Re: [Full-disclosure] http://cms.netrix.hu - hacked by anti-sec

2009-07-21 Thread Kema Druma
OMG, WTF is this.
ANTI-SEC has successfully pwnd a useless website using lulzy sql
injection from milw0rm.com.
u assholes, get a name like SHITHOLE and post ur shit somewhere else
and stop polluting anti-sec and the anti-sec movement and
security mailing list FFS.
GO DIE SOMEWHERE ELSE.

-kemadruma

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] http://cms.netrix.hu - hacked by anti-sec

2009-07-21 Thread Ant-Sec Movement
You, sir, (Kema Druma), are an idiot.
Good day to you.

On Tue, Jul 21, 2009 at 4:15 PM, Kema Druma kemadr...@gmail.com wrote:

 OMG, WTF is this.
 ANTI-SEC has successfully pwnd a useless website using lulzy sql
 injection from milw0rm.com.
 u assholes, get a name like SHITHOLE and post ur shit somewhere else
 and stop polluting anti-sec and the anti-sec movement and
 security mailing list FFS.
 GO DIE SOMEWHERE ELSE.

 -kemadruma

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] http://cms.netrix.hu - hacked by anti-sec

2009-07-21 Thread Kema Druma
Yes, I am bcoz, I bothered to reply to it and wasted my time. Ignoring
would be best.

-kemadruma

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [INFIGO-2009-07-09]: NASA Common Data Format remote buffer overflow(s)

2009-07-21 Thread infocus

===
 'Celebrating 40 years of Apollo and 20 years of buffer overflows'
===


INFIGO IS Security Advisory #ADV-2009-07-09
http://www.infigo.hr/en/
 

Title: NASA Common Data Format remote buffer overflow(s)
Advisory ID: INFIGO-2009-07-09
Date: 2009-07-20
Advisory URL: http://www.infigo.hr/en/in_focus/advisories/INFIGO-2009-07-09
Vendor: NASA GODDARD Space Flight Center
Vendor URL: http://cdf.gsfc.nasa.gov/
Impact: Remote code execution
Risk Level: High
Vulnerability Type: Remote



==[ Overview

CDF is the Common Data Format. It is a conceptual data abstraction for
storing, manipulating, and accessing multidimensional data sets.  
The basic component of CDF is a software programming interface that is 
a device-independent view of the CDF data model.
The CDF software package is used by hundreds of government agencies,
universities, and private and commercial organizations as well as 
independent researchers on both national and international levels.  
CDF has been adopted by the International Solar-Terrestrial Physics 
(ISTP) project as well as the Central Data Handling Facilities (CDHF) 
as their format of choice for storing and distributing key parameter 
data. A list of some applications that use the CDF library can be found
at http://cdf.gsfc.nasa.gov/html/examples.html.


==[ Vulnerability

Various memory corruption vulnerabilities have been identified during a
security audit of the CDF library. The vulnerabilities exist in the code
processing CDF files. This advisory contains technical information about
one of the identified vulnerabilities, that can be exploited when a 
malformed CDF file is parsed by a CDF reading program.
The vulnerability exists in the ReadAEDRList64() function. This function 
is used to read a list of attribute entries from a CDF file. 
The attribute entries are stored in a list indexed by the entry number. 
The relevant source code is shown below:

./cdf32_1-dist/src/lib/cdfread64.c:

STATICforIDL CDFstatus ReadAEDRList64 (vFILE *fp,
 struct AEDRstructExt64 ***AEDRList,
 OFF_T AEDRHead,
 Int32 MaxEntry)
{
...
  struct AEDRstructExt64 *TempAEDR;
  Int32 LastAEDRNum = -1;
  Int32 i;
  OFF_T temp;
...
[1]  *AEDRList = cdf_AllocateMemory((MaxEntry + 1) *
 sizeof(struct AEDRstructExt64**), NULL);

  while (NxtAEDR != 0  LastAEDRNum != MaxEntry)
  {
[2]   TempAEDR = cdf_AllocateMemory(sizeof(struct AEDRstructExt64), NULL);
...
[3]if (!Read32_64(fp,(TempAEDR-AEDR.Num))) return CRE;
...
[4](*AEDRList)[TempAEDR-AEDR.Num] = TempAEDR;
  }
  return pStatus;
}
-

The code marked as [1] creates an array of AEDRstructExt64 structures, 
allocated on the heap and assigned to the AEDRList variable. The TempAEDR
structure [2] is also allocated on the heap. It is further used in the 
while() loop to read the attributes from the CDF file that is being 
parsed. 
The Read32_64() function [3] is used to read an integer from the
CDF file stream and store it in the TempAEDR-AEDR.Num. At [4] this value
is used as the index that specifies where in the AEDRList the address of 
the TempAEDR structure is stored. 
This is where the vulnerability exists as the code performs no sanity 
checks on the TempAEDR-AEDR.Num value. 
In other words, if the CDF file contains a value that is higher than the
number of allocated AEDRList entries, a malicious CDF file can overwrite
arbitrary heap data after the AEDRList array. The value that will be 
written is the address of the TempAEDR structure. This can be further
exploited as the attacker can control the content of the TempAEDR 
structure, in which malicious code can be embedded.

