Re: [Full-disclosure] Month Of Hackerrats Bugs

2007-06-18 Thread J. M. Seitz
Well, in response:

1) If the Month of BS that you are spraying is all you can contribute to the
security community, you are leagues behind Jericho who heads the OSVDB, VIM
and does many other countless things, tirelessly day in and day out.

2) Who cares? If the FBI or RCMP (in my case from Canada) comes knocking at
my door, and they ask Hey, we know script kiddie XYZ sent you details on
how they bypassed the Net Nanny filters at their high school. I wouldn't
lose any sleep handing out info, I doubt neither would you.

3) No one is really sure what you are after here? Most people, like HD, did
the month of.. To open the eyes of vendors, fame, tool releases, etc. This
seems strange? Maybe lame responses like my own are the reason why?

Aside from that, you are barking up the wrong tree going after Jericho..


JS
 

 Following suit to the month of bugs - we are pleased to 
 announce the disclosures of cooperating snitches liars and 
 conmen in the industry. We present our second Hackerrat with 
 an eye opening Jericho
 
 Jericho (Brian Martin) and his cohorts at the website 
 Attrition were at one time mining hacker information for the 
 FBI. They will swear they didn%u2019t an offer a barrage of 
 verbally crafted nonsense to deter the truth about their 
 actions, but we know better. This information or 
 (Disinformation) comes via an earlier write up on the 
 Hackerrat terrorist known as Mark Maiffret and eEye Security.
 
 So how does Jericho tie into eEye anyway? Simple he does so 
 via way of Dale Coddington aka Punkis who worked at eEye. 
 Snitches of a feather flock together. See it worked like 
 this, once upon a time there was #dc-stuff, no wait, some may 
 not be ready for that. krystlia, malvu and other miscreants
 
 . Anynow there was Brian Martin hacking the NYTimes as HFG. 
 (don%u2019t worry Martin, I believe the US has a statute of 
 limitations). Never to be discovered perhaps because Adam 
 Penenburg would never disclose it, and perhaps because Martin 
 had some decent friends like Carole Fennelly. Why does 
 Jericho insist he never cooperated with the feds nor 
 disclosed any information to them. The truth is in front of 
 most, but most care not to look at the truth.
 
 Ask yourself logically, search any search engine, Lexis 
 Nexis, Google, find one instance of a case of federal agents 
 raiding someone's home and walking out without a suspect. 
 You'd have better luck getting struck by lightning. So what 
 happened after FBI agents raided Martin's house once upon a 
 time? Truth be told, he cooperated with authorities and 
 provided them with log records for moronic developmentally 
 challenged idiots who were sending him proof of their hacks. 
 Thinks this is propaganda?
 
 Brian Martin's information is publicly available via what is 
 known in the United States as the Freedom of Information Act. 
 It is highly unlikely he'd appreciate this disclosure since 
 he would somehow have to prove everyone else except him is 
 lying. He would have to come back with discourse on how the 
 government is out to get him by carefully, selectively and 
 willfully injecting disinformation into his life records. Not 
 plausible. So a huge greeting to the federal snitch known as 
 Jericho and his gang of buddies at Attrition. This month's 
 second biggest federal snitch.
 
 http://hackerwars.blogsome.com/
 
 
 -
 Brought to you by Footard: http://www.footard.com Please 
 report spam to [EMAIL PROTECTED]
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ShAnKaR: Simle machines forum CAPTCHA bypass and PHP injection

2007-06-18 Thread 3APA3A
Dear [EMAIL PROTECTED],

  ShAnKaR  shankar  at shankar.name reported vulnerabilities in Simple
  Machines Forum 1.1.2 (aka SMF) http://www.simplemachines.org/

  Original advisory (in Russian):
  http://securityvulns.ru/Rdocument271.html

1. Weak sound-based CAPTCHA protection

   In  this engine sound CAPTCHA based automated registration protection
   is  implemented  with  a  WAV file, generated by concatenation of few
   different  sound  files.  Developers  use WAV file randomization, but
   this   randomization   is   insufficient   and  can  be  bypassed  by
   bruteforcing with known sound templates.

[EMAIL PROTECTED] smfh]$ ./captcha.pl http://localhost/smf/
nnrbv
created in 1.41827201843262 seconds
[EMAIL PROTECTED] smfh]$ ./captcha.pl http://localhost/smf/
vpubu
created in 1.49515509605408 seconds
[EMAIL PROTECTED] smfh]$ ./captcha.pl http://localhost/smf/
ntfhh
created in 2.31928586959839 seconds
[EMAIL PROTECTED] smfh]$ ./captcha.pl http://localhost/smf/
egudz
created in 0.823321104049683 seconds

  As  it  can  be  seen,  bruteforce usually takes only 1-2 seconds. See
  script attached.

