[Full-Disclosure] Kindergarten on vacation (was: Obvious fake mail...)

2005-01-07 Thread Stefan Esser
that lost one of his toys. And I will most probably face it again and again until you die by a heart attack. Yours, Stefan Esser -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQFB3zGLSuF5XhWr2ngRAsGzAJ90LsGPkTWvDyItnX

[Full-Disclosure] Outsch... Sorry...

2005-01-07 Thread Stefan Esser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Outsch! My mail was so fast through that I do not believe anymore that it is moderated at the moment :) So sorry to Dave. Stays the question why pipermail is too dumb to generate correct archives ;) Stefan -BEGIN PGP SIGNATURE- Version:

[Full-Disclosure] Advisory 01/2004: Multiple Vulnerabilities in PHP 4/5

2004-12-18 Thread Stefan Esser
Author: Stefan Esser [EMAIL PROTECTED] Application: PHP4 = 4.3.9 PHP5 = 5.0.2 Severity: Several vulnerabilities within PHP allow local and remote execution of arbitrary code Risk: Critical Vendor Status: Vendor has released bugfixed versions

[Full-Disclosure] Advisory 01/2004: Multiple vulnerabilities in PHP 4/5

2004-12-18 Thread Stefan Esser
Author: Stefan Esser [EMAIL PROTECTED] Application: PHP4 = 4.3.9 PHP5 = 5.0.2 Severity: Several vulnerabilities within PHP allow local and remote execution of arbitrary code Risk: Critical Vendor Status: Vendor has released bugfixed versions

[Full-Disclosure] Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities

2004-11-22 Thread Stefan Esser
/22 Author: Stefan Esser [EMAIL PROTECTED] Application: Cyrus IMAP Server = 2.2.8 Severity: Several vulnerabilities within Cyrus IMAP Server allow remote execution of arbitrary code Risk: Critical Vendor Status: Vendor has released a bugfixed version

[Full-Disclosure] Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities

2004-11-17 Thread Stefan Esser
Author: Stefan Esser [EMAIL PROTECTED] Application: Linux 2.4 = 2.4.27 Linux 2.6 = 2.6.9 Severity: Several vulnerabilities within smbfs allow crashing the kernel or leaking kernel memory with the help of the smb server Risk

[Full-Disclosure] Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow

2004-11-14 Thread Stefan Esser
: 2004/11/15 Author: Stefan Esser [EMAIL PROTECTED] Application: Samba 3 = 3.0.7 Severity: A buffer overflow inside the QFILEPATHINFO request handler allows remote code execution Risk: Critical Vendor Status: Vendor has released a bugfixed version. Reference

Re: [Full-Disclosure] How secure is PHP ?

2004-11-04 Thread Stefan Esser
Nice try Ron, while PHP indeed had lots of advisories in the past, your list is FUD. Many of the listed vulnerabilities are within non standard or even EXPERIMENTAL extensions, are theoretical vulnerabilities, are only exploitable if precondition a,b,c,d,e,f,g is fullfilled or are only affecting

Re: [Full-Disclosure] iDEFENSE Security Advisory 08.16.04: CVS Undocumented Flag Information Disclosure Vulnerability

2004-08-16 Thread Stefan Esser
, where you pay people for vulnerabilities that were already found and reported by others. Stefan Esser -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security

[Full-Disclosure] Advisory 12/2004: PHP strip_tags() bypass vulnerability

2004-07-13 Thread Stefan Esser
Author: Stefan Esser [EMAIL PROTECTED] Application: PHP = 4.3.7 PHP5 = 5.0.0RC3 Severity: A binary safety problem within PHP's strip_tags() function may allow injection of arbitrary tags in Internet Explorer and Safari browsers Risk

[Full-Disclosure] Advisory 11/2004: PHP memory_limit remote vulnerability

2004-07-13 Thread Stefan Esser
Author: Stefan Esser [EMAIL PROTECTED] Application: PHP = 4.3.7 PHP5 = 5.0.0RC3 Severity: A vulnerability within PHP allows remote code execution on PHP servers with activated memory_limit Risk: Critical Vendor Status: Vendor has released a bugfixed

[Full-Disclosure] Advisory 10/2004: Chora CVS/SVN Viewer remote vulnerability

2004-06-13 Thread Stefan Esser
Author: Stefan Esser [EMAIL PROTECTED] Application: Chora = 1.2.1 Severity: A vulnerability within Chora allows remote shell command injection Risk: Critical Vendor Status: Vendor has released a bugfixed version. Reference: http://security.e-matters.de/advisories

[Full-Disclosure] Advisory 09/2004: More CVS remote vulnerabilities

2004-06-09 Thread Stefan Esser
: Stefan Esser [EMAIL PROTECTED] Application: CVS feature release = 1.12.8 CVS stable release = 1.11.16 Severity: Vulnerabilities within CVS allow remote compromise of CVS servers. Risk: Critical Vendor Status: Vendor has released bugfixed versions

