[Full-disclosure] n3td3v / Andrew Wallace's psychological profile

2009-11-19 Thread Sam Haldorf
Earlier this year, a very well educated FD member posted the psychological 
profile of Mr. Wallace. (Found here: 
http://seclists.org/fulldisclosure/2009/Jan/415 ) Interesting to view in 
retrospect, because I find it depicts him to a T.

This profile is almost like an instruction set for n3td3v's life. A 
self-fulfilling prophecy if you will.

An eery example: Anyone here remember how n3td3v posted as full-censorship a 
few months ago claiming to be a martyr? 
http://seclists.org/fulldisclosure/2009/Oct/45 . His profile states "Martyr 
glamorizations" aren't just n3td3v trolling you, he really considers himself as 
such. All the while you go out and bang your girlfriends and have fun with your 
friends, he's thinking the world revolves around him.

Another example is his frequent, obvious, though earnest attempts at using 
pseudonyms to defend himself. Often speaking of himself in third-person, as a 
hired lawyer, a hacker, zealous advocate, an underground "Full censorship" 
movement, etc.

It's possible as of late he may have done another attention-seeking false 
suicide. He hasn't updated his Google Page or Twitter in over 48 hours. I'm 
seriously worried. He may be wasting taxpayer money with fake suicide attempts. 
He's trolling society now.

I would like to post Andrew Wallace's psychological profile verbatim:

===
  Psychological profile of n3td3v / Andrew Wallace
===

Andrew is a special kind of crazya friend of mine and former colleague who 
I highly respect (practicing Psych., who profiles individuals for a real 
doggone intel agency...alas, not MI-Jive) labeled Andrew as a probable 
schizophrenic with grandiose idealizations.

These types of people usually can't hold a job.  The most active period of 
delusions occur from 17-33, some think the drop-off may be due to decreased 
levels of testosterone as they age.  Intelligence agency intrigue & innuendo is 
a classic manifestation, along with imaginary friends, martyr glamorizations, 
alternate personalities and repeated exclamations that they will curtail their 
behaviors, only to come back, roaringly, foisting themselves upon a 
group/friend circle with a different guise or mission. Some have said it 
resembles alcoholic behavior in the promises "to quit..."

They constantly need an audience, since 'friends' are temporal at best...they 
churn through relationships like shit flowing through a goose...as people 
become estranged/exasperated with the constant epiphany's, revelations and 
God-like interpretations.

Stranger yet is that people like this can be wonderfully charming in 
real-lifefunny for awhile, but as they age, they start losing boyish charms 
that previously were  
forgiven...promulgating even more outlandish behavior as grow older. Sound 
familiar?  We have a baseline here, folks.  Also notice he hasn't written 
anything technical -- it's mostly outlandish hypothesis with pointers to..not 
infosec...but Andrew.

They usually refuse medications to control themselves, because it dulls the 
essence of what they're trying to portray: someone mysterious, withholding 
critical information, being the sole-source of knowledge that might somehow 
change the world.

IMHO, I would venture to say Andrew has attempted suicide -- his type is 
usually unsuccessful, indeed, it's not a suicide attempt but an 
attention-seeking event.

He's bat-shit-fucking-crazy-nuts, but sane enough to fool someone unfamiliar 
with his MO.  That's what is so aggravating about this particular form of 
mental illness...once again, as long as there's a receptive audience, the 
monkey will feel the compulsion to perform.  It's akin to sexual gratification 
for him to see he's the subject of people's ire...don't forget that.

This type of person will emotionally soul-suck everyone he comes in contact 
with, and make up dramas if only to suck more
people in, because really, it's all about the adulation of n3td3v/Andrew/, 
nothing else.

Solutions:  There's a few, but I wouldn't want to be responsible for the end 
result; once again, n3td3v is a human たまごっち (Tamagotchi) and should be treated 
accordingly.

Source: http://seclists.org/fulldisclosure/2009/Jan/415  ( - o z - )


__
Do You Yahoo!?
Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen 
Massenmails. 
http://mail.yahoo.com ___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread Sam Haldorf
Feel free to share your feelings with Greenbaum's boss:

Kevin Mowbray
Phone: 314-340-8970
E-mail: kmowb...@post-dispatch.com

--- mrx  schrieb am Fr, 20.11.2009:

Von: mrx 
Betreff: Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, 
St. Louis Post-Dispatch, Reports commenter to employer.
An: full-disclosure@lists.grok.org.uk
Datum: Freitag, 20. November 2009, 0:16

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

No problem regarding the personal post, I have made the same mistake myself.

