static.dataspill.org
SA-2006-0002: gdb
http://static.dataspill.org/entries/sa_2006_0002.html
Buffer overflow in the (1) DWARF (dwarfread.c) and DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW FORM block) that contains a large number of operations. Temporarily just giving the CVE summary: CVE. This page does not necessarily reflect the views of my employer or anyone i'm associated with.
static.dataspill.org
Ruby/ActiveLdap
http://static.dataspill.org/entries/ruby-activeldap.html
Ruby/ActiveLdap is a project I started when I first found Ruby. I'd been tortured by poor LDAP tool suites and LDAP's increasing ubiquity. It provides an ORM mapping from LDAP data to objects in Ruby by automatically parsing the server's LDAP schema. Currently lives at RubyForge, and the amazing kou. Has taken over 99.9% of all Ruby/ActiveLdap development and support. This page does not necessarily reflect the views of my employer or anyone i'm associated with.
static.dataspill.org
TiddlyWiki encryption
http://static.dataspill.org/entries/tiddlywiki_encryption.html
I've been looking for a useful tool to aid note taking, but that I could also keep on a USB stick safely. I didn't want to have to toy with encrypted filesystems or specialized programs to access it, and I'd like it to be cross platform. I ran across TiddlyWiki. Not only do I doubt that I've implemented this without mistake, I'd also be surprised if anyone is using it. It's pretty slow when it has to do a lot of work. Feel free to try out the EncryptionPlugin.
static.dataspill.org
redpig.dataspill.org » code
http://static.dataspill.org/code
On Monday, I presented Flayer: Exposing Application Internals. At the First USENIX Workshop on Offensive Technologies (WOOT'07). Flayer is a Valgrind tool for software security testing and analysis that provides bit-precise input taint tracing and execution path alteration. … ». This my crack at a (quick! I used to spend a lot of time writing helpful tools for myself in Ruby. I haven't done much in a while. I've dumped the old skeletons of work in a directory. Parses LDAP schemas provided by the server i...
static.dataspill.org
redpig.dataspill.org » thoughts
http://static.dataspill.org/thoughts
I was recently looking for (free) reverse engineering tools for Linux. On the open source front, there's virtually nothing left that works on modern Linux systems. Fenris, linice, and numerous others are all extinct. Without picking up a copy of IDA, you' … ». This page does not necessarily reflect the views of my employer or anyone i'm associated with.
static.dataspill.org
Another user-level threading library
http://static.dataspill.org/entries/another_user-level_threading_library.html
Another user-level threading library. When I was at university, I was challenged to write a full-fledged, POSIX-compatible, threading library. Motivated by an assignment to write a threading library using the friendly BSD functions from. I opted for the more interesting problem. This resulted in wth. This will add support for subsecond scheduling which will make it much more responsive. This page does not necessarily reflect the views of my employer or anyone i'm associated with.
static.dataspill.org
Old ruby stuff
http://static.dataspill.org/entries/old_ruby_stuff.html
I used to spend a lot of time writing helpful tools for myself in Ruby. I haven't done much in a while. I've dumped the old skeletons of work in a directory. Feel free to try anything out, but I can't guarantee how useful it'll be. Some of the abandoned code includes projects like Ruby/BloomFilter, Ruby/PkiToolkit, Ruby/QuickCert, a NIST ICAT vulnerability database parser, and a simple, extensible certificate authority.
static.dataspill.org
SA-2006-0003: cscope
http://static.dataspill.org/entries/sa_2006_0003.html
Multiple buffer overflows in cscope 15.5 and earlier allow user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple vectors including (1) a long pathname that is not properly handled during file list parsing, (2) long pathnames that result from path variable expansion such as tilde expansion for the HOME environment variable, and (3) a long -f (aka reffile) command line argument. Temporarily just giving the CVE summary: CVE.