what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 39 of 39 RSS Feed

Files Date: 2006-03-15 to 2006-03-16

ttyrpld-2.15-src.tbz2
Posted Mar 15, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Added support for NetBSD 3.0. Various fixes.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 919c584e8cf7e217bed6fc92527281158522d03d1ed476dd6a46a05b549749a6
john-1.7.0.1.tar.gz
Posted Mar 15, 2006
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.

Changes: Minor bug and portability fixes. Better handling of certain uncommon scenarios and improper uses of John. Keyboard cracker included in the default john.conf (john.ini) that will try sequences of adjacent keys on a keyboard as passwords.
tags | cracker
systems | windows, unix, beos
SHA-256 | bb7ae637b3f8c9792d7d6155b32a34303bdefbd40282aef4f6fb87501fe55814
popa3d-1.0.1.tar.gz
Posted Mar 15, 2006
Authored by Solar Designer | Site openwall.com

popa3d is a POP3 daemon which attempts to be extremely secure, reliable, RFC compliant, and fast (in that order).

Changes: Couple of bug fixes.
systems | unix
SHA-256 | 21aed6059bb3afce22f24c4cf1efc71a5df22e412807384da7bb0672b191e8eb
scanlogd-2.2.6.tar.gz
Posted Mar 15, 2006
Authored by Solar Designer | Site openwall.com

Scanlogd is a TCP port scan detection tool originally designed to illustrate various attacks an IDS developer has to deal with, for a here.

Changes: Check changelog.
tags | tcp
systems | unix
SHA-256 | 4a2621037270f88576c8770261c53761edc875984f126872c880c2a98a8f63fa
HexView Security Advisory 2006-03-14.1
Posted Mar 15, 2006
Authored by HexView | Site hexview.com

A vulnerability exists in Microsoft Excel which can be exploited to run a code of attacker's choice on user's PC. Sufficient data validation is not performed when parsing "Named Range" definitions in the document file, which makes it possible to produce a negative 32-bit value that is later used as a length parameter for the msvcrt.memmove() function. As a result, a large chunk of memory is copied overwriting critical memory ranges, including the stack space. All tests were performed using Microsoft Excel 2003 (11.6560.6568) on Windows XP and Windows 2000 Pro platforms. It is likely that all MS Excel products are vulnerable.

tags | advisory
systems | windows
advisories | CVE-2005-4131
SHA-256 | d3ff03122df3a97151a14bd39966d4c618c8133f2af3261d2fc519f3c40b6a32
CodeScan-Horde.txt
Posted Mar 15, 2006
Authored by CodeScan Labs | Site codescan.com

Horde versions 3.09 and below suffer from a unauthenticated arbitrary file reading vulnerability.

tags | advisory, arbitrary
SHA-256 | ffe257bc37850ac77cff8df29d47bc0492aa5b5dc7688941ff6174407ac6118f
CodeScan-ASPPortal.txt
Posted Mar 15, 2006
Authored by CodeScan Labs | Site codescan.com

ASPPortal version 3.00 is susceptible to more than ten SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
SHA-256 | 877f4a6827b3e4ff00071c0c77ab79d55525602a5dce401b56b3e0aacae42a72
WLSI.zip
Posted Mar 15, 2006
Authored by Cesar Cerrudo | Site argeniss.com

Whitepaper entitled "WLSI - Windows Local Shellcode Injection" that describes a new technique to create 100% reliable local exploits for Microsoft Windows operating systems. The technique uses some Windows design weaknesses that allow low privileged processes to insert data into almost any Windows process regardless of their current privilege level. After a brief introduction and a description of the technique, a couple of samples (Exploits for MS05-012 and MS05-040) are included so the reader will be enabled to write their own exploits.

tags | paper, local, shellcode
systems | windows
SHA-256 | 0edd124aeb55cb3125140eb5cdb86f78449fba1ac22466a4b4325fdf39c92857
Technical Cyber Security Alert 2006-73A
Posted Mar 15, 2006
Authored by CERT, US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA06-073A - Microsoft has released updates that address critical vulnerabilities in Microsoft Office and Excel. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

tags | advisory, remote, denial of service, arbitrary, vulnerability
advisories | CVE-2005-4131, CVE-2006-0009, CVE-2006-0028, CVE-2006-0029, CVE-2006-0030, CVE-2006-0031
SHA-256 | 1ecf1950da060f73d8c84b791e2a2fdb436c6ef300126811c5f2221dda6ff9cc
FSA-2006-09.txt
Posted Mar 15, 2006
Authored by Fortinet Research

Fortinet Security Advisory: FSA-2006-09 - Fortinet Security Research Team (FSRT) has discovered a improper stack overflow vulnerability in the Microsoft Excel software. This vulnerability is due to Microsoft Excel's manipulation of opcode 0x0218, when provided with a large Formula Size, it will cause a stack overflow. An remote attacker could construct a .xls file and put it on controlled web site. When the user opens the .xls file with Microsoft Internet Explorer, the browser will call Microsoft Excel to open the .xls file automatically, and this will cause Microsoft Excel to crash. If excel file is specially crafted, it may allow attackers to execute arbitrary code on the affected system.

tags | advisory, remote, web, overflow, arbitrary
advisories | CVE-2006-0029
SHA-256 | 16c513406c9b8eb2fa4c22dab9875ea3b88c39027021cbaa2f2e053132b54f34
FSA-2006-08.txt
Posted Mar 15, 2006
Authored by Fortinet Research

Fortinet Security Advisory: FSA-2006-08 - Fortinet Security Research Team (FSRT) has discovered a improper memory access vulnerability in the Microsoft Excel software. This vulnerability is due to Microsoft Excel's manipulation of opcode 0x001D, when provided with a random Column Index, it will cause a Improper Memory Access. An remote attacker could construct a .xls file and put it on controlled web site. When the user opens the .xls file with Microsoft Internet Explorer, the browser will call Microsoft Excel to open the .xls file automatically, and this will cause Microsoft Excel to crash. If excel file is specially crafted, it may allow attackers to execute arbitrary code on the affected system.

tags | advisory, remote, web, arbitrary
advisories | CVE-2006-0029
SHA-256 | dc9856cf4ccaafabc94f927fb1c3ed7a4f3095e88f27bb0e22a383e59fe370ae
Secunia Security Advisory 19138
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Office, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 6300c1c3adca03d4a9e89630bb3403bdf04b48dfb5f117a447570c1e4516becc
Secunia Security Advisory 19218
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Flash Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 2bcc89b5a7598588a7df2b8ee4931dee440f1a3b22010cd5f31318a3debeff6f
SYMSA-2006-001.txt
Posted Mar 15, 2006
Authored by Ollie Whitehouse | Site symantec.com

Symantec Security Advisory SYMSA-2006-001 - There exists a buffer overflow in Microsoft Word, Excel, PowerPoint, and Outlook in the parsing of the routing slip metadata. The result is that when a user closes a malicious document, arbitrary code can be executed on the host in question.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-0009
SHA-256 | ea731a97597080437bb7468feb46d673d0c29d6bf906cdf8a42e809c2c07d1db
Page 2 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close