[Full-Disclosure] Advisory 07/2004: CVS remote vulnerability

2004-05-19 Thread Stefan Esser
-matters GmbH - Securityteam Key fingerprint = 3FFB 7C86 7BE8 6981 D1DA A71A 6F7D 572D 3004 C4BC Copyright 2004 Stefan Esser. All rights reserved. -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQFAqWRzb31XLTAExLwRAroGAKDWZEjc+4qs

[Full-Disclosure] Advisory 06/2004: libneon date parsing vulnerability

2004-05-19 Thread Stefan Esser
: Stefan Esser [EMAIL PROTECTED] Application: libneon = 0.24.5 Severity: A vulnerability within a date parsing function allows arbitrary code execution Risk: Medium Vendor Status: Vendor is releasing a bugfixed version. Reference: http://security.e-matters.de

[Full-Disclosure] Advisory 08/2004: Subversion remote vulnerability

2004-05-19 Thread Stefan Esser
: Stefan Esser [EMAIL PROTECTED] Application: Subversion = 1.0.2 Severity: A vulnerability within Subversion allows remote compromise of Subversion servers. Risk: Critical Vendor Status: Vendor is releasing a bugfixed version. Reference: http://security.e-matters.de

[Full-Disclosure] Advisory 05/2004: phpMyFAQ local file inclusion vulnerability

2004-05-18 Thread Stefan Esser
Author: Stefan Esser [EMAIL PROTECTED] Application: phpMyFAQ stable release = 1.3.12 phpMyFAQ developer release = 1.4.0-alpha1 Severity: A vulnerability within phpMyFAQ allows inclusion of arbitrary local files Risk: Medium Vendor Status: Vendor has

Re: [Full-Disclosure] Re: Linux Kernel sctp_setsockopt() Integer Overflow

2004-05-15 Thread Stefan Esser
. Otherwise you would find several protocol handlers vulnerable... f.e. IPv6... Stefan Esser -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http

Re: [Full-Disclosure] Linux Kernel sctp_setsockopt() Integer Overflow

2004-05-11 Thread Stefan Esser
Very funny FAKE advisory. Especially funny because bugtraq let it through while the real NetBSD local root is held back... Stefan Esser -- -- Stefan Esser[EMAIL PROTECTED] e

[Full-Disclosure] Advisory 04/2004: Net(Free)BSD Systrace local root vulnerabilitiy

2004-05-10 Thread Stefan Esser
e-matters GmbH www.e-matters.de -= Security Advisory =- Advisory: Net(Free)BSD Systrace local root vulnerability Release Date: 2004/05/11 Last Modified: 2004/05/11 Author: Stefan Esser [EMAIL PROTECTED

[Full-Disclosure] Advisory 03/2004: Multiple (13) Ethereal remote overflows

2004-03-23 Thread Stefan Esser
e-matters GmbH www.e-matters.de -= Security Advisory =- Advisory: Multiple (13) Ethereal remote overflows Release Date: 2004/03/23 Last Modified: 2004/03/23 Author: Stefan Esser [EMAIL PROTECTED

Re: [Full-Disclosure] The Trillian GPL violation allegations are confirmed false.

2004-02-28 Thread Stefan Esser
chars or so. So why in hell did you both choose coincidently 64 byte... Just one of many examples. And using atoi() instead of strtol() is still derived code. Ohh and btw: your parsers are not efficient and it would be trivial to write a far more efficient one with the use of memchr() Stefan Esser

Re: [Full-Disclosure] Advisory 02/2004: Trillian remote overflows - maybe this is off-topic, but...

2004-02-25 Thread Stefan Esser
it is better) Stefan Esser -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Keygpg --keyserver

Re: [Full-Disclosure] Advisory 02/2004: Trillian remote overflows - maybe this is off-topic, but...

2004-02-25 Thread Stefan Esser
to Trillian and was written by the Gaim project is in Trillian. Thank you Stefan -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e

[Full-Disclosure] Advisory 02/2004: Trillian remote overflows

2004-02-24 Thread Stefan Esser
e-matters GmbH www.e-matters.de -= Security Advisory =- Advisory: Trillian remote overflows Release Date: 2004/02/24 Last Modified: 2004/02/24 Author: Stefan Esser [EMAIL PROTECTED] Application

Re: [Full-Disclosure] XBOX EvolutionX ftp 'cd' command and telnet 'dir' buffer overflow

2004-02-10 Thread Stefan Esser
server and supplying a long username:password combination. Ohh and unlike your crashes this one is preauth. Stefan Esser -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security

Re: [Full-Disclosure] Apparently the practice was prevalent

2004-02-08 Thread Stefan Esser
anymore... I doubt, I doubt. Stefan -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Keygpg --keyserver