As the TempAEDR-AEDR.Num is used as the index, the attacker can write 4
bytes to an address higher than the AEDRList's address. Since this index
is added to the AEDRList address, an attacker can also specify a large 
value which allows him to overflow the integer in the adding calculation, 
effectively writing to any address mapped by the process. 
Other protection mechanisms, such as ASLR, could make this exploitation 
method less reliable.

Various other memory corruption vulnerabilities have been identified 
in SearchForRecord_r_64(), LastRecord64(), CDFsel64() and other functions. 
In cooperation with the vendor all identified vulnerable function have 
been fixed, and a proper validation module was developed to verify CDF 
files before processing them.


==[ Affected Version

The vulnerabilities has been identified in the latest available CDF 
version 3.2.4. Previous versions are believed to be vulnerable as well. 


==[ Fix

The vendor has addressed 

[Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller


 One bug to rule them all
 IE5,IE6,IE7,IE8,Netscape,Firefox,Safari,Opera,Konqueror,
 Seamonkey,Wii,PS3,iPhone,iPod,Nokia,Siemens and more.



Update/Changes :


Backround :
~~~
+ I failed to include details about the nature of the bug (DOM), 
the root cause is a DOM flaw and not a Javascript flaw as the 
Backround info might have lead to think.

Thanks James Schend for the heads up.

+ The bug was present in a 9 year old version of Netscape - draw your own 
conclusions.

Patch availability :

+ Seamonkey 1.1.17 and SeaMonkey 2 (soon to be Beta) have been patched

Affected Products :

+ Blackberry 8800/probably all (null ptr exception, browser crash)
Thanks to 528-0444 for the Report.
+ Google G1 latest (Firmware 1.5, Kernel: 2.6.27-00393-g6607056, Build: CRB43)
(Browser crash) 
Thanks Scott Fraser for the Report.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] A brief message on the topic of Anti-Sec

2009-07-21 Thread antisec
Nobody cares.. lame. Hack something loser.

On Mon, 20 Jul 2009 18:29:28 -0400 the.defa...@hushmail.com wrote:
Hi,

My name is DeadlyData. I enjoy long walks on the beach, getting 
pizzas delivered to my house when my d0x were dropped, and having 
anal sex with my buddy Sean/TD Debug. My 1337 hack group The 
Defaced (thedefaced.org) has been making threats and being homo-
erotic on F-D. I'm sure you've seen the email from 
anti.sec.movem...@gmail.com that said Please check out our 
website 
at: http://romeo.copyandpaste.info/; Well, that is RoMeO's website 

(a TheDefaced admin!) dedicated to posing as a 1337 blackhat haqr. 

He's got cool things on there like portions of phrack zines, anti-
sec ownages (that were done by the other anti-sec factions. You 
think we can hack? GOOD JOKE!!!), some zines from the olden days, 
and a speech by our buddy strayfe/n3w7yp3 (we love his dick, but 
we 
don't think he likes us ;( We lub you strayfe!). I just wanted to 
let you all know that our group has no 0days. Don't waste your 
time 
reading anti.sec.movem...@gmail.com's bullshit. Just worry about 
the other anti-sec factions. Ok? Well, then have a nice day and 
don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c 
(http://www.nopaste.com/p/aDTdT5s1C) was it!

Sincerely,
 DeadlyData

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] anti-sec: OpenSSH = 5.2 zero day exploitcode - 48 hours until it is publicly released!

2009-07-21 Thread Ureleet
put up or shut up.

On Mon, Jul 20, 2009 at 1:02 PM, epixoipepix...@hush.com wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 the level of ignorance on this list is overwhelming at times.

 the individual posting as [anti.sec.movem...@gmail.com] is not
 affiliated with, nor is a representative of, the anti-sec movement.
 he is simply a troll. stop indulging this cockfag, and maybe he'll
 fuck off.

 it _is_ possible, even probable, that there is an openssh exploit
 circulating among anti-sec groups -- we've seen evidence of this in
 several logs that have been shared (not just those posted to Full-
 Disclosure). but no anti-sec group has ever even bragged about
 having $EXPLOIT, and they've certainly never shared $EXPLOIT code.
 so there's really no reason for you skiddies to get your panties in
 a twist since you'll never see the exploit code, and there's no
