SecurityFocus Linux Newsletter #110
-----------------------------------

This issue is sponsored by: Qualys

Strengthening Network Security: FREE Guide Network security is a
constantly moving target - even proven solutions lose their punch over
time.  Find out how to get COMPLETE PROTECTION against ever-growing
security threats with our FREE new Guide.

Get your copy today at: https://www.qualys.com/forms/nsguideh_376.php

-------------------------------------------------------------------------------

I. FRONT AND CENTER
     1. Barbarians at the Gate: An Introduction to Distributed Denial...
     2. Does Research Support Dumping Linux?
     3. SecurityFocus DPP Program
     4. InfoSec World Conference and Expo/2003 (March 10-12, 2003,Orlando,FL)
II. LINUX VULNERABILITY SUMMARY
     1. YaBB YaBB.pl Cross Site Scripting Vulnerability
     2. Traceroute-Nanog Hostname Buffer Overflow Vulnerability
     3. SuidPerl Information Disclosure Vulnerability
     4. Pserv Request Method Buffer Overflow Vulnerability
     5. Pserv HTTP Version Specifier Buffer Overflow Vulnerability
     6. SquirrelMail read_body.php Cross Site Scripting Vulnerability
     7. Linux Netfilter/IPTables IP Queuing Arbitrary Network Traffic...
     8. Debian Internet Message Insecure Temporary File Creation...
     9. SMB2WWW Remote Command Execution Vulnerability
     10. PortailPHP SQL Injection Vulnerability
     11. Aldap Contact Manager Authentication Bypass Vulnerability
     12. phpBB search.php Cross Site Scripting Vulnerability
     13. Exim Internet Mailer Format String Vulnerability
     14. Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
     15. pWins Web Server Directory Traversal Vulnerability
     16. Bogofilter Bogopass Insecure Temporary File Creation...
     17. Boozt index.cgi Buffer Overrun Vulnerability
     18. Pserv Stream Reading Buffer Overflow Vulnerability
     19. Traceroute-Nanog Spray Buffer Overflow Vulnerability
     20. Pserv User-Agent HTTP Header Buffer Overflow Vulnerability
III. LINUX FOCUS LIST SUMMARY
     1. NO NEW POSTS FOR THE WEEK ENDING 12.06.02
IV. NEW PRODUCTS FOR LINUX PLATFORM
     1. CaptIO
     2. NetMAX VPN Server Suite
     3. NetSecure Web
V. NEW TOOLS FOR LINUX PLATFORMS
     1. Sniffdet v0.7
     2. linksysulator v1.0
     3. gateProtect Firewall v3.2
VI. SPONSOR INFORMATION



I. FRONT AND CENTER
-------------------
1. Barbarians at the Gate: An Introduction to Distributed Denial of
   Service Attacks
By Matthew Tanase

DDoS attacks first made headlines in February 2000. Now, almost three
years later, can it be that we're still vulnerable? Unfortunately the
answer is yes. This article will explain the concept of DDoS attacks, how
they work, how to react if you become a target, and how the security
community can work together to prevent them.

http://online.securityfocus.com/infocus/1647

2. Does Research Support Dumping Linux?
By Tim Mullen

Microsoft's security policies are getting better every day, even as a new
report slams open-source competitors as security nightmares. But the easy
answers aren't always the right ones.

http://online.securityfocus.com/columnists/127

3. SecurityFocus DPP Program

Attention Universities!! Sign-up now for preferred pricing on the only
global early-warning system for cyber attacks - SecurityFocus DeepSight
Threat Management System.

Click here for more information:
http://www.securityfocus.com/corporate/products/dpsection.shtml

4. InfoSec World Conference and Expo/2003 (March 10-12, 2003, Orlando, FL)

Optional Workshops March 8, 9, 12, 13, & 14 Vendor Expo March 10 & 11

Solutions to today’s security concerns; hands-on experts; blockbuster
vendor expo; the CISO Executive Summit; invaluable networking
opportunities.  InfoSec World has it all!

Go to: http://www.misti.com/10/os03nl37inf.html


II. BUGTRAQ SUMMARY
-------------------
1. YaBB YaBB.pl Cross Site Scripting Vulnerability
BugTraq ID: 6272
Remote: Yes
Date Published: Nov 28 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6272
Summary:

YaBB (Yet Another Bulletin Board) is freely available web forum software
that is written in Perl. YaBB will run on most Unix/Linux variants, MacOS,
and Microsoft Windows 9x/ME/NT/2000/XP platforms.