2. PHP injection

There  is  a  possibility  to  execute  any  PHP code during creation or
editing of forum message.
(no further details is given by advisory author).




-- 
http://securityvulns.com/
 /\_/\
{ , . } |\
+--oQQo-{ ^ }-+ \
|  ZARAZA  U  3APA3A   } You know my name - look up my number (The Beatles)
+-o66o--+ /
|/

capcha.pl
Description: Binary data
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Month Of Hackerrats Bugs

2007-06-18 Thread M. Shirk
I am looking forward to the Month of Lame White Motherfuckers
--reference George Carlin


Shirkdog
' or 1=1--
http://www.shirkdog.us





From: [EMAIL PROTECTED]
To: snitches[EMAIL PROTECTED]
CC: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Month Of Hackerrats Bugs
Date: Mon, 18 Jun 2007 01:24:25 -0400

quite a pleasure to see another well drafted composition to full
disclosure. it appears we have quite a real hacker/wanker giving us
some wonderful information. i hope the people you reveal had great
success in working with the authorities. we should rename this to a
month of heros if you should continue. perhaps if you try hard
enough you could start a month of not sucking dick but some how i
doubt you could succeed in such  an endevour. enjoy hiding in the
shadows with your useless commentary that no one on here gives a
shit about. are you jealous that these people actually have
something that you do not,,success and lives?

get a bloody life you dumb shit.



--jMcD

  Following suit to the month of bugs - we are pleased to
announce the
  disclosures of cooperating snitches liars and conmen in the
industry. We
  present our second Hackerrat with an eye opening Jericho
 
  Jericho (Brian Martin) and his cohorts at the website Attrition
were at
  one time mining hacker information for the FBI. They will swear
they
  didn%u2019t an offer a barrage of verbally crafted nonsense to
deter the
  truth about their actions, but we know better. This information or
  (Disinformation) comes via an earlier write up on the Hackerrat
terrorist
  known as Mark Maiffret and eEye Security.
 
  So how does Jericho tie into eEye anyway? Simple he does so via
way of
  Dale Coddington aka Punkis who worked at eEye. Snitches of a
feather flock
  together. See it worked like this, once upon a time there was #dc-
stuff,
  no wait, some may not be ready for that. krystlia, malvu and other
  miscreants
 
  . Anynow there was Brian Martin hacking the NYTimes as HFG.
(don%u2019t
  worry Martin, I believe the US has a statute of limitations).
Never to be
  discovered perhaps because Adam Penenburg would never disclose
it, and
  perhaps because Martin had some decent friends like Carole
Fennelly. Why
  does Jericho insist he never cooperated with the feds nor
disclosed any
  information to them. The truth is in front of most, but most care
not to
  look at the truth.
 
  Ask yourself logically, search any search engine, Lexis Nexis,
Google,
  find one instance of a case of federal agents raiding someone's
home and
  walking out without a suspect. You'd have better luck getting
struck by
  lightning. So what happened after FBI agents raided Martin's
house once
  upon a time? Truth be told, he cooperated with authorities and
provided
  them with log records for moronic developmentally challenged
idiots who
  were sending him proof of their hacks. Thinks this is propaganda?
 
  Brian Martin's information is publicly available via what is
known in the
  United States as the Freedom of Information Act. It is highly
unlikely
  he'd appreciate this disclosure since he would somehow have to
prove
  everyone else except him is lying. He would have to come back with
  discourse on how the government is out to get him by carefully,
  selectively and willfully injecting disinformation into his life
records.
  Not plausible. So a huge greeting to the federal snitch known as
Jericho
  and his gang of buddies at Attrition. This month's second biggest
federal
  snitch.
 
  http://hackerwars.blogsome.com/
 
 
  -
  Brought to you by Footard: http://www.footard.com
  Please report spam to [EMAIL PROTECTED]
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/

--
Click to lower your debt and consolidate your monthly expenses
http://tagline.hushmail.com/fc/CAaCXv1QPRIsBEe9Gbyddq0sRO5wpLyf/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_
Need a break? Find your escape route with Live Search Maps. 
http://maps.live.com/default.aspx?ss=Restaurants~Hotels~Amusement%20Parkcp=33.832922~-117.915659style=rlvl=13tilt=-90dir=0alt=-1000scene=1118863encType=1FORM=MGAC01

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] n3td3v says second internet exists

2007-06-18 Thread Valdis . Kletnieks
On Sun, 17 Jun 2007 04:36:46 +0200, Martin Zimmermann said:

  not only is the second internet being built incase the first one gets
  attaced, infact the government plan to eventually switch everyone over
  to the second internet because its being built with security in mind.
 
