Twenty Year Anniversary
Showing 76 - 100 of 409 RSS Feed

Operating System: AIX

Secunia Security Advisory 46641
Posted Nov 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities in AIX, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof, vulnerability
systems | aix
MD5 | 503dac369f83579dc41bed47d89db9e2
Samhain File Integrity Checker 2.8.6
Posted Sep 20, 2011
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: A bug with the correlation of entries in monitored log files has been fixed, and a deadtime option has been added to avoid repetitive reports. In verbose mode, the policy under which a directory or file is monitored will be reported now. The update function has been enhanced with an option to update only files listed in a text file, and issues with some compile options have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | b7fe741ce52db1e3b5f0919ea10a24bb
Secunia Security Advisory 45265
Posted Jul 24, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability and a weakness in AIX, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | aix
MD5 | cf8636fa21061eec77a4d94bfe127577
Samhain File Integrity Checker 2.8.4a
Posted May 12, 2011
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: A regression has been fixed that under certain circumstances would cause samhain to hang when reloading the configuration file. A compile error in the samhain_hide.ko kernel module has been fixed. A contributed patch for samhainadmin.pl has been included that allows you to specify the location of the secret keyring. The (l)stat timeout has been increased to fix spurious timeouts under heavy load. The Apache log file parser has been enhanced to allow the insertion of arbitrary regexes into the format definition. New options allow you to define the port range for the open ports check.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | cebadf8b7bb9da1ff828539a297db68b
Secunia Security Advisory 43968
Posted Apr 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious people to bypass certain security features.

tags | advisory
systems | aix
MD5 | 1a2af5844db614e94c2ae33e34dd4740
Samhain File Integrity Checker 2.8.3a
Posted Mar 23, 2011
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Samhain now runs lstat/stat calls in a subprocess to avoid getting blocked by hanging NFS mounts. A compile error on Windows/Cygwin as well as minor networking issues have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 2bc57c3dcc487157703a1a5812ca8511
Samhain File Integrity Checker 2.8.2
Posted Feb 16, 2011
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: It is possible now to skip checksumming for files matching user-defined criteria (based on file size, permission, name, and/or file type). Several minor bugs have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 568c51b7edf1578ada95eac08a177f37
rpc.cmsd Remote Proof Of Concept Exploit
Posted Feb 8, 2011
Authored by Rodrigo Rubira Branco

rpc.cmsd / Calendar Manager RPC service remote proof of concept buffer overflow exploit for Solaris, AIX, and HP-UX.

tags | exploit, remote, overflow, proof of concept
systems | solaris, aix, hpux
advisories | CVE-2010-4435
MD5 | d9f09b7556322f5ef87ed00d0fd9a449
Secunia Security Advisory 42962
Posted Jan 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | aix
MD5 | fac1b6bf57b3a787d669d4643dddb041
Samhain File Integrity Checker 2.8.0
Posted Oct 31, 2010
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: On Linux, it\'s possible now to have samhain report who changed a file (employing the kernel audit system). A module has been added to monitor keys in the Windows registry, and IPv6 networking is supported now.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 1e68bb8639cf4b2be009b2901dd5d660
HP Security Bulletin HPSBMA02596 SSRT100271
Posted Oct 22, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02596 SSRT100271 - A potential security vulnerability has been identified in HP AssetCenter and HP AssetManager for AIX, HP-UX, Linux, Solaris and Windows. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). Revision 1 of this advisory.

tags | advisory, xss
systems | linux, windows, solaris, aix, hpux
advisories | CVE-2010-3291
MD5 | 6842e48ce049162cb8d99f0bde3780d0
Secunia Security Advisory 41446
Posted Sep 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users to gain escalated privileges and bypass certain security restrictions.

tags | advisory, local, vulnerability
systems | aix
MD5 | f7da1f03bcd52bb1a0e9debf58769096
Secunia Security Advisory 40730
Posted Jul 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in AIX, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
systems | aix
MD5 | 1a99bed55869ba68c092abb6b0a85b87
Secunia Security Advisory 40617
Posted Jul 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kingcope has reported a security issue in IBM AIX, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
systems | aix
MD5 | 90f3d6116490afb16db41d4349e4e5e5
AIX 5l FTPd Hash Disclosure
Posted Jul 23, 2010
Authored by Kingcope

