Date: | 10 May 2005 19:24:01 -0000 |
From: | "Peter Laborge" <plaborge@securityfocus.com>
| To: | linux-secnews@securityfocus.com |
Subject: | SecurityFocus Linux Newsletter #235 |
SecurityFocus Linux Newsletter #235
------------------------------------
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_sf-news_041130
------------------------------------------------------------------------
I. FRONT AND CENTER
1. Live CD Paradise
2. Software Firewalls versus Wormhole Tunnels
3. Bruce Schneier on Cryptography
II. LINUX VULNERABILITY SUMMARY
1. Linux Kernel it87 and via686a Drivers Insecure File Creation...
2. Joshua Chamas Crypt::SSLeay Perl Module Insecure Entropy Sou...
3. SmartList ListManager Arbitrary List Addition Vulnerability
4. PostgreSQL TSearch2 Design Error Vulnerability
5. PostgreSQL Character Set Conversion Privilege Escalation Vul...
6. GNUTLS Padding Denial of Service Vulnerability
7. Invision Power Board Act Parameter Cross-Site Scripting Vuln...
8. FishNet FishCart Multiple Cross-Site Scripting and SQL Injec...
9. NASM IEEE_PUTASCII Remote Buffer Overflow Vulnerability
10. MidiCart PHP Search_List.PHP SearchString Parameter SQL
Inje...
11. MidiCart PHP Item_List.PHP MainGroup Parameter SQL
Injection...
12. MidiCart PHP Item_List.PHP SecondGroup Parameter SQL
Injecti...
13. MidiCart PHP Item_Show.PHP Code_No Parameter SQL Injection
V...
14. MidiCart PHP Search_List.PHP SearchString Parameter
Cross-Si...
15. MidiCart PHP Item_List.PHP SecondGroup Parameter Cross-Site
...
16. MidiCart PHP Item_List.PHP Maingroup Parameter Cross-Site
Sc...
17. MegaBook Admin.CGI EntryID Cross-Site Scripting
Vulnerabilit...
18. QMail Alloc() Remote Integer Overflow Vulnerability
19. Invision Power Board Login.PHP SQL Injection Vulnerability
20. RealNetworks RealPlayer Unspecified Code Execution
Vulnerabi...
21. Invision Power Board Search.PHP Highlite Parameter
Cross-Sit...
22. Invision Power Board Topics.PHP Highlite Parameter
Cross-Sit...
23. QMail Commands() Function Remote Integer Overflow
Vulnerabil...
24. QMail Substdio_Put() Function Remote Integer Overflow
Vulner...
25. Apache HTDigest Realm Command Line Argument Buffer Overflow
...
26. FreeRadius RLM_SQL.C SQL Injection Vulnerability
27. FreeRadius RLM_SQL.C Buffer Overflow Vulnerability
III. LINUX FOCUS LIST SUMMARY
NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.
IV. NEW PRODUCTS FOR LINUX PLATFORMS
1. CoreGuard Core Security System
2. EnCase Forensic Edition
3. KeyGhost SX
4. SafeKit
5. Astaro Linux Firewall
6. CAT Cellular Authentication Token and eAuthentication Servic...
V. NEW TOOLS FOR LINUX PLATFORMS
1. Umbrella v0.6
2. Kernel Socks Bouncer 2.6.11
3. NuFW 1.0.0
4. ldaupenum 0.02alpha
5. File System Saint 1.02a
6. Travesty 1.0
VII. SPONSOR INFORMATION
I. FRONT AND CENTER
-------------------
1. Live CD Paradise
By Scott Granneman
Whether you need to sniff for wireless networks or carry Nessus, Nmap
and
the Metasploit Framework with you in your pocket, there's a
security-based
Live CD out there for you.
http://www.securityfocus.com/columnists/323
2. Software Firewalls versus Wormhole Tunnels
By Bob Rudis and Phil Kostenbader
This article explains how the PCAP library on Windows can be used to
render
software firewalls and client VPN environments ineffective, easily
bypassing traditional security measures.
http://www.securityfocus.com/infocus/1831
3. Bruce Schneier on Cryptography
By Federico Biancuzzi
An interview with Bruce Schneier on some current trends in
cryptography.
http://www.securityfocus.com/columnists/324
II. LINUX VULNERABILITY SUMMARY
-------------------------------
1. Linux Kernel it87 and via686a Drivers Insecure File Creation...
BugTraq ID: 13455
Remote: No
Date Published: May 02 2005
Relevant URL: http://www.securityfocus.com/bid/13455
Summary:
The Linux kernel it87 and via686a drivers create an insecure file that
could allow a local user to cause a denial of service condition. This
occurs because the created file's permissions allow both read and
write.