 Sh, dont tell anybody.. But theres a super secret web 1.0 page for
 the choosen few. Since everybody knows you are a ûberhacker I guess we
 better let you in on it.. - http://www.internet2.edu/ .And make sure

Actually, that's not the second Internet in case the first one gets whacked.

That's just a research network for high-bandwidth communications.

The *real* second network could be one or more of:

1) An IPv6-based network, which supposedly includes security.  To be honest,
the Emperor is wearing some new really slick new threads here - the IPv6
security is basically that the same IPSEC AH/ESP stuff that nobody uses
on IPv4 needs to be supported for a compliant IPv6 network stack, while it's
an optional for IPv4. Some progress. ;)

2) The networks that DISA and friends run for various parts of the
US government. (Hint - Google for 'DISN' - most of the hits on the first
page will take you interesting places.)

3) Something else. ;)

Hint:  Look at the sites listed here: http://www.carrierhotels.com/properties/
and then ask yourself who interconnects at which telco hotels, and who
has currently dark fiber capacity into and and out of the cities involved.
Remember that for a second internet to be *useful*, it needs connections
to all the places that need to be on the second internet.  And of course,
need is defined by the people paying for the fiber and the routers (you
ever *priced* a OC-192 card for a Juniper? Yowza. :)  Remember - you don't
*have* to be at One Wilshire or the Westin - but if your fiber ends someplace
else, the people you want to connect to will have to get fiber to the
someplace else... 

 20 - 30 years ?? Im getting my Internet 2.0 fiber access on monday, but
 I do know somewbody.

Welcome aboard, newcomer - some of us were connected to Abilene last century,
and have been on NLR since that got started... ;)


pgpu4ujkQOBH6.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] CISSP

2007-06-18 Thread Bozo Bad

http://www.cissp.com/store/search.asp?s=%3Cscript%3Ealert(%22Look,mamma, I'm
a CISSP!%22)%3C/script%3E
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Month Of Hackerrats Bugs

2007-06-18 Thread Dr. Neal Krawetz PhD
All,

[EMAIL PROTECTED] is just another identity that gobbles aka n3td3v
has created as part of his smear campaign against myself and other
prominent members of the computer security community.  It is best that
we just ignore him.  This is the only way to make him go away.

Thanks,
Dr. Neal Krawetz, PhD.
http://www.hackerfactor.com/blog/ 

On Sun, Jun 17, 2007 at 10:44:00PM -0700, J. M. Seitz wrote:
 Well, in response:
 
 1) If the Month of BS that you are spraying is all you can contribute to the
 security community, you are leagues behind Jericho who heads the OSVDB, VIM
 and does many other countless things, tirelessly day in and day out.
 
 2) Who cares? If the FBI or RCMP (in my case from Canada) comes knocking at
 my door, and they ask Hey, we know script kiddie XYZ sent you details on
 how they bypassed the Net Nanny filters at their high school. I wouldn't
 lose any sleep handing out info, I doubt neither would you.
 
 3) No one is really sure what you are after here? Most people, like HD, did
 the month of.. To open the eyes of vendors, fame, tool releases, etc. This
 seems strange? Maybe lame responses like my own are the reason why?
 
 Aside from that, you are barking up the wrong tree going after Jericho..
 
 
 JS
  
 
  Following suit to the month of bugs - we are pleased to 
  announce the disclosures of cooperating snitches liars and 
  conmen in the industry. We present our second Hackerrat with 
  an eye opening Jericho
  
  Jericho (Brian Martin) and his cohorts at the website 
  Attrition were at one time mining hacker information for the 
  FBI. They will swear they didn%u2019t an offer a barrage of 
  verbally crafted nonsense to deter the truth about their 
  actions, but we know better. This information or 
  (Disinformation) comes via an earlier write up on the 
  Hackerrat terrorist known as Mark Maiffret and eEye Security.
  
  So how does Jericho tie into eEye anyway? Simple he does so 
  via way of Dale Coddington aka Punkis who worked at eEye. 
  Snitches of a feather flock together. See it worked like 
  this, once upon a time there was #dc-stuff, no wait, some may 
  not be ready for that. krystlia, malvu and other miscreants
  
  . Anynow there was Brian Martin hacking the NYTimes as HFG. 
  (don%u2019t worry Martin, I believe the US has a statute of 
  limitations). Never to be discovered perhaps because Adam 
  Penenburg would never disclose it, and perhaps because Martin 
  had some decent friends like Carole Fennelly. Why does 
  Jericho insist he never cooperated with the feds nor 
  disclosed any information to them. The truth is in front of 
  most, but most care not to look at the truth.
  
