Modhide1.c demonstrates a new method of hiding kernel modules which does not trigger any normal detection techniques because it does not change lsmod or the system call table. Instead it hacks the kernel's memory to make it "forget" the module.
0a87b973516873f2b069e3b3d61def3144776cfcecb3dec5ab65fdef5d8cfd01
Microsoft Security Advisory MS01-028 - Microsoft Word contains a vulnerability in RTF documents linked to templates which allows malicious users to run macros without the users knowledge or approval. The macro would be able to take any action that the user herself could take. This could include disabling the user's Word security settings so that subsequently-opened Word documents would no longer be checked for macros. Microsoft FAQ on this issue available here.
23d0500e57635f970a6cdb057331b5ed4edae2ecd473703ac2900e4611f3eeb0
Red Hat Security Advisory RHSA-2001:069-02 - The man package which is included with Red Hat 5.x, 6.x, and 7.0 contains a buffer overflow which allows local users to gain gid=man privileges.
b3528cab8e9854e0aea2f67b8bfbda58041f4184d82c1caf896cc0386f8802d6
Red Hat Security Advisory RHSA-2001:063-02 - When modifying an unsuspecting user's private keyring, an attacker can cause a user to generate incorrect signatures for data. If a user generates both a correct and an incorrect signature for the same data, the different signatures can be used to compute the user's secret key. This is fixed in v1.0.5.
f0495b4a79ee9ef8d5489f6b7cff1ee6128afd0bad6c90054acfcb63d3f51f65
Red Hat Security Advisory RHSA-2001:060-04 - Updated Kerberos 5 packages are now available for Red Hat Linux 6.2, 7, and 7.1, due to the discovery of several buffer overflows.
a485986767aedff1e0389289f0c1cfd5aba7bde259b7928671e3053a2fa52f0b
The WebAvail LinkMax2 (ASP) allows website visitors to view the LinkMax2 admin login and password. Fix included.
bc49f92d642851afebdaa716c8669034d092c6652034fd4a9c0ddaa830453e4f
FGC_Tools exploits Fortress security by simply making calls to the DLL used by their program. Disables security or overwrites the password without prior knowledge of the current password. Includes TASM source.
69b6b254e5158ea06287477874dc92414293ce96c8c13eb98dcc2cb7925247ec
Icmp-Log v0.4 is a simple ICMP logger.
26034114f4f2e03badef9ea5d53b3fbb65e94c2cf0a0db00c5d7da43fa7045cb
FreeVSD facilitates true Linux Virtual Servers within a 'chroot' environment, allowing Web servers and other applications to be deployed and administered discretely, without compromise to security. Each Virtual Server has its own IP address(es), Apache webserver, and view of the process table. FreeVSD expands the Linux system by creating a pseudo-'super user' (admin) for each Virtual Server. The admin user has the ability to create extra POP3/FTP and Telnet users and also administrate vital services such as the webserver.
03d3bb19a8cc0553d34c00ccab0151b47ae1cc4f32e47c354adbf742bea1b200
Samhain (development branch) is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6. The devel version has more advanced features, but not all options are thoroughly tested yet.
5d1dad7c0b0a2a4dd188767a5f3f037cf9749b1bb98b06900f7c8d21c445aba1
The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.
c55524357504029edc8df12d1f74d0fae50aa031bb0a75ab64e4e96ad05757ee
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.
96b48c77c92a128f92d0a7016d8908de006ed99506c0e506524d4b59ca531c92