Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-03 Thread Kurt Buff
On Tue, Nov 3, 2009 at 20:13, Paul Schmehl  wrote:
> --On November 4, 2009 12:55:45 PM +1100 "Ivan ."  wrote:
>
>> The answer is both more mundane and more alarming. Prosecutors are
>> using the FBI's massive surveillance system, DCSNet, which stands for
>> Digital Collection System Network. According to Wired magazine, this
>> system connects FBI wiretapping rooms to switches controlled by
>> traditional land-line operators, internet-telephony providers and
>> cellular companies. It can be used to instantly wiretap almost any
>> communications device in the U.S. — wireless or tethered.
>>
>> http://www.wallstreetandtech.com/blog/archives/2009/10/how_prosecutors.h
>> tml;jsessionid=ABTR4HPERGBDFQE1GHPCKHWATMY32JVN
>>
>
> Of course, without a warrant they can't wiretap anything.

Really? Do tell. Hope your sarcasm meter is pegged here.

> Furthermore
> every warrant to wiretap has to be accompanied by evidence that justifies
> the warrant and signed by a federal judge who agrees that there is
> sufficient cause for the wiretap, and illegal wiretaps will not only get
> your case thrown out of court but your butt thrown in jail as well.

Except when it doesn't.

> But other than that, it's really troubling

As it should be. I don't trust Feds as far as I can spit when it comes
to this sort of stuff.

Kurt

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-03 Thread frank^2
On Tue, Nov 3, 2009 at 8:13 PM, Paul Schmehl  wrote:
> Of course, without a warrant they can't wiretap anything.

good troll.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-03 Thread Holt Sorenson
On Tue, Nov 03, 2009 at 10:13:24PM -0600, Paul Schmehl wrote:
>Of course, without a warrant they can't wiretap anything.  Furthermore 
>every warrant to wiretap has to be accompanied by evidence that justifies 
>the warrant and signed by a federal judge who agrees that there is 
>sufficient cause for the wiretap, and illegal wiretaps will not only get 
>your case thrown out of court but your butt thrown in jail as well.
>
>But other than that, it's really troubling

um, have you been off planet for the last 8 years or something?
http://bit.ly/Cpwam
http://bit.ly/2AMX6O
http://bit.ly/guIGS
http://bit.ly/vKLgB
http://bit.ly/L6xP7
http://bit.ly/18chv

-- 
Holt Sorenson
h...@nosneros.net
www.nosneros.net/hso

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-03 Thread Paul Schmehl
--On November 4, 2009 12:55:45 PM +1100 "Ivan ."  wrote:

> The answer is both more mundane and more alarming. Prosecutors are
> using the FBI's massive surveillance system, DCSNet, which stands for
> Digital Collection System Network. According to Wired magazine, this
> system connects FBI wiretapping rooms to switches controlled by
> traditional land-line operators, internet-telephony providers and
> cellular companies. It can be used to instantly wiretap almost any
> communications device in the U.S. — wireless or tethered.
>
> http://www.wallstreetandtech.com/blog/archives/2009/10/how_prosecutors.h
> tml;jsessionid=ABTR4HPERGBDFQE1GHPCKHWATMY32JVN
>

Of course, without a warrant they can't wiretap anything.  Furthermore 
every warrant to wiretap has to be accompanied by evidence that justifies 
the warrant and signed by a federal judge who agrees that there is 
sufficient cause for the wiretap, and illegal wiretaps will not only get 
your case thrown out of court but your butt thrown in jail as well.

But other than that, it's really troubling

Paul Schmehl, If it isn't already
obvious, my opinions are my own
and not those of my employer.
**
WARNING: Check the headers before replying

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] KCSEC-00000001-ServUWebClient

2009-11-03 Thread Megumi Yanagishita
If you are about to exploit this bug with ollydbg and a /SafeSEH scanner
plug-in which could be found at:

http://www.openrce.org/downloads/details/244/OllySSEH

I think you may need to change line 516 of ollysseh.c from *free(lpDD);* to
*else free(lpLCD);* and re-compile it. Or you may find your ollydbg
crashes once it runs the original OllySSEH.dll plug-in.

