what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 49 of 49 RSS Feed

Files Date: 2004-09-21 to 2004-09-22

advisory-05-glFTPd.txt
Posted Sep 21, 2004
Authored by CoKi | Site nosystem.com.ar

The dupescan binary from glFTPd versions 2.00RC3 and below suffers from a stack overflow that can be exploited locally. Full exploit included.

tags | exploit, overflow
SHA-256 | 160289b0841eaee7d277dbda03e49e1139d4b00c48d005bd5958349f4609a988
debian.telnetd.txt
Posted Sep 21, 2004
Authored by Michal Zalewski

The Netkit telnetd implementation shipped with Debian Linux appears to be lacking the AYT vulnerability patch. This exposes the platform to a remote root problem discovered by scut of TESO back in 2001.

tags | advisory, remote, root
systems | linux, debian
advisories | CVE-2001-0554
SHA-256 | b774351baca900b321dda13082fb9c199c217207f04f1f3942bfc7692e1b6978
tcpreplay-2.3.0.tar.gz
Posted Sep 21, 2004
Site sourceforge.net

tcpreplay is a BSD-style licensed tool to replay saved tcpdump files at arbitrary speeds. It provides a variety of features for replaying traffic for both passive sniffer devices as well as inline devices such as routers, firewalls, and the new class of inline IDS's. Many NIDSs fare poorly when looking for attacks on heavily-loaded networks. tcpreplay allows you to recreate real network traffic from a real network for use in testing.

Changes: Now includes Cisco HDLC support and better reporting of DLT types. A fix for an issue in tcpprep files that broke cache file compatibility between big and little-endian systems was also implemented.
tags | tool, arbitrary, intrusion detection
systems | unix, bsd
SHA-256 | 050dd6a8f0eaa2ee9f14437a20270c67a742c313435bda82190fcd7bde932931
sudoedit.txt
Posted Sep 21, 2004
Authored by Angelo Rosiello | Site rosiello.org

Local exploit for sudo version 1.6.8p1 that makes use of a flaw in sudoedit.

tags | exploit, local
SHA-256 | ab1bfd7ddab1b1c6b89d7c8e3bdb7bc786b3bad054180fc0cc417bc68c3ca04f
MySQLguest.txt
Posted Sep 21, 2004
Authored by BliZZard

MySQLguest from AllWebscripts is vulnerable to an HTML injection flaw that is exposed via the entry submitting form due to a lack of proper sanitization.

tags | advisory
SHA-256 | adff55a9298359f4f057edc112d12bbf74c373c97e76c2d43184798b9bc21eec
dns4me.txt
Posted Sep 21, 2004
Site gulftech.org

GulfTech Security Research - DNS4Me version 3.0.0.4 is susceptible to cross site scripting and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 4d1fd96ce8b157a8c343db0d58f22a30793e5d9cc04af8a7764712643086bfd5
mambo451.txt
Posted Sep 21, 2004
Authored by khoai | Site xfrog.org

Mambo versions 4.5.1 and below are susceptible to a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 4d025889e22337402a892e1c2a8fc928680f8c29a942f1164367af073911141a
airscanner.txt
Posted Sep 21, 2004
Site airscanner.com

Airscanner Mobile Security Advisory - Airscanner Corp. has been able to reverse engineer and post a fix for the CE.Dust virus.

tags | advisory, virus
SHA-256 | dfc04361209fb2f42302f257250840672dab84f49ad9f7075e8b4132dc448d24
zyxel650_dos.pl
Posted Sep 21, 2004
Authored by frid4y

ZyXEL Prestige 650HW-31 and 650R-11 DSL Router denial of service exploit.

tags | exploit, denial of service
SHA-256 | e8cc8aa0e77ce2a4cff14c8233b83829173b4599367ed8e83e217ece1585d09a
psad-1.3.3.tar.gz
Posted Sep 21, 2004
Site cipherdyne.org

Port Scan Attack Detector (psad) is a collection of four lightweight daemons written in Perl and C that are designed to work with Linux firewalling code (iptables and ipchains) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options, email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP, UDP, and ICMP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap. Psad also uses packet TTL, IP id, TOS, and TCP window sizes to passively fingerprint the remote operating system from which scans originate. Changelog available here.