A cross-site scripting vulnerability has been reported in the YaBB forum
'YaBB.pl' script. This vulnerability is due to insufficient sanitization
of URI parameters.

As a result, it is possible for a remote attacker to create a malicious
link to the login page of a site hosting the web forum. The malicious link
may contain arbitrary HTML code in URI parameters. When this link is
visited by an unsuspecting web user, the attacker-supplied code will be
executed in their browser in the security context of the vulnerable
website.

It has been demonstrated that this vulnerability may be exploited to steal
cookie-based authentication credentials.

This vulnerability has been reported for YaBB 1 Gold - SP 1. It is not
known if other versions are affected.

2. Traceroute-Nanog Hostname Buffer Overflow Vulnerability
BugTraq ID: 6274
Remote: No
Date Published: Nov 28 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6274
Summary:

Traceroute is a tool that is used to track packets in a TCP/IP network to
determine the path of network connections.  This vulnerability affects the
Traceroute-Nanog program, written for Unix and Linux operating systems.

A problem with Traceroute-Nanog may make it possible to execute arbitrary
code locally on a vulnerable host.

It has been reported that a buffer overflow exists in Traceroute-Nanog.
Due to insufficient bounds checking in the Traceroute-Nanog program, a
user may execute the program with a hostname of arbitrary length, and
cause the overwriting of stack memory within the process.  This could
result in the execution of attacker-supplied instructions.

This program may present a risk if installed with setuid privileges.  By
default, this program is installed with setuid privileges on Linux
operating systems such as SuSE.

3. SuidPerl Information Disclosure Vulnerability
BugTraq ID: 6282
Remote: No
Date Published: Nov 29 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6282
Summary:

SuidPerl is the Perl interpreter for setuid Perl scripts. It is included
with distributions of the Perl package and is available for Linux and Unix
variant operating environments.

An information disclosure vulnerability has been reported for SuidPerl.
Reportedly, it is possible for an attacker to determine whether files
exist in non-accessible directories.

An attacker can exploit this vulnerability by invoking suidperl with an
absolute filename to determine whether the file exists. When run in this
manner, suidperl will return with a message that confirms the existence of
a file.

Information obtained in this manner may allow an attacker to launch
further, potentially damaging, attacks against a vulnerable system.

4. Pserv Request Method Buffer Overflow Vulnerability
BugTraq ID: 6284
Remote: Yes
Date Published: Nov 30 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6284
Summary:

Pserv (Pico Server) is a freely available web server designed for Linux
and Unix variant operating systems.

A buffer overflow vulnerability has been reported in Pserv. The buffer
overflow condition is due to the way Pserv handles data streams from
remote connections. Reportedly, Pserv reads 1024 bytes at a time from a
connected socket but fails to allocate sufficient space in local buffers
for the data. Specifically, in the request method, defined in the
'analyzeRequest()' function in 'main.c', Pserv only allocates 16 bytes of
space. Due to this, it may be possible to corrupt sensitive memory on the
system stack.

This may cause the web server to exhibit signs of unpredictable behaviour.
Although it has not been confirmed, it may be possible for an attacker to
execute arbitrary code.

5. Pserv HTTP Version Specifier Buffer Overflow Vulnerability
BugTraq ID: 6285
Remote: Yes
Date Published: Nov 30 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6285
Summary:

Pserv (Pico Server) is a freely available web server designed for Linux
and Unix variant operating systems.

A buffer overflow vulnerability has been reported in Pserv. The buffer
overflow condition is due to the way Pserv handles data streams from
remote connections. Reportedly, Pserv reads 1024 bytes at a time from a
connected socket but fails to allocate sufficient space in local buffers
for the data.

An attacker can exploit this vulnerability by issuing an overly long HTTP
request with an invalid HTTP version specifier. Specifically, in the
request method, defined in the 'analyzeRequest()' function in 'main.c',
Pserv only allocates 16 bytes of space for the data. Due to this, it may
be possible to corrupt sensitive memory on the system stack.