 need for whitehats to incite fear and paranoia in their community --
  you should only be worried if you are being targeted by anti-sec.
 oh, right -- that's most of you on this list.

 do your research and know your shit. stop believing everything you
 read.
 -BEGIN PGP SIGNATURE-
 Charset: UTF8
 Note: This signature can be verified at https://www.hushtools.com/verify
 Version: Hush 3.0

 wpwEAQMCAAYFAkpkox4ACgkQacHgESW3wZpb2AP/bnmxzy16/EbkTEpesiRV+S70kZ95
 wOSsayUMxjdah82320O9ihHqGn+23V4ps5pJb4okns354Xp4J05z12WhKL3uCYwy8/IV
 OdEqJXF4M8BsRwmZcPbNU7Qs+QPmFYPpVSRuaMq2bJCF8jNsFyazk226zUWWDssFPOKV
 RPWJn6E=
 =0bZq
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] You are invited to DEFCON EXPLOIT CODES PARTY!

2009-07-21 Thread Exploitsweatshop


Dear Full-disclosure,

Exploitsweatshop invited you to DEFCON EXPLOIT CODES PARTY!.  For all of the 
details, check out the Invitation Page:

http://anyvite.com/events/home/f3cgdeapii/z0rm0mjixesvzv/hcox3eqotupzbstajbxe


Event Details:
* Title:
DEFCON EXPLOIT CODES PARTY!

* Description:
okay guys! big stuff here! 

EXPLOITING CODES HACKER PARTY at defcons! BRING REMOTE EXPLOIT CODE, GET FREE 
COCKTAIL!

you come, bring explot codes, buy some explot codes, maybe see breakdancing and 
LIVE RAPS MUSIC!

drink and coketail bar also!

BIG PARTY TIME AND BIG PIMPGIN FOR INFOSEC INDUSTRY HONCHO!

* Date and Time:
Thursday, July 30 at 9:00 PM (PDT)

* Location:
TOP OF RIVEIRA HOTELS, RIVEIRA HOTELS (where defcon at), Last Vages, Nevanda, 
US of A, in America

Note: Please do not forward this email.  Doing so could give others access to 
your Anyvite Invitation.
Instead, use the following URL when sharing this event with your friends:
http://anyvite.com/events/home/f3cgdeapii/DEFCON-EXPLOIT-CODES-PARTY
_
http://anyvite.com/

To change your notification settings, please go to:
http://anyvite.com/profile/notifications/z0rm0mjixesvzv/806aad4f84547cdf4b89

For support, please contact supp...@anyvite.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] http://cms.netrix.hu - hacked by anti-sec

2009-07-21 Thread scott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ant-Sec Movement wrote:
 Dear Reader,
 
 The anti-sec movement has officially pwned http://cms.netrix.hu in order to
 spread our message and our goals.
 
 Sincerely,
 
 -anti-sec
 
 
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

Oh, look. They couldn't get their primary targets so the dorked one they
could.

 Impressive!!
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkplXjQACgkQFQICCHwe04JAcgCfQipW2ZIs/Ca1P1Dcp28gpoX9
BzMAnAhUb4pzqvdYslauaNxkzDjMiLlk
=wv7L
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] http://cms.netrix.hu - hacked by anti-sec

2009-07-21 Thread Buherátor
It is actually a demo site and its admin passwd is available for
everyone anyway...

2009/7/21 scott redhowlingwol...@nc.rr.com:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Ant-Sec Movement wrote:
 Dear Reader,

 The anti-sec movement has officially pwned http://cms.netrix.hu in order to
 spread our message and our goals.

 Sincerely,

 -anti-sec



 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 Oh, look. They couldn't get their primary targets so the dorked one they
 could.

  Impressive!!
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.9 (GNU/Linux)

 iEYEARECAAYFAkplXjQACgkQFQICCHwe04JAcgCfQipW2ZIs/Ca1P1Dcp28gpoX9
 BzMAnAhUb4pzqvdYslauaNxkzDjMiLlk
 =wv7L
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
Buherátor
http://buhera.blog.hu

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] You are invited to DEFCON EXPLOIT CODES PARTY!

2009-07-21 Thread don bailey
I will be there supporting 5.99USD per hour exploit developments!!!

D

Exploitsweatshop wrote:
 
 [Site Logo] http://anyvite.com/
 
 
   You're Invited to DEFCON EXPLOIT CODES PARTY!
 
 Dear Full-disclosure,
 
 Exploitsweatshop invited you to *DEFCON EXPLOIT CODES PARTY!*.
 
 View the Invitation
 http://anyvite.com/events/home/f3cgdeapii/z0rm0mjixesvzv/hcox3eqotupzbstajbxe
 
 
 
 Invitation Details
 
   
 
 RSVP
 
 
 DEFCON EXPLOIT CODES PARTY!
 
 *okay guys! big stuff here! *
 
 *EXPLOITING CODES HACKER PARTY at defcons! BRING REMOTE EXPLOIT CODE,
 GET FREE COCKTAIL!
 *
 