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-06 Thread Stefan Esser
-- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Keygpg --keyserver pgp.mit.edu --recv-key 0xCF6CAE69 Key fingerprint B418 B290 ACC0 C8E5 8292 8B72 D6B0

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-06 Thread Stefan Esser
Password:foolish How would that be different from BasicAuth? And I hope your argument is not that the password is not transfered in plain text with BasicAuth... Stefan -- -- Stefan Esser[EMAIL

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-06 Thread Stefan Esser
no rights... -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Keygpg --keyserver pgp.mit.edu --recv

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-06 Thread Stefan Esser
no right to change standards. If Netscape had introduced the feature everyone here would cheer. But the big 800 pounds gorilla has no rights... -- -- Stefan Esser[EMAIL PROTECTED] e

Re: [Full-Disclosure] Interesting side effect of the new IE patch

2004-02-05 Thread Stefan Esser
-- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Keygpg --keyserver pgp.mit.edu --recv-key 0xCF6CAE69 Key fingerprint B418 B290 ACC0 C8E5 8292 8B72

Re: Re: [Full-Disclosure] file_exists() bypassing , critical problem ?

2004-02-02 Thread Stefan Esser
IF they exist. And maybe for the hundreth time: Never trust filenames supplied by the user. You always have to tripple check them. Stefan -- -- Stefan Esser[EMAIL PROTECTED] e-matters

[Full-Disclosure] GAIM Patch update

2004-01-27 Thread Stefan Esser
. This problem was reported by: Joseph Martin Cheers, Stefan Esser -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Key

[Full-Disclosure] Advisory 01/2004: 12 x Gaim remote overflows

2004-01-26 Thread Stefan Esser
e-matters GmbH www.e-matters.de -= Security Advisory =- Advisory: 12 x Gaim remote overflows Release Date: 2004/01/26 Last Modified: 2004/01/26 Author: Stefan Esser [EMAIL PROTECTED] Application: Gaim

Re: [Full-Disclosure] Computer Sabotage by Microsoft

2003-09-11 Thread Stefan Esser
back. I payed for a black box with specific features the font hack was one of the features. If they kill this feature, they kill my property and have to pay for it. Yours, Stefan Esser -- -- Stefan Esser

Re: [Full-Disclosure] Computer Sabotage by Microsoft

2003-09-11 Thread Stefan Esser
that says MS monopoly alert, does only play what MS wants (ignoring the fact that the XBOX is advertised as playing audio cds which is not true with all those CD copy protections in .de) Stefan Esser -- -- Stefan Esser

[Full-Disclosure] Computer Sabotage by Microsoft

2003-09-11 Thread Stefan Esser
sabotage. I have never allowed MS to modify my dashboard or to auto update my dashboard. Is any lawyer on the list who can point me to the right paragraphs? I do not believe this computer sabotage is legal in any european country. Yours, Stefan Esser

[Full-Disclosure] Little Missunderstanding...

2003-08-18 Thread Stefan Esser
Hi, this is a little bit off topic, but everytime I send out a security advisory I have to answer the same questions. No I am not the Stefan Esser from FreeBSD, and I am not the guy on the photos you can find on google (iirc, that is the FreeBSD guy). But yes, I am also the XBOX font hacker

[Full-Disclosure] Update to emule/xmule/lmule vulnerabilities.

2003-08-18 Thread Stefan Esser
by an additional condition in an If clause. Stefan Esser -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Key

[Full-Disclosure] Advisory 02/2003: emule/xmule/lmule multiple remote vulnerabilities

2003-08-17 Thread Stefan Esser
e-matters GmbH www.e-matters.de -= Security Advisory =- Advisory: eMule/lmule/xmule multiple remote vulnerabilities Release Date: 2003/08/17 Last Modified: 2003/08/17 Author: Stefan Esser [EMAIL PROTECTED

Re: [Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #970 - 38 msgs

2003-07-23 Thread Stefan Esser
this on sites like http://www.xbox-scene.com Stefan -- -- Stefan Esser[EMAIL PROTECTED] e-matters Security http://security.e-matters.de/ GPG-Key

[Full-Disclosure] Advisory 05/2002: Another Fetchmail Remote Vulnerability

2002-12-13 Thread Stefan Esser
e-matters GmbH www.e-matters.de -= Security Advisory =- Advisory: Fetchmail remote vulnerability Release Date: 2002/12/13 Last Modified: 2002/12/13 Author: Stefan Esser [[EMAIL PROTECTED]] Application

Re: [Full-Disclosure] PHP Information Functions May Allow Cross-Site Scripting

2002-10-13 Thread Stefan Esser
that calls phpinfo(); AND(!) have expose_php on. I already said at different places that you cannot blame insecure programming onto the language. There is absolutely NO reason to have a phpinfo() script on a production server, because it reveals too much information. Stefan Esser