This may cause the web server to exhibit signs of unpredictable behaviour.
Although it has not been confirmed, it may be possible for an attacker to
execute arbitrary code.

6. SquirrelMail read_body.php Cross Site Scripting Vulnerability
BugTraq ID: 6302
Remote: Yes
Date Published: Dec 03 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6302
Summary:

SquirrelMail is a standards-based webmail package written in PHP4. It
includes built-in PHP support for the IMAP and SMTP protocols, and all
pages render in pure HTML 4.0. It is available for Linux and Unix based
operating systems.

A cross-site scripting vulnerability has been discovered in SquirrelMail.
The read_body.php script fails to adequately sanitize content passed to
the 'mailbox' and 'passed_id' variables. This makes it possible for an
attacker to embed malicious script code in variable parameters.

Processing a malicious email may result in the execution of embedded
script code in the users mail client. It may be possible to exploit this
issue to obtain sensitive user information such as address books and
authentication credentials.

It should be noted that this issue is known to affect SquirrelMail 1.2.9.
It has not yet been determined if other versions are affected.

7. Linux Netfilter/IPTables IP Queuing Arbitrary Network Traffic Reading Vulnerability
BugTraq ID: 6305
Remote: No
Date Published: Dec 03 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6305
Summary:

IPTables and Netfilter are the firewall infrastructure developed for the
Linux kernel.

A problem with the IP Queuing module distributed with the packages may
make possible the reading of arbitrary network traffic.

The IP Queuing module requires a privileged process to communicate with
user space to handle the queuing of network traffic on the local host.
Insufficient checking of the integrity of the privileged process is
performed.  This could lead to a local user gaining access to information
meant for the privileged process.

It has been reported that if the privileged process exits, the exit of the
process is not tracked.  A local user starting a new, unprivileged process
with the previous process id of the privileged process would gain access
to a limited amount of the network traffic meant for the privileged
process.  This could allow the user access to sensitive network traffic,
and potentially lead to information disclosure.

It should be noted that the limited access to network traffic is dependant
on the set queue length, which is typically 1024 bytes.

8. Debian Internet Message Insecure Temporary File Creation Vulnerability
BugTraq ID: 6307
Remote: No
Date Published: Dec 03 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6307
Summary:

IM (Internet Message) provides a series of user interface commands (im*
commands) and backend Perl5 libraries to integrate E-mail and NetNews user
interface. It is available for the Debian Linux distribution.

A vulnerability has been discovered in the way Debian Internet Message
(IM) creates temporary files. It has been reported that both the impwagent
and immknmz utilities are affected.

By anticipating the names used to create files and directories stored in
the /tmp, it may be possible for a local attacker to corrupt or modify
data as another user. Depending on the actions executed on the temporary
file, it may also be possible to disclose sensitive information with
permissions of the IM process.

9. SMB2WWW Remote Command Execution Vulnerability
BugTraq ID: 6313
Remote: Yes
Date Published: Dec 04 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6313
Summary:

SMB2WWW is a client for Windows Networks that is accessible through a web
browser. It is designed for use with Linux variant operating systems.

A vulnerability has been reported for SMB2WWW. An attacker may be able to
exploit this vulnerability to execute commands with the privileges of the
'www-data' user on a vulnerable host.

Precise technical details of this vulnerability are currently unknown.
This BID will be updated as more information becomes available.

10. PortailPHP SQL Injection Vulnerability
BugTraq ID: 6273
Remote: Yes
Date Published: Nov 28 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6273
Summary:

Portail PHP is a Web portal project based PHP and MySQL. It is available
for the Linux, Unix, and Microsoft Windows operating systems.

A vulnerability exists in the mod_search module included with PortailPHP.
The vulnerability is due to insufficient sanitization of variables used to
construct SQL queries in the 'index.php' script. Specifically, the 'rech'
variable is not sanitized of malicious SQL input. It is possible to modify
the logic of SQL queries through malformed query strings in requests for
the vulnerable script.

By injecting SQL code into the 'rech' variable, it may be possible for an
attacker to corrupt database information.

11. Aldap Contact Manager Authentication Bypass Vulnerability
BugTraq ID: 6310
Remote: Yes
Date Published: Dec 03 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6310
Summary:

Aldap is a Web-based contact manager. It is designed for use with Linux
variant operating systems.

