Secunia Security Advisory - Slackware has issued an update for php. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.
f6c90550f97977d476fa62861d1af6837ce1b4bb4e3109d073754f4f45ca267f
Secunia Security Advisory - Slackware has issued an update for gaim. This fixes a vulnerability and two weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system.
5ceecea2b4fe7421213cfb60c409411fee62ce15f04eef34f48e204dc7b6c61a
New Packet Storm exploits for August, 2005.
737daa99baadbd33fa0079ca279b5b2fde17b2f7baa25312812167df7bab73cf
SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.
65b253904558b664c09cf110a319274d6b48ca373b50ad12de98da2d83972918
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
353814e8aa9c797c80d6d97d711344c29f8dad56ab9af3cfbd9f2836fed3588a
fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.
f02236fc30cbe288fd42dbfa3aaf09934b181da64e3cb5b345617760a0ca29a1
A small utility that shows all connections by reading open inodes and will even show related PIDs. Very useful for backdoor detection when you cannot trust other binaries.
e0f17c5b2fc829a001738b7b5d94113d2a5e8aa07f9c76d21ead02ae2514efff
FlatNuke version 2.5.6 suffers from remote command execution, cross site scripting, and path disclosure flaws. Detailed exploitation provided.
acd8a3dbf0ed55c669e06c2ab4803e49531560cd1dbf89d73564346bb8eee69f
Remote code execution exploit for FUD Forum versions 2.7 and below.
68a63805a860c1ee120af420819c0ab4d12a5942b56e21c9e07b5373a6c5856e
Gentoo Linux Security Advisory GLSA 200508-20 - phpGroupWare improperly validates the mid parameter retrieved via a forum post. The current version of phpGroupWare also adds several safeguards to prevent XSS issues, and disables the use of a potentially vulnerable XML-RPC library. Versions less than 0.9.16.008 are affected.
d33de08c4298350651ca1c385fd6272325c50069a0e5c4e6069ba07eeb7605fd
Gentoo Linux Security Advisory GLSA 200508-19 - Javier Fernandez-Sanguino Pena has discovered that lm_sensors insecurely creates temporary files with predictable filenames when saving configurations. Versions less than 2.9.1-r1 are affected.
31b4d798b9de178a17a1c9460c42068a441d78e850787dc18cf3a51cb443e327
MASSIVE Enumeration Toolset, or MET, is a small tool that helps mine information from google.com. It supports Johnny's GHDB (Google Hacking Database XML Format) and Google's SOAP and Mobile APIs. Written in Python.
c13f808f8bd74252be28b00f47a212b8773406cbf65cdf62fb4dbda979590c31
Remote command execution exploit for HP OpenView Network Node Manager versions 6.2, 6.4, 7.01, and 7.50.
35f6fb2bbbf9a319cca337f6e91aa2660874027de25e497f6c79ccace01bedc0
Debian Security Advisory DSA 791-1 - Max Vozeler discovered that the lockmail program from maildrop, a simple mail delivery agent with filtering abilities, does not drop group privileges before executing commands given on the commandline, allowing an attacker to execute arbitrary commands under with group mail privileges.
584cfb606501f55a12f62374974c15e0a1de581a87b4f136e5a4aa5a0d9d4e73
e107 version 0.6 has an input validation flaw in forum_post.php that allows attackers the ability to create topics in non-existing forums.
54ebb505ef7de3a47c44cc973d59da1fe31893292a35300fb1af1a1046ebe05e
BNBT EasyTracker is susceptible to a remote denial of service vulnerability when accepting a malformed HTTP request. Demonstration exploit provided. Versions 7.7r3.2004.10.27 and below are affected.
f9291b23377db55f3b2c53e515326c7b8ac550f848e8a637eecb137eee6a7662
Simple and efficient port scanning utility to audit what ports are open on a machine. Works much like netstat without having to trust netstat.
d82b6fbf527183bbc75ad70635488c19834d003b841acb9c88a06612ff13c43f
phpLDAPadmin versions 0.9.6 through 0.9.7/alpha5 suffer from directory traversal, remote code execution and cross site scripting vulnerabilities. Detailed exploitation provided.
72a0a1106d2ca25cc4bbd9000f4fc9071da5e7057f2e5999d828b382dd4ebcc1
iDEFENSE Security Advisory - Local exploitation of a design error in the Symantec AntiVirus 9 Corporate Edition may allow a user to gain elevated privileges. Exploitation can occur when a user chooses the right click Scan for viruses option. The Symantec scan file interface allows the user to launch a help window through the use of a toolbar icon. If the user then right clicks the help window title bar they can choose the Jump to URL menu option, which will then allow them to browse the local file system and execute files as the SYSTEM user.
4c4c53312ff3be87fe0e66e5f442ebce8f831cd5fb132dd1575a49517cbbc92b
iDEFENSE Security Advisory - Local exploitation of a design error in Adobe Systems, Inc. Version Cue allows local attackers to gain root privileges. Version Cue includes a setuid root application named VCNative which is vulnerable to a symlink attack. The vulnerability specifically exists due to the use of predictable log file names. VCNative uses a format such as VCNative-[pid].log for the filename and stores the file in the current working directory. Attackers can easily predict the created filename and supply user-controlled data via the -host and - port options. A carefully supplied value can cause a crafted log file to be written. Crafted strings written to root-owned files can lead to arbitrary code execution with root privileges.
411dc375de7e880373b5415079f07e6ba80c1cdda2a6b6a1c38e1aa35c6407ac
iDEFENSE Security Advisory - Local exploitation of a design error in Adobe Systems, Inc. Version Cue allows local attackers to gain root privileges. Version Cue includes a setuid root application named VCNative which contains a design error that allows local attackers to gain root privileges. The vulnerability specifically exists due to an unchecked command line option parameter. The -lib command line option allows users to specify library bundles which allows for the introduction of arbitrary code in the context of a root owned process. The init function in a shared library is executed immediately upon loading. By utilizing the -lib argument to load a malicious library, local attackers can execute arbitrary code with root privileges.
4df7fce995e778869fe2e236a60a050ada95134690b5bfce30b5fc73c86389d1
Proof of concept exploit for the flaws relating to BFCC versions 1.22_A and below and BFVCC versions 2.14_B and below.
70ecdd7e1df36c0385865b76a03635b0e68125f1fd65081f4b00062b965a23bd
BFCommand and Control Server Manager are both susceptible to multiple bugs. BFCC versions 1.22_A and below and BFVCC versions 2.14_B and below are susceptible to full anonymous login bypass and various manipulation flaws.
82d511d1562e6896e98ab485a7698bc6c3577ea5c73c093677372f083c030e8c
Land Down Under versions 801 and below suffer from multiple SQL injection vulnerabilities. Full details provided.
d2b508373b14a63e311f6bd4f062bb809fa0835d4ab70151cad0ae5ebf03a0ed
Debian Security Advisory DSA 788-1 - Several security related problems have been discovered in kismet, a wireless 802.11b monitoring tool.
2da369bca44b6d64e712261b8e7bfd3eda1b78c5bc20947a4d194f98a54d4914