I also see what you mean regarding the language of the privacy statement.
"unauthorised use" could be interpreted as any use that has not been given 
explicit approval before the fact.

Weasel words imho.

And Mr Holstein if this was the point you were trying to make, I accept it.

regards
mrx



dramacrat wrote:
> Sorry, forgot to reply-to-all.

> 2009/11/20 dramacrat 
> 
>> They're ORs, unfortunately. The language is unclear but it seems to be one
>> of those infernal boilerplate pieces of shit that basically invalidate the
>> assurances as to privacy.
>>
>> You could still probably press the suit. "Unauthorised use" has recently
>> been defined and redefined, it's an evolving piece of law and if you have
>> the resources to get a jury trial they'll *want* to find in favor of the
>> plaintiff, which is more important than you might expect.
>>
>> 2009/11/20 mrx 
>>
>> -BEGIN PGP SIGNED MESSAGE-
>>> Hash: SHA1
>>>
>>> Michael Holstein wrote:
> What Greenbaum did was against the privacy policy of the site:
>
 You seem to be missing the part where the comment was removed (several
 times) and re-posted.

  From : http://www.stltoday.com/help/privacy-policy

 "..to protect against misuse or unauthorized use of our web sites"


 Cheers,

 Michael Holstein
 Cleveland State University
>>>
>>> So what? Ban the IP address. Admittedly a childish comment but the site is
>>> hardly one that is frequented by children.
>>> imho Mr K. Greenbaum should be fired and sued.
>>>
>>> And Mr Holstein you seem to be using your quote above out of context...
>>>
>>> Compliance with Legal Process
>>> We may disclose personal information if we or one of our affiliated
>>> companies is required by law to disclose personal information, or if we
>>> believe in good faith that such action is necessary to comply with a law
>>> or some legal process, to protect or defend our rights and property, to
>>> protect against misuse or unauthorized use of our web sites or to protect
>>> the personal safety or property of our users or the public.
>>>
>>> INAL, however I ask where is the legal process in this matter?
>>>
>>>
>>> regards
>>> mrx
>>>
>>> - --
>>> I am not an expert, I have much to learn, I make mistakes.
>>> My words are just opinions which may or may not reflect the truth.
>>> Be kind to others, yet trust no one.
>>>
>>> http://www.propergander.org.uk
>>> -BEGIN PGP SIGNATURE-
>>> Version: GnuPG v1.4.2 (MingW32)
>>> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>>>
>>> iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ
>>> GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo
>>> 14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO
>>> WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry
>>> EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT
>>> qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw==
>>> =tE1f
>>> -END PGP SIGNATURE-
>>>
>>> ___
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>
> 


- --
I am not an expert, I have much to learn, I make mistakes.
My words are just opinions which may or may not reflect the truth.
Be kind to others, yet trust no one.

http://www.propergander.org.uk
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEVAwUBSwXfxbIvn8UFHWSmAQL9SQgAvu4cN5dby3AUGPtYyX0NnHvVUEdEeJ6Y
yvbKgi5/VOT9uqAnoRWRABLwJh3dcrCpzKA9gjSWpyalqU/YzEQvfB/iFI1QQmZg
9u6N/mZgGkAW1WYeM54AnawrYW8a+2sF1c1QWBhX0gYRGNctOs/Gi7ObvndDb57Q
k4CAp537TqXLzbUwzPkoqNBoaDhBCa4CEkONvFYJtVbUTwmry8gH55tWXI48Fz6/
vWaw9XY5SDUmxz1QYnfji0YKg3OR2YPfdxKxRATdFba4iZa8S3AiOgxZ/OXDNewh
aeILmusBEeCjG+2Wx//EB6lTf5xr9sr7CMHziG+PZ/EsW/GctyNw1A==
=WZoJ
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


__
Do You Yahoo!?
Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen 
Massenmails. 
http://mail.yahoo.com ___
Full-Disclosure - We believe in it.
Charter: http://lis

Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread netinfinity
Mr.  Kurt Greenbaum made a mistake. Privacy violated, because there
are other mechanism's like baninig the IP, email or whatever is
necessary to submit the post. If this fails then you should conntact
the ISP of the "spammer" based on the IP.