An authentication bypassing vulnerability has been reported for Aldap.
Reportedly, it may be possible for attackers to login to the Aldap contact
manager with 'Manager' privileges regardless of the supplied password.

The vulnerability exists in the 'bind()' function in 'config.inc' and is
due to the misuse of the '$pass' variable. Specifically, the '$pass'
variable is declared twice and as a result is not used in a proper manner.
Exploitation of this vulnerability will allow a remote attacker to obtain
'Manager' level privileges on vulnerable installations of Aldap.

This vulnerability was reported for Aldap 0.09.

12. phpBB search.php Cross Site Scripting Vulnerability
BugTraq ID: 6311
Remote: Yes
Date Published: Dec 03 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6311
Summary:

phpBB is an open-source web forum application that is written in PHP and
supported by a number of database products. It will run on most Unix and
Linux variants, as well as Microsoft Windows operating systems.

phpBB is prone to cross site scripting attacks. The problem lies in the
search.php script which fails to properly sanitize user-supplied input in
the 'search_username' parameter.

By exploiting this issue it may be possible to steal a users cookie-based
authentication credentials. This could be accomplished by constructing a
malicious link containing script code embedded in the 'search_username'
parameter.

13. Exim Internet Mailer Format String Vulnerability
BugTraq ID: 6314
Remote: No
Date Published: Dec 04 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6314
Summary:

Exim is a message transfer agent (MTA) developed at the University of
Cambridge and available under the GNU Public License. It is available for
the Linux operating system.

A format string vulnerability has been discovered in the daemon_go()
function used by Exim. The problem occurs while copying the user-supplied
'pid_file_path' variable into a buffer using the sprintf() function. The
variable is copied into 'buff' with no specified format string. This may
allow an attacker to insert format string characters into the
'pid_file_path?, which may be used to overwrite memory.

Gaining the ability to overwrite memory may make it possible for a local
attacker to execute arbitrary code, with root privileges.

It should be noted that the execution of the daemon_go() function is
limited to the user defined as the 'exim-admin-user'. The
'exim-admin-user' must be defined at compile time.

14. Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
BugTraq ID: 6298
Remote: Yes
Date Published: Dec 02 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6298
Summary:

Cyrus IMAPD is a freely available, open source Interactive Mail Access
Protocol (IMAP) daemon.  It is available for Unix and Linux operating
systems.

A problem discovered in the Cyrus IMAPD server may result in heap
corruption.

It has been reported that Cyrus IMAPD does not sufficiently handle overly
long strings.  In some cases, when a user connects to the daemon, and upon
negotiating the connection sends a login string of excessive length, a
buffer overflow occurs.  This could result in heap corruption and
arbitrary words in memory being overwritten.

It should be noted that this vulnerability does not require remote
authentication.  Exploitation of this vulnerability would result in a user
gaining remote access with the privileges of the IMAP daemon.  This would
minimally give a remote user the ability to read sensitive information
such as email, and could lead to further attack and elevated privileges.

15. pWins Web Server Directory Traversal Vulnerability
BugTraq ID: 6271
Remote: Yes
Date Published: Nov 28 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6271
Summary:

pWins is a Web server implemented using Ruby and Perl. It is designed for
use on Linux variant and Microsoft Windows operating environments.

It has been reported that pWins fails to properly sanitize web requests.
By sending a malicious web request to the vulnerable server, using
directory traversal sequences, it is possible for a remote attacker to
access sensitive resources located outside of the web root.

An attacker is able to traverse outside of the established web root by
using dot-dot-slash (../) directory traversal sequences. An attacker may
be able to obtain any web server readable files from outside of the web
root directory.

Disclosure of sensitive system files may aid the attacker in launching
further attacks against the target system.

This vulnerability has been reported for pWins 0.2.5 for the Microsoft
Windows platform.

16. Bogofilter Bogopass Insecure Temporary File Creation Vulnerability
BugTraq ID: 6278
Remote: No
Date Published: Nov 29 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6278
Summary:

Bogofilter is a package used to filter spam from incoming email. It is
available for Linux and Unix variant operating environments. Bogopass is a
Perl script included with Bogofilter.