  Ask yourself logically, search any search engine, Lexis 
  Nexis, Google, find one instance of a case of federal agents 
  raiding someone's home and walking out without a suspect. 
  You'd have better luck getting struck by lightning. So what 
  happened after FBI agents raided Martin's house once upon a 
  time? Truth be told, he cooperated with authorities and 
  provided them with log records for moronic developmentally 
  challenged idiots who were sending him proof of their hacks. 
  Thinks this is propaganda?
  
  Brian Martin's information is publicly available via what is 
  known in the United States as the Freedom of Information Act. 
  It is highly unlikely he'd appreciate this disclosure since 
  he would somehow have to prove everyone else except him is 
  lying. He would have to come back with discourse on how the 
  government is out to get him by carefully, selectively and 
  willfully injecting disinformation into his life records. Not 
  plausible. So a huge greeting to the federal snitch known as 
  Jericho and his gang of buddies at Attrition. This month's 
  second biggest federal snitch.
  
  http://hackerwars.blogsome.com/
  
  
  -
  Brought to you by Footard: http://www.footard.com Please 
  report spam to [EMAIL PROTECTED]
  
  
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] iDefense Security Advisory 06.18.07: Cerulean Studios Trillian UTF-8 Word Wrap Heap Overflow Vulnerability

2007-06-18 Thread iDefense Labs
Cerulean Studios Trillian UTF-8 Word Wrap Heap Overflow Vulnerability

iDefense Security Advisory 06.18.07
http://labs.idefense.com/intelligence/vulnerabilities/
Jun 18, 2007

I. BACKGROUND

Trillian is a multi-protocol chat application that supports IRC, ICQ,
AIM and MSN protocols. More information can be found on the vendor's
site at the following URL.

http://www.ceruleanstudios.com/learn

II. DESCRIPTION

Remote exploitation of a heap overflow vulnerability in Cerulean Studios
Trillian Instant Messenger could allow attackers to execute arbitrary
code as the currently logged on user.

The vulnerability specifically exists due to improper handling of UTF-8
sequences. When word-wrapping UTF-8 text, the window width is
improperly used as a buffer size value. As such, heap corruption can
occur leading to a potentially exploitable condition.

III. ANALYSIS

Exploitation of this vulnerability could allow remote attackers to
execute arbitrary code with the credentials of the currently logged on
user.

Exploitation occurs simply by viewing a malicious message that contains
a specially constructed UTF-8 string.

The MSN protocol is a known attack vector for this vulnerability.
However, exploitation could potentially occur using any supported
protocol.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in Cerulean
Studios Trillian 3.1.5.1. Previous versions are suspected to be
vulnerable.

V. WORKAROUND

iDefense is currently unaware of any effective workaround for this
issue.

VI. VENDOR RESPONSE

The Cerulean Studios team has addressed this vulnerability by releasing
version 3.1.6.0 of Trillian. More information is available at the
Cerulean Studios Blog via the following URL.

http://blog.ceruleanstudios.com/?p=150

VII. CVE INFORMATION

A Mitre Corp. Common Vulnerabilities and Exposures (CVE) number has not
been assigned yet.

VIII. DISCLOSURE TIMELINE

05/04/2007  Initial vendor notification
05/04/2007  Initial vendor response
06/18/2007  Coordinated public disclosure

IX. CREDIT

This vulnerability was reported to iDefense by www.BlurredLogic.com.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2007 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
 There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Harry Potter 0day

2007-06-18 Thread go harry

*   Harry Potter 0day
*


Dear my brothers,

Voldemort killed Hermione. Yes, that's true. And we knew that 2 days ago.

This is the end of the not yet published (someone could call that 0day) book

Harry Potter and the Deathly Hallows .

At the end of the story Hagrid was killed by Snape in the attempt of ambush 
Hermione and Ron.
Ron and Hermione flees in privet drive but Voldermort, surprising them, engaged 
a magical duel with Ron and Hermione.

Voldemort attacked trough the imperius curse and Hermione, to protect the life 
of Ron fight hardly for more than 6 pages and then finally die.
(boring, very boring... it's always the same story!)

Then, to make a long story short, Harry came up, killed all the bad guys and 
Hogwarts against became a good place to stay and have fun.

Ah, i missed one important information about Draco Malfoy, he started to create 
Horcrux (for fun and profit!).
The end.


Yes, we did it.
We did it by following the precious words of the great Pope Benedict XVI when 
he still was Cardinal Josepth Ratzinger.
He explained why Harry Potter bring the youngs of our earth to Neo Paganism 
faith.