 *you come, bring explot codes, buy some explot codes, maybe see
 breakdancing and LIVE RAPS MUSIC!*
 
 *drink and coketail bar also!*
 
 *BIG PARTY TIME AND BIG PIMPGIN FOR INFOSEC INDUSTRY HONCHO!
 *
 
 Date  Time
 
 Thursday, July 30 at 9:00 PM (PDT)
 
 Location
 
 TOP OF RIVEIRA HOTELS
 RIVEIRA HOTELS (where defcon at)
 Last Vages, Nevanda
 US of A, in America
 Get Map  Directions
 http://maps.google.com/maps?f=dsaddr=daddr=RIVEIRA+HOTELS+%28where+defcon+at%29%2C+Last+Vages%2C+Nevanda%2C+US+of+A%2C+in+America
 
 
   
 
 Please Respond:
 
 Yes
 http://anyvite.com/events/response/f3cgdeapii/z0rm0mjixesvzv/hcox3eqotupzbstajbxe/Y
 
 
 
 Maybe
 http://anyvite.com/events/response/f3cgdeapii/z0rm0mjixesvzv/hcox3eqotupzbstajbxe/M
 
 
 
 No
 http://anyvite.com/events/response/f3cgdeapii/z0rm0mjixesvzv/hcox3eqotupzbstajbxe/N
 
 
 
 
 Invite More Guests
 
 This email is customized for you. Please do not forward it.
 
 Instead, invite guests using Anyvite.
 http://anyvite.com/events/add_invites/f3cgdeapii/z0rm0mjixesvzv/hcox3eqotupzbstajbxe
 
 Unsubscribe
 
 Change your Anyvite Notifications
 http://anyvite.com/profile/notifications/z0rm0mjixesvzv/806aad4f84547cdf4b89
 
 
 Anyvite.com http://anyvite.com/  Unsubscribe
 http://anyvite.com/profile/notifications/z0rm0mjixesvzv/806aad4f84547cdf4b89
  For support, please contact supp...@anyvite.com
 mailto:supp...@anyvite.com.
 
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Michal Zalewski
 + The bug was present in a 9 year old version of Netscape - draw your own
 conclusions.

There are literally thousands of HTML- and JavaScript-related denial
of service vectors in modern browsers. If you want a silly, ad hoc
example I just made up on the spot (and so could any reader of the
list), try:

foo = 'marquee';
for (i=0;i7;i++) foo += foo;
for (i=0;i1;i++) document.write(foo);

Likewise, it trahes just about any renderer (not the JS engine). So do
attempts to render highly nested XML documents, render or rescale
CANVAS objects with obscene geometries in pretty much all browsers
that support the tag... and much, much more. Heck, even silly things
such as looping window.print() are an excellent way to lock out the
UI.

In fact, such DoS scenarios are one of the most significant roadblocks
in specialized fuzzing, and need to be painfully and comprehensively
accounted for in any such code.

Because of this, I am not entirely sure it makes much value to the
community to report such patterns individually; developers may address
some bugs at random, but will likely ignore most - and because of the
nature of HTML and JavaScript, it's unlikely that a sensible set of
memory- and CPU-related constraints could be imposed without running
into scalability issues with legitimate websites, anyway.

In other words, discussing this in a more holistic way, perhaps
releasing test suites and recommending general mitigation schemes that
do not require the web to be done from scratch, might be a better
option. For example, even the approach taken by Chrome - letting
attackers take down their own tabs only - is a significant improvement
that prevents data loss pretty well in most such cases (though it's
definitely not perfect).

/mz

PS. We may argue over whether DoS attacks in browsers are a security
issue by one definition or another, but they are definitely an
usability concern and an annoyance - so rest assured, I am not trying
to dismiss your work.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] An important message for you sec folks

2009-07-21 Thread antisex
B3c4us3 w3 4ll kn0w th4t n0n3 0f y0u 4r3 g3tt1ng l41d; y0u m1ght 4s 
w3ll subscr1b3 t0 th3 anti-sex m0v3m3nt. J01n 0ur c4us3. Cur3 41ds! 
L3t th0s3 b1g 3v1l c0nd0m m4nuf4ctur3rs f41l!


m4sturb4tion 0nly!

8===D~~~

4nd f0r y0u 4s14ns...
8=D~~~



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] You are invited to DEFCON EXPLOIT CODES PARTY!

2009-07-21 Thread Valdis . Kletnieks
On Tue, 21 Jul 2009 05:58:10 -, Exploitsweatshop said:
 BRING REMOTE EXPLOIT CODE, GET FREE COCKTAIL!

Unless you can throw an exploit together in 30 seconds, the dollars per
hour value there sucks.

Hmm.. I *do* have this '0pen0wn.c' I can probably obfuscate a bit in 30 secs...




pgp5BFOFNxEyb.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] An important message for you sec folks