Reportedly, bogopass creates temporary files in a predictable manner.
Specifically, temporary files will be created in '/tmp' as
'bogopass.<PID>'. As a result, it is possible for local attackers to read
or corrupt files readable by the bogopass process. An attacker could
potentially exploit this issue by creating a symbolic link in place of the
temporary file which is created. Any actions performed by bogopass when it
is executed will be performed on the file pointed to by the symbolic link.

An attacker may exploit this vulnerability to read, or corrupt,
potentially critical system files.

17. Boozt index.cgi Buffer Overrun Vulnerability
BugTraq ID: 6281
Remote: Yes
Date Published: Nov 29 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6281
Summary:

Boozt is a banner management program available for the Linux operating
system.

A buffer overrun has been discovered in the index.cgi script used by
Boozt. By passing a string of excessive length, as the value for the $name
parameter, to the vulnerable script, it is possible to overwrite a static
buffer. This may result in the corruption of sensitive system memory.

By overwriting sensitive memory with attacker-supplied values, it may be
possible to direct program flow to execute malicious instructions.
Successful exploitation will result in the execution of arbitrary code
with the privileges of the Boozt process.

This issue is known to affect Boozt 0.9.8 and it is not known whether
other versions are affected.

18. Pserv Stream Reading Buffer Overflow Vulnerability
BugTraq ID: 6283
Remote: Yes
Date Published: Nov 30 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6283
Summary:

Pserv (Pico Server) is a freely available web server designed for Linux
and Unix variant operating systems.

A buffer overflow vulnerability has been reported in Pserv. The buffer
overflow condition is due to the way Pserv handles data streams from
remote connections. Pserv reads 1024 bytes from a connected socket. Due to
some flaws when processing the data, it may be possible to corrupt
sensitive memory on the system stack.

Reportedly, it is possible to overflow a local buffer and corrupt memory
by issuing a request that is exactly 1024 bytes. This may cause the web
server to exhibit signs of unpredictable behaviour. Although it has not
been confirmed, it may be possible for an attacker to execute arbitrary
code.

19. Traceroute-Nanog Spray Buffer Overflow Vulnerability
BugTraq ID: 6275
Remote: No
Date Published: Nov 28 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6275
Summary:

Traceroute is a tool that is used to track packets in a TCP/IP network to
determine the path of network connections.  This vulnerability affects the
Traceroute-Nanog program, written for Unix and Linux operating systems.

A problem with Traceroute-Nanog may make it possible to execute arbitrary
code locally on a vulnerable host.

It has been reported that a buffer overflow exists in Traceroute-Nanog.
Due to insufficient bounds checking in the Traceroute-Nanog program, a
user may execute the program with a spray packets amount of excessive
size, and cause the overwriting of stack memory within the process.  This
could result in the execution of attacker-supplied instructions.

This program may present a risk if installed with setuid privileges.  By
default, this program is installed with setuid privileges on Linux
operating systems such as SuSE.

20. Pserv User-Agent HTTP Header Buffer Overflow Vulnerability
BugTraq ID: 6286
Remote: Yes
Date Published: Nov 30 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6286
Summary:

Pserv (Pico Server) is a freely available web server designed for Linux
and Unix variant operating systems.

A buffer overflow vulnerability has been reported in Pserv. The buffer
overflow condition is due to the way Pserv handles data streams from
remote connections.

An attacker can exploit this vulnerability by issuing an overly long HTTP
request with an invalid User-Agent header. Specifically, in the request
method, defined in the 'analyzeRequest()' function in 'main.c', Pserv only
allocates 256 bytes of space for the data that can be as large as 1011
bytes. Due to this, it may be possible to corrupt sensitive memory on the
system stack.

This may cause the web server to exhibit signs of unpredictable behaviour.
Although it has not been confirmed, it may be possible for an attacker to
execute arbitrary code.

21. Pserv HTTP Request Parsing Buffer Overflow
BugTraq ID: 6287
Remote: Yes
Date Published: Nov 30 2002 12:00AM
Relevant URL:
http://www.securityfocus.com/bid/6287
Summary:

Pserv (Pico Server) is a freely available web server designed for Linux
and Unix variant operating systems.

A buffer overflow vulnerability has been reported in Pserv. The buffer
overflow condition is due to the way Pserv handles data streams from
remote connections.