-- 
netinfinity

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SecurityReason: KDE KDELibs 4.3.3 Remote Array Overrun (Arbitrary code execution)

2009-11-19 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[ KDE KDELibs 4.3.3 Remote Array Overrun (Arbitrary code execution) ]

Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009

CVE: CVE-2009-0689
Risk: High
Remote: Yes

Affected Software:
- - KDELibs 4.3.3

NOTE: Prior versions may also be affected.

Original URL:
http://securityreason.com/achievement_securityalert/74


- --- 0.Description ---
KDELibs is a collection of libraries built on top of Qt that provides
frameworks and functionality for developers of KDE-compatible software.
The KDELibs libraries are licensed under LGPL.


- --- 1. KDE KDELibs 4.3.2 Remote Array Overrun (Arbitrary code
execution) ---
The main problem exist in dtoa implementation. KDE has a very similar
dtoa algorithm to the BSD, Chrome and Mozilla products. Problem exist
in dtoa.cpp file

http://websvn.kde.org/tags/KDE/4.3.3/kdelibs/kjs/dtoa.cpp?revision=1042584&view=markup

and it is the same like SREASONRES:20090625.

http://securityreason.com/achievement_securityalert/63

but fix for SREASONRES:20090625, used by openbsd was not good.
More information about fix for openbsd and similars SREASONRES:20091030,

http://securityreason.com/achievement_securityalert/69

We can create any number of float, which will overwrite the memory. In
Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and
it is possible to call 16<= elements of freelist array.


- --- 2. Proof of Concept  (PoC) ---

- ---

var a=0.;

- ---

If we use konqueror to see this PoC, konqueror will crash. For example

- ---

var a=0.;

- ---

Program received signal SIGSEGV, Segmentation fault.
[Switching to process 24845, thread 0x7e6e6800]
0x090985c3 in diff () from /usr/local/lib/libkjs.so.5.0

0x06db85c3 :  mov%esi,(%ecx)

#0  0x090985c3 in diff () from /usr/local/lib/libkjs.so.5.0
#1  0x0909901b in kjs_strtod () from /usr/local/lib/libkjs.so.5.0
#2  0x090738e5 in KJS::Lexer::lex () from /usr/local/lib/libkjs.so.5.0
#3  0x0907300c in kjsyylex () from /usr/local/lib/libkjs.so.5.0
#4  0x09072f86 in kjsyyparse () from /usr/local/lib/libkjs.so.5.0
#5  0x090805cf in KJS::Parser::parse () from /usr/local/lib/libkjs.so.5.0
#6  0x0908337f in KJS::InterpreterImp::evaluate ()

(gdb) i r
eax0x0  0
ecx0x220ff000   571469824
edx0x0  0
ebx0x220fbb00   571456256
esp0xcfbc04e0   0xcfbc04e0
ebp0xcfbc0518   0xcfbc0518
esi0xc71c71c7   -954437177
edi0x0  0
eip0x21415c30x21415c3

esi=0x71c71c7


- --- 3. SecurityReason Note ---

Officialy SREASONRES:20090625 has been detected in:
- - OpenBSD
- - NetBSD
- - FreeBSD
- - MacOSX
- - Google Chrome
- - Mozilla Firefox
- - Mozilla Seamonkey
- - KDE (example: konqueror)
- - Opera
- - K-Meleon

This list is not yet closed. US-CERT declared that will inform all
vendors about this issue, however, they did not do it. Even greater
confusion caused new CVE number "CVE-2009-1563". Secunia has informed
that this vulnerability was only detected in Mozilla Firefox, but nobody
was aware that the problem affects other products like ( KDE, Chrome )
and it is based on "CVE-2009-0689". After some time Mozilla Foundation
Security Advisory
("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";)
was updated with note :
"The underlying flaw in the dtoa routines used by Mozilla appears to be
essentially the same as that reported against the libc gdtoa routine by
Maksymilian Arciemowicz ( CVE-2009-0689)".
This fact ( new CVE number for Firefox Vulnerability )and PoC in
javascript (from Secunia), forced us to official notification all other
vendors. We publish all the individual advisories, to formally show all
vulnerable software and to avoid wrong CVE number. We do not see any
other way to fix this issue in all products.