2009-07-21 Thread Ed Carp
Did you do that by hand, or did you download some software off the net to do
it for you?

2009/7/21 antisex anti...@hushmail.com

 B3c4us3 w3 4ll kn0w th4t n0n3 0f y0u 4r3 g3tt1ng l41d; y0u m1ght 4s
 w3ll subscr1b3 t0 th3 anti-sex m0v3m3nt. J01n 0ur c4us3. Cur3 41ds!
 L3t th0s3 b1g 3v1l c0nd0m m4nuf4ctur3rs f41l!


 m4sturb4tion 0nly!

 8===D~~~

 4nd f0r y0u 4s14ns...
 8=D~~~


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] An important message for you sec folks

2009-07-21 Thread Killian Faughnan
2009/7/21 Ed Carp e...@pobox.com

 Did you do that by hand, or did you download some software off the net to
 do it for you?



Judging by the content I would assume he does it by hand.


2009/7/21 antisex anti...@hushmail.com

 B3c4us3 w3 4ll kn0w th4t n0n3 0f y0u 4r3 g3tt1ng l41d; y0u m1ght 4s
 w3ll subscr1b3 t0 th3 anti-sex m0v3m3nt. J01n 0ur c4us3. Cur3 41ds!
 L3t th0s3 b1g 3v1l c0nd0m m4nuf4ctur3rs f41l!


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] An important message for you sec folks

2009-07-21 Thread antisex
1 d1d 1t w1th th3 s4m3 h4nd 1 us3 t0 m4sturb4t3.

On Tue, 21 Jul 2009 12:18:32 -0400 Killian Faughnan 
li...@killianfaughnan.com wrote:
2009/7/21 Ed Carp e...@pobox.com

 Did you do that by hand, or did you download some software off 
the net to
 do it for you?



Judging by the content I would assume he does it by hand.


2009/7/21 antisex anti...@hushmail.com

 B3c4us3 w3 4ll kn0w th4t n0n3 0f y0u 4r3 g3tt1ng l41d; y0u 
m1ght 4s
 w3ll subscr1b3 t0 th3 anti-sex m0v3m3nt. J01n 0ur c4us3. Cur3 
41ds!
 L3t th0s3 b1g 3v1l c0nd0m m4nuf4ctur3rs f41l!



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] An important message for you sec folks

2009-07-21 Thread Ed Carp
Well, I certainly hope you washed your hands before you started typing!  But
wait a minute ... if you're anti-sex or anti-suck or whatever, what are you
doing jacking off??

2009/7/21 antisex anti...@hushmail.com

 1 d1d 1t w1th th3 s4m3 h4nd 1 us3 t0 m4sturb4t3.

 On Tue, 21 Jul 2009 12:18:32 -0400 Killian Faughnan
 li...@killianfaughnan.com wrote:
 2009/7/21 Ed Carp e...@pobox.com
 
  Did you do that by hand, or did you download some software off
 the net to
  do it for you?
 
 
 
 Judging by the content I would assume he does it by hand.
 
 
 2009/7/21 antisex anti...@hushmail.com
 
  B3c4us3 w3 4ll kn0w th4t n0n3 0f y0u 4r3 g3tt1ng l41d; y0u
 m1ght 4s
  w3ll subscr1b3 t0 th3 anti-sex m0v3m3nt. J01n 0ur c4us3. Cur3
 41ds!
  L3t th0s3 b1g 3v1l c0nd0m m4nuf4ctur3rs f41l!
 
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] An important message for you sec folks

2009-07-21 Thread mod-raver
7h15 15 7h3 c0n57ruc7. 17'5 0ur |04d1ng pr0gr4m. W3 c4n |04d 
4ny7h1ng w3 n33d.1f y0u'r3 74|k1ng 4b0u7 wh47 y0u c4n f33|, wh47 
y0u c4n 5m3||, wh47 y0u c4n 74573 4nd 533, 7h3n r34| 15 51mp|y 
3|3c7r1c4| 51gn4|5 1n73rpr373d by y0ur br41n. 7h15 15 7h3 w0r|d 
7h47 y0u kn0w.

w3|c0m3 70 UN1X w0r|d!

On Tue, 21 Jul 2009 18:02:57 +0200 Ed Carp e...@pobox.com wrote:
Did you do that by hand, or did you download some software off the 
net to do
it for you?

2009/7/21 antisex anti...@hushmail.com

 B3c4us3 w3 4ll kn0w th4t n0n3 0f y0u 4r3 g3tt1ng l41d; y0u m1ght 
4s
 w3ll subscr1b3 t0 th3 anti-sex m0v3m3nt. J01n 0ur c4us3. Cur3 
41ds!
 L3t th0s3 b1g 3v1l c0nd0m m4nuf4ctur3rs f41l!


 m4sturb4tion 0nly!

 8===D~~~

 4nd f0r y0u 4s14ns...
 8=D~~~



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

Yes,  we  all  know  that.  The  flaw here was not looping on itself a
thousands  of  times,  wow.  It was a DOM implementation flaw. That's
what made it interesting. A border case that was not accounted for.

That's  all,  still  interesting.  I don't see how Javascripts endless
loops are similar at all - sorry.


MZ There are literally thousands of HTML- and JavaScript-related denial
MZ of service vectors in modern browsers. If you want a silly, ad hoc
MZ example I just made up on the spot (and so could any reader of the
MZ list), try:

MZ foo = 'marquee';
MZ for (i=0;i7;i++) foo += foo;
MZ for (i=0;i1;i++) document.write(foo);





-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Michal Zalewski
 Yes,  we  all  know  that.  The  flaw here was not looping on itself a
 thousands  of  times,  wow.  It was a DOM implementation flaw.