So we make this spoiler to make reading of the upcoming book useless and boring.

The attack strategy was the easiest one. 
The usual milw0rm downloaded exploit delivered by 
email/click-on-the-link/open-browser/click-on-this-animated-icon/back-connect 
to some employee of Bloomsbury Publishing, the company that's behind the Harry 
crap.

It's amazing to see how much people inside the company have copies and drafts 
of this book. 
Curiosity killed the cat.

Who kill curiosity?


To protect you and your families

God bless you

Gabriel

Free spot - Fight terrorism: 
http://www.challenging-islam.org/articles/warraq-debate-muslims.htm


=


-- 
Powered by Outblaze

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Harry Potter 0day

2007-06-18 Thread scott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Who are you people and why should I care?

Maybe a new exploit would be more useful.

Cheers,
  Scott




go harry wrote:
 
 * Harry Potter 0day
 *
 
 
 Dear my brothers,
 
 Voldemort killed Hermione. Yes, that's true. And we knew that 2 days ago.
 
 This is the end of the not yet published (someone could call that 0day) book
 
   Harry Potter and the Deathly Hallows .
 
 At the end of the story Hagrid was killed by Snape in the attempt of ambush 
 Hermione and Ron.
 Ron and Hermione flees in privet drive but Voldermort, surprising them, 
 engaged a magical duel with Ron and Hermione.
 
 Voldemort attacked trough the imperius curse and Hermione, to protect the 
 life of Ron fight hardly for more than 6 pages and then finally die.
 (boring, very boring... it's always the same story!)
 
 Then, to make a long story short, Harry came up, killed all the bad guys and 
 Hogwarts against became a good place to stay and have fun.
 
 Ah, i missed one important information about Draco Malfoy, he started to 
 create Horcrux (for fun and profit!).
 The end.
 
 
 Yes, we did it.
 We did it by following the precious words of the great Pope Benedict XVI when 
 he still was Cardinal Josepth Ratzinger.
 He explained why Harry Potter bring the youngs of our earth to Neo Paganism 
 faith.
 
 So we make this spoiler to make reading of the upcoming book useless and 
 boring.
 
 The attack strategy was the easiest one. 
 The usual milw0rm downloaded exploit delivered by 
 email/click-on-the-link/open-browser/click-on-this-animated-icon/back-connect 
 to some employee of Bloomsbury Publishing, the company that's behind the 
 Harry crap.
 
 It's amazing to see how much people inside the company have copies and drafts 
 of this book. 
 Curiosity killed the cat.
 
 Who kill curiosity?
 
 
 To protect you and your families
 
 God bless you
 
 Gabriel
 
 Free spot - Fight terrorism: 
 http://www.challenging-islam.org/articles/warraq-debate-muslims.htm
 
 
 =
 
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGdwy8elSgjADJQKsRAj/NAJ9xqF/Wd0aIG6EFb2ROtVXGpouN3ACfYj36
uOQD7CIz193AKrtSL3PBPpA=
=87/Q
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Dear Neal Krawetz

2007-06-18 Thread HACK THE GOV

n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
n3td3v is NOT Gobbles
Gobbles is NOT n3td3v
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] CISSP

2007-06-18 Thread Florian Stinglmayr
Daniel Marsh schrieb:
 On 6/19/07, Bozo Bad [EMAIL PROTECTED] wrote:

 http://www.cissp.com/store/search.asp?s=%3Cscript%3Ealert(%22Look,mamma,
 I'm a CISSP!%22)%3C/script%3E
 
 That's a beautiful thing.
 

Irony at its best.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Dear Neal Krawetz, will the real n3td3v please stand up?

2007-06-18 Thread coderman
On 6/18/07, HACK THE GOV [EMAIL PROTECTED] wrote:
 n3td3v is NOT Gobbles
 Gobbles is NOT n3td3v


a biased mind peers into the chasm that is full-disclosure:

Dr._Neal_Krawetz,_PhD. my god, it's full of [n3td3v | GOBBLES] !!!

... your paper was interesting and inherently flawed; may you one day
discover the concept of compounded errors.

consider GOBBLES the slim shady; n3td3v the pimply imitator in a ford
festiva with plywood spoiler.  all you see is one annoyance, while
intact intellect discerns the substance from the shallow.

don't worry, i'm only pissing on your expert security credentials, Dr.
Neal Krawetz, PhD., because i too am n3td3v... disguised via
artificial intelligence softwarez!


