what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2005-06-20

Gentoo Linux Security Advisory 200506-7
Posted Jun 20, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-07 - The curses_msg function of Ettercap's Ncurses-based user interface insecurely implements formatted printing. Versions less than 0.7.3 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-1796
SHA-256 | 6a746409daeafad4c334cd236ac208cf89245f30a0595bd2b2110feca22ce0f4
Gentoo Linux Security Advisory 200506-6
Posted Jun 20, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-06 - Xpdf is vulnerable to multiple overflows, as described in GLSA 200501-28. Also, integer overflows were discovered in Real and PNG extractors. Versions less than 0.5.0 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-0064
SHA-256 | 3594893b9233aeb6688302bb390d5d56e549be47ae5ec2be431f9a902e721a68
leafnode-SA-2005-02.txt
Posted Jun 20, 2005
Authored by Adam Funk

Leafnode versions 1.11.2 and below are susceptible to a denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2005-1911
SHA-256 | b3dbe7a435c3abeb4c1e445c450e31cc05463a02674a52ac5e7806e00d87ad62
vlanAbuse.txt
Posted Jun 20, 2005
Site fishnetsecurity.com

Various voice VLAN access and abuse is possible on Cisco voice-enabled 802.1x-secured interfaces.

tags | advisory
systems | cisco
SHA-256 | b271c560636f09a5cbd25f3b28da662cee34afe14326f5e0ed5ce97adddc4dbf
lokiSQL.txt
Posted Jun 20, 2005
Authored by hack_912

The Loki download manager is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 0245509c2ac467e21c07125f4d197a522ac9413996459e09d2d7d51ee23775cf
Gentoo Linux Security Advisory 200506-5
Posted Jun 20, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-05 - The SilverCity package installs three executable files with insecure permissions. Versions less than 0.9.5-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 1a72e454fde56c4d7ae21a621cc22b04ea0564f0ad4e1d0e0ed060048e010d7b
Ubuntu Security Notice 137-1
Posted Jun 20, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-137-1 - Alexander Nyberg discovered that ptrace() insufficiently validated addresses on the amd64 platform so that it was possible to set an invalid segment base. A local attacker could exploit this to crash the kernel. This does not affect the i386 and powerpc platforms in any way. Chris Wright discovered that the mmap() function could create illegal memory maps (using the "mmap" function) with the start address pointing beyond the end address. A local user could exploit this to crash the kernel or possibly even execute arbitrary code with kernel privileges.

tags | advisory, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2005-1265, CVE-2005-0756
SHA-256 | 46e83c6a3e90f0e4e676dc428e2a71fb4f585c696d18bd8d6dc3fec2dbd0c6cb
goodtechDoS.txt
Posted Jun 20, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

GoodTech SMTP Server for Windows NT/2000/XP version 5.14 is susceptible to a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | 6a659a01652487edb2b466186a3c43617aa2cdf0f3ba1a1a514251ccb1c33cb8
WEBSP05-V0098.txt
Posted Jun 20, 2005
Authored by Esteban Martinez Fayo | Site appsecinc.com

A remote buffer overflow exists in the WebSphere application server administrative console.

tags | advisory, remote, overflow
SHA-256 | e74e8ec2a3d866f38cbe94ade110b68eba3f1bf9f6b2b3b2c968770fe1798347
kasperskyAV.txt
Posted Jun 20, 2005
Authored by Ilya Rabinovich

The Kaspersky AntiVirus klif.sys is susceptible to a privilege escalation vulnerability.

tags | advisory
SHA-256 | bd0c92e93ac9d6a52b32ffbf9a767870fb27712232c031ea91674830470957cf
arpalert-0.4.4.tar.gz
Posted Jun 20, 2005
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

tags | local
systems | unix
SHA-256 | 27b11a8257640ddee911ed02c6b2be6078e43dff5eab97f037a5171277b154a5
TOR Virtual Network Tunneling Tool 0.1.0.10
Posted Jun 20, 2005
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: A good amount of bug fixes and performance improvements. Check out the changelog for full details.
tags | tool, remote, local, peer2peer
SHA-256 | 1531f627f91db0fda7d05b35019f0551c765e8e4904c67b0d392badf98ee2eb1
zm-1.21.1.tar.gz
Posted Jun 20, 2005
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Various new features and bug fixes.
tags | web
systems | linux
SHA-256 | f7874d703f85d6d88b601c401a9af52382b8e747b503a8e53bbb41997bf09e33
pictosniff-0.2.tar.bz2
Posted Jun 20, 2005
Authored by lekernel | Site lekernel.lya-fr.com

PictoSniff allows you to spy live on PictoChat communications between Nintendo DS gaming consoles. It requires an 802.11 device with support for monitor mode and Radiotap (tested only under FreeBSD with the p54u driver). It is based upon GTK2 and libpcap.

tags | tool, scanner
systems | unix, freebsd
SHA-256 | 3d1f14f945161061770ed6488db87a64d50d2f814bf4849e196bd991272fa158
base-1.1.3.tar.gz
Posted Jun 20, 2005
Authored by Kevin Johnson | Site sourceforge.net

BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.

tags | tool, web, sniffer
SHA-256 | 9a815a5a6c98938258ad99301c185e71a29372c82ad72440e44512eebe3fba4a
authfail-1.1.3.tgz
Posted Jun 20, 2005
Authored by Bartek Krajnik | Site bmk.bz

authfail is a tool for adding IP addresses to an ACL when entities from those addresses attempt to log into a system, but cause authentication failures in auth.log. It reads data from auth.log in real time and adds the IP into netfilter with a DROP/REJECT policy.

Changes: Couple of modifications made.
tags | tool, firewall
systems | linux
SHA-256 | c31e42c5443566243213fffc80da1bff4bc9d2cdb9effe26767b66b53f9679c2
snortsms-0.11.5.tar.gz
Posted Jun 20, 2005
Authored by SmithJ108 | Site snortsms.servangle.net

SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.

Changes: Various bug fixes.
tags | tool, web, sniffer
SHA-256 | 15296bbeab8e43ad453eb6f84f865f0c5cf024bd7c35d4eda155f4c0fb8d90f2
nufw-1.0.8.tar.gz
Posted Jun 20, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Suppress useless opening of /dev/random.
tags | tool, remote, firewall
systems | unix
SHA-256 | e758c92fd39a7eca10f54529b3f5628e9f1ef31cd71f71e749c8696e86c9d543
alph-0.12.tar.gz
Posted Jun 20, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: ALBERTI cipher implemented. Jeffer-Lewis cipher implemented. Updated man page.
tags | encryption
SHA-256 | 9511de01afd25185ad7e4ff970c0120aa5c7eff29dca613cfaec161468f786dd
tinyca2-0.7.0.tar.gz
Posted Jun 20, 2005
Authored by Stephan Martin | Site tinyca.sm-zone.net

TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.

Changes: Minor bug fixes.
tags | perl, encryption
SHA-256 | 881153497e48eb003865f7b4ab8d5feecdde5dafcc43258c546ea8b513bc7b95
aolDoSateim32.txt
Posted Jun 20, 2005
Authored by SP Research Labs | Site security-protocols.com

AOL Instant Messenger (AIM) buddy icon ateimg32.dll is susceptible to a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | ea1e1cb8f0ff32a23f3b0a3fd57f507e2e71f6162b20d3672552779e348e3e75
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close