The code created an oversized list, which does not seem to be that far
from creating an overly nested DOM tree, or drawing an oversized
CANVAS shape, or any other
creating-too-many-things-for-the-renderer-to-handle attacks... but
really, I'm not trying to be dismissive, just saying that a more
holistic approach might be more beneficial in the long run.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] An important message for you sec folks

2009-07-21 Thread opt opt
Honestly kids...

On Tue, Jul 21, 2009 at 1:23 PM, mod-ra...@hushmail.com wrote:
 7h15 15 7h3 c0n57ruc7. 17'5 0ur |04d1ng pr0gr4m. W3 c4n |04d
 4ny7h1ng w3 n33d.1f y0u'r3 74|k1ng 4b0u7 wh47 y0u c4n f33|, wh47
 y0u c4n 5m3||, wh47 y0u c4n 74573 4nd 533, 7h3n r34| 15 51mp|y
 3|3c7r1c4| 51gn4|5 1n73rpr373d by y0ur br41n. 7h15 15 7h3 w0r|d
 7h47 y0u kn0w.

 w3|c0m3 70 UN1X w0r|d!

 On Tue, 21 Jul 2009 18:02:57 +0200 Ed Carp e...@pobox.com wrote:
Did you do that by hand, or did you download some software off the
net to do
it for you?

2009/7/21 antisex anti...@hushmail.com

 B3c4us3 w3 4ll kn0w th4t n0n3 0f y0u 4r3 g3tt1ng l41d; y0u m1ght
4s
 w3ll subscr1b3 t0 th3 anti-sex m0v3m3nt. J01n 0ur c4us3. Cur3
41ds!
 L3t th0s3 b1g 3v1l c0nd0m m4nuf4ctur3rs f41l!


 m4sturb4tion 0nly!

 8===D~~~

 4nd f0r y0u 4s14ns...
 8=D~~~



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] An important message for you sec folks

2009-07-21 Thread Valdis . Kletnieks
On Tue, 21 Jul 2009 11:21:54 EDT, anti...@hushmail.com said:
 m4sturb4tion 0nly!

You'll discover it becomes a lot more fun once you reach puberty, any year now..


pgpw12vMH1fug.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Steven,
SMC  we will quickly run
SMC into lots of complexity that may well enter the realm of undecidable
SMC problems,
Yeah,  security  is  too  complex.  Dude,  the  fix  was  to LIMIT the
the number of elements. This is not rocket science.

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZDI-09-046: Novell Privileged User Manager Remote DLL Injection Vulnerability

2009-07-21 Thread ZDI Disclosures
ZDI-09-046: Novell Privileged User Manager Remote DLL Injection
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-09-046
July 21, 2009

-- Affected Vendors:
Novell

-- Affected Products:
Novell Privileged User Manager

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
systems running vulnerable versions of Novell's Privileged User Manager.
Authentication is not required to exploit this vulnerability.

The specific flaw exists within the unifid.exe service which binds on
port 29010 for a protocol providing RPC-like functionality encapsulated
over SSL. This protocol allows a client to make a method call into a
module. The 'spf' RPC call is implemented unsafely allowing remote
attackers to load arbitrary modules over the network resulting in code
execution under the context of the service.

-- Vendor Response:
Novell has issued an update to correct this vulnerability. More
details can be found at:

http://www.novell.com/support/search.do?cmd=displayKCamp;docType=kcamp;ext
ernalId=7003640amp;sliceId=1amp;docTypeID=DT_TID_1_1amp;dialogID=72895793
amp;stateId=0%200%2072897343

-- Disclosure Timeline:
2009-06-23 - Vulnerability reported to vendor
2009-07-21 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Stephen Fewer of Harmony Security (www.harmonysecurity.com)

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Steven M. Christey

On Tue, 21 Jul 2009, Thierry Zoller wrote:

 Yeah, security is too complex.  Dude, the fix was to LIMIT the the
 number of elements. This is not rocket science.

I believe Michal and I are having the conversation in a larger context.
What you found is valid on its own merit and got addressed, which is
great.  But now think of the whole ECMAScript API and there are probably
dozens or hundreds of such functions that would expose similar issues.
There could be a lot of individual reports for each individual function,
or one concerted effort that looks at everything at once.  (I'm not saying
you should have done this - after all it's your research - I'm just saying
that *somebody* could.)  Extend this to things like web-connected
interpreters (PHP anyone?) and similar logic may well apply.

