Perlnecklace v0.3 is a wrapper for the perl v5.005 binary to increase site-wide security. It features the ability to set chroot the environment the script is running in, set resource limits, allow/disallow modules, and log to syslog. Tested on Redhat Linux 6.2 2.2.14 x86, FreeBSD 3.4-RELEASE x86, and OpenBSD 2.6 x86.
1c051c890c064343ee30f237038e272a152e8c9a63056c6be434d6c452663eb6
The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.
b6a92fd989ad60d1c34c1f6c165ec70d5cbdb5b2ee278b47c562ee220a111307
The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format. Screenshot available here.
7ccebdbacec58ad5b6e4b9adc0c3b030ce7a7e617f13bd6e7fa46ad2c35fe070
RFPickaxe2.pl is a windows port of RFP's RFPickaxe.pl demo exploit for the BlackICE IDS uses a management console.
7115ec33efe3130c21b7bf3b9c61e2b5d24620f2951e8ae5fe98bbc2b6ea2f29
TWWWscan v0.3 - Windows based www vulnerability scanner which looks for 186 www/cgi vulnerabilities . Displays http header, server info, and tries for accurate results. Now features anti-IDS url encoding. Tested on win95 osr2 win98,win98se,win nt4,win 2k.
1b22e13bcf68508b65896b00684805961b31aacc64bb2dbb8a86c2f3dec63c36
Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Yahoo glitch, pgp 5.0 security flaw, setting up portsentry, is PKI secure enough?, Kevin Mitnick speaking ban, UK privacy, Curador charged, WAP related defacment, running a BSD firewall, an interview with Frank Van Vliet, and more.
41885a4d1b2c011a62b58376759aefcd6b5e129744649022130fbe5d7b4327dd
Slirp v1.0.10(RELEASE) local buffer overflow exploit for Linux which gives you a SGID shell if /usr/local/bin/slirp is mode 2755. Tested against Slackware 3.6. Includes perl script to find the offset.
12e61b047e8d24718f434c4d48b7b220b125ea133744046125a247842e78d76a
One last elm v2.4 / v2.5 exploit - gives EGID 12. This version works against almost all vulnerable versions of elm.
47fefa5230db61d38f353f0a5b82b73f911a8e966cb50c54a8092a788c5e4d9e
sms.c is a remote SMS 1.8.2 (mail2sms gateway) long subject line remote buffer overflow exploit. Send the mail generated by this program and a shell will be listening on port 2222. Offsets adjusted for redhat.
5263a1384cd6d126f626841f9e172551ca855196cc1ef2d42713cc721e51647b
This document contains details on a proof-of-concept white paper on how to circumvent Cisco access-lists which rely on only permitting "established" TCP sessions by establishing communications between a client and server (included) which never uses the SYN bit. Works on any firewall that accepts all packets without the syn bit.
79d26376604497500925b5b6543234d5413f0ad668b64b1784396b240628a49e
TESO Security Advisory #10 - KDE KApplication {} configfile vulnerability. Due to insecure creation of configuration files via KApplication-class, local lusers can create arbitrary files when running setuid root KDE-programs. Tested with SuSE 6.4 standard installation under KDE 1.1.2.
004b3ec17b9d4970f5d766395aef75b5dbd5c2b046edf150e3773fa527b7f18b
BugzPL ADVISORY #1 - Bypassing restricted bash. bash-2 gives us the option to use a shell in restricted mode. Includes a patch to bash to eliminate most of the described attacks.
47bb68c6308df5ed6fe19a7497f029c4b854f395cc92453841f8d72aa441b418
Cerberus Information Security Advisory (CISADV000525) - The Cerberus Security Team has found a remotely exploitable buffer overrun in two executables that come with PDGSoft's Shopping Cart. Redirect.exe and changepw.exe are both accessable over the web to all users. If supplied an overly long query string both will overflow an internal buffer overwriting the saved return address.
47c5ccd9102dac8b0ab89dab0a306e546e5bd7ae581a145be2b627262530e2ac
NetBSD Security Advisory 2000-003 - Exploitable vulnerability in xlockmore. Xlock can be manipulated to print /etc/shadow.
287e6d1314b1ad1faffd919e3f691fe493e2b86f5526625e8e868eaa9d21974e
Delphis Consulting Plc Security Team Advisory DST2K0009 - Userlisting Bug in Ipswitch WS_FTP Server 1.05E allows remote users to confuse the server manager.
c45c47e0f2f64311cef176002da746700559bf5930be62695ff30bd1c8a2b23b
Simple Web Server 0.5.1 stack overflow advisory. Allows eip to be overwritten.
48d728d1a0369d0efc66c0322f42866aafd5c4801aa62aeb3619a6c8cd355af1
shadyshell.c is a flexible, obfuscated, and lightweight UDP portshell. Takes client input via netcat -u.
16c3e56c91fe42a99758dc394e3c954f75985e353ac20556e6c3104449fdc5f9
CERT Advisory CA-2000-09 - Flaw in PGP 5.0 Key Generation. UNIX systems having a /dev/random device running any version of PGP 5.0 are affected. When keys are generated non-interactively and without user-added randomness, on some systems PGP v5.0 generates keys that are not random enough, allowing an attacker to predict keys and therefore recover information encrypted with that key. Additionally, an attacker may be able to forge a digital signature corresponding to a vulnerable key. CERT homepage here.
666d2573e857d8eb04ebc9ba4aaf3ae4e08ea3110c54153867406d0110fb40d3
ICQ Web Front Remote denial of service vulnerability - ICQ 2000a, 99b, and 99a contain a vulnerability in the personal web server. Guestbook.cgi, installed by default, crashes when sent a long name.
05ba8a95f1072921afea8cf60d91a06e244658a30f3a4b75372c90226af4d779
TurboLinux Security Announcement - xlockmore-4.16 and earlier contain a buffer overflow in -mode which allow an attacker to reveal arbitrary portions of xlock's address space including the shadow password file. TurboLinux security announcments here.
dbb836cef2dd10d05896becfe0cd419b6fa0fc409eccf4c77d736ed0a7ca2dfe