Thanks,
M. Yanagishita

On Mon, Nov 2, 2009 at 6:18 AM, Nikolaos Rangos  wrote:

> Hello list, the vulnerability named "RhinoSoft.com Serv-U 9.0.0.5 WebClient
> Remote Buffer Overflow"
> can be found at http://www.rangos.de/ServU-ADV.txt.
>
> Best Regards,
>
> Nikolaos Rangos
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2009:293 ] squidGuard

2009-11-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:293
 http://www.mandriva.com/security/
 ___

 Package : squidGuard
 Date: November 3, 2009
 Affected: 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
   Enterprise Server 5.0, Multi Network Firewall 2.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in squidGuard:
 
 Buffer overflow in sgLog.c in squidGuard 1.3 and 1.4 allows remote
 attackers to cause a denial of service (application hang or loss of
 blocking functionality) via a long URL with many / (slash) characters,
 related to emergency mode. (CVE-2009-3700).
 
 Multiple buffer overflows in squidGuard 1.4 allow remote attackers
 to bypass intended URL blocking via a long URL, related to (1)
 the relationship between a certain buffer size in squidGuard and a
 certain buffer size in Squid and (2) a redirect URL that contains
 information about the originally requested URL (CVE-2009-3826).
 
 squidGuard was upgraded to 1.2.1 for MNF2/CS3/CS4 with additional
 upstream security and bug fixes patches applied.
 
 This update fixes these vulnerabilities.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3700
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3826
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 d51a6de0eb876804fcb7ebc8e5bc671f  
2009.0/i586/squidGuard-1.3-1.1mdv2009.0.i586.rpm 
 5b9e436cb1866b66a59789f9d0147be7  
2009.0/SRPMS/squidGuard-1.3-1.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 c8ce4727e7a7a062196616102ac03c75  
2009.0/x86_64/squidGuard-1.3-1.1mdv2009.0.x86_64.rpm 
 5b9e436cb1866b66a59789f9d0147be7  
2009.0/SRPMS/squidGuard-1.3-1.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 77efe541c81811d47c695f3189e583e7  
2009.1/i586/squidGuard-1.4-1.1mdv2009.1.i586.rpm 
 c057b45049ed4655fc367fdad7b492ba  
2009.1/SRPMS/squidGuard-1.4-1.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 02d9b40ba619f24376842ccdcb85a8be  
2009.1/x86_64/squidGuard-1.4-1.1mdv2009.1.x86_64.rpm 
 c057b45049ed4655fc367fdad7b492ba  
2009.1/SRPMS/squidGuard-1.4-1.1mdv2009.1.src.rpm

 Corporate 3.0:
 1a6ff7e05b3867f666234dd4b511e89b  
corporate/3.0/i586/squidGuard-1.2.1-0.1.C30mdk.i586.rpm 
 da035e0175561ee84c7ea900b504e1f5  
corporate/3.0/SRPMS/squidGuard-1.2.1-0.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 dd3e63730283d91df564fd9dfe436c75  
corporate/3.0/x86_64/squidGuard-1.2.1-0.1.C30mdk.x86_64.rpm 
 da035e0175561ee84c7ea900b504e1f5  
corporate/3.0/SRPMS/squidGuard-1.2.1-0.1.C30mdk.src.rpm

 Corporate 4.0:
 a5b7580f7288482f5ea87e0a7903085d  
corporate/4.0/i586/squidGuard-1.2.1-0.1.20060mlcs4.i586.rpm 
 41e551a07f381020d18bcf19d5aabbc8  
corporate/4.0/SRPMS/squidGuard-1.2.1-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 0e4dce779010bc97bfb40dd46511e61c  
corporate/4.0/x86_64/squidGuard-1.2.1-0.1.20060mlcs4.x86_64.rpm 
 41e551a07f381020d18bcf19d5aabbc8  
corporate/4.0/SRPMS/squidGuard-1.2.1-0.1.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 5a5aaf6bfffcae9a3f736da5de946f6a  mes5/i586/squidGuard-1.4-0.2mdvmes5.i586.rpm 
 bfa391098ac9298228fa7bb9a660e80e  mes5/SRPMS/squidGuard-1.4-0.2mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 fdc0804c49ac90683d16fcc5941fcbf5  
mes5/x86_64/squidGuard-1.4-0.2mdvmes5.x86_64.rpm 
 bfa391098ac9298228fa7bb9a660e80e  mes5/SRPMS/squidGuard-1.4-0.2mdvmes5.src.rpm

 Multi Network Firewall 2.0:
 cbd56a801cc68478bf6348ce0b5193d1  
mnf/2.0/i586/squidGuard-1.2.1-0.1.C30mdk.i586.rpm 
 358ec35776e7a4c7062bcb936e8f2a1e  
mnf/2.0/SRPMS/squidGuard-1.2.1-0.1.C30mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFK8EkEmqjQ0CJFipgRAu7FAKCrcgmFNIq2/iAiBqEKIw51i968iQCfSNAU
PhPo0Nnvv+KDCrRbbaKu1Z8=
=i2KW
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Char

