what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-12-22

saint-3.1.2.tar.gz
Posted Dec 22, 2000
Authored by Sam Kline | Site wwdsi.com

SAINT (Security Administrator's Integrated Network Tool) is an updated version of SATAN, designed to assess the remote security of computer networks. Features include scanning through a firewall, frequently updated security checks, 4 levels of vulnerability severity, and a feature rich HTML interface.

Changes: Checks for OpenBSD/NetBSD ftpd buffer overflow, Updated Kerberos tutorials to address vulnerabilities in KTH version, and bug fixes.
tags | tool, remote, scanner
systems | unix
SHA-256 | acfb8dc42f242b154922991a4c583d3ce494aa79fcf0ee43a2e647bf2ddfec86
bindview.naptha.txt
Posted Dec 22, 2000
Site razor.bindview.com

The NAPTHA dos vulnerabilities (Revised Edition - Dec 18) - The naptha vulnerabilities are weaknesses in the way that TCP/IP stacks and network applications handle the state of a TCP connection.

tags | exploit, tcp, vulnerability
SHA-256 | c292602620f5df846e547c83d8ca52048ace27d17ccb5b270d8f412c29746e7c
openbsd.ftpd
Posted Dec 22, 2000
Site openbsd.org

OpenBSD Security Advisory - A one byte buffer overflow bug in ftpd(8) allows remote attackers to execute arbitrary code as root provided they can create a directory.

tags | remote, overflow, arbitrary, root
systems | openbsd
SHA-256 | 0dbdf75b4723fe8bfe9ab6d31f303c851e38ba61ac63eb3664deef47a6b5ed86
sonata-teleconf-2.txt
Posted Dec 22, 2000
Authored by Larry W. Cashdollar | Site vapid.betteros.org

Voyant Technologies Sonata Conferencing Software v3.x on Solaris 2.x comes with the setuid binary doroot which executes any command as root.

tags | exploit, root
systems | solaris
SHA-256 | 66e1e97f64c7220d0c49571196c3c0b688f31aa0b1d4177776bcaca25289e18f
omnihttpdex.c
Posted Dec 22, 2000
Authored by Kilrid | Site Hack-X.org

Omni httpd v2.07 and below remote denial of service exploit. Combines a shell script from sirius from buffer0vefl0w security with a bugtraq report from Valentin Perelogin.

tags | exploit, remote, denial of service, shell
SHA-256 | 4d3154c89c3ecd6fc2094b5e325fa6c37806583f8e2045d1e514e145f3c09e7b
rhsa.2000-128-02.slocate
Posted Dec 22, 2000
Site redhat.com

Red Hat Security Advisory - New slocate packages are available for Red Hat Linux 6.x and Red Hat Linux 7. These fix a heap overflow in the database parsing code of slocate allowing group slocate access.

tags | overflow
systems | linux, redhat
SHA-256 | 9ef88c164fb6814d053efbaecb132a8bed3a64a0558c53ee57f3796cba96c540
defcom.bea-weblogic.txt
Posted Dec 22, 2000
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2000-04 - Bea WebLogic Server for Windows NT prior to V5.1.0 (sp7) has a remotely exploitable buffer overflow in the handling of URL's which start with two dots. Arbitrary code can be executed as LocalSystem. Fix available here.

tags | overflow, arbitrary
systems | windows
SHA-256 | 1c0de5ec329656e24655156e39a44ee2e64f733317110e581319f00cbc00b4ba
defcom.mdaemon.txt
Posted Dec 22, 2000
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2000-03 - MDaemon 3.5.0 for Windows NT and 2000 contains a remote denial of service vulnerability due to some problems handling buffers within the IMAP and webconfig services.

tags | remote, denial of service, imap
systems | windows
SHA-256 | 7b99f2952cca90165759bc8794ad6cf6d5f6f1cd26cb446ccebb1b66b11b240e
rhsa.2000-130-05.rp-pppoe
Posted Dec 22, 2000
Site redhat.com

Red Hat Security Advisory - Bad TCP packets (e.g. a SYN packet with kind=3, len=0) over a PPP-over-Ethernet link could lock up rp-pppoe, making it vulnerable to a remote denial of service attack.

tags | remote, denial of service, tcp
systems | linux, redhat
SHA-256 | 4f1fe9966d6cf70c97c2b8b494b85e06c41e213cd709a98b257807d891031a5e
gnupg-1.0.4.security-patch1.diff
Posted Dec 22, 2000
Site gnupg.org

Patch for GnuPG v1.04 to fix the signature verification vulnerability which can easily lead to false positives.

tags | patch
systems | unix
SHA-256 | 81673aa4b233497ea537475462b2a2d09fdd7a1b1b86e3fd833f5e1c7b3b3ba7
rhsa.2000-131-02.gnupg
Posted Dec 22, 2000
Site redhat.com

Red Hat Security Advisory - When importing keys from public key servers, GnuPG will import private keys (also known as secret keys) in addition to public keys. If this happens, the user's web of trust becomes corrupted. Additionally, when used to check detached signatures, if the data file being checked contained clearsigned data, GnuPG would not warn the user if the detached signature was incorrect. Updated GnuPG packages are available for Red Hat 6.x and 7.x.

tags | web
systems | linux, redhat
SHA-256 | a3d7a469d62f08607589d4d684c30cde65da46296d86d4bf17374486f4d6ffb7
netbsd.2000-018.ftpd
Posted Dec 22, 2000

NetBSD Security Advisory 2000-017 - A one-byte remote buffer overrun has been found in the ftp daemon which is believed to allow remote attackers to gain root access. A bad bounds check was found in the replydirname() function.

tags | remote, overflow, root
systems | netbsd
SHA-256 | e0ab5c31958bafa483ecd3f408d2edbd579e570fd1a7c4b75e395e24680f2190
netbsd.2000-017.libkrb
Posted Dec 22, 2000

NetBSD Security Advisory 2000-017 - Kerberised telnetd and libkrb contain exploitable local root bugs. There were two problems - first, telnetd allowed the user to provide arbitrary environment variables, including several that cause programs to behave differently. There was also a possible buffer overflow in the Kerberos v4 library.

tags | overflow, arbitrary, local, root
systems | netbsd
SHA-256 | e2ca278f746dd9a252a1141d30648c61f4059f12835a666a65c72466f7ff53b7
rhsa.2000-137-04.stunnel
Posted Dec 22, 2000
Site redhat.com

Red Hat Security Advisory - When invoked in daemon mode (that is, without the -l or -f flags), stunnel will attempt to log its process ID to a file in the /var/stunnel directory, which does not exist. This errata changes the default directory used for PID files to /var/run.

systems | linux, redhat
SHA-256 | 0a182e09569679f9691a22b66cc4510f387b1bc75c377fbebc37fdc213c6d47f
ksh.temp-hole.txt
Posted Dec 22, 2000
Authored by Paul Szabo

The Korn Shell (ksh) uses temp files in an insecure manner. Demonstration included.

tags | exploit, shell
SHA-256 | 46bf095b3af47f5a39cd2ce0d8c077e482095e3d43d2cc6b15980c73f2114313
interchange.txt
Posted Dec 22, 2000
Authored by SNS Research

Infinite InterChange is a Win95/98/NT/2k mail server which has a remote denial of service vulnerability where it can be caused to crash via a malformed post request. This has been fixed in Infinite InterChange v3.61.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 559ea8e4a462900c2ff37f454cf8826455a86a72a81384b69ee480184c46eb97
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close