exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-04-20

Technical Cyber Security Alert 2004-111B
Posted Apr 20, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-111B - There is a vulnerability in Cisco's Internetwork Operating System (IOS) SNMP service. When vulnerable Cisco routers or switches process specific SNMP requests, the system may reboot. If repeatedly exploited, this vulnerability could result in a sustained denial of service (DoS).

tags | advisory, denial of service
systems | cisco
SHA-256 | 3fed4b1233387104fb4e7e1bcf2dc6aba32e42412482673afff6ef774107c8b3
honeyd-0.8b.tar.gz
Posted Apr 20, 2004
Authored by Niels Provos | Site citi.umich.edu

Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Changes: Several bugs that would cause operating system detection with nmap to fail were fixed along with compilation issues for honeydctl on Linux and *BSD. Support for log rotation via SIGUSR1 was added.
tags | tool, arbitrary, tcp, intrusion detection
systems | unix
SHA-256 | 7d774533010e55a38825fb6cd571a33808e83c5d6691f10ee26527fd93b97646
sid-0.3.4.tar.gz
Posted Apr 20, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 171f0659442c5f4b2c3add675ca0fb1fed6c5140f661990d020b34e8775b61f4
jpegrescue.c
Posted Apr 20, 2004
Authored by Tobin Fricke | Site splorg.org

JPEG Rescue is a small program used to search a formatted/wiped filesystem for JPEG files and extracts them. Designed to work with Compact Flash cards.

tags | tool
systems | unix
SHA-256 | 802d96933d5b0b04de56f8b7429a033f7d15c6374370b066c22ead634e9f1de1
lids-2.2.0pre3-2.6.5.tar.gz
Posted Apr 20, 2004
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.

Changes: Kconfig ifdef cleanup, added back the fastguessing for acl searching, capability fixed up.
tags | kernel, root
systems | linux
SHA-256 | e025e71556bd167fa5f567b20af24a34eb59dcaf730c8e180f0c41520490d2ca
0x3142-sq-chpasswd.c
Posted Apr 20, 2004
Authored by x314

Local root exploit for Squirrelmail's chpasswd utility. Tested on Suse 9. Original bug found by Matias Neiff.

tags | exploit, local, root
systems | linux, suse
SHA-256 | 2b92773c507dec11bb83386fb30b5c4db547be150a75c00aec35583c53feee1b
p_xfree.c
Posted Apr 20, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

XFree version 4.3.x local root exploit that makes use of the vulnerability that exists in the use of the CopyISOLatin1Lowered() function with the 'font_name' buffer.

tags | exploit, local, root
SHA-256 | 5f80619f3d14965d61bcf967f0b26ae2e5d1de37280e8076979c4872b7760af0
isec-0015-msfilter.txt
Posted Apr 20, 2004
Authored by Wojciech Purczynski, Paul Starzetz | Site isec.pl

Linux kernel versions 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 have an integer overflow in setsockopt MCAST_MSFILTER. Proper exploitation of this vulnerability can lead to privilege escalation.

tags | advisory, overflow, kernel
systems | linux
SHA-256 | 836369aad1ed778a870f252f0733e83e6fb921672b010265395c6bb0c30ddc9d
THCbindinfo.c
Posted Apr 20, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

Quick and dirty hack to grab the versions from ISC bind 8 and 9 nameservers.

SHA-256 | d1a49379069a489d6405a914d21fcb59edfd323ab4351efa3f15397dc1398ba1
THCsmbgetOS.c
Posted Apr 20, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

A small, but very useful SMB OS-detection tool which gets workgroup, smbserver and operating system. It works for all tested samba versions on different platforms like Mac OSX, AIX, Solaris, Linux, BSD, and all Microsoft Windows platforms.

systems | linux, windows, solaris, bsd, aix, apple
SHA-256 | 15e66dd0f9ffc8a4ba1ade94a6b6fa5ed858378503b48dd688db6c38623db32a
eudora61.pl
Posted Apr 20, 2004
Authored by Paul Szabo

Eudora 6.1 still has attachment spoofing flaws along with a Nested MIME DoS vulnerability.

tags | exploit, denial of service, spoof
SHA-256 | d3024ea6787aa72ecd301f863e452c672b83f691a325455dd8c7f5b291042e9a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close