I'm sure that I've generated web pages with about 10,000 elements, so now
it sounds like this simple select fix could break that.  (Maybe I didn't
have any business doing such gruesome things, but it wasn't technically
incorrect to do so.)

- Steve

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

MZ  which does not seem to be that far
MZ from creating an overly nested DOM tree, or drawing an oversized

Interesting tidbit:
The W3C DOM specifies the select.length attribute to be *read only*.
Yet   (all)  browsers  have  implemented  it  allowing to write to it. I
am not sure what use that has (?) but one thing is sure, they failed
to add a limit, the W3C didn't, but that's because it was never meant
to be written to in the first place.


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Fionnbharr
One bug to rule them all

I know your get your jollies off finding AV bypasses which is great
and all, but I doubt many people call crashing a browser ruling them
all. Maybe re-release with slightly inconveniencing them all.

2009/7/22 Thierry Zoller thie...@zoller.lu:
 Hi Michal,

 MZ  which does not seem to be that far
 MZ from creating an overly nested DOM tree, or drawing an oversized

 Interesting tidbit:
 The W3C DOM specifies the select.length attribute to be *read only*.
 Yet   (all)  browsers  have  implemented  it  allowing to write to it. I
 am not sure what use that has (?) but one thing is sure, they failed
 to add a limit, the W3C didn't, but that's because it was never meant
 to be written to in the first place.


 --
 http://blog.zoller.lu
 Thierry Zoller


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

Interesting,
http://www.w3.org/TR/REC-DOM-Level-1/level-one-html.html
--
 readonly attribute  long length;
--

MZ Does not seem to be the case in HTML5 at least?
There must have been a change then between HTML4 and HTML5

MZ It may or may not have any practical uses (dynamic resizing of SELECTs
MZ without having to delete individual options).


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

MZ That was DOM Level 1 (1999). Even level 2 (2000) has this as read-write:
MZ http://www.w3.org/TR/DOM-Level-2-HTML/html.html#ID-94282980

Ah, now that makes sense. So my theory goes right down the drain =X

MZ Also keep in mind that with relatively few exceptions, W3C simply
MZ trailed and struggled to capture status quo (or some compromise
MZ representation thereof) back then.

Thanks for your insight!


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Michal Zalewski
 http://www.w3.org/TR/REC-DOM-Level-1/level-one-html.html
 --
  readonly attribute  long                 length;
 --

That was DOM Level 1 (1999). Even level 2 (2000) has this as read-write:

http://www.w3.org/TR/DOM-Level-2-HTML/html.html#ID-94282980

Also keep in mind that with relatively few exceptions, W3C simply
trailed and struggled to capture status quo (or some compromise
representation thereof) back then.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Michal Zalewski
 The W3C DOM specifies the select.length attribute to be *read only*.

Does not seem to be the case in HTML5 at least?

http://dev.w3.org/html5/spec/Overview.html#the-select-element

In fact, it has the behavior for writes defined:

On setting, it must act like the attribute of the same name on the
options collection.

It may or may not have any practical uses (dynamic resizing of SELECTs
without having to delete individual options).

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] (no subject)

2009-07-21 Thread anti sec
We, the worldwide anti-sec movement have landed yet another coup that
will strike full-disclosurizers into the very hearts and soul of their
being.

Fellow anti-sec'ers and freedom-lovers: Rejoice, for it is time to take
revenge against the full disclosure zionist hegemony in retaliation for
the damage white hats  have been committing against the security world.
Our heroic anti-sec warriors have carried out a blessed raid against
4chanarchive.org. 4chan users are now burning with fear, terror and panic
on their /b/, /gif/, /r9k/, and /a/ boards.

The white hat world will soon be asunder and the enemies will flee from
our holy power!

We have repeatedly warned the security industry and the people in it. DO
NOT FUCK WITH ANTI-SEC! Statistically speaking, every white hat is using