- --- 4. Fix ---
NetBSD fix (optimal):
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h

OpenBSD fix:
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/sum.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorx.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtord.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorQ.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtof.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtodg.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtod.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/smisc.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/hdtoa.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gethex.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gdtoa.h
http://www.openbsd.org/

[Full-disclosure] SecurityReason: Opera 10.01 Remote Array Overrun (Arbitrary code execution)

2009-11-19 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[ Opera 10.01 Remote Array Overrun (Arbitrary code execution) ]

Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009

CVE: CVE-2009-0689
Risk: High
Remote: Yes

Affected Software:
- - Opera 10.01
- - Opera 10.10 Beta

NOTE: Prior versions may also be affected.

Original URL:
http://securityreason.com/achievement_securityalert/73


- --- 0.Description ---
Opera is a Web browser and Internet suite developed by the Opera
Software company. The browser handles common Internet-related tasks such
as displaying Web sites, sending and receiving e-mail messages, managing
contacts, IRC online chatting, downloading files via BitTorrent, and
reading Web feeds. Opera is offered free of charge for personal
computers and mobile phones.


- --- 1. Opera 10.01 Remote Array Overrun (Arbitrary code execution) ---
The main problem exist in dtoa implementation. Opera has a very similar
dtoa algorithm to the BSD, Chrome and Mozilla products. It is the same
issue like SREASONRES:20090625.

http://securityreason.com/achievement_securityalert/63

but fix for SREASONRES:20090625, used by openbsd was not good.
More information about fix for openbsd and similars SREASONRES:20091030,

http://securityreason.com/achievement_securityalert/69

We can create any number of float, which will overwrite the memory. In
Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and it
is possible to call 16<= elements of freelist array.


- --- 2. Proof of Concept  (PoC) ---

- ---

var a=0.;

- ---

If we use Opera to see this PoC, Opera will crash. For example

- ---

var a=0.;

- ---

OPERA-CRASHLOG V1 desktop 10.01 1844 windows
Opera.exe 1844 caused exception C005 at address 67956906 (Base: 40)

Registers:
EAX=01165C40   EBX=0592064C   ECX=A0D589D4   EDX=4200   ESI=C20471EC
EDI=   EBP=0012E384   ESP=0012E2FC   EIP=67956906 FLAGS=00010202
CS=001B   DS=0023   SS=0023   ES=0023   FS=003B   GS=
FPU stack:
C020A38F66534266F000 C020A38F66534266F000 3FFBE38E38E38E38D800
3FC78000 1001 0BBE0004
 2EBA804E2FDE SW=0122 CW=027F

127# gdb -q opera opera.core
...
Program terminated with signal 11, Segmentation fault.
#0  0x2960307b in ?? ()
...
(gdb) i r
eax0x71c71c71   1908874353
ecx0x2aa03be4   715144164
edx0x0  0
ebx0x296177f8   694253560
esp0xbfbfb650   0xbfbfb650
ebp0xbfbfb698   0xbfbfb698
esi0x2962d000   694341632
edi0x0  0
eip0x2960307b   0x2960307b
...
(gdb) x/100x ($esi)-90
0x2962cfa6: 0x71c71c71  0x1c71c71c  0xc71c71c7  0x71c71c71
0x2962cfb6: 0x1c71c71c  0xc71c71c7  0x71c71c71  0x1c71c71c
0x2962cfc6: 0xc71c71c7  0x71c71c71  0x1c71c71c  0xc71c71c7
0x2962cfd6: 0x71c71c71  0x1c71c71c  0xc71c71c7  0x71c71c71
0x2962cfe6: 0x1c71c71c  0xc71c71c7  0x71c71c71  0x1c71c71c
0x2962cff6: 0xc71c71c7  0x71c71c71  Cannot access memory at
address 0x2962cffe
...


- --- 3. SecurityReason Note ---

Officialy SREASONRES:20090625 has been detected in:
- - OpenBSD
- - NetBSD
- - FreeBSD
- - MacOSX
- - Google Chrome
- - Mozilla Firefox
- - Mozilla Seamonkey
- - KDE (example: konqueror)
- - Opera
- - K-Meleon

This list is not yet closed. US-CERT declared that will inform all
vendors about this issue, however, they did not do it. Even greater
confusion caused new CVE number "CVE-2009-1563". Secunia has informed
that this vulnerability was only detected in Mozilla Firefox, but nobody
was aware that the problem affects other products like ( KDE, Chrome )
and it is based on "CVE-2009-0689". After some time Mozilla Foundation
Security Advisory
("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";)
was updated with note :
"The underlying flaw in the dtoa routines used by Mozilla appears to be
essentially the same as that reported against the libc gdtoa routine by
Maksymilian Arciemowicz ( CVE-2009-0689)".
This fact ( new CVE number for Firefox Vulnerability )and PoC in
javascript (from Secunia), forced us to official notification all other
vendors. We publish all the individual advisories, to formally show all
vulnerable software and to avoid wrong CVE number. We do not see any
other way to fix this issue in all products.


