Exploit the possiblities
Showing 51 - 75 of 254 RSS Feed

Operating System: NetBSD

Mandriva Linux Security Advisory 2010-027
Posted Jan 27, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-027 - KDE KSSL in kdelibs 3.5.4, 4.2.4, and 4.3 does not properly handle a \\'\\0\\' (NUL) character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle allocation failures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document that triggers write access to an offset of a NULL pointer. WebKit in Apple Safari before 4.0.2, KHTML in kdelibs in KDE, QtWebKit (aka Qt toolkit), and possibly other products does not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to recursion in certain DOM event handlers. WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document. KDE Konqueror allows remote attackers to cause a denial of service (memory consumption) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692. The gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc in FreeBSD 6.4 and 7.2, NetBSD 5.0, and OpenBSD 4.5 allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a large precision value in the format argument to a printf function, related to an array overrun. WebKit, as used in Safari before 3.2.3 and 4 Public Beta, on Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 and Windows allows remote attackers to execute arbitrary code via a crafted SVGList object that triggers memory corruption. The updated packages have been patched to correct these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, spoof, javascript
systems | linux, netbsd, windows, freebsd, openbsd, apple, osx, mandriva, iphone
advisories | CVE-2009-2702, CVE-2009-1687, CVE-2009-1725, CVE-2009-1690, CVE-2009-1698, CVE-2009-2537, CVE-2009-0689, CVE-2009-0945
MD5 | 71dd2ef10df3ead3da1c7f0863e27e61
Secunia Security Advisory 38134
Posted Jan 17, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | netbsd
MD5 | 6aa26e8edf575fe5fc5ee2623614f910
Rootkit Hunter 1.3.6
Posted Nov 30, 2009
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: This release offers more ease of use and improved checks. The changelog lists 29 additions including 9 configuration options and details for 12 rootkits, 29 changes including improvements for 15 rootkit checks, and 22 bugfixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 41bd92b1ea0803401c4a45215c8293a2
Backconnect Script For NetBSD
Posted Nov 3, 2009

This is a back-connect script written for NetBSD and was made as a result of playing with /dev/tcp.

tags | tool, tcp, rootkit
systems | netbsd, unix
MD5 | 7a868f2fae6a808dfc4fb2827b757da1
Kernel-Level TTY Key And Screen Logger 2.60
Posted Oct 15, 2009
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a multi-OS kernel-level tty key and screen logger. Recorded sessions can be followed live or replayed at a later time. Supported platforms are Linux, Solaris, FreeBSD, NetBSD, and OpenBSD.

Changes: Support was added for recent versions of various operating systems, such as Linux 2.6.31, FreeBSD 8, OpenBSD 4.5, and NetBSD 5. Escape codes that would trigger an unwanted terminal response are now filtered. The packet format has also been altered to accommodate packets larger than 64K.
tags | kernel, system logging
systems | linux, netbsd, unix, solaris, freebsd, openbsd
MD5 | 68837fd1635902c55d9ceb8b0a75b1ea
Secunia Security Advisory 36775
Posted Sep 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | netbsd
MD5 | 691a7da3c0b8d50388e45a84ae172c55
Check Rootkit 0.49
Posted Jul 30, 2009
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: New and enhanced tests, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
MD5 | 304d840d52840689e0ab0af56d6d3a18
Secunia Security Advisory 36056
Posted Jul 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for BIND. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | c88babb9c63b62100427110171edd7b7
Secunia Security Advisory 36044
Posted Jul 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | fc2abcf1ef9f7840db6b1e7f6f9cb2ed
Secunia Security Advisory 36043
Posted Jul 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for ISC DHCP. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | 47eb48bac13eaa9c504e07906f141556
Secunia Security Advisory 35832
Posted Jul 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for ISC dhclient. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
systems | netbsd
MD5 | 734c38f80235df1a8781494cc309402c
Secunia Security Advisory 35729
Posted Jul 8, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | netbsd
MD5 | 034126791cf7fed92979af50e7bf1ef9
Secunia Security Advisory 35631
Posted Jul 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has acknowledged some vulnerabilities in hack, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
systems | netbsd
MD5 | c4623093a4dabe552b53ed1dad969539
Secunia Security Advisory 35670
Posted Jul 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for ssh. This fixes a vulnerability, which potentially can be exploited by malicious people to disclose sensitive information.

tags | advisory
systems | netbsd
MD5 | a3b59a28948bb8b2bfbb5e8de0ce48a8
Secunia Security Advisory 35630
Posted Jul 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for ntp. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | netbsd
MD5 | 5d8707bf43a0bedee6e7236f98bba2ae
Multiple Vendors libc/gdtoa printf(3) Array Overrun
Posted Jun 26, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

An array overrun vulnerability has been discovered in libc/gdtoa printf(3). Systems affected include OpenBSD version 4.5, NetBSD version 5.0, and FreeBSD versions 7.2 and 6.4.

tags | advisory, overflow
systems | netbsd, freebsd, openbsd
advisories | CVE-2009-0689
MD5 | b60dc8e7cd15abef3ab6de2a7b3a582f
Secunia Security Advisory 35556
Posted Jun 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has acknowledged a vulnerability in proplib, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | f29cf54dbc340263d39769087f2223f0
Secunia Security Advisory 35553
Posted Jun 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has acknowledged a weakness in OpenPAM, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | netbsd
MD5 | 60cd02cdfe3a22a049d33caaf7c5452a
Secunia Security Advisory 35555
Posted Jun 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has issued an update for tcpdump. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | netbsd
MD5 | 3e72f6998c42c9a8d35ea9767c042571
NetBSD x86 Kill All Processes Shellcode
Posted Jun 19, 2009

NetBSD/x86 kill all processes shellcode.

tags | exploit, x86, shellcode
systems | netbsd
MD5 | a18757a54f6286cdb3307308a8b829e5
Packet Filter Null Pointer Dereference
Posted May 1, 2009
Authored by Rembrandt

PF in OpenBSD, NetBSD, and various other Unix variants suffer from a null pointer dereference vulnerability.

tags | exploit
systems | netbsd, unix, openbsd
MD5 | 60d751eefd8b784dbe6d32c93886e27b
Rootkit Hunter 1.3.4 Is Released
Posted Dec 31, 2008
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: The changelog for this release is packed listing 4 new additions, 8 changes, and 9 bug fixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 31eaacc4d01ad138d1a4283f105088e6
Secunia Security Advisory 32406
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, or to cause a DoS (Denial of Service).

tags | advisory, denial of service, spoof
systems | netbsd
MD5 | 9d9a795b09494f60104340d40c1a46ab
Secunia Security Advisory 32401
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has acknowledged a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | 14e345676d1c62d2904a6ecc108574bf
Secunia Security Advisory 32068
Posted Sep 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maksymilian Arciemowicz has reported a vulnerability in NetBSD ftpd, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
systems | netbsd
MD5 | 2ec5e1e09160f6288f06c1ef37a29ca6
Page 3 of 11
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    11 Files
  • 21
    Feb 21st
    3 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close