the original cloud security
Showing 101 - 125 of 253 RSS Feed

Operating System: NetBSD

Secunia Security Advisory 19616
Posted Apr 14, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | netbsd
MD5 | eecc6f6e1e4bcc636ebdbab3bb523552
Secunia Security Advisory 19463
Posted Mar 31, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has acknowledged a vulnerability in racoon, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
MD5 | 7c1c5a3036fe3dc33045c5b16fcb30f9
Secunia Security Advisory 19464
Posted Mar 31, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information.

tags | advisory, local
systems | netbsd
MD5 | 4bea9f9744faa66cc6fea042315f3f7a
Secunia Security Advisory 19465
Posted Mar 31, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in NetBSD, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information.

tags | advisory, local
systems | netbsd
MD5 | ea9bf79b547600fe7f75af168674c06d
Secunia Security Advisory 19466
Posted Mar 31, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has acknowledged a vulnerability in sendmail, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | netbsd
MD5 | 37ed75eb0377d40d860e560eed9ce3e7
p0f-2.0.6.tgz
Posted Mar 10, 2006
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris.

Changes: Bug fixes and feature enhancements. Cygwin support.
tags | tool, remote, local, scanner
systems | linux, netbsd, unix, solaris, freebsd, openbsd
MD5 | 5f48bc69592079dad0a3866f39905141
rkhunter-1.2.8.tar.gz
Posted Feb 26, 2006
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support for Fedora core 4, FreeBSD 4.11, 5.2, 5.3, 5.4, 6.0, CentOS 3.3, CentOS 3.5, 4.1 and 4.2, Debian 3.1 (AMD64), RHEL WS/AS/ES 3 Taroon update 6, RHEL WS 4 Nahant Update 1 and 2, and Slackware 10.2.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 41122193b5006b617e03c637a17ae982
kernelBSD.txt
Posted Feb 4, 2006
Site securitylab.net

Due to a flaw in the original patch implemented by the NetBSD team in release 2.0.3 the kernfs_xread function was still vulnerable to exploitation. OpenBSD's 3.8 kernel release contained the same vulnerability and the same type of patch as NetBSD 2.0.3.

tags | advisory, kernel
systems | netbsd, openbsd
MD5 | c35c3724bcfcae53b43286818cef97de
Secunia Security Advisory 18388
Posted Jan 11, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
systems | netbsd
MD5 | 0a2a3106a7eddce6f63a0dfd5d7cf858
NetBSD-SA2006-002.txt
Posted Jan 10, 2006
Site NetBSD.org

NetBSD Security Advisory 2006-002 - The prohibition against setting the system time backwards at securelevel > 1 can be circumvented.

tags | advisory
systems | netbsd
MD5 | 2fdff858ac9159d97935dc26b5530ca3
NetBSD-SA2006-001.txt
Posted Jan 10, 2006
Site NetBSD.org

NetBSD Security Advisory 2006-001 - The kernfs filesystem does not validate file offsets properly and a userlevel non-privileged process can read arbitrary kernel memory locations.

tags | advisory, arbitrary, kernel
systems | netbsd
MD5 | 7c3395740681de7aea30a35cf4e00e2b
rt-sa-2005-16.txt
Posted Jan 10, 2006
Site redteam-pentesting.de

The implementations of securelevels on NetBSD and Linux contain an integer overflow, allowing the protection of system time to be completely circumvented.

tags | advisory, overflow
systems | linux, netbsd
advisories | CVE-2005-4352
MD5 | 849401f20aafd7ad6d40b6543eec82e3
netbsdCallback.txt
Posted Dec 1, 2005
Authored by pasquale minervini

NetBSD/i386 2.0, callback shellcode (port 6666);

tags | shellcode
systems | netbsd
MD5 | 4e60dfbebdf96d693a75bbbc428de53f
netbsdExec-2.txt
Posted Dec 1, 2005
Authored by pasquale minervini

NetBSD/i386 2.0, setreuid(0, 0); execve("/bin//sh", ..., NULL); shellcode. 29 Bytes.

tags | shellcode
systems | netbsd
MD5 | e6bdb0644018e75671f759bae99c49cb
netbsdExec-1.txt
Posted Dec 1, 2005
Authored by pasquale minervini

NetBSD/i386 2.0, setreuid(0, 0); execve("/bin//sh", ..., NULL); shellcode. 30 Bytes.

tags | shellcode
systems | netbsd
MD5 | 7812bf0c939272faec4a77476071ea16
prdelka-vs-BSD-ptrace.tar.gz
Posted Nov 8, 2005
Authored by prdelka | Site prdelka.blackart.org.uk

NetBSD versions 2.1 and below ptrace() local root exploit.

tags | exploit, local, root
systems | netbsd
MD5 | 58fd50723dee56fbe36eb241e3a24a3e
Secunia Security Advisory 17389
Posted Nov 3, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges, or by malicious users to cause a DoS (Denial of Service) and compromise a vulnerable system, or by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, denial of service, local, vulnerability
systems | netbsd
MD5 | 408bdf8bbe9db6e40910dc168c1d2dc7
Secunia Security Advisory 15874
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | netbsd
MD5 | b38283ecee0aebc51099a163331deeaa
netbsd-2005-001.txt
Posted Jul 1, 2005
Site netbsd.org

NetBSD Security Advisory 2005-001 - The Pentium CPU shares caches between HyperThreads. This permits a local process to gain a side-channel against cryptographic processes running on the other HyperThread. Testing for cached data can be accomplished by timing reads. Under some circumstances, this permits the spying process to extract bits of the key. This has been demonstrated against OpenSSL.

tags | advisory, local
systems | netbsd
MD5 | 0b7d686df11dc8fabc0eddfddfd7f9ec
rkhunter-1.2.7.tar.gz
Posted May 30, 2005
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Includes a bugfix for the updater, and improved support for Bind, RHEL AS, CentOS, Mandrake, E-smith, and FreeBSD.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 288ba8a87352716384823c9ea1958fa7
rkhunter-1.2.4.tar.gz
Posted Apr 28, 2005
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Supports E-smith (SME 6.0), updated Fedora core 2 hashes, and many cool improvements to the installer and the tools. Also fixes a bug with the --allow-ssh-root-user option.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | d3f653233376af34bcdd2837cff56a3a
chkrootkit-0.45.tar.gz
Posted Apr 18, 2005
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.

Changes: Various improvements, minor bug fixes.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd, hpux
MD5 | 57493e24ca81750a200d8bcb4049e858
rkhunter-1.2.3.tar.gz
Posted Mar 22, 2005
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Whitelisting was added for hidden files and directories. Support for SuSE 9.2 (64 bits) was added. The manpage was updated. The package database and MD5 hash database were updated. The installer was immensely improved.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | 404ae3f5cde3ede8e3be1ee1f04f52d5
p0f-db-20050307.tar.gz
Posted Mar 15, 2005
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris. This particular version is modified by Nerijus Krukauskas to store the data in a database.

Changes: Added a patch.
tags | tool, remote, local, scanner
systems | linux, netbsd, unix, solaris, freebsd, openbsd
MD5 | b95d46afd1f43382b862b880bfac6aa2
rkhunter-1.2.1.tar.gz
Posted Feb 26, 2005
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support for Mandrake 8.1 (i586, no hashes), FreeBSD 5.3 (i386, with hashes for release version), Slackware 10.1. Updated various hashes. Improved logging. Fixed typos.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
MD5 | a5591b84c41a736b1e0ae64947f65b76
Page 5 of 11
Back34567Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close