On solaris (maybe also AIX) the installation of WebSphere from IBM installs a deinstallation shell script in /usr/bin with mode 777. This gets run by root.
ab14cab6e5574ea1cbe2c6ebaa65c3d72eab077850d8673140f0b2245ad67470
This is regarding a logic but in the shadow suite that enables a brute force attack for finding and cracking login in accounts via telnet (and possibly some other nasty side affects). If the account is locked or does not exist, the telnet connection will drop immediately.
361d517df27985b876da419da8f31aae37d0bb58446e06867cc90115923155ff
Pandora v4 Beta 2.1 Netware Attack tool for Linux - Offline password auditing and Online attack for the X Windows platform on Linux. The Online software requires an IPX-aware kernel and root.
04176a26ae4765b00ef4e4f75faf0e72600d8e13e260d89cfd33ce9a9697bc98
The IE 5 Web Proxy Auto-Discovery (WPAD) feature enables web clients to automatically detect proxy settings without user intervention. The algorithm used by WPAD prepends the hostname "wpad" to the fully-qualified domain name and progressively removes subdomains until it either finds a WPAD server answering the hostname or reaches the third-level domain. A vulnerability arises because in international usage, the third-level domain may not be trusted. A malicious user could set up a WPAD server and serve proxy configuration commands of his or her choice. Microsoft FAQ here.
29f73e3d19883fc29c12f6db9708c87545175d7ca226325e950747fadc18d8ad
Speeding Up Your Internet Connection using DNS Caching under Unix and Windows: everything you've always wanted to know about DNS caching but were afraid to ask.
68e339cb0b62929ec6a1e6f0bca1896fd0fa6920a1475c05ac6a0430e116b8b7
Trojan port list which covers 171 remote trojans. Archive password is set to p4ssw0rd. Use at your own risk.
e7568202d0d3c02b0044c7d4d54e3092aed55dab34dbbd571294a5ec231fbd30
Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in pdf format.
fe89bf833c3fbce4093062cabfc60183cc818333c2d1405d6bb45e39b7db6d25
Spanish translation, for the Kurt Seifried 's Linux Administrator's Security Guide in postscript format.
12db919962cbe5f321fed5d1b2d3f6281ba9a3683c995a174ee5197b3d12055e
Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in text format.
97231323d7cabf3ddb93b90db4f8178a692c77857ea910ddfa67be40ff6832b1
Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in HTML format.
89820d58bc30853377078b5112bf63b242c99bfc1dcb91617712124607daf73f
Microsoft has released a patch for a vulnerability in the SSL ISAPI filter that ships with IIS and other microsoft products which could allow plaintext to be sent back to the data's owner. A FAQ about this vulnerability is here.
87a0a7a5e8e96807db49642cd72ae20247b0809d7717d3d6245dfc2c75b1135f
The version of dump that was distributed with Debian GNU/Linux 2.1 suffers from a problem with restoring symbolic links. The new version uses lchown instead of chown, fixing a possible security problem when restoring symlinks (a malicious user could use this to deliberately corrupt the ownership of important system files). Debian security website here.
d6ca5c12e1090ef63a7880ef69eb09531e1db975d5bfe60b3bafad55afdc3887
A vulnerability has been found that the installation of Internet Explorer 5 introduces in Windows NT through the Task Scheduler service. This vulnerability makes it possible for a User to become a member of the Administrators group if he/she can do an interactive logon. The Task Scheduler service is an "improved" version of the usual Schedule service - they are not the same thing. The Schedule service is replaced by the Task Scheduler when Internet Explorer 5 is installed on Windows NT. Microsoft security bulletin 51 addresses this issue and is available here.
e586b63470a7536dfa7b26cc02b77cf27aea8efa4fc13b852d5f0a78a50e98c8
A serious bug exists in UnixWare 7.1's libc. A buffer overflow in gethostbyname() will allow any user to obtain elevated privileges. My demonstration exploit happened to be "arp", but any program calling this function will do.
