Default Newsletter Issue #1: Last weeks news on Help Net Security, Y2K: As the millenium approaches, A look into basic cryptography, The history of Zero Knowledge Systems, Telecommunications 101, Macintosh security: How to make your mac a babel tower!, Computing: A closer look at hard- and software, An approach to Linux System Security, Infection & Vacination, Spam: The problems with junk e-mail, Freedom of speech - related incidents, Meet the underground.
bba707d22f2ebf95680af99290e2f4fd516ba71b51f813951b3a22eeb268356f
Default Newsletter Issue #2: Y2K: As the millenium approaches, A look into basic cryptography, Internet privacy: What are the issues?, Telecommunications 101, Macintosh Security: How to set up a gateway and firewall, Computing: A closer look at hard- and software, Linux Firewalls, Infection and vaccination, More from the ACPO front, Freedom of speech - related incidents, Intrusion and detection.
f36b07ac2c4039e4a15ddc5e069c16261545cf3364fa4b563c5cabe3178c3184
Default Newsletter Issue #3: Y2K: As the millennium approaches, A look into basic cryptography, Internet privacy: Freedom Network, Macintosh Security: F33r my hybride M4c, I'm coding!, Computing: A closer look at hard- and software, Linux: IP Masquerading, Infection and vaccination, Freedom of speech - related incidents, Scams - Getting something by all means, Intrusion and detection part two.
a56b7023af5b02dad19a56f846a65e927683fa27d5239a1bbe46847ca442c147
Default Newsletter Issue #4: Description of the Millenium problem, A look into basic cryptography, Telecom 101: Receiving through the serial port, Macintosh security: Security audit with our Mac, Computing: Matrox G400 MAX Review, Understanding basic crypto techniques, Infection & Vaccination, New programs on Net-Security (NS Watch!), More news from the ACPO front, The Hotmail security hole, Meet the underground, Freedom of speech - related incidents, Microsoft Installs US Spy Agency with Windows.
135c1a3d2ad99b4219bb1b0c1cd135db1e677acc96aa882c3c5f5bc6c7612a10
Default Newsletter Issue #5: Defaced pages, Hit2000 report, Interview with v00d00, Want secure and encrypted e-mails? , Security audit with our Mac Part-2/2, More from the ACPO front, Infection and vaccination, Watch out for documents you publish on The Internet, Freedom of speech - related incidents, Y2K survey for 72 countries, Journalism.
2b9073119a8837c4048e7e69b7d34298d9573c23892ddc3c08c6ed1784621d41
Default Newsletter Issue #6: Defaced pages, Ech0 Security Scanner - What's that again ?, Y2K: hoaxes and scams, Infection & Vactination, Hi, my name is..., Virology 101: A primer to computer viruses, More from the ACPO front, Network Solutions Stumbles on WebMail Offering, Securing your Mac, Why NT isn't what it is claimed to be, Freedom of the speech related incidents, Meet the underground.
a8c7df1a687f8285f90ff9500c5fca7ae6f11b3b597aff3c294b82633707d43e
Leapfrog 1.0. Leapfrog will anonymize and redirect any port. It can be used to work around firewall configuration and other issues requiring a port redirect. For example, you have a firewall that does not allow telnet (23), but it does allow http (80). Set leapfrog up on the other side of the firewall to listen on port 80 and send to 23, then telnet to port 80 of the leapfrog machine and you will ricochet to the machine you wish to connect. You will have the Leapfrog machines' IP and MAC addresses. It supports unlimited users (well, limited by memory). Leapfrog can be chained, reconfigured on the fly, and customized to change ports/machine redirects without the need to log into the box. It can be configured (with little work) to remove all traces of itself from disk after being loaded, or it can be configured to log everything (default). It supports colors and some basic admin tools. It is very fast. Leapfrog compiles on Solaris 2.6, 2.7, x86 (2.6, 2.7), Linux with pthread libs, BSD with pthread libs. Possibly others, but it wasn't tested on others. (Official Site).
bf04847a1339af71fba9081ff56a10ae386aa7898991dc6d61ec08ad310c9f2d
Patch to upgrade from Netfilter 0.1.8.