L'enfer, c'est les autres - Sartre

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CVE-2007-1358] Apache Tomcat XSS vulnerability in Accept-Language header processing

2007-06-18 Thread Mark Thomas
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

CVE-2007-1358: Apache Tomcat XSS vulnerability in Accept-Language
header processing

Severity:
Low (cross-site scripting)

Vendor:
The Apache Software Foundation

Versions Affected:
Tomcat 4.0.0 to 4.0.6
Tomcat 4.1.0 to 4.1.34
Tomcat 5.0.0 to 5.0.30
Tomcat 5.5.0 to 5.5.20
Tomcat 6.0.0 to 6.0.5

Description:
Web pages that display the Accept-Language header value sent by the
client are susceptible to a cross-site scripting attack if they assume
the Accept-Language header value conforms to RFC 2616. Under normal
circumstances this would not be possible to exploit, however older
versions of Flash player were known to allow carefully crafted
malicious Flash files to make requests with such custom headers.
Tomcat now ignores invalid values for Accept-Language headers that do
not conform to RFC 2616.

Mitigation:
1. Upgrade to fixed version
2. Escape values obtained from Accept-Language header before use.

Credit:
This issue was reported by Masato Anzai and Toshiharu Sugiyama.

References:
http://tomcat.apache.org/security.html

Mark Thomas



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGdxWMb7IeiTPGAkMRAgDgAJkBG6sVBDP/8yxGrZ7CqvEXPNW1mACgiL8M
CyWgpvE5125qciTSYPJbOgU=
=A84r
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Dear Neal Krawetz, will the real n3td3v please stand up?

2007-06-18 Thread Dr. Neal Krawetz PhD
If you believe my method(s) was flawed, then demonstrate your claim(s).

I used a repeatable scientific proof that conclusively proves my
findings.  People constantly criticize me, claiming that I am wrong.
However not one of these people are able to offer a valid scientific
argument against me or my methods!  

You are acting like an uneducated child.  Is this where you are?  Did
you even attend a school of higher learning?  I should hope that no
respected academic institution would allow such a pea-brained fool as
yourself entrance!

Grow up, learn, and come back to speak with me once you've learned what
logic is and how to apply it.  Until then you are nothing.  You are the
sort of person that believes bananas are proof that there is a God, when
the truth is there is no God.  You simple-minded doofus.

- neal

On Mon, Jun 18, 2007 at 05:42:07PM -0700, coderman wrote:
 On 6/18/07, HACK THE GOV [EMAIL PROTECTED] wrote:
  n3td3v is NOT Gobbles
  Gobbles is NOT n3td3v
 
 
 a biased mind peers into the chasm that is full-disclosure:
 
 Dr._Neal_Krawetz,_PhD. my god, it's full of [n3td3v | GOBBLES] !!!
 
 ... your paper was interesting and inherently flawed; may you one day
 discover the concept of compounded errors.
 
 consider GOBBLES the slim shady; n3td3v the pimply imitator in a ford
 festiva with plywood spoiler.  all you see is one annoyance, while
 intact intellect discerns the substance from the shallow.
 
 don't worry, i'm only pissing on your expert security credentials, Dr.
 Neal Krawetz, PhD., because i too am n3td3v... disguised via
 artificial intelligence softwarez!
 
 
 L'enfer, c'est les autres - Sartre
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Dear Neal Krawetz, will the real n3td3v please stand up?

2007-06-18 Thread Michael Silk
lol

On 6/19/07, Dr. Neal Krawetz PhD [EMAIL PROTECTED] wrote:
 If you believe my method(s) was flawed, then demonstrate your claim(s).

 I used a repeatable scientific proof that conclusively proves my
 findings.  People constantly criticize me, claiming that I am wrong.
 However not one of these people are able to offer a valid scientific
 argument against me or my methods!

 You are acting like an uneducated child.  Is this where you are?  Did
 you even attend a school of higher learning?  I should hope that no
 respected academic institution would allow such a pea-brained fool as
 yourself entrance!

 Grow up, learn, and come back to speak with me once you've learned what
 logic is and how to apply it.  Until then you are nothing.  You are the
 sort of person that believes bananas are proof that there is a God, when
 the truth is there is no God.  You simple-minded doofus.

 - neal

 On Mon, Jun 18, 2007 at 05:42:07PM -0700, coderman wrote:
  On 6/18/07, HACK THE GOV [EMAIL PROTECTED] wrote:
   n3td3v is NOT Gobbles
   Gobbles is NOT n3td3v
 
 
  a biased mind peers into the chasm that is full-disclosure:
 
  Dr._Neal_Krawetz,_PhD. my god, it's full of [n3td3v | GOBBLES] !!!
 
