Skip to main content

Networking

High-Tech Security A High-Wire Act

posted onJanuary 22, 2002
by hitbsecnews

Source: NewsDay.com

For those charged with securing the computer systems of entities as diverse as the Metropolitan Transit Authority and Astoria Federal Savings, the job has come to combine the more challenging aspects of juggling with the potential consequences of a fall from the high-wire.

Port 12345: Hacker haven or Internet X-File?

posted onJanuary 22, 2002
by hitbsecnews

Source: ZDNet

Increased activity on port 12345 could be due to hackers, an antivirus product or something else altogether

Increased activity on TCP port 12345 -- best known as both the NetBus Trojan's default port and the port used for a Trend Micro antivirus product -- has the security community arguing as to who is responsible. Is it Trend Micro customers who have yet to patch known vulnerabilities, script kiddies looking for an easy hit, or an Internet X-file?

Bad Reception

posted onJanuary 22, 2002
by hitbsecnews

Source: Entrepreneur.com

Who's reading your e-mail? Hackers? Competitors? If you're among the companies that have set up an 802.11b-or Wi-Fi-Wireless LAN (WLAN), you may have more people downloading files from your network than you have on your payroll. Some may even be planning to sabotage you.

Linux-*nix-Security: Snort Core Dump Vulnerability

posted onJanuary 21, 2002
by hitbsecnews

Source: Zero Security

It is possible to cause Snort, an open source network intrusion detection tool, to core dump by sending it an extremely small ICMP ECHO packet.

Vulnerable systems:
Snort version 1.8 and prior (without the patch)

Example:
Run snort:
# snort -dev host 192.168.0.3 and 192.168.0.1

Ping 192.168.0.1 from 192.168.0.3 within one data in payload:
# ping -c 1 -s 1 192.168.0.1

Conectiva: Security update to MySQL

posted onJanuary 21, 2002
by hitbsecnews

Source: News Forge

The package shipped with Conectiva Linux 6.0 and older logs by default all queries made to the database to the /var/log/mysql file. This includes user creation, password changes via SQL commands and other queries. Our package incorrectly leaves the permissions of this file as world-readable (0644), thus allowing any user on the system access to potentially sensitive information.

17-year-old hacker penetrated DND network

posted onJanuary 20, 2002
by hitbsecnews

Source: National Post

The leader of an international hacker group that penetrated over a Department of National Defence computer system in 1999 was a 17-year-old high school student who gained access to the security network in 10 minutes from his mother's kitchen table.

Russell Sanford, now 19 and serving two years in a Texas prison, designed complex software that exploited one of Canada's military networks via its Website intermittently for three days.

ProFTPD's DoS Problem and Slash's Weak Link

posted onJanuary 18, 2002
by hitbsecnews

Source: O'Reilly Network

In this column, we look at several problems with ProFTPD; a Trojan Horse application disguised as an exploit; buffer overflows in the glibc library, dtspcd, wmcube-gdk, and Mandrake Linux's Kerberos telnet; and problems in Slash, IBM Websphere, popauth, Aftpd, TWIG, PGPMail.pl, and the Cisco SN 5420 Storage Router.

CISCO - Solaris MGC

posted onJanuary 18, 2002
by hitbsecnews

Source: Xatrix

The Media Gateway Controller (MGC) product is installed on top of
Solaris operating system. In the default installation Solaris has
several know security vulnerabilites. In order to prevent them from
being exploited customers must install updated packages CSCOh007 and
CSCOh013. These packages contain the latest Solaris patches and
additional hardening of the Solaris OS.