4chan or at least has heard of it. Thus we struck into the very core of
their existence. We have fulfilled our promise and carried out our
blessed hacking attack on 4chanarchive after our warriors exerted
strenuous efforts over a long period of time to ensure the success of the
attack.

We continue to warn the websites of governmentsecurity and hackforums and
all full disclosure public as a whole that they will be punished in the
same way if they do not withdraw from their erroneous ways of living and
see that white hats are the scum of the earth. Those who warn are
excused.

The list will be released at the usual places. those in the know do
realize where that is.

ANTI-SEC FOR LIFE!

-- 
How Strong is Your Score?
Click here to see yours for $0!
By FreeCreditReport.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] (no subject)

2009-07-21 Thread Ed Carp
Do not fuck with anti-suck.  LOL!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] (no subject)

2009-07-21 Thread antisex
Awww, seriously? Can you leave governmentsecurity alone? I don't 
want you fucking with my backdoorz. It's not my fault they run 
litespeed.

On Tue, 21 Jul 2009 21:27:38 -0400 anti sec anti-
sec4l...@email.com wrote:
We, the worldwide anti-sec movement have landed yet another coup 
that
will strike full-disclosurizers into the very hearts and soul of 
their
being.

Fellow anti-sec'ers and freedom-lovers: Rejoice, for it is time to 
take
revenge against the full disclosure zionist hegemony in 
retaliation for
the damage white hats  have been committing against the security 
world.
Our heroic anti-sec warriors have carried out a blessed raid 
against
4chanarchive.org. 4chan users are now burning with fear, terror 
and panic
on their /b/, /gif/, /r9k/, and /a/ boards.

The white hat world will soon be asunder and the enemies will flee 
from
our holy power!

We have repeatedly warned the security industry and the people in 
it. DO
NOT FUCK WITH ANTI-SEC! Statistically speaking, every white hat is 
using
4chan or at least has heard of it. Thus we struck into the very 
core of
their existence. We have fulfilled our promise and carried out our
blessed hacking attack on 4chanarchive after our warriors exerted
strenuous efforts over a long period of time to ensure the success 
of the
attack.

We continue to warn the websites of governmentsecurity and 
hackforums and
all full disclosure public as a whole that they will be punished 
in the
same way if they do not withdraw from their erroneous ways of 
living and
see that white hats are the scum of the earth. Those who warn are
excused.

The list will be released at the usual places. those in the know 
do
realize where that is.

ANTI-SEC FOR LIFE!

-- 
How Strong is Your Score?
Click here to see yours for $0!
By FreeCreditReport.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] (no subject)

2009-07-21 Thread Rob Fuller
I'm sorry, log time reader of FD, it's a great mashup of hilarity and vuln
disclosure. But this takes the cake. I can't sit silent for this one:

Are you OUTSIDE your mind? 4chan? and not even 4chan.org, an archive site.
This is the very core of the White Hat being? If this is truly a 'agent
of AntiSec' which I highly doubt, you must be selecting low hanging fruit
and finding any possible way to associate it with those you hate.

I hope those who are in Anti-Sec if there really is such a thing, come and
hunt you down... and that's the way it is... for July 21st, 2009

--
Rob Fuller | Mubix
Room362.com | Hak5.org | TheAcademyPro.com


On Tue, Jul 21, 2009 at 9:39 PM, Ed Carp e...@pobox.com wrote:

 Do not fuck with anti-suck.  LOL!

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Andrew Farmer
On 21 Jul 2009, at 08:12, Michal Zalewski wrote:
 There are literally thousands of HTML- and JavaScript-related denial
 of service vectors in modern browsers...

There's one significant difference in this one, though: while a bunch  
of nested divs (for instance) will just mess with the HTML renderer,  
a malformed or oversized select element may end up passing bad data  
to native menu APIs. It's one of the only elements I can think of  
offhand that often has effects which extend outside the HTML canvas.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/