what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 161 RSS Feed

Files Date: 2003-11-01 to 2003-11-30

sa2003-07.txt
Posted Nov 14, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-07 - The HP-UX Software Distributor utilities are susceptible to a buffer overflow vulnerability when reading in the LANG variable since they do not perform any bounds checking on its size. Due to this, local attackers could gain root privileges.

tags | advisory, overflow, local, root
systems | hpux
advisories | CVE-2003-0089
SHA-256 | fa7084e4341d66e2414719a1aa4874b255b2255729d312209d47cbdb4f8997bd
sa2003-08.txt
Posted Nov 14, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-08 - Do to a lack of input validation on the NLSPATH variable, libc on HP-UX is susceptible to a format string vulnerability that will allow a local attacker to gain root privileges.

tags | advisory, local, root
systems | hpux
advisories | CVE-2003-0090
SHA-256 | 7763824063b03d4c3ebd80f0f6e25b25ad766c35105b7d94923ec0e3e6a15b2b
fortigate2.txt
Posted Nov 14, 2003
Authored by Maarten Hartsuijker

Fortigate firewall pre 2.50 maintenance release 4 allows a remote attacker to inject hostile code into an administrative interface. This vulnerability, used in conjunction with the fact that the username and MD5 hash of the user's password are stored in a cookie, allows a remote attacker to trick an administrator into giving up their credentials.

tags | advisory, remote
SHA-256 | 10520ea52ac2e94c5e4b69055bcaa957dce33e5e0594b94759fc3b4eefda58aa
iw-config.c
Posted Nov 14, 2003
Authored by heka

Proof of concept local root exploit for iwconfig, which is not setuid by default.

tags | exploit, local, root, proof of concept
SHA-256 | 3dbd8972e7b154e7c02eb7d11c3f0d3cc45103a8a209a3c7caa8f4999642cd99
kpr-winkill.c
Posted Nov 14, 2003
Authored by Koper

Microsoft Windows 95/98/98SE denial of service utility that makes use of malformed NETBIOS packets to lock-up and reboot the machine.

tags | denial of service
systems | windows
SHA-256 | 926d171c8c658d8861fb0067abda1bc605fcc9caf1e0a70a1986947d8c097432
termxploit.c
Posted Nov 14, 2003
Authored by Phender

TerminatorX version 3.81 and below local root exploit. Makes use of vulnerabilities discussed in this related advisory.

tags | exploit, local, root, vulnerability
SHA-256 | 353e26a854dbb90fd2e44d12f9a85d391324bccb56e027c9fdb3393227f42737
terminatorX-exp.c
Posted Nov 14, 2003
Authored by Li0n7

TerminatorX version 3.81 and below local root exploit. Bruteforcing option included. Makes use of vulnerabilities discussed in this related advisory.

tags | exploit, local, root, vulnerability
SHA-256 | d2ae0f1ca62a0e762c3a10af9db9cf6b2ec2a061ba6c99cecdfaeadde1df7ea5
SRT2003-11-11-1151.txt
Posted Nov 14, 2003
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations Advisory SRT2003-11-11-1151 - Clam AntiVirus versions clamav-0.60 through clamav-0.60p are subject to format string attacks that allow a remote attacker to commit a denial of service and possibly perform remote command execution.

tags | advisory, remote, denial of service
SHA-256 | 10ef4bf26c1ab47ad1a7b53bc21aae94a7fe570686b961eb6d52b4a3d73035fa
CA-2003-28.MS.txt
Posted Nov 14, 2003
Site cert.org

CERT Advisory CA-2003-28 - A specially crafted network message can trigger a buffer overflow in Microsoft's Workstation server. The vulnerability is caused by a flaw in the network management functions of the DCE/RPC service and a logging function implemented in Workstation Service (WKSSVC.DLL). Various RPC functions will permit the passing of long strings to the vsprintf() routine that is used to create log entries. The vsprintf() routine contains no bounds checking for parameters thus creating a buffer overflow situation.

tags | advisory, overflow
SHA-256 | 979392a63ca9d86583ec3f6402dafeb1c0ea7237bc2af925d5f46a51e7c89a47
awstats-5.9.tgz
Posted Nov 11, 2003
Authored by Eldy | Site awstats.sourceforge.net