This issue was reported to affect kernel version 2.6.11.7; earlier
versions may also be affected.
2. Joshua Chamas Crypt::SSLeay Perl Module Insecure Entropy Sou...
BugTraq ID: 13471
Remote: No
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13471
Summary:
Crypt::SSLeay is prone to a security vulnerability. Reports indicate
that the library employs a file from a world writable location for its
fallback entropy source. The module defaults to this file if a proper
entropy source is not set.
If the affected library is using the insecure file as a source of
entropy, a local attacker may replace the contents of the file with known
text. This known text is then employed to seed cryptographic operations.
This may lead to weak cryptographic operations.
3. SmartList ListManager Arbitrary List Addition Vulnerability
BugTraq ID: 13474
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13474
Summary:
Smartlist could allow arbitrary email addresses to be added to a
mailing list. This issue is due to a vulnerability in the confirm add-on
function of Smartlist. The function can be tricked, thus permitting the
addition of arbitrary addresses to the list.
4. PostgreSQL TSearch2 Design Error Vulnerability
BugTraq ID: 13475
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13475
Summary:
The PostgreSQL 'contrib/tsearch2' module is prone to a security
vulnerability. The issue manifests because the module does not correctly
declare several functions.
Although unconfirmed, it is conjectured that this issue allows a remote
user that can write SQL queries to the affected database to call these
functions, when they should not be accessible directly from SQL
commands.
This vulnerability affects PostgreSQL 7.4 and later.
5. PostgreSQL Character Set Conversion Privilege Escalation Vul...
BugTraq ID: 13476
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13476
Summary:
PostgreSQL character set conversion functions could allow an
unprivileged user to supply malicious arguments. This may result in arbitrary
queries executing with the privileges of the conversion functions.
6. GNUTLS Padding Denial of Service Vulnerability
BugTraq ID: 13477
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13477
Summary:
GnuTLS is prone to a denial of service vulnerability. A remote
attacker can send specifically designed data to cause a flaw in the parsing,
leading to denial of service conditions.
This issue has been addressed in GnuTLS versions 1.0.25 and 1.2.3;
earlier versions are vulnerable.
7. Invision Power Board Act Parameter Cross-Site Scripting Vuln...
BugTraq ID: 13483
Remote: Yes
Date Published: May 03 2005
Relevant URL: http://www.securityfocus.com/bid/13483
Summary:
Invision Power Board is prone to a cross-site scripting vulnerability.
This issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
It is reported this issue may only be exploitable through Microsoft
Internet Explorer; this has not been confirmed.
8. FishNet FishCart Multiple Cross-Site Scripting and SQL Injec...
BugTraq ID: 13499
Remote: Yes
Date Published: May 04 2005
Relevant URL: http://www.securityfocus.com/bid/13499
Summary:
FishCart is prone to multiple cross-site scripting and SQL injection
vulnerabilities. These issues are due to a failure in the application to
properly sanitize user-supplied input.
Successful exploitation of the SQL injection issues could result in a
compromise of the application, disclosure or modification of data, or
may permit an attacker to exploit vulnerabilities in the underlying
database implementation.
An attacker may leverage the cross-site scripting issues to have
arbitrary script code executed in the browser of an unsuspecting user. This
may facilitate the theft of cookie-based authentication credentials as
well as other attacks.
9. NASM IEEE_PUTASCII Remote Buffer Overflow Vulnerability
BugTraq ID: 13506
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13506
Summary:
NASM is prone to a remote buffer overflow vulnerability. This issue
affects the 'ieee_putascii()' function.
It is likely that an attacker exploits this issue by crafting a
malicious source file to be assembled by the application. This file is sent
to an affected user and if the user loads the file in NASM, the attack
may result in arbitrary code execution.
The attacker may then gain unauthorized access in the context of the
user running NASM.
10. MidiCart PHP Search_List.PHP SearchString Parameter SQL Inje...
BugTraq ID: 13512
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13512
Summary:
MidiCart PHP is prone to an SQL injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.
Successful exploitation could result in a compromise of the
application, disclosure or modification of data, or may permit an attacker to
exploit vulnerabilities in the underlying database implementation.
11. MidiCart PHP Item_List.PHP MainGroup Parameter SQL Injection...
BugTraq ID: 13513
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13513
Summary:
MidiCart PHP is prone to an SQL injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.
Successful exploitation could result in a compromise of the
application, disclosure or modification of data, or may permit an attacker to
exploit vulnerabilities in the underlying database implementation.
