 49782dde2f7496fcd56b54e2724b1ade
openssh-2.2.0-exp.tgz
Posted Mar 16, 2001
Authored by Nemes||y

OpenSSH-2.2.0 remote exploit - Includes a wrapper to brute force the offset.

tags | exploit, remote
MD5 | a975d944823b58f0e067a2c6cca0ae53
npulse-0.50.tar.gz
Posted Mar 16, 2001
Authored by Dr. Steven Horsburgh | Site horsburgh.com

nPULSE is a web-based network monitoring package for Unix-like operating systems. It can quickly monitor tens, hundreds, even thousands of sites/device s at a time on multiple ports. nPULSE is written in Perl, uses nmap as its core scanning engine, and comes with its own mini web server for extra security.

Changes: Includes 20 new features!
tags | tool, web, perl, nmap
systems | unix
MD5 | 6aa2c0cf2bde46335bc244ded60a2061
disassembling.txt
Posted Mar 16, 2001
Authored by Angel Ramos

Disassembling programs on Debian Linux 2.2 using gdb.

tags | paper
systems | linux, unix, debian
MD5 | 93372530435d52395912ab038d31d9bf
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close