FreeBSD Security Advisory FreeBSD-SA-02:18 - A programming error in zlib may cause segments of dynamically allocated memory to be released more than once (double-freed), allowing attackers to send specially crafted data to applications that use zlib, crashing the application.
85e35fe5255d89e2e7899a233f71d3e506322b0209fc2a63fdfa86524f863db8
Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.
1b7fd54fe9783cb5628608cd06f03db29b2a574fe5ce177b9968b69def8f5761
Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed. Changelog available here.
2384c1a68f71b699dbecbb2a42da6821a14c0af62ca17d19f32c38fce048eb11
This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions.
b8a406b2935f40c49f13e6e3d79fda76022255d9736da36f4610cbda284aaf71
FreeBSD Security Advisory FreeBSD-SA-02:22 - Local users can cause the FreeBSD system to crash due to a bug in the virtual memory management system involving a failure to check for the existence of a VM object during page invalidation. This bug could be triggered by calling msync(2) on an anonymous, asynchronous memory map (i.e. created using the mmap flags MAP_ANON and MAP_NOSYNC) which had not been accessed previously, causing the system to crash.
2b5798f47b997adc1c458dfa79cf7e89c9a9e25de047108d39e3bd1df3fe48d5
Slrnpull, which is installed sgid root on RedHat 6.2, contains an exploitable buffer overflow in the -d parameter.
3950879882b96a2f764f65ca4f6bcaf9fe87f1de9f0abfc1ef9d7a26911d5c12
Building an Intrusion Detection System Using Snort - Covers installing RedHat Linux 7.1,Compiling/Installing and configuration of MySql/Apache/ACID/Snort, setup of snort rules, and hardening the machine.
693dd028e38a04d6de3d62c9a3ad6ba8116cefe131f075354424559f93aa6979
K9 is a Windows tool for passive OS detection. It uses WinPCAP to capture network traffic and a user friendly interface to handle results, fingerprint database, etc.
d5b528a143b240b7f434edcb491b8360a0ea9025729d569c46b1a251990869ad
Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 900 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.
6c7c2bec7d8f4d2534adca4add2a7868d7b4949eb0d1ce0a890bf58f584ad6b9
PsyBNC v2.3 has a problem dealing with oversized passwords, making it possible to tie up all the connection slots and consume a lot of CPU on the server.
0076bdd43e597952dd16a6f401e73eea906e8ced691f051d4aff0d921f56940b
Alcatel.zip is a Windows tool for getting the challenge response for easy offline config of an alcatel modem. Often used for "patching" a speedtouch home to pro, as discussed on https://brunning.com.
f0143874eac2d3e8f6c548caad97aa69e3794f842bfec451246d4646bf56953d
NetBIOS Enumeration Utility v1.2 (command line version) is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.
b27f8b006bb40cc3588e16898307f94b7b74ec285c1a9cb48290f55c86ea3d34
Microsoft IIS .HTR heap overflow checker. Determines remotely if patch MS02-018 has been applied.
52133ff9dadd4573b967bc8fb29cf1e30d48c51d0ca09a8652e9a86b701d1b23
Screen v3.9.11 local root linux/x86 exploit for braille module bug.
90a3c9a09aff132ce76e2ff92bcfae748992637421e40057034ec7da4b1f6c8f
Five vulnerabilities have been found in Intellisol Xpede v4.1.
df4573dff9d2fa48de6f6f395949332bd7564871d9bb839336c57c1974d25c6c
Microsoft Distributed Transaction Coordinator DoS - A flaw in the way MSDTC handles malformed packets could allow an attacker to hang the service and exhaust resources on the Server. If an attacker sends 20200 null characters to the MSDTC service, which listens on TCP port 3372, server resources are allocated poorly. This attack can result in MSDTC.EXE spiking at 100% cpu usage, MSDTC refusing connections and kernel resources being exhausted. This was fixed with MS02-018, although the security bulletin does not mention this vulnerability.
56dd249e53673e98d3a0139b8cf8aa106a4ee865cfe40d1c24f7be6f85c089c5
A format string bug in Foundstone Fscan v1.12 for Windows can result in a malicious service banner overwriting the stack and the EIP on the PC performing the scanning, if banner grabbing is enabled. Fix available here.
48240b9faf31846718310f57a76c6e7c7d0a140705f914f460b711509490f1c7
How to Remotely Exploit Format String Bugs - A practical tutorial. Includes info on guessing the offset, guessing the address of the shellcode in the stack, using format string bugs as debuggers, examples, etc.
c323add4e7a0e2f2f14ec27d9d50002992564b1d0be3d391722da88350a25a83
FreeBSD Security Advisory FreeBSD-SA-02:23 - Setuid or setgid applications can be used for privilege elevation due to insecure handling of stdio file descriptors on FreeBSD releases up to and including 4.5-RELEASE. It is known that the 'keyinit' set-user-id program is exploitable using this method. This vulnerability was discovered by Joost Pol.
8f69bc483a1458f7d54a29d27b77175fcbf84e8323830e08f06dd00c8fae39cc
Local root exploit for the "Suid application execution bug" (< FreeBSD 4.5-STABLE) that was discovered by Joost Pol from Pine.
f0a04ead1fe242bd1e5e26bb4bf52e05952b5a51e90dc885185f96487aee999d
PHP Nuke v5.5 contains 8 new and 9 old cross site scripting vulnerabilities.
173016f49f065ea15a0ca8293cbecbab43159ab44acc35b53ecd704c5c82556a
Iosmash.c is an exploit for the stdio kernel bug that resides in all releases of FreeBSD up to and including 4.5-RELEASE. The exploit uses keyinit, which is part of the S/key package, to create 5 valid root passwords that give instant root access trough S/key.
6a6a5e8af30ab97b224a0e42ecc45ae27efc070689420d081e0ef24f01aa745c