12. MidiCart PHP Item_List.PHP SecondGroup Parameter SQL Injecti...
BugTraq ID: 13514
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13514
Summary:
MidiCart PHP is prone to an SQL injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.
Successful exploitation could result in a compromise of the
application, disclosure or modification of data, or may permit an attacker to
exploit vulnerabilities in the underlying database implementation.
13. MidiCart PHP Item_Show.PHP Code_No Parameter SQL Injection V...
BugTraq ID: 13515
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13515
Summary:
MidiCart PHP is prone to an SQL injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.
Successful exploitation could result in a compromise of the
application, disclosure or modification of data, or may permit an attacker to
exploit vulnerabilities in the underlying database implementation.
14. MidiCart PHP Search_List.PHP SearchString Parameter Cross-Si...
BugTraq ID: 13516
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13516
Summary:
MidiCart PHP is prone to a cross-site scripting vulnerability. This
issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
15. MidiCart PHP Item_List.PHP SecondGroup Parameter Cross-Site ...
BugTraq ID: 13517
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13517
Summary:
MidiCart PHP is prone to a cross-site scripting vulnerability. This
issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
16. MidiCart PHP Item_List.PHP Maingroup Parameter Cross-Site Sc...
BugTraq ID: 13518
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13518
Summary:
MidiCart PHP is prone to a cross-site scripting vulnerability. This
issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
17. MegaBook Admin.CGI EntryID Cross-Site Scripting Vulnerabilit...
BugTraq ID: 13522
Remote: Yes
Date Published: May 05 2005
Relevant URL: http://www.securityfocus.com/bid/13522
Summary:
MegaBook is prone to a cross-site scripting vulnerability. This issue
is due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
This issue is reported to affect MegaBook version 2.0; other versions
may also be vulnerable.
18. QMail Alloc() Remote Integer Overflow Vulnerability
BugTraq ID: 13528
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13528
Summary:
QMail is susceptible to a remote integer overflow vulnerability in the
alloc() function.
Specifically, the alloc() function can be coerced into overflowing an
integer value, resulting in an incorrect memory allocation occurring.
This may only be possible in environments where more than 4 gigabytes of
virtual memory is available, such as 64 bit systems.
It is conjectured that remote code executing may be possible.
19. Invision Power Board Login.PHP SQL Injection Vulnerability
BugTraq ID: 13529
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13529
Summary:
Invision Power Board is prone to an SQL injection vulnerability. This
issue is due to a failure in the application to properly sanitize
user-supplied data before using it in an SQL query.
Successful exploitation could result in a compromise of the
application, disclosure or modification of data, or may permit an attacker to
exploit vulnerabilities in the underlying database implementation.
This issue reportedly affects Invision Power Board versions prior to
2.0.4.
20. RealNetworks RealPlayer Unspecified Code Execution Vulnerabi...
BugTraq ID: 13530
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13530
Summary:
RealNetworks RealPlayer is a media player that is available for various
operating systems, including Microsoft Windows, Linux, and Mac OS.
An unspecified vulnerability affects RealNetworks RealPlayer. The
cause of this issue is currently unknown.
The potential impact of this issue is that an attacker may execute code
in the context of the user running the affected software; this BID will
be updated as more information is released.
21. Invision Power Board Search.PHP Highlite Parameter Cross-Sit...
BugTraq ID: 13532
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13532
Summary:
Invision Power Board is prone to a cross-site scripting vulnerability.
This issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
This issue has been addressed in Invision Power Board version 2.0.4;
earlier versions are vulnerable.
22. Invision Power Board Topics.PHP Highlite Parameter Cross-Sit...
BugTraq ID: 13534
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13534
Summary:
Invision Power Board is prone to a cross-site scripting vulnerability.
This issue is due to a failure in the application to properly sanitize
user-supplied input.
An attacker may leverage this issue to have arbitrary script code
executed in the browser of an unsuspecting user. This may facilitate the
theft of cookie-based authentication credentials as well as other
attacks.
This issue has been addressed in Invision Power Board version 2.0.4;
earlier versions are vulnerable.
23. QMail Commands() Function Remote Integer Overflow Vulnerabil...
BugTraq ID: 13535
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13535
Summary:
QMail is susceptible to a remote integer overflow vulnerability in the
commands() function.
Specifically, the commands() function can be coerced into overflowing
an integer value, resulting in overwriting an unintended location with a
NULL byte. This may only be possible in environments where more than 4
gigabytes of virtual memory is available, such as 64 bit systems.
It is conjectured that remote code executing may be possible.
24. QMail Substdio_Put() Function Remote Integer Overflow Vulner...
BugTraq ID: 13536
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13536
Summary:
QMail is susceptible to a remote integer overflow vulnerability in the
substdio_put() function.