[Full-disclosure] How Prosecutors Wiretap Wall Street

2009-11-03 Thread Ivan .
The answer is both more mundane and more alarming. Prosecutors are
using the FBI's massive surveillance system, DCSNet, which stands for
Digital Collection System Network. According to Wired magazine, this
system connects FBI wiretapping rooms to switches controlled by
traditional land-line operators, internet-telephony providers and
cellular companies. It can be used to instantly wiretap almost any
communications device in the U.S. — wireless or tethered.

http://www.wallstreetandtech.com/blog/archives/2009/10/how_prosecutors.html;jsessionid=ABTR4HPERGBDFQE1GHPCKHWATMY32JVN

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] e-Courier Tracking Site Multiple Script UserGUID Parameter XSS

2009-11-03 Thread Bugs NotHugs
Vendor: e-Courier (http://www.ecouriersoftware.com/)
Product: CMS Tracking Site Issue: Cross-Site Scripting.
Description: Nearly all pages include the URI Parameter UserGUID,
which is not sanitized before being included in the response.

Example:
https://demo.e-courier.com/demo/home/index.asp?UserGUID=";>alert(document.cookie)

-- 

BugsNotHugs
Shared Vulnerability Disclosure Account

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Bractus SunTrack Multiple XSS

2009-11-03 Thread Bugs NotHugs
Vendor: Bractus (http://bract.us)
Product: SunTrack (http://bract.us/demo/login.jsp)

Multiple stored XSS vulnerabilities exist in the Bractus SunTrack
courier software suite.

Affected scripts:
newprofile.html (title parameter)
signup/signup.html (firstname, lastname, company parameter)
contact.html (firstname, lastname, address[0].street1 parameter)

-- 

BugsNotHugs
Shared Vulnerability Disclosure Account

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:292 ] wireshark

2009-11-03 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:292
 http://www.mandriva.com/security/
 ___

 Package : wireshark
 Date: November 3, 2009
 Affected: 2009.1, Corporate 4.0, Enterprise Server 5.0
 ___

 Problem Description:

 Vulnerabilities have been discovered and corrected in wireshark,
 affecting DCERPC/NT dissector, which allows remote attackers to cause
 a denial of service (NULL pointer dereference and application crash)
 via a file that records a malformed packet trace (CVE-2009-3550); and
 in wiretap/erf.c which allows remote attackers to execute arbitrary
 code or cause a denial of service (application crash) via a crafted
 erf file (CVE-2009-3829).
 
 The wireshark package has been updated to fix these vulnerabilities.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3829
 ___

 Updated Packages:

 Mandriva Linux 2009.1:
 9776a5ff48251ff4014a284803f8eedb  
2009.1/i586/dumpcap-1.0.10-0.1mdv2009.1.i586.rpm
 5763243f9b6de3e0eb998683eb157e37  
2009.1/i586/libwireshark0-1.0.10-0.1mdv2009.1.i586.rpm
 615c1f912fcae0f63c14046c7292305e  
2009.1/i586/libwireshark-devel-1.0.10-0.1mdv2009.1.i586.rpm
 fc8c67f248b0039c0006220456f7d0dc  
2009.1/i586/rawshark-1.0.10-0.1mdv2009.1.i586.rpm
 be03c1c1e06412b5603dc65f1632b18a  
2009.1/i586/tshark-1.0.10-0.1mdv2009.1.i586.rpm
 4da9966e690a238eecbe215bfce9fe8a  
2009.1/i586/wireshark-1.0.10-0.1mdv2009.1.i586.rpm
 5ce93f8c9af2127d3255a87c0ea8503b  
2009.1/i586/wireshark-tools-1.0.10-0.1mdv2009.1.i586.rpm 
 d705f70a10051311f0ccfc14e5a587af  
2009.1/SRPMS/wireshark-1.0.10-0.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 ab53926e26b33237cd48aedacd0f6260  
2009.1/x86_64/dumpcap-1.0.10-0.1mdv2009.1.x86_64.rpm
 4d167d0401af7c55904fd0e4bf4d5a09  
2009.1/x86_64/lib64wireshark0-1.0.10-0.1mdv2009.1.x86_64.rpm
 38c8c81a64a488965f397ac55aca4f0d  
2009.1/x86_64/lib64wireshark-devel-1.0.10-0.1mdv2009.1.x86_64.rpm
 0dd651556a433aae58a1d3311dbeacf4  
2009.1/x86_64/rawshark-1.0.10-0.1mdv2009.1.x86_64.rpm
 4e3b3d843fc38637fb5fcb505516a444  
2009.1/x86_64/tshark-1.0.10-0.1mdv2009.1.x86_64.rpm
 f5d7864ae57e97d98abfd1d0da2c601b  
2009.1/x86_64/wireshark-1.0.10-0.1mdv2009.1.x86_64.rpm
 e241a5747541de4b35cb884a3a2a2e09  
2009.1/x86_64/wireshark-tools-1.0.10-0.1mdv2009.1.x86_64.rpm 
 d705f70a10051311f0ccfc14e5a587af  
2009.1/SRPMS/wireshark-1.0.10-0.1mdv2009.1.src.rpm