  ... your paper was interesting and inherently flawed; may you one day
  discover the concept of compounded errors.
 
  consider GOBBLES the slim shady; n3td3v the pimply imitator in a ford
  festiva with plywood spoiler.  all you see is one annoyance, while
  intact intellect discerns the substance from the shallow.
 
  don't worry, i'm only pissing on your expert security credentials, Dr.
  Neal Krawetz, PhD., because i too am n3td3v... disguised via
  artificial intelligence softwarez!
 
 
  L'enfer, c'est les autres - Sartre
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



-- 
mike
68 65 6c 6c 6f 20 74 6f 20 79 6f 75 2c
20 68 65 78 20 64 65 63 6f 64 65 72 2e

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Dear Neal Krawetz, will the real n3td3v please stand up?

2007-06-18 Thread StaticRez

This is riduculous...

On 6/18/07, Michael Silk [EMAIL PROTECTED] wrote:


lol

On 6/19/07, Dr. Neal Krawetz PhD [EMAIL PROTECTED] wrote:
 If you believe my method(s) was flawed, then demonstrate your claim(s).

 I used a repeatable scientific proof that conclusively proves my
 findings.  People constantly criticize me, claiming that I am wrong.
 However not one of these people are able to offer a valid scientific
 argument against me or my methods!

 You are acting like an uneducated child.  Is this where you are?  Did
 you even attend a school of higher learning?  I should hope that no
 respected academic institution would allow such a pea-brained fool as
 yourself entrance!

 Grow up, learn, and come back to speak with me once you've learned what
 logic is and how to apply it.  Until then you are nothing.  You are the
 sort of person that believes bananas are proof that there is a God, when
 the truth is there is no God.  You simple-minded doofus.

 - neal

 On Mon, Jun 18, 2007 at 05:42:07PM -0700, coderman wrote:
  On 6/18/07, HACK THE GOV [EMAIL PROTECTED] wrote:
   n3td3v is NOT Gobbles
   Gobbles is NOT n3td3v
 
 
  a biased mind peers into the chasm that is full-disclosure:
 
  Dr._Neal_Krawetz,_PhD. my god, it's full of [n3td3v | GOBBLES] !!!
 
  ... your paper was interesting and inherently flawed; may you one day
  discover the concept of compounded errors.
 
  consider GOBBLES the slim shady; n3td3v the pimply imitator in a ford
  festiva with plywood spoiler.  all you see is one annoyance, while
  intact intellect discerns the substance from the shallow.
 
  don't worry, i'm only pissing on your expert security credentials, Dr.
  Neal Krawetz, PhD., because i too am n3td3v... disguised via
  artificial intelligence softwarez!
 
 
  L'enfer, c'est les autres - Sartre
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



--
mike
68 65 6c 6c 6f 20 74 6f 20 79 6f 75 2c
20 68 65 78 20 64 65 63 6f 64 65 72 2e

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Dear Neal Krawetz, will the real n3td3v please stand up?

2007-06-18 Thread Sam
Carole Chaski gave you a run for your money tho.

http://www.securityfocus.com/comments/articles/11419/34147/threaded#34147


Dr. Neal Krawetz PhD wrote:
 If you believe my method(s) was flawed, then demonstrate your claim(s).

 I used a repeatable scientific proof that conclusively proves my
 findings.  People constantly criticize me, claiming that I am wrong.
 However not one of these people are able to offer a valid scientific
 argument against me or my methods!  

 You are acting like an uneducated child.  Is this where you are?  Did
 you even attend a school of higher learning?  I should hope that no
 respected academic institution would allow such a pea-brained fool as
 yourself entrance!

 Grow up, learn, and come back to speak with me once you've learned what
 logic is and how to apply it.  Until then you are nothing.  You are the
 sort of person that believes bananas are proof that there is a God, when
 the truth is there is no God.  You simple-minded doofus.

 - neal

 On Mon, Jun 18, 2007 at 05:42:07PM -0700, coderman wrote:
   
 On 6/18/07, HACK THE GOV [EMAIL PROTECTED] wrote:
 
 n3td3v is NOT Gobbles
 Gobbles is NOT n3td3v
   
 a biased mind peers into the chasm that is full-disclosure:

 Dr._Neal_Krawetz,_PhD. my god, it's full of [n3td3v | GOBBLES] !!!

 ... your paper was interesting and inherently flawed; may you one day
 discover the concept of compounded errors.

 consider GOBBLES the slim shady; n3td3v the pimply imitator in a ford
 festiva with plywood spoiler.  all you see is one annoyance, while
 intact intellect discerns the substance from the shallow.

 don't worry, i'm only pissing on your expert security credentials, Dr.
 Neal Krawetz, PhD., because i too am n3td3v... disguised via
 artificial intelligence softwarez!