Specifically, the substdio_put() function can be coerced into
overflowing an integer value, resulting in writing data to an unintended
location. This may only be possible in environments where more than 4
gigabytes of virtual memory is available, such as 64 bit systems.
It is conjectured that remote code executing may be possible.
25. Apache HTDigest Realm Command Line Argument Buffer Overflow ...
BugTraq ID: 13537
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13537
Summary:
A buffer overflow vulnerability exists in the htdigest utility included
with Apache. The vulnerability is due to improper bounds checking when
copying user-supplied realm data into local buffers.
By supplying an overly long realm value to the command line options of
htdigest, it is possible to trigger an overflow condition. This may
cause memory to be corrupted with attacker-specified values.
This issue could be exploited by a remote attacker; potentially
resulting in the execution of arbitrary system commands within the context of
the web server process.
26. FreeRadius RLM_SQL.C SQL Injection Vulnerability
BugTraq ID: 13540
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13540
Summary:
FreeRadius is prone to an SQL injection vulnerability. This issue is
due to a failure in the application to properly sanitize user-supplied
input before using it in an SQL query.
Successful exploitation could result in a compromise of the
application, disclosure or modification of data, or may permit an attacker to
exploit vulnerabilities in the underlying database implementation.
27. FreeRadius RLM_SQL.C Buffer Overflow Vulnerability
BugTraq ID: 13541
Remote: Yes
Date Published: May 06 2005
Relevant URL: http://www.securityfocus.com/bid/13541
Summary:
FreeRadius is prone to a buffer overflow vulnerability. This issue is
due to a failure in the application to do proper bounds checking on
user-supplied data.
Remote code execution may be possible; this has not been confirmed.
III. LINUX FOCUS LIST SUMMARY
-----------------------------
NO NEW POSTS FOR THE WEEK 2005-05-03 to 2005-05-10.
IV. NEW PRODUCTS FOR LINUX PLATFORMS
------------------------------------
1. CoreGuard Core Security System
By: Vormetric
Platforms: AIX, Linux, Solaris, Windows 2000, Windows XP
Relevant URL: http://www.vormetric.com/products/#overview
Summary:
CoreGuard System profile
The CoreGuard System is the industry's first solution that enforces
acceptable use policy for sensitive digital information assets and
protects personal data privacy across an enterprise IT environment.
CoreGuard's innovative architecture and completeness of technology
provide a comprehensive, extensible solution that tightly integrates
all
the elements required to protect information across a widespread,
heterogeneous enterprise network, while enforcing separation of duties
between security and IT administration. At the same time, CoreGuard is
transparent to users, applications and storage infrastructures for ease
of deployment and system management.
CoreGuard enables customers to:
* Protect customer personal data privacy and digital information assets
* Protect data at rest from unauthorized viewing by external attackers
and unauthorized insiders
* Enforce segregation of duties between IT administrators and security
administration
* Ensure host & application integrity * Block malicious code, including
zero-day exploits
2. EnCase Forensic Edition
By: Guidance Software Inc.
Platforms: DOS, FreeBSD, Linux, MacOS, NetBSD, OpenBSD, PalmOS,
Solaris, UNIX, Windows 2000, Windows 95/98, Windows NT, Windows XP
Relevant URL:
http://www.guidancesoftware.com/products/EnCaseForensic/index.shtm
Summary:
EnCase Forensic Edition Version 4 delivers the most advanced features
for computer forensics and investigations. With an intuitive GUI and
superior performance, EnCase Version 4 provides investigators with the
tools to conduct large-scale and complex investigations with accuracy and
efficiency. Guidance Software?s award winning solution yields
completely non-invasive computer forensic investigations while allowing
examiners to easily manage large volumes of computer evidence and view all
relevant files, including "deleted" files, file slack and unallocated
space.
The integrated functionality of EnCase allows the examiner to perform
all functions of the computer forensic investigation process. EnCase's
EnScript, a powerful macro-programming language and API included within
EnCase, allows investigators to build customized and reusable forensic
scripts.
3. KeyGhost SX
By: KeyGhost Ltd
Platforms: BeOS, DOS, Linux, OS/2, Solaris, SunOS, Windows 2000,
Windows 95/98, Windows NT, Windows XP
Relevant URL: http://www.keyghost.com/SX/
Summary:
KeyGhost SX discreetly captures and records all keystrokes typed,
including chat conversations, email, word processor, or even activity within
an accounting or specialist system. It is completely undetectable by
software scanners and provides you with one of the most powerful stealth
surveillance applications offered anywhere.
