S.A.F.E.R. Security Bulletin 000309.EXP.1.4 - StarOffice comes with a nice groupware server, called StarScheduler, which includes a web server that is vulnerable to several security problems, leading to remote code exection and root access.
20d5c4fc9990de97aeb124f4e5c58bf4dce2d6d9da6be61b3c34503af0ffcd43
Most webservers can be DoS'd by creating a large number of tcp connections from the same host. Simple, lame, and not spoofed, but effective nonetheless.
742f8b8c58b74086dd6f9e8870807bede34139f4d3d48adb713b24fbf53308f2
Windows Security Digest - March 8, 2000. In this issue: Buffer Overflow in Clip Art Gallery, Device Names in a URL Can Crash Windows 9x, Internet Explorer 5.0 Allows Arbitrary Code Execution, Omniback Subject to Denial of Service, Feature: Kerberos in Windows 2000, HowTo: Maximizing Proxy Server Security, Review: Synch Passwords with SAM/PS or P-Synch 3.5, and How to Analyze Internal and External Firewall Activity.
6a8c9ed6cebe9b223ea141995ee14ce777b5b49b054b3802d778ae2a59be4aa9
Windows Security Alert - Serious buffer overflow in Microsoft's ClipArt Gallery Live Update that could allow an intruder to gain control over a remote machine. Because clipart updates can be received from sites other than Microsoft, a malicious Web site operator can launch an exploit against an unsuspecting user. Affected Microsoft products include Office 2000, Works 2000, PictureIt 2000, HP 2000, Publisher99, and PhotoDraw 2000 Version 1.
ad675d94704391ceb1013ac6d344640026895f7d321265f61298c341963b4d1c
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
5cbe1d1d292d519db4d8dc7a90e264fab5d367227a8af23f769b69c42d94e8d4
Toast is a shell script which launches 56 different DoS attacks against a victim IP. Binaries and source included.
4fa3d3b152d95cc046b06a63aaee0189105039f39f35848f758dc03de2d43c65
Fix for bugregcon.vbs, a small script that added c:/con/con to the registry, rendering a windows system useless.
502de921b52b8e55a2b6084c73b22e406dc59dbe11c10a156bd27f6337b604c1
ipchains-firewall is an easily-configurable shell script to establish masquerading and firewalling rules using ipchains. The package contains a script to establish firewalling for a single machine connected to the network without masquerading, a script to establish firewalling for a system acting as a router routing to non-private IP space, a script to establish firewalling and masquerading for a system acting as a router routing to private IP address space, and one to establish firewalling and masquerading for a system acting as a router, routing to multiple RFC1918 subnets over multiple interfaces. The distribution also includes a copy of midentd v1.6, to enable identd over the masqueraded network.
cf88ed66335d82924a292f83db2889c6f309b9bcb9e7cdce3480bee29185d543