Conectiva Security Advisory CLA-2002:480 - A buffer overflow found in tcpdump v3.62 in AFS RPC decoding can be used to remotely execute code. Libpcap v0.6 has been audited and lots of boundary checks have been added.
f7720c917a93f0f68b6677ff643c70b0952d1395aec39f34d0cd50634c02b1f6
Fenris is a multipurpose tracer, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics by providing a structural program trace, general information about internal constructions, execution path, memory operations, I/O, conditional expression info, and much more. A small demonstration how this tool works can be found here.
918de9718405630e09b3b3c2dfc3fea4d577479adfc90c8f21b79790fc3cf58d
RATS, the Rough Auditing Tool for Security, is a security auditing utility for C, C++, Python, Perl and PHP code. RATS scans source code, finding potentially dangerous function calls. The goal of the RATS project is to provide a starting point for performing manual security audits.
611b461698cf0e37a5e5534054b4bda316d0d638cb10916f25b7ea50acddf6d0
Linux and FreeBSD Multi-OS shellcode - Spawns a shell. Info on Multi-OS shellcode here.
f908d0ac122c0c91f770cc286f83c1f2923e465ea98e1a505778e013d8bd9559
NMRC Advisory #21 - The inJoin Directory Server v4.0 for Solaris 2.8 has a vulnerability in the iCon admin interface listening on tcp port 1500 which allows an attacker with the correct username and password to read any file accessible to the ids user. Exploit URLs included. Fix available here.
6eede2a2c8e66f0b5f7073fa9ba6f676e7b5fbe09f3603da7f67b73d7fa26a17
The iwdrive project for linux is a small console based wireless network location program.
da9c5b93596d5db802a9b226b39981af093c8f696fbd77018686fecabe2ffd18
Drdos v2.0 is a tool for distributed reflection denial of service attacks.
456d80aab4b5ffa8109f6d73877742da6799b8a3e6ae666b0dd14e32b80c4cd7
Logagent is a Windows tool in Perl which monitors several ascii logfiles and redirect any change made to a central location. Supports remote logging.
a644d6b393a1f7bf9c90966cb62683ca5a4f11ddb0426bf0e5ec94a801fc811d
Neolock is a tool that is a combination of console security locking tool (vlock) matrix console screensaver (cmatrix). Provides more discreet and nicer console locking.
01937d9fa051df13c9c2ce9e53868292bbdcdbd54089efe33b5a92a62ebed84f
Illeech is a collection of search engine harvesting scripts (google/altavista).
de59bef71023f82b82ba35921b16bbc0df99d1434b1f29cd532ce50cdceb5b58
NSAT (Network Security Analysis Tool) is a fast, stable bulk security scanner designed to audit remote network services and check for versions, security problems, gather information about the servers and the machine and much more. Unlike many other auditing tools, it can collect information about services independently of vulnerabilities, which makes it "timeless", meaning it doesn't depend on frequent updates as new vulnerabilities are found.
febfa779afcc82c93b4ce5767233a0cc0d134c5e59d4ac58c471b56ad3a506ea
XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 140 modes.
cb8839a35c2fd68d851903abb4dc2b82d90b12ce7fbc848f9dc4fb458ee1eccc
MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.
96ee6a9c8772c787207682f265d937fddea502ba9535982270556edd0e59f10e
Btk is a little Python extension module allowing one to create and play with raw sockets and TCP/UDP/ICMP packets from within Python. It also has a nice and easy libpcap interface and good documentation.
af775caf35837b48d88412bc4f21fd450fd3cdbb2c63da952d0d7a5687189856
FreeBSD Security Notice for Ports - The following software included with FreeBSD contains security vulnerabilities if it is older than: analog-5.22, radius (several), dnews-5.5h2, ethereal-0.9.3, icecast-1.3.12, dhcp-3.0.1.r8_1, mozilla-1.0.rc1_3,1, mod_python-2.7.8, ntop, p5-SOAP-Lite-0.55, puf-0.93.1, sudo-1.6.6, webalizer-2.1.10, and xpilot-4.5.2.
90f2ab3fad70ac13ec1a4c3674a6e77efe45260fade23620256769a5c2bda1be
The DHCP gobbler is a proof of concept tool for an attack mentioned in RFC 3118 which grabs all available DHCP addresses. New machines trying to join the network won't be allocated IP addresses as they have all been allocated to no existent machines.
6156f06b8cad144a22b2a4d99327ea07ba5b2b22ed181c5a46bf0f1782c27783
Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. It is able to embed data in BMP, WAV, and AU files.
e0025156c963295278900f0e5d15a9c3e5de1e6b91f07ce74f1382133e2bc172
Psybnc v2.3 denial of service exploit. Sends a 20000 character password.
b68a05e384ec52f9ec173ea2e8f4f7a4510a639aefa527c2297b94830460519a
This paper puts forth the concept of intrusion resiliency as an emergent behavior that occurs within coupled intrusion detection and intrusion response mechanisms when the mechanisms, as a whole, exhibit a key set of identified attributes. An Illustrative example of how these attributes interact with each other to produce this behavior is given in the form of the Saint Jude Linux Kernel Module.
10cdd85dfc4ab9986f41339000087747a99bb2b8f9df26f4f9dd7d02256374a8
The Saint Jude Solaris Kernel module is a port of the StJude_LKM kernel module into the Solaris 8 kernel for both 32 and 64 bit architectures. This Module implements the Saint Jude Model for the detection of improper privilege transitions. This will permit the discovery of local and remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits. This is the First public release of the StJude Solaris Kernel Module (SKM). The Version number, though, parallels the capability and maturity of its sister program StJude_LKM. Tested on single and dual Sparc and ultrasparc I/II on Solaris 8.
cd6b25d7d4a1edb3285c886a6099b8ea8394efc2f6767f20103414573115a6ba
WolfMail.cgi, a script that works similarly to formmail.cgi, allows users to send mail via a web interface. The configuration for WolfMail.cgi is not internally hardcoded but is passed via parameters in html input statements allowing any user to send fake mail.
3778400e8f79eb597d173c53cc2b7232adf9d3124bea0458e83e4ede52030d94
A buffer overflow vulnerability has been found by eEye in the parameter handling of the MSN Messenger OCX and can allow remote code execution on affected systems.
76df0e68a796ea743a0cc568c84f1055d8df681f7945e0a436d49f5ed4e21b47
A buffer overflow vulnerability has been found in the WU-IMAP daemon and can be used to remotely execute code via malformed requests. An account is necessary to exploit this overflow.
4eab3d4451f2286911c7ccb083a73a3343426075027dd2069efebe1bf2bfc3c9
Red Hat Security Advisory RHSA-2002:081-06 - A bug in utf8 interaction between perl-Digest-MD5 and Perl results in utf8 strings having improper MD5 digests.
d11615b5bcc788dfe5676e519a1fe805e3192b4891226b1c53792d0ab3fa59f9
CERT Advisory CA-2002-13 - A buffer overflow in the MSN Chat control allows remote attackers to run arbitrary code if a user runs MSN Messenger or Exchange Instant Messenger. It is also possible to exploit this vulnerability via a web site or HTML email. Additional information can be found in the Microsoft bulletin MS02-22.
52e9e17ec39b12833fa4ec39db4d6650de8ad82e653d3e709a6272a235b94787