exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2003-01-17 to 2003-01-18

w00nf-stunnel.c
Posted Jan 17, 2003
Authored by ^sq/w00nf | Site w00nf.org

Stunnel v3.15 - 3.21 remote format string exploit. Tested against Red Hat 7.2, 7.3, 8.0, Slackware 8.1, Debian GNU 3.0, and Mandrake 9.0. More information on the bug available here.

tags | exploit, remote
systems | linux, redhat, slackware, debian, mandrake
advisories | CVE-2002-0002
SHA-256 | 532b98b86e389878816da8e1e91e5367bcb977b9463a85ff0fd56f7f70b0b4fd
CA-2003-01.dhcpd
Posted Jan 17, 2003
Site cert.org

CERT Advisory CA-2003-01 - There are multiple stack-based buffer overflows in ISC DHCP that are exploitable by sending a DHCP message containing a large hostname value allowing remote attackers to execute code with the privileges of the user running dhcpd.

tags | remote, overflow
SHA-256 | 2d70b42cde3f4a607ef0aa3df62e9ec9d5c773cc61d8028f912a4ce536d447e3
ftester-0.8.tar.gz
Posted Jan 17, 2003
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be tested with the 'connection spoofing' option. Requires: Net::RawIP, Net::PcapUtils, NetPacket.

Changes: Compatible with Perl 5.8.0, documentation updates, and bug fixes.
tags | tool, perl, spoof, firewall
systems | unix
SHA-256 | 08e23fb3f81a0f5e56e26fb66adb5aa3465c45be2fa414aac201805baa767518
RHSA-2003:006-06
Posted Jan 17, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:006-06 - Unpatched versions of libpng 1.2.1 and earlier do not correctly calculate offsets, which leads to a buffer overflow and arbitrary code execution. This can be exploited by an attacker creating a carefully crafted PNG file which executes arbitrary code when the victim views it.

tags | overflow, arbitrary, code execution
systems | linux, redhat
SHA-256 | 43c61f8f16cfe7fe1dab5612b04579e7a8f93c580803d470a7c8d27182e10496
RHSA-2002:295-07
Posted Jan 17, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2002:295-07 - Eight vulnerabilities have been fixed in the CUPS printer software included with Red Hat 7.3 and 8.0.

tags | vulnerability
systems | linux, redhat
SHA-256 | 8bf0911bf79427b7cea9038faf50d6c154fdcccc1125024b8287f7da634fdd4a
ICMP Denial Of Service Tutorial
Posted Jan 17, 2003
Authored by Dataclast | Site dataclast.filetap.com

Tutorial on ICMP DOS attacks implemented with Sendip.

tags | paper
SHA-256 | c3e0ad7bd2c5b34c8c47b9f9f68cb793372e54be9e312ab355e72770757a69b6
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close