[Full-disclosure] Sina UC ActiveX Multiple Remote Stack Overflow

2007-01-08 Thread Sowhat
Sina UC ActiveX Multiple Remote Stack Overflow By Sowhat of Nevis Labs Date: 2007.01.09 http://www.nevisnetworks.com http://secway.org/advisory/20070109EN.txt http://secway.org/advisory/20070109CN.txt CVE:NO-CVE-Num Vendor Sina Inc. <=UC2006 are vulnerable Overview: Sina UC is one

[Full-disclosure] [Fwd: Re: 0trace - traceroute on established connections]

2007-01-08 Thread Matthew Flaschen
--- Begin Message --- Write a 5 second C program that is a wrapper for the usleep C library function... none of this cruft is necessary. -Matt On 1/8/07, Matthew Flaschen <[EMAIL PROTECTED]> wrote: Michal Zalewski wrote: > I'd like to announce the availability of a free security reconnaissance

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-08 Thread Brendan Dolan-Gavitt
A much easier way is to write your own usleep and drop it in /bin: ---usleep.c--- #include #include #include int main (int argc, char **argv) { usleep(atoi(argv[1])); return 0; } ---usleep.c--- [note: doesn't check error conditions] 0trace worked brilliantly on my debian system after

[Full-disclosure] VMware ESX server security updates

2007-01-08 Thread VMware Security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - --- VMware Security Advisory Advisory ID: VMSA-2007-0001 Synopsis: VMware ESX server security updates Issue date:2007-01-08 Updated on:

[Full-disclosure] [ MDKSA-2007:004 ] - Updated geoip packages fix geoipupdate vulnerability

2007-01-08 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:004 http://www.mandriva.com/security/ ___

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-08 Thread Matthew Flaschen
Michal Zalewski wrote: > I'd like to announce the availability of a free security reconnaissance / > firewall bypassing tool called 0trace. Good work. Are you going to put it under a free license? > Enough chatter - the tool is available here (Linux version): > > http://lcamtuf.coredump.cx/s

[Full-disclosure] [ MDKSA-2007:003 ] - Updated avahi packages fix DoS vulnerability

2007-01-08 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:003 http://www.mandriva.com/security/ ___

[Full-disclosure] Fwd: Flog 1.1.2 Remote Admin Password Disclosure

2007-01-08 Thread T Biehn
-- Forwarded message -- From: T Biehn <[EMAIL PROTECTED]> Date: Jan 8, 2007 3:06 PM Subject: Re: [Full-disclosure] Flog 1.1.2 Remote Admin Password Disclosure To: endrazine <[EMAIL PROTECTED]> How are you guys still arguing about this? It wasn't even a troll. It's called a one-wa

Re: [Full-disclosure] Universal XSS with PDF files: highly dangerous

2007-01-08 Thread Matthew Flaschen
The Anarcat wrote: > Anyone knows how this affects opensource PDF viewers like gpdf or > evince? As I understand this vulnerability, it's only effective > against embeded PDF readers, right? I don't know what you mean embedded. It only affects Adobe Reader 7. Matthew Flaschen signature.asc De

Re: [Full-disclosure] Universal XSS with PDF files: highly dangerous

2007-01-08 Thread The Anarcat
Anyone knows how this affects opensource PDF viewers like gpdf or evince? As I understand this vulnerability, it's only effective against embeded PDF readers, right? A. signature.asc Description: Digital signature ___ Full-Disclosure - We believe in it

Re: [Full-disclosure] Flog 1.1.2 Remote Admin Password Disclosure

2007-01-08 Thread endrazine
typos : endrazine a écrit : > Here again, I agree. Now, if one needs to exhaustively try every > possible 32b hashes with the largest possible charset (or even bigger hashes > with a smaller - like those alphanumerical keys you just mentionned), to > break a password hash, the it's not a "*BIG*"

Re: [Full-disclosure] Flog 1.1.2 Remote Admin Password Disclosure

2007-01-08 Thread endrazine
Hi Vladis, Hi dear list, [EMAIL PROTECTED] a écrit : > > It's a pretty easy proof actually. If your password input routine allows > more different passwords than there are possible hashes, you *will* have > collisions. For instance, if you use a 64-bit hash, and reasonable-length > passwords, yo

[Full-disclosure] [SECURITY] [DSA 1247-1] New libapache-mod-auth-kerb packages fix remote denial of service

2007-01-08 Thread Noah Meyerhans
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1247-1[EMAIL PROTECTED] http://www.debian.org/security/ Noah Meyerhans January 08, 2007 - --

[Full-disclosure] rPSA-2007-0001-1 openoffice.org

2007-01-08 Thread rPath Update Announcements
rPath Security Advisory: 2007-0001-1 Published: 2007-01-08 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: openoffice.org=/[EMAIL PROTECTED]:devel//1/2.0.3-1.7-1 References: http://www.cve.mitre.org/

Re: [Full-disclosure] Flog 1.1.2 Remote Admin Password Disclosure

2007-01-08 Thread Valdis . Kletnieks
On Sun, 07 Jan 2007 16:08:23 +0100, endrazine said: > > yes that's correct but don't forget that hashes can collide > > > > it could be the case that: > > > can ? could ? might ? Do you have any mathematical prouve or are you > just guessing ? It's a pretty easy proof actually. If your password

[Full-disclosure] [SECURITY] [DSA 1246-1] New OpenOffice.org packages fix arbitrary code execution

2007-01-08 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1246-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze January 8th, 2007

Re: [Full-disclosure] code release: cryptographic attack tool

2007-01-08 Thread Dave \"No, not that one\" Korn
"Slythers Bro" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED] > this is a mathematic tool where all bits of a double word have 3 states : > one , zero and > unknow > i implemented the addition , multiplication (with an integer), a new > concept "fusion" > (equivalent to = ) , and a

Re: [Full-disclosure] Perforce client: security hole by design

2007-01-08 Thread Dave \"No, not that one\" Korn
Ben Bucksch wrote: > Anders B Jansson wrote: >> I'd say that it's a design decition, not sure that it's a design >> flaw. >> It's all down to what you try to protect. >> ... connecting any device not 100% controlled by the company to a >> company network is strictly forbidden, doing so would be reg

Re: [Full-disclosure] [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-08 Thread M . B . Jr .
On 1/3/07, Jim Manico <[EMAIL PROTECTED]> wrote: > I'm most worried about the CSRF vector. how come? this is client-side stuff. -- Marcio Barbado, Jr. == == ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.or