AWStats is a short for Advanced Web Statistics. It's a free tool that generates advanced web (but also ftp, syslog or mail) server access statistics graphically. This log analyzer works as a CGI or from command line and shows you all possible information your log contains, in few graphical web pages. It uses a partial information file to be able to process large log files often and quickly. It can analyze log files from IIS (W3C log format), Apache log files (NCSA combined/XLF/ELF log format or common/CLF log format), WebStar and most of all web, proxy, wap servers (and even syslog, ftp servers or mail logs). Take a look at this comparison table for an idea on differences between most famous statistics tools.

tags | web, cgi, system logging
systems | unix
SHA-256 | b1621929b0eaa9d622b677bc9959f186743f5e08eef10e0530900b9d7e086ade
LogrepSource-1.4.1.tar.gz
Posted Nov 11, 2003
Authored by Tevfik Karagulle | Site logrep.sourceforge.net

Logrep is a secure multi-platform tool for the collection, extraction, and presentation of information from various log files. It includes HTML reports, multi-dimensional analysis, overview pages, SSH communication, and graphs. Supports 18 popular systems including Snort, Squid, Postfix, Apache, Sendmail, syslog, iptables/ipchains, xferlog, NT event logs, Firewall-1, wtmp, Oracle listener, and Cisco Pix.

Changes: Supports log files from sendmail and xferlog files from an FTP server. Binary packages for Linux were made Perl 5.8 aware.
tags | system logging
systems | cisco, unix
SHA-256 | 9703dd25cf439fd8dbdd26da06e3ded249c360cd6bf462095783f018edaf3e5e
squidefender-1.3.tar.gz
Posted Nov 11, 2003
Site jeroen.se

Squidefender is a Perl script which analyzes a squid log file in native format to detect attacks. This can be used to automatically adapt your firewall when an attack has occurred. The power of squidefender lies in its configuration options, which let you easily add new attacks to scan for. Another interesting option of squidefender is its ability to use different message templates based on the attack found.

Changes: IPs can now be blocked for a specified time based on the pattern.
tags | web, perl
SHA-256 | 7d0bc26b064b50bc2e533a8d73a11e5ecd2cc983f8d2e7eda2d3bc0473598f2c
chkrootkit-0.42b.tar.gz
Posted Nov 11, 2003
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit v0.42b locally checks for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: Fixed NPTL threading mechanisms, minor corrections, chkrootkit, a new test (vdir), detection of the worms 55808.A and TC2, and detection of the rootkits Volc, Gold2, Anonoying, Suckit (improved), and ZK (improved). Fixed bugs and added BSDI support.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
SHA-256 | 489cc91a933ccd03e3e4a99e724a6ab485abe41c239006f50b1bdd6f0cd9a16c
DansGuardian-2.6.1-5.source.tar.gz
Posted Nov 11, 2003
Site dansguardian.org

DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.

Changes: This release fixes a workaround where a user could put a double forward slash in the path of a URL to bypass some of the filtering.
tags | web
systems | linux, solaris, freebsd, openbsd
SHA-256 | 67f56406731c5dee5f7533417230223cde3bc8e35eda797eb71a583f42ae60af
darkstat-2.6.tar.gz
Posted Nov 11, 2003
Site members.optushome.com.au

Darkstat is an ntop-workalike network statistics gatherer. Built to be faster and smaller than ntop, it uses libpcap to capture network traffic and serves up Web page reports of statistics such as data transferred by host, port, and protocol. It also has a cool bandwidth usage graph.

Changes: This release adds a DLT_PPP_SERIAL linktype, new translations, code cleanup, better pthreads configuration, and fixed graph bar tooltips. This will be the last release in the 2.x line.
tags | tool, web, sniffer, protocol
SHA-256 | de84a7a9ef1f8abdc8eecd3faeb562fd4bf72f6fb605129fa1b1254a4f4573b0
mixmaster-2.9.1.tar.gz
Posted Nov 11, 2003
Site sourceforge.net

Mixmaster is an anonymous remailer which provides protection against traffic analysis and allow sending electronic mail anonymously or pseudonymously. It is every unix using citizens civic duty to run a remailer and help ward off the evil forces of censorship. It is a well known fact that running a remailer will make you automatically cool.

