Linux Security Week June 26 - In this issue: The default configuration of wu-ftpd is vulnerable to remote users gaining root access, Simple Object Access Protocol (SOAP), Network Intrusion Detection Using Snort, Updates for Mandrake bind, cdrecord, dump, fdutils, kdesu, xemacs, and xlockmore, Remote users can cause a FreeBSD system to panic and reboot via bugs in the processing of IP options in the FreeBSD IP stack, Remote vulnerabilities exist with all Zope-2.0 releases, NetBSD: libdes vulnerability, RedHat: 2.2.16 Kernel Released, Bastille Linux Review, and Intel admits wireless security concerns.
c0d7ad7845e4e90d9f4129a48230f19515b41a6a9486eb4dafc7447bd62eed0c
PIKT is a multi-functional tool for monitoring systems, reporting and fixing problems, and managing system configurations. PIKT is quickly gathering potential as a serious security management system. PIKT comprises an embedded scripting language with unique, labor-saving features.
bb923db7b45bf28cd668b582701807d3c15a4af79976b78c8f7bf479c8a87cfe
exim local buffer overflow exploit.
6c2ff838baf8851b374d45600a8b07c39ab9e3e947db5aeab59f0b03a3e099d8
iisdos.c is a dos attack against Microsoft Windows 2000.0 running IIS.
3a5391689ea601a5d266aaa724384ad438a4b0e2bd5af92c61ad494be825bb70
Sendmail & procmail & kernel less than 2.2.15 local root exploit.
4296222d1bf1930105daa59e2a5114c9af90add47c2081575d64f3a6d4215ae3
Linux kernel 2.2.X (X<=15) & sendmail less than or equal to 8.10.1 local root exploit shell script.
3b67ba848976793933d8e5cb6e27c246ec4bf7b79874530a6a791c5581d9d695
pms.pl is watches for certain running processes and alerts you via /dev/speech when they start.
e43969bd8b52cef54eed32fc170fda5e248565c948046a25250e12d54c508f9b
ARP0c2.c - ARP0c2 is a simple and powerful connection interceptor for switched networks. It features ARP redirection/spoofing, automated bridging, automated routing, progressive attacks of known IP connections, network cleanup on exit, and ARP flooding with random IP and Ethernet addresses. Known network connections can be intercepted by adding them to the routing table file. It is complely userland and tested on Linux.
d0dc915dfa26416aae4f90e45c03ddb5d999877e247e02f827d45f062098954e
Dopewars 1.47-current has two local security holes. Dopewars is SGID games. Remote buffer overflows also exist.
0f42ff1b37e66d07b86bb87e247d94963fa74c6ecd4315816a593792519e5108
Passive Mapping: The Importance of Stimulus - This paper is a follow-on to the first Passive Mapping paper. It examines the difference between active and passive mapping and gives some examples of how this difference can be implemented.
b7aee3df2ecda88f78698e55edb61103bf3a24346cb9a3ab238c14fbe4837b5d
Offensive Use of IDS - This paper explores ways Intrusion Detection Systems (IDS) can be used for offensive purposes. It gives a brief technical outline of determining which TCP services are running on a network using passive monitoring.
5afe13e0d8a24ba3581c61da0bde82429b9bc4336ab887010dcf199a7ad71979
The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux. The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts.
07778457a1e052e4fccfc4ae0c297622bd9202aede49d08639db1cdf824df16b