 L'enfer, c'est les autres - Sartre

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

   


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] FLEA-2007-0026-1: evolution-data-server

2007-06-18 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Foresight Linux Essential Advisory: 2007-0026-1
Published: 2007-06-18

Rating: Major

Updated Versions:
evolution-data-server=/[EMAIL PROTECTED]:1-devel//1/1.10.2-2-1
group-dist=/[EMAIL PROTECTED]:1-devel//1/1.3-0.6-3

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558
https://issues.rpath.com/browse/RPL-1220
https://issues.rpath.com/browse/RPL-1460

Description:
Previous versions of the evolution-data-server package are vulnerable to
multiple attacks of varying severity, the most severe of which allows a
compromised or malicious IMAP server to execute arbitrary code as the
connecting user.

- ---

Copyright 2007 Foresight Linux Project
Portions Copyright 2007 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.foresightlinux.org/permanent/mit-license.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4 (GNU/Linux)

iQIVAwUBRnc7gNfwEn07iAtZAQIWCw/+PY01+X8vNjMKJJV1njlW+bx4fp0ZV33c
VbINOzIzy3PGmA+CSCvAzEefaejghwC1qYvhVfYq12S/Fwj6ZxV8OfudwWX9wqML
b1XyUDKIr48MD1ykrI9un+gQtDtmHIiM99rIQLF0h4RTb1p77mIidoUGQfVDWaJg
YnUYb98DsBhwE1Nr7XQGESLJ9JB1HN5G7D+seWdVXAXZ7BOUjVWV2NfkVINDG+dy
KJi8R4vxM9Dy7QXWEj7fcCIJlxN/eLvKDjbCi2bXLw9lnH+a57EiLzQ2EbGTQNrO
aqiC/s9pOGIfufHgFQik+S0UsbNULJ1HneB7CcyVLaM8g5e0s/3hkZZCldLfDHcT
G+v/ZUhtfjFhazuzCxVsVozjQA/Vyu7lCtQgPu9DbY/TUwdGayTuVZNR6AKhczEN
fu3TR4IwuF2F1WOy3tZ2ENJ7YMlEBNhkdA9McqF7bcBogs5qw8814gzFJZSV5tS1
ttTUDnv2f5eUxGlFB5jy5GZovdGRH8Syqq6O4OQrJA3pLk1BV9g7ENfpx5n29wpr
rCO6IYvW+mAACBHUNxkkc9Ml8DpQJGvjuJoRTAfn7Rr17LpdN+r61etAE15sERR+
OkocGnYnMfBFwEwDHfZHCJM+IecNcFl7E7/GMfIxjhPNf6qrd6+Z6faMCnZ5khJ9
YdWl6q+NYJo=
=FXIn
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [CVE-2007-1358] Apache Tomcat XSS vulnerability in Accept-Language header processing

2007-06-18 Thread Debasis Mohanty
the funny part is I hit this issue everytime I assess an application
configured with tomcat and was under the impression that it is already
a known issue... :)

On 6/19/07, Mark Thomas [EMAIL PROTECTED] wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 CVE-2007-1358: Apache Tomcat XSS vulnerability in Accept-Language
 header processing

 Severity:
 Low (cross-site scripting)

 Vendor:
 The Apache Software Foundation

 Versions Affected:
 Tomcat 4.0.0 to 4.0.6
 Tomcat 4.1.0 to 4.1.34
 Tomcat 5.0.0 to 5.0.30
 Tomcat 5.5.0 to 5.5.20
 Tomcat 6.0.0 to 6.0.5

 Description:
 Web pages that display the Accept-Language header value sent by the
 client are susceptible to a cross-site scripting attack if they assume
 the Accept-Language header value conforms to RFC 2616. Under normal
 circumstances this would not be possible to exploit, however older
 versions of Flash player were known to allow carefully crafted
 malicious Flash files to make requests with such custom headers.
 Tomcat now ignores invalid values for Accept-Language headers that do
 not conform to RFC 2616.

 Mitigation:
 1. Upgrade to fixed version
 2. Escape values obtained from Accept-Language header before use.

 Credit:
 This issue was reported by Masato Anzai and Toshiharu Sugiyama.

 References:
 http://tomcat.apache.org/security.html

 Mark Thomas



 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.7 (MingW32)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

 iD8DBQFGdxWMb7IeiTPGAkMRAgDgAJkBG6sVBDP/8yxGrZ7CqvEXPNW1mACgiL8M
 CyWgpvE5125qciTSYPJbOgU=
 =A84r
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/