USSR Advisory #34 - Local/Remote D.o.S Attack in InterAccess Telnet Server Release 4.0 (All Builds) Windows95/98/WinNT. The code that handles the Terminal client configurations to the Telnet server in the connection procedure contains a buffer overflow, causing Telnetd to crash.
0bdd9580503830aa0647e9839d98b921538bdc30f5ff55c343a02f65a3cc2142
EvntSlog v3.2 takes NT system logs and sends them out in syslog format over the syslog UDP port so all the logs from your NT and unix boxes can be stored on the same unix box.
8b8d8459a63504945492f7b519ee570f89f6ebeb4985dbeee7f3aa0181d86033
FreeBSD is vulnerable to a DoS vulnerability involving high speed pinging with packets over 8184 bytes. Unofficial patch included.
e6d81cdb10724ed192d48717002167649620f7b1c8833755743139dcae8ba13d
Updated NetBSD Security Advisory - Procfs local root vulnerability. Systems which have procfs configured in the kernel, but not mounted normally, are still vulnerable because user processes may mount procfs. This includes most default NetBSD installations. NetBSD security page here.
1838f1f1359abb3f784db566ae4482ff550682a1b1f47623dd3bfc572a77a0e4
Distributed Deniel Of Service attacks - A proposal based on routing. This paper describes a technique that -hopefully- can be used to defeat the recent DDOS attacks. The solution presented here is bases on routing. It requires a certain amount of extra network infrastructure.
d4db3368713cb2f7d6a456ebc627dd45e014bc76bf35def353db951d27f392a7
ITS4 is a command-line tool for statically scanning C and C++ source code for security vulnerabilities. ITS4 scans through source code for potentially dangerous function calls that are stored in a database. Anything that is in the database gets flagged. ITS4 tries to automate a lot of the grepping usually done by hand when performing security audits.
eda8d0762c06c5ed9847ce9f0187e7f3c53a4cd482084ddf434522078030e383
Describes what you need to Spoof/Hijack/Predict sequence numbers. Meant for newbies who don't know what to use to execute those kind of attacks often seen in TCP/IP Security Documents.
3ea630fc7ed9d3ed3d8630424dd21cb5fd189500f57a386684b160d1a0c87a1c
The stunnel program is designed to work as SSL encryption wrapper between remote client and local (inetd-startable) or remote server. The concept is that having non-SSL aware daemons running on your system you can easily setup to communicate with clients over secure SSL channels. stunnel can be used to add SSL functionality to commonly used inetd daemons like POP-2, POP-3 and IMAP servers as well as standalone daemons like NNTP, SMTP and HTTP without changes to the source code.
c90edd9e2a8fd94ab9f1c1cf08c86094fc48abc6775010957d62fb11c4127d9f
Decimate removes files in an ext2 filesystem so they are not recoverable. Includes some cool examples of how regular rming can be recovered.
f2267590b03a2861c683fd881192e6081fca39626f9fe86c3173912300ed06f8
Osiris catalogs specified directories of files, including MD5 hashes, modification dates, and file attributes into a specified database and/or to STDOUT as directed. The second program, scale, compares two such databases against each other. It will output, either to a file or STDOUT, any differences it finds between the two catalogs including missing or additional files, differing MD5 hashes, modification dates, and file attributes. Together, the two programs give an administrator the tools to follow changes in files on a server or workstation. This keeps an administrator apprised of possible attacks and/or nasty little trojans.
c48763a329c092fdd7ae1e56352b3f3bbf1abf79d7b4aa0a4fbf94e4fdde0c38
All versions of Sambar server running under Windows NT and 2000 (95/98 not vulnerable) have vulnerabilities which allow remote command execution.
7b13bc962d27ef93b883d59d73a68c652e8b342cd4167afd0fde35917066ca60
Georgi Guninski security advisory #7 - There is a vulnerability in Wordpad which allows executing arbitrary programs without warning the user after activating an embedded or linked object. This may be also exploited in IE for Win9x. Demonstration which starts AUTOEXEC.BAT available here.
8c815d047dd5d9b4e8a06fecc24985c9005b8075decd685d753f14bceca1b2b7
Sun iPlanet Web Server, Enterprise Edition 4.1 on Linux is vulnerable to a remote DoS attack. Many GET requests cause a kernel panic.
3d2d8fe606c710e7c1f85b7806cd14681cc6f8b5827957940ee2d1e143a45115
Network Associates Security Advisory - Remote Vulnerability in the MMDF SMTP Daemon. A bug in MMDF allows anyone to obtain mail management privileges via the SMTP daemon, and then root. All versions of MMDF prior to 2.43 are vulnerable, including the version included with SCO Openserver.
f2dea4a97da484464ee6e817e263cac11e46e2e3609a0b08a5ca3d921c508355
ISIC - 0.05 (IP Stack Integrity Check). Crafts random packets and launches them. Can fix or randomize source/dest IP's and Ports. You can specify the percentage of packets to fragment, to have IP options, to have bad IP versions.... Just about every field can be automagically twiddled. It contains distinct programs for TCP, UDP, ICMP, IP with a randomized protocol field and a program for randomized raw ethernet frames. Compiles and should work using Libnet under OpenBSD, Solaris, Linux and FreeBSD.
78c7539b7de1f443ad0733aae617651355575721464987aa3ba08695eb41d58a
Dvst8er.bx version 3.5 - BitchX module to encrypt IRC conversations.
32eb36236930a4cb5a0b01471a782bb081d0f137ff2cc078e7b1b3e956ba7426
Windows Security Alert - Two new risks were reported today: Microsoft reported a problem with its Systems Management Server 2.0 that allows an intruder to gain elevated privileges on the system and network, and Georgi Guninski reported a problem with WordPad that may allow unwanted code to execute on the desktop. According to the report, an exploit can be launched using a Web page and IE. Microsoft is aware of the problem, however no official response was known at the time of this writing.
1bfd8eb16760dc1a28c84405f40d0590d9e886eafe4097b331c98342b2e097f2
Windows Security Update - February 23, 2000. In this issue: Internet Information Server 4.0 Denial of Service, Windows Autorun.inf Vulnerability, Site Server Commerce User Input Unvalidated, Microsoft Java Virtual Machine Exposes User Files, Windows 2000 Professional Exposes System During Installation, Internet Explorer Exposes Users' Files, Zombie Zapper Helps Shut Down DDoS Attacks, How to Defend Against DoS Attacks, Novell Firewall for NT, SurfinShield Censors Hostile Code, Security for E-Business Documents, Malicious Code Protection Software, and Why Intruders Control Internet Insurance.
ff10183cd7167c4eb30e3a325f9675ee8c2fe21c8defa6a3de1759acf5ab6432
Microsoft has released a patch for a vulnerability in Windows Media Services. The vulnerability allows denial of service attacks against a streaming media server. Microsoft FAQ on this issue available here.
d832904d0d88fe9603f93beb52147c755b99286f2ceda68be6dc04a440ce6bdd
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.
1588e920c9fc1c52a983d51eea4ec9c15c628f001e4efc6b8f77a739b63c8010