 Corporate 4.0:
 00f7f312ecb50337a61e8aa226351f0f  
corporate/4.0/i586/dumpcap-1.0.10-0.1.20060mlcs4.i586.rpm
 397831075a172aa09914b851978764c0  
corporate/4.0/i586/libwireshark0-1.0.10-0.1.20060mlcs4.i586.rpm
 38c43d3e4c53be9afdf63e25f81022cd  
corporate/4.0/i586/libwireshark-devel-1.0.10-0.1.20060mlcs4.i586.rpm
 7fb8b1da94b58a405fc248c91a46710a  
corporate/4.0/i586/rawshark-1.0.10-0.1.20060mlcs4.i586.rpm
 275f67bd5a9c81d2fa681802b17ff148  
corporate/4.0/i586/tshark-1.0.10-0.1.20060mlcs4.i586.rpm
 6512854ec097ba7abd54f8fa216f6e47  
corporate/4.0/i586/wireshark-1.0.10-0.1.20060mlcs4.i586.rpm
 0de613b7620d731af50e2f952311e0d4  
corporate/4.0/i586/wireshark-tools-1.0.10-0.1.20060mlcs4.i586.rpm 
 29284ce6df7107031ab98a27eca0a1c5  
corporate/4.0/SRPMS/wireshark-1.0.10-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 22ef3658492b8bf0222b00a213b33ddb  
corporate/4.0/x86_64/dumpcap-1.0.10-0.1.20060mlcs4.x86_64.rpm
 c907ebb1ffd142898a65e4df8c4b98ae  
corporate/4.0/x86_64/lib64wireshark0-1.0.10-0.1.20060mlcs4.x86_64.rpm
 a61af49a91c9313aa48911240f11b878  
corporate/4.0/x86_64/lib64wireshark-devel-1.0.10-0.1.20060mlcs4.x86_64.rpm
 c7c476849dd061df9caa056ee435486c  
corporate/4.0/x86_64/rawshark-1.0.10-0.1.20060mlcs4.x86_64.rpm
 06ea86736d32c321e0f6db14c71eec31  
corporate/4.0/x86_64/tshark-1.0.10-0.1.20060mlcs4.x86_64.rpm
 1a866f965de14960eec591b4ef91fdb3  
corporate/4.0/x86_64/wireshark-1.0.10-0.1.20060mlcs4.x86_64.rpm
 619b8cd611129692d4b6948121311336  
corporate/4.0/x86_64/wireshark-tools-1.0.10-0.1.20060mlcs4.x86_64.rpm 
 29284ce6df7107031ab98a27eca0a1c5  
corporate/4.0/SRPMS/wireshark-1.0.10-0.1.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 acb7f0ef708faabc4f8a0107413581ba  mes5/i586/dumpcap-1.0.10-0.1mdvmes5.i586.rpm
 89771916a201d1877a4e6b3979c9382a  
mes5/i586/libwireshark0-1.0.10-0.1mdvmes5.i586.rpm
 441055d1c582709fe952c66b0cf0bb3e  
mes5/i586/libwireshark-devel-1.0.10-0.1mdvmes5.i586.rpm
 8fcc2774a57fe38b3d93ca2be71d485a  mes5/i586/rawshark-1.0.10-0.1mdvmes5.i586.rpm
 c2c3e70bffbb284c180d38e59ed78647  mes5/i586/tshark-1.0.10-0.1mdvmes5.i586.rpm
 a27530dc435f220afad5a0fa66477210  
mes5/i586/wireshark-1.0.10-0.1mdvmes5.i586