exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-06-12

netsec17.txt
Posted Jun 12, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 17 - 12.06.2000 - Covers weekly roundups of security related events. In this issue: DNS security in Austrailia, Cellphone worm, VBS plan worm, Winn Schwartau's war against the net, bots defend networks, Interview with Marcus Ranum of NFR, IE 5 Cross-frame security vulnerability, Kdelibs vulnerability for setuid KDE applications, ColdFusion Web Application Server DoS attack, Sendmail Workaround for Linux Capabilities Bug, and flaws in the SSL transaction handling of Netscape.

tags | worm, web
systems | linux
SHA-256 | bfde7f5ca1c9c62230187fcb5910190e4359ec4b7d5f0a920e30482be68dac6b
pikt-1.10.0.tar.gz
Posted Jun 12, 2000
Authored by Robert Osterlund | Site pikt.uchicago.edu

PIKT is a multi-functional tool for monitoring systems, reporting and fixing problems, and managing system configurations. PIKT is quickly gathering potential as a serious security management system. PIKT comprises an embedded scripting language with unique, labor-saving features.

Changes: Rewrote much of the script processing code in a more modular, readable, and maintainable fashion. Revised the value history mechanism, fixing a serious scalability problem. Fixed several small bugs and made other code improvements. Binaries available here/.
tags | tool
systems | unix
SHA-256 | 47c3b254931e7dd4ce066386de539ef68797d4d01c86e9939d4bb786ee18adf7
oasis2.c
Posted Jun 12, 2000
Authored by Oasis

oasis2.c sends spoofed ICMP_SOURCE_QUENCH packets, telling the victim host to slow down data transmission.

tags | exploit, spoof
SHA-256 | caf38ff30c91e72d083821bc20375b417d1bf05afe59cd3258fa379237529825
CA-2000-11.kerberos
Posted Jun 12, 2000
Site cert.org

CERT Advisory CA-2000-11 - MIT Kerberos vulnerable to denial-of-service attacks. Several new buffer overflow vulnerabilities were found in Kerberos 4, Kerberos 5 with v4 support, KerbNet, and Cygnus Kerberos. Due to the use of static buffers, these vulnerabilities do not allow remote execution of arbitrary code.

tags | remote, overflow, arbitrary, vulnerability
SHA-256 | d96c4bdd107b1255a3004276121d75e0c5c68ad148f76745301d12d5346d2095
freebsd-cdrecord.c
Posted Jun 12, 2000
Authored by Sectorx | Site xorteam.cjb.net

Freebsd cdrecord local root exploit - Tested against FreeBSD 3.3-RELEASE.

tags | exploit, local, root
systems | freebsd
SHA-256 | 69c97fd5a84be42d400615e765ad61662441f2ca88b97bbb52105cfe55f17024
linux-security.1-7.txt
Posted Jun 12, 2000
Authored by Benjamin Thomas | Site linuxsecurity.com

Linux Security Week June 12 - In this issue: A very serious Linux kernel security bug was recently discovered that allows local users to gain root access, SuSE 6.x: qpop vulnerability, Conectiva: gpm Remote buffer overflow, BRU: local root exploit vulnerability, Solar Designer's OpenWall Kernel Patch, BSD Based Operating Systems: IPCS, RedHat 6.x: kdelibs vulnerability, Debian: mailx local exploit, Linux 101: Basic network security, Bastille Linux: A Walkthrough, OpenSSH 2.2.1 Released, and more.

tags | remote, overflow, kernel, local, root
systems | linux, redhat, suse, bsd, debian
SHA-256 | 58e4d65d069ee0c9790083443a819679b23f181c9a9c60da9e29a3506ff1ab83
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close