Because KeyGhost uses STRONG 128-Bit encryption to store the recorded
data in it?s own internal memory (not on the hard drive), it is
impossible for a network intruder to gain access to any sensitive data stored
within the device.
4. SafeKit
By: Evidian Inc.
Platforms: AIX, HP-UX, Linux, Solaris, Windows 2000
Relevant URL: http://www.evidian.com/safekit/index.htm
Summary:
Evidian's SafeKit technology makes it possible to render any
application available 24 hours per day. With no extra hardware: just use your
existing servers and install this software-only solution.
This provides ultimate scalability. As your needs grow, all you need to
do is add more standard servers into the cluster. With the load
balancing features of SafeKit, you can distribute applications over multiple
servers. If one system fails completely, the others will continue to
serve your users.
5. Astaro Linux Firewall
By: Astaro
Platforms: Linux
Relevant URL: http://www.astaro.com/php/statics.php?action=asl&lang=gb
Summary:
Astaro Linux Firewall: All-in-one firewall, virus protection, content
filtering and spam protection internet security software package for
Linux.
Free download for home users.
6. CAT Cellular Authentication Token and eAuthentication Servic...
By: Mega AS Consulting Ltd
Platforms: Java, Linux, OpenBSD, Os Independent, SecureBSD, Solaris,
UNIX, Windows 2000, Windows NT
Relevant URL: http://www.megaas.co.nz
Summary:
Low cost, easy to use Two Factor Authentication One Time Password token
using the Cellular. Does not use SMS or communication, manages multiple
OTP accounts - new technology. For any business that want a safer
access to its Internet Services. More information at our site.
We also provide eAuthentication service for businesses that will not
buy an Authentication product but would prefer to pay a monthly charge
for authentication services from our our CAT Server.
V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. Umbrella v0.6
By: Umbrella
Relevant URL: http://umbrella.sourceforge.net/
Platforms: Linux
Summary:
Umbrella is a security mechanism that implements a combination of
Process-Based Access Control (PBAC) and authentication of binaries through
Digital Signed Binaries (DSB). The scheme is designed for Linux-based
consumer electronic devices ranging from mobile phones to settop boxes.
Umbrella is implemented on top of the Linux Security Modules (LSM)
framework. The PBAC scheme is enforced by a set of restrictions on each
process.
2. Kernel Socks Bouncer 2.6.11
By: Paolo Ardoino
Relevant URL: http://ksb.sourceforge.net/
Platforms: Linux
Summary:
Kernel Socks Bouncer is a Linux Kernel 2.6.x patch that redirects tcp
connections [SSH, telnet, browsers...] to follow through socks5. KSB26
uses a character device to pass socks5 and target ips to the Linux
Kernel.
3. NuFW 1.0.0
By: INL
Relevant URL: http://www.nufw.org
Platforms: Linux
Summary:
NuFW performs an authentication of every single connections passing
through the IP filter, by transparently requesting user's credentials
before any filtering decision is taken. Practically, this brings the notion
of user ID down to the IP layers.
4. ldaupenum 0.02alpha
By: Roni Bachar & Sol Zehnwirth
Relevant URL: https://sourceforge.net/projects/ldapenum
Platforms: Linux, Perl (any system supporting perl), Windows 2000,
Windows 95/98, Windows NT, Windows XP
Summary:
ldapenum is a perl script designed to enumerate system and password
information from domain controllers using the LDAP service when IPC$ is
locked. The script has been tested on windows and linux.
5. File System Saint 1.02a
By: Joshua Fritsch
Relevant URL: http://www.unixgeeks.org/saint
Platforms: Linux, UNIX
Summary:
A fast, flexible, lightweight perl-based host IDS.
6. Travesty 1.0
By: Robert Wesley McGrew
Relevant URL: http://cse.msstate.edu/~rwm8/travesty/
Platforms: Linux
Summary:
Travesty is an interactive program for managing the hardware addresses
(MAC) of ethernet devices on your computer. It supports manually
changing the MAC, generating random addresses, and applying different vendor
prefixes to the current address.
It also allows the user to import their own lists of hardware
addresses and descriptions that can be navigated from within the Travesty
interface. Travesty is written in Python, and is very simple to add
functionality to, or modify.
VII. SPONSOR INFORMATION
-----------------------
Need to know what's happening on YOUR network? Symantec DeepSight
Analyzer
is a free service that gives you the ability to track and manage
attacks.
Analyzer automatically correlates attacks from various Firewall and
network
based Intrusion Detection Systems, giving you a comprehensive view of
your
computer or general network. Sign up today!
http://www.securityfocus.com/sponsor/Symantec_sf-news_041130
------------------------------------------------------------------------