AIX 5l with FTP server remote root hash disclosure exploit. Creates a coredump including the root user hash from /etc/security/passwd. This is the second version that was written to be more portable between hosts.

tags | exploit, remote, root
systems | aix
MD5 | 9960734c7ca1d426705d71ffbd6d6444
Secunia Security Advisory 40632
Posted Jul 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has issued an update for AIX. This fixes a vulnerability, which can be exploited by malicious users to potentially compromise a vulnerable system.

tags | advisory
systems | aix
MD5 | e302aa496abe15c2f6c00b6b4291f2f5
rpc.pcnfsd Format String Exploit
Posted Jul 18, 2010
Authored by Rodrigo Rubira Branco

rpc.pcnfsd remote format string exploit for AIX versions 6.1.0 and below.

tags | exploit, remote
systems | aix
advisories | CVE-2010-1039
MD5 | 80bf54ff89c750ace3b212bdc80f1528
Mandriva Linux Security Advisory 2010-129
Posted Jul 8, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-129 - The krshd and v4rcp applications in MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion. The ftpd and ksu programs in MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. Certain invalid GSS-API tokens can cause a GSS-API acceptor (server) to crash due to a null pointer dereference in the GSS-API library. The updated packages have been patched to correct these issues.

tags | advisory, local
systems | linux, aix, mandriva
advisories | CVE-2006-3083, CVE-2006-3084, CVE-2010-1321
MD5 | 6c20e9db2952989c815723d2c29fedcf
Samhain File Integrity Checker 2.7.1
Posted Jun 7, 2010
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Logging of client reports to prelude can be done by the server now (rather than by the clients themselves). The configuration file parser now accepts C-style quoting for filenames, and the maximum line length has been increased to 16382 characters. Some compile problems have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 3e5eca3315332b494b2b68645bb342d4
HP Security Bulletin HPSBMA02538 SSRT100136
Posted Jun 4, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - HP Security Bulletin - A potential security vulnerability has been identified with HP ServiceCenter running on AIX, HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to allow cross site scripting (XSS).

tags | advisory, xss
systems | linux, windows, solaris, aix, hpux
advisories | CVE-2010-1963
MD5 | ac150ab05f77209382734aac771f1bcc
HP Security Bulletin HPSBGN02315 SSRT071487
Posted May 27, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP TestDirector for Quality Center running on AIX, Linux and Solaris. The vulnerability could be exploited to allow remote unauthorized access.

tags | advisory, remote
systems | linux, solaris, aix
advisories | CVE-2010-1959
MD5 | 8944d506a2f2160f81e73b8fbdbd33f8
Secunia Security Advisory 39909
Posted May 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Communications Server for AIX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | aix
MD5 | 3d0c9393fee80201bc8d5c859e00ae05
Secunia Security Advisory 39932
Posted May 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has issued an update for OpenSSL included in AIX. This fixes some vulnerabilities, where one has an unknown impact and the others can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | aix
MD5 | 64ad8a882f4a85c0a04cd7619d5f37f2
rpc.pcnfsd Syslog Format String
Posted May 22, 2010
Authored by Rodrigo Rubira Branco

rpc.pcnfsd suffers from a syslog related format string vulnerability. IBM AIX versions 6.1.0 and below, IRIX 6.5 and HP-UX versions 11.11, 11.23 and 11.31 are all affected.

tags | advisory
systems | irix, aix, hpux
advisories | CVE-2010-1039
MD5 | 6a561a87ac3fe6bcbce97917f6ebcfbf
Secunia Security Advisory 39911
Posted May 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | aix
MD5 | 7b3f2427da824eb0497cf1af4d76d30c
Page 4 of 17
Back23456Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    20 Files
  • 20
    Apr 20th
    7 Files
  • 21
    Apr 21st
    10 Files
  • 22
    Apr 22nd
    2 Files
  • 23
    Apr 23rd
    17 Files
  • 24
    Apr 24th
    13 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close