33ff95b3f628171302cc481f7d84bd468b39f1cbee5eefe342b2237ec3c91cdd
SCO UnixWare 7.1's sgid-sys /usr/bin/uidadmin will allow any user to gain root privileges as a result of it's ability to write *ANY* file, not just those traditionally writable by gid-sys. Exploit for 7.1 included, 7.0 is vulnerable as well.
e3601c95a78b23bc230de20b8d8323da8152ce4edc6999c9572c383340376a25
Core/SDI discovered a second buffer overflow in the implmementation of the RSA algorithm in RSAREF2 from RSA Data Security. This advisory addresses the details of the bug discovered, the details are somewhat focused on the ability to exploit the bug in SSH compiled with RSAREF2, but its extensible to any software product that uses RSAREF2.
527168062ffc62dfc807ebe43c1e9bb63bab56ab4c45d4ed0623b4acd4bf4dcc
Netscape Enterprise Server and Netscape FastTrack Server are widely used Internet web servers. Internet Security Systems (ISS) X-Force has discovered a vulnerability in Netscape Enterprise Server and Netscape FastTrack Server, as well as in the Administration Server supplied with both. There is a buffer overflow in the HTTP Basic Authentication that can be used to execute code on the machine as SYSTEM in Windows NT or as root or nobody in Unix, without requiring authentication. The Administration Service runs as root in Unix, the Application Server runs as the user nobody by default.
8187b5e0d5711bc5d702c33784339ce21a06c2477828919f768b1d4d8b39cbf0
There is a Local/Remote DoS Attack in Serv-U FTP-Server v2.5a. Source / Binary available here.
d83888fc7f71eee75b5beae3a3c7641437bf142bd15113b4fdd74e42c083547c
Logcheck helps spot problems and security violations in your logfiles automatically and will send the results to you in e-mail.
dfe4cb29305c619dc0a0aca5b11b2bd397baccf3076b48f03457f66f299ab42e
NetPeek is a GUI-based network monitoring and diagnosis tool. It captures packets from the local network and displays them to the user in two forms: a short one-line description similar to that produced by tcpdump, and a long form that displays the contents of all fields within the packets in full. NetPeek also includes some useful network analysis tools similar to ping, hostname lookup, netstat, rpcinfo, and ifconfig.
c09c629cde249d7c09dd110b2ec1a63fcc17bb77cb6277f965e52c98e50fe6fd
logsurfer is a log checking/auditing tool similar to swatch and logcheck but with the capability of handling multi-line messages and dynamically adapting the ruleset. It is written in portable C, well documented, fast, and flexible. It works on any textfile or stdin, can be run at intervals or continuously, and has timeouts and resource limits.
544d9a0a79ddca06aa9c17d04f98e8f51ea727e3420c9328c79cdd428d89689e
Sendmail-TLS is a wrapper for Sendmail which allows for clients to make a secure (SSL) connection to their mailserver as described in RFC 2487. The connection is internally forwarded to sendmail and does not require sendmail to be running on port 25. Clients which support this currently are Netscape Messenger, Microsoft Outlook, and Microsoft Outlook Express.
16feb4a9df58db47671f987a4b8d4916701fed719f503063c6e3ebedf68d6d2a
Portfwd is a small C++ utility which forwards incoming TCP connections and/or UDP packets to remote hosts. Multiple forwarders can be specified in a flexible configuration file.
0b34ee09d0cbd1db6fb166d906bec18b73d868fd203c6728baf0e90b8e107330
Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux. Virtually every task it performs is optional, providing immense flexibility. It also educates the user regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
84bd4c8d84f91c54e1931a348fdbb0ade81ac8f75d3f5e5777b1655b8413d7a8
PortSentry is part of the Abacus Project suite of security tools. It is a program designed to detect and respond to port scans against a target host in real-time. It runs on TCP and UDP sockets and works on most UNIX systems. Advanced stealth detection modes are available under Linux only and detect SYN, FIN, NULL, XMAS, and Oddball packet scans. All modes support real-time blocking and reporting of violations.
dcd261b2ed7cb1fc2b602b0b94fa7d47cfbbfaf03a0fb3d92ce243e2f647588d