6b9ffe80db6fc4b7f4bf6a9f9307fefd002e63f60fa89356be6cf2ee65992b70
Netfilter 0.1.9 for Linux 2.3.18: Packet Mangling for Linux 2.3. New features: Should work with gcc 2.7.x (no more 'memset undefined'), local NFS and conntrack should work fine, speed should be fine for modems, 'Call rusty: need skb_realloc_tailroom!' for ftp cured, tcp and udp ports printed correctly in iptables, should compile on libc5 for SURE this time. (Official Site).
eadf483fa8256d69fa34e56f42ecd01ee2329ba9eaf195e4593bbadc58892088
UDP backdoor v2.0 for UNIX by {MANIAC}. Archive password is set to p4ssw0rd. Use at your own risk.
11892b19990bc077400e60528a6a411a
The unsetenv function in glibc 2.1.1 suffers from a problem whereby when running through the environment variables, if the name of the variable being unset is present twice consecutively, the second is not destroyed.
e95f036725c67eeb8bbbae8a91e4c1024e21dd154ce64c42d89d5f8972a412d8
On SuSE 6.2, /usr/bin/pb and /usr/bin/pg, suid root by default allow any user to read any file on the system.
bee33e1b284d9c26735967f8e5656a85d2c39e8e862ab38ebecde0fa73eb1db0
A fully functional unix virus that will infect your manpages when started
7a21d58433fa270c7e2dad8c566f8df79a0b4d09c4e1d0864c08a4f8b8dd1733
/usr/bin/sccw contains a bug allowing a local root compromise through an overflow in handling $HOME. For Linux x86 tested on SuSE 6.2.
1a4ba5966711dd2350d5c844fc2fd33fd80a54d53e53c1833f89d49d306a2a05
nlservd/rnavc local root exploit for Linux x86 tested on SuSE 6.2. Exploits Arkiea's Knox backup package.
20ae153167802687c55fbf998a0f2a1a04c7f30f5207c19ae0ed3a19f237ebeb
SSH 1.2.27 vulnerable to a denial of service attack
52db1d05b27b6f7d8b74feae305f307c509b18a2db01b105867f9738c709aa92
SSH has the option of setting up "authentication sockets", used to pass authentication keys securely. When this is used, a socket is created on both client and server machines; the socket created on the server uses an often easy to guess filename (based on the PID)...
75491b9d176b71151fc9e9366f1486cb0fe9a8525c93ee0c5a2c52acb43f9ff4
Local root exploit for Solaris 2.6 through ps and way it handles $LD_PROFILE.
f506a2474914c827ec7a0c0bf71a2c49ecf7efebc987a21b65784bbd6935e068
SCO 5.0.x exploits for scosession and scoterm allowing bin/root respectively.
a61174f64ded7a55fac1aadd1f8c4b9fbd79b7bfc3f5f36cdf34cca15ae44bb3
root exploit for the ProFTPD log_xfer() buffer overflow.
db92d949feac85635925af2c68c4a2d9061dce0a00179e24c9161365329e6f94
When lynx calls external programs for protocols (e.g. telnet), the location is passed unchecked. This can be used to activate commandline parameters.
2efb9a7b590a7fdfbaaf65d327cae8fdd80728736bce172044d775dd8f2118a4
proftpd 1.2.0pre6 patch
5bdc9aa9e1d57b44dbf88aab490454e6434e8ff5c0144e794f2d95918ae4b618
Virtually any program using the GNOME libraries is vulnerable to a buffer overflow attack!
27f7d493a0ad77755b1b1284a650c04745451802d22a2093bee4bdecf5682a29
FreeBSD vfs_cache.c in version 3.0 and later is vulnerable to a denial of service attack as there is no way to purge entries from the cache.
bd076457f63ba433e668902ae2abeed4b04f14b8d13e7b4cff6f2455d620f582
fts library routine vulnerability. Local users could gain root access.
ce67cec1e5bb2748fc8ef9819ef8460f79229b6f4d78e7caeef04af037340737