An attacker can exploit this vulnerability by issuing an overly long HTTP
request. Specifically, in the 'handleMethod()' function in 'main.c', Pserv
attempts to concatenate supplied data with the absolute path for the web
document root folder. The supplied input may be as large as 1024 bytes,
however, Pserv does not take this into account when allocating space on
the system stack. Due to this, it may be possible to corrupt sensitive
memory on the system stack.

This may cause the web server to exhibit signs of unpredictable behaviour.
Although it has not been confirmed, it may be possible for an attacker to
execute arbitrary code.


III. LINUX FOCUS LIST SUMMARY
---------------------------------
1. NO NEW POSTS FOR THE WEEK ENDING 12.06.02


IV. NEW PRODUCTS FOR LINUX PLATFORM
-----------------------------------
1. CaptIO
by Captus Networks Corp.
Platforms: Linux
http://www.captusnetworks.com/captio.htm
Summary:

The CaptIO combines the functions of: -a firewall to manage access to
resources -an Intrusion Detection System to prevent attempts to intrude on
or shut down your systems -a high performance switch router network load
balancing to even out traffic across a network Protection from security
attacks originating from: -outside the network -inside the network where
most security breaches occur An adaptive firewall that: -works with the
dynamic Intrusion Detection System to continuously update against new
attacks in near real-time

2. NetMAX VPN Server Suite
by Cybernet Systems
Platforms: Linux, Windows 2000, Windows 95/98, Windows NT
http://www.netmax.com/products/vpn_prods.html
Summary:

The NetMAX VPN Server Suite simplifies Linux servers by installing a
ready-to-configure network security solution consisting of a Virtual
Private Network (VPN) server, firewall, router, and proxy/cache server,
along with the Linux operating system. NetMAX Internet Appliance Software
provides small/medium sized businesses and enterprise workgroups easy use
of a browser-based administration and pre-configured suite of
applications, along with the strength and reliability of Linux.

3. NetSecure Web
by NetSecure Software
Platforms: AIX, BSDI, Linux, Solaris, Windows NT
http://www.netsecuresoftware.com/netsecurenew/Products/NetSecureWeb/netsecureweb.html
Summary:

NetSecure Web enables you to create Internet services guaranteeing full
protection of your information system network.
* Total access to internal database server
* Fully transparent for internal and external users
* Preserves your private network from intrusion
* Ensures that only authorized requests are delivered
* Easy installation and operation


V. NEW TOOLS FOR LINUX PLATFORMS
--------------------------------
1. Sniffdet v0.7
by Ademar de Souza Reis Jr.
Relevant URL:
http://sniffdet.sourceforge.net
Platforms: Linux, POSIX
Summary:

Sniffdet is an implementation of a set of tests for remote sniffers
detection in TCP/IP network environments. It is composed of a flexible and
easy to use library and a console application to run the tests. Major
features include several tests for sniffers detection, config file
support, output plugins, dropping of root privileges, and general
documentation.

2. linksysulator v1.0
by TomK Tech
Relevant URL:
http://tomktech.n3.net
Platforms: Linux
Summary:

Linsysulator is a simple script that utilizes sed, wget, and nmap to
automatically find "ope" linksys routers on a given subnet.

3. gateProtect Firewall v3.2
by Till von Rennenkampff
Relevant URL:
http://www.gateprotect.com/trial_down.php
Platforms: Linux, Windows 2000, Windows 95/98, Windows CE, Windows NT,
Windows XP
Summary:

The "gateProtect Firewall & VPN Server&#8221; with its worldwide unique
user interface, has passed several independent tests with best scores. All
rules and VPN connections can be defined by drag & drop which only takes a
few minutes. It&#8217;s VPN functionality is compatible to all other VPN
solutions including Checkpoint VPN-1. All settings can be made intuitively
and in several languages.


VI. SPONSOR INFORMATION
-----------------------
This issue is sponsored by: Qualys

Strengthening Network Security: FREE Guide Network security is a
constantly moving target - even proven solutions lose their punch over
time.  Find out how to get COMPLETE PROTECTION against ever-growing
security threats with our FREE new Guide.

Get your copy today at: https://www.qualys.com/forms/nsguideh_376.php

-------------------------------------------------------------------------------

Reply via email to