Changes: Automatic danger level assignments were fixed. The ability to ignore both ranges and specific ports/protocols was added with a new variable, IGNORE_PORTS in psad.conf. Many bugs were fixed.
tags | remote, kernel, udp, perl, tcp
systems | linux
SHA-256 | 6bd217ff69b21745cd5bcc36f1d24b7a8010cfe703e104e69d4bc0d3c274fe13
ettercap-NG-0.7.1.tar.gz
Posted Sep 21, 2004
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 4a688a9835e3537ec6cb0b31c00acec252b02e4a40e0752f151eb1ec2ef5e80b
sudo168.txt
Posted Sep 21, 2004

sudo version 1.6.8p1 has been released to address a security flaw in sudoedit that could give a malicious user read access to file that would normally be unreadable.

tags | advisory
SHA-256 | efab4b67cba3f43b49749ab3f9feff2c10711daa2901a428c6afc8c3591c8f21
Technical Cyber Security Alert 2004-261A
Posted Sep 21, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-261A - Several vulnerabilities exist in the Mozilla web browser and derived products, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.

tags | advisory, remote, web, arbitrary, vulnerability
SHA-256 | f7d86e4564591538d33b369f77eeeeec3819b0c8aa29f08f2d427cfa298e4d9d
inkraError.txt
Posted Sep 21, 2004
Authored by Felix Zhou

The Inkra 1504GX router suffers from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 7d88b0aa59b5c2c116b89d4bd94a13fda2109b7744bf6cfd8791bbd00030e7ce
sbd-1.36.tar.gz
Posted Sep 21, 2004
Authored by Michel Blomgren | Site tigerteam.se

sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.

Changes: New timeout feature added, various tweaks and updates.
tags | tcp
systems | windows, unix
SHA-256 | a15ce468e7e04cc12fe2686e0a44e1201d7c67986681d51e255cba9362ab0676
rsynxOSX.txt
Posted Sep 21, 2004
Authored by Matt Johnston

RsyncX version 2.1, the frontend for rsync on OS X, fails to drop a group id of wheel and allows for arbitrary program execution.

tags | exploit, arbitrary
systems | apple, osx
SHA-256 | 7461c1d224257e6868b2e710ecfd89f961714104279359829f4e24b82656f49b
Libnids-W32-1.19.tar.gz
Posted Sep 21, 2004
Authored by Nergal | Site libnids.sourceforge.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit, and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: Ported to Win32 by Goldie.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | 137fe89a3f5ed030632fd95c5d8892b7a5ba53d1ef42b0f36ff2a12ca1435379
boFreeBSDroot.txt
Posted Sep 21, 2004
Authored by rookie

A buffer overflow has been discovered in the trap.c syscall() function of the FreeBSD source tree. However, you need to be root to exploit this.

tags | advisory, overflow, root
systems | freebsd
SHA-256 | 6444178da5ea0a896ca263731a215cc7f808b36e98e12a1934fae459315952df
iDEFENSE Security Advisory 2004-09-16.t
Posted Sep 21, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 09.16.04 - Remote exploitation of a denial of service vulnerability in Ipswitch Inc.'s WhatsUp Gold versions 8.03 and below allows attackers to cause the application to crash.

tags | advisory, remote, denial of service
advisories | CVE-2004-0799
SHA-256 | c438fb19fce4a7088b6fd32219675ec8c1ce08196af321f87c7fec70aa9b556a
pigeonx.zip
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for Pigeon versions 3.02.0143 and below.

tags | exploit, remote, denial of service
SHA-256 | cb65fe199cc4cbac985760de68a05888a15acf6bd8ccf4895e9316d6e9c0b438
pigeon302.txt
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

A login field longer than 8180 characters sent to the port 3103 causes the immediate freeze of the Pigeon server versions 3.02.0143 and below.

tags | advisory
SHA-256 | 5b895839fa11cad0d1760038031d16051b1c9b2bcb399577776f785a0ffb9460
snitz.txt
Posted Sep 21, 2004
Authored by Maestro

Snitz Forums 2000 v3.4.04 suffers from an HTTP response splitting vulnerability.

tags | advisory, web
SHA-256 | 088243d419f091086b2f76b1287fd453be130828c19e0fef6ca6f242e098be54
Gentoo Linux Security Advisory 200409-19
Posted Sep 21, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200409-19 Several bugs exist in the Heimdal ftp daemon which could allow a remote attacker to gain root privileges. Versions below 0.6.3 are affected.

tags | advisory, remote, root
systems | linux, gentoo
SHA-256 | c6878366d672dd0f0a396d0c602079ad593297bb32821664a5c6c1a6cfc62a58
wp-04-0001.txt
Posted Sep 21, 2004
Authored by Paul Johnston | Site westpoint.ltd.uk

Westpoint Security Advisory wp-04-0001 - Multiple browsers are susceptible to multiple cookie injection vulnerabilities. Tested: Internet Explorer 6.0 for Windows 2000 with all patches, Konqueror 3.1.4 for SuSE 9.0, Mozilla Firefox 0.9.2 for Windows 2000, Opera 7.51 for Windows 2000.

tags | advisory, vulnerability
systems | linux, windows, suse
advisories | CVE-2004-0746, CVE-2004-0866, CVE-2004-0867, CVE-2004-0869, CVE-2004-0870, CVE-2004-0871, CVE-2004-0872
SHA-256 | 8fc149376018ed5107866eec1ab39898b97111216c66d313f39856eb9a5ec1d0
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close