Changes: Features several changes for the Windows build, some install script fixes, and a fix for a problem in blockrequest() where a buffer could have been used after it was free()'d which resulted in segfaults. Other bugs were fixed.
systems | unix
SHA-256 | 4249cfa9be9ea98857c216673ece95201444982a91a7aaa953aa98ca3326796d
arcs.exe
Posted Nov 9, 2003
Authored by Angelo Rosiello, rosiello, Roberto Carrozzo | Site rosiello.org

Contest Windows binary of arcs.

systems | windows
SHA-256 | 5ee44ad0ae249826411eb70fae8ebd129dd9892e9c0eea2169267c0e5938b19b
thc_imap_bruter.c
Posted Nov 9, 2003
Authored by thc, Skyper | Site thc.org

IMAP password brute force tool. Can go up to 500 passwords / second on a remote host with 1000 connections in parallel if you like. It's fast and efficient.

tags | remote, imap
SHA-256 | d6b4d292152253c3334afdd2a23e77394ed57ce9bd1ec0da568b01e3292c0d50
IP_Converter.exe
Posted Nov 9, 2003
Authored by Negative9

Dotted IP to 32 bit long IP converter, for Windows. Binary only.

systems | windows
SHA-256 | 89a8d7da788908e91150aa3fa05cec7d1e82e1f25cf43b7425f9629b7b447f9c
mfp_classClscan.sh
Posted Nov 9, 2003
Authored by m4rc3l0

Class C address scanner and lookup tool.

tags | tool, scanner
systems | unix
SHA-256 | 650fccc07af37f2cde47425cb6b522fc8b6c56dbd7694de545b2e8b60ec9c797
mfp_travatudin.c
Posted Nov 8, 2003
Authored by m4rc3l0

Mfp_travatudin.c locks the console until a password is entered.

systems | unix
SHA-256 | 068c16bfe68903696b3e1f9b1721cc288f7b2ca0a8eb4e75c25b840dcdc0e8f3
mfp_chksrc.c
Posted Nov 8, 2003
Authored by m4rc3l0

Mfp_chksrc.c checks C source code for commonly insecure functions like gets, fgets, strcpy, strcat, setenv, getenv, scanf, sscanf, fscanf, sprintf, fprintf, snprintf, syslog, system, popen, vsprintf, and vsnprintf.

systems | unix
SHA-256 | b11bc6cba21b894b2793849cea3b08c208c819a5d7cf1ea30677aa35c7bed1f4
DMit-v1.0beta.tgz
Posted Nov 8, 2003
Authored by Kernel-- | Site deep-magic.org

Dmitry (Deepmagic Information Gathering Tool) is a a UNIX/(GNU)Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host. Gets netcraft information, whois lookup, tcp port scan, looks for subdomains, and grabs banners. Tested on *BSD and some Linux variations.

tags | tool, scanner, tcp
systems | linux, unix, bsd
SHA-256 | ec840c07c82826aa9cf8717d60d4b2c6b25ab34cd23e482f25b0e4ed26db50a6
webscan_0.1.0.tar.gz
Posted Nov 8, 2003
Authored by Gunzip | Site members.xoom.it

Webscan is a web site fuzzer that checks for remote vulnerabilities such as sql injection, cross site scripting, remote code execution, file disclosure, directory traversal, php includes, shell escapes, and insecure perl open() calls.

tags | remote, web, shell, perl, php, vulnerability, code execution, xss, sql injection, fuzzer
SHA-256 | eafcdbf028f048e0942fbbf8b91c58bc7470b0555231101283ddfcebf8e7b45f
outsiders-terminatorX-001.txt
Posted Nov 8, 2003
Authored by Cowboy, 0x333 | Site 0x333.org

TerminatorX v3.8.1 contains several local root vulnerabilities including stack overflows and format string bugs. Includes the vulnerable code and solutions.

tags | advisory, overflow, local, root, vulnerability
SHA-256 | 6896039ce102a933e00fff841c4b978321a4a345c95c62d0bcf97ed8888e020f
Page 5 of 7
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close