- --- 4. Fix ---
Opera fix:
The vulnerability was fixed in the latest release candidate Opera RC3 :
http://snapshot.opera.com/windows/Opera_1010_1890_in.exe
In shortly time we can expect the final verion of Opera with the fix.

NetBSD fix (optimal):
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h

OpenBSD fix:
http://www.openbsd.org/cgi-bin

[Full-disclosure] SecurityReason: K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution)

2009-11-19 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[ K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) ]

Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009

CVE: CVE-2009-0689
Risk: High
Remote: Yes

Affected Software:
- - K-Meleon 1.5.3

NOTE: Prior versions may also be affected.

Original URL:
http://securityreason.com/achievement_securityalert/72


- --- 0.Description ---
K-Meleon is an extremely fast, customizable, lightweight web browser
based on the Gecko layout engine developed by Mozilla which is also used
by Firefox. K-Meleon is free, open source software released under the
GNU General Public License and is designed specifically for Microsoft
Windows (Win32) operating systems.


- --- 1. K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) ---
The main problem exist in dtoa implementation. K-Meleon has the same
dtoa as a KDE, Opera and all BSD systems. This issue has been fixed in
Firefox 3.5.4 and fix

http://securityreason.com/achievement_securityalert/63

but fix for SREASONRES:20090625, used by openbsd was not good.
More information about fix for openbsd and similars SREASONRES:20091030,

http://securityreason.com/achievement_securityalert/69

We can create any number of float, which will overwrite the memory. In
Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and it
is possible to call 16<= elements of freelist array.


- --- 2. Proof of Concept  (PoC) ---

- ---

var a=0.;

- ---

K-Meleon will crash with

Unhandled exception at 0x01800754 in k-meleon.exe: 0xC005: Access
violation reading location 0x0bc576ec.

01800754  mov eax,dword ptr [ecx]

EAX 0002
ECX 0BC576EC
EDI 028FEB51


- --- 3. SecurityReason Note ---

Officialy SREASONRES:20090625 has been detected in:
- - OpenBSD
- - NetBSD
- - FreeBSD
- - MacOSX
- - Google Chrome
- - Mozilla Firefox
- - Mozilla Seamonkey
- - KDE (example: konqueror)
- - Opera
- - K-Meleon

This list is not yet closed. US-CERT declared that will inform all
vendors about this issue, however, they did not do it. Even greater
confusion caused new CVE number "CVE-2009-1563". Secunia has informed
that this vulnerability was only detected in Mozilla Firefox, but nobody
was aware that the problem affects other products like ( KDE, Chrome )
and it is based on "CVE-2009-0689". After some time Mozilla Foundation
Security Advisory
("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";)
was updated with note :
"The underlying flaw in the dtoa routines used by Mozilla appears to be
essentially the same as that reported against the libc gdtoa routine by
Maksymilian Arciemowicz ( CVE-2009-0689)".
This fact ( new CVE number for Firefox Vulnerability )and PoC in
javascript (from Secunia), forced us to official notification all other
vendors. We publish all the individual advisories, to formally show all
vulnerable software and to avoid wrong CVE number. We do not see any
other way to fix this issue in all products.

Please note:
Patch used in Firefox 3.5.4 does not fully solve the problem. Dtoa
algorithm is not optimal and allows remote Denial of Service in Firefox
3.5.5 giving long float number.


- --- 4. Fix ---
NetBSD fix (optimal):
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h

OpenBSD fix:
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/sum.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorx.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtord.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorQ.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtof.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtodg.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtod.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/smisc.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/hdtoa.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gethex.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gdtoa.h
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/dtoa.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/dmisc.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/stdio/vfprintf.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/arch/vax/gdtoa/strtof.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorxL.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorf.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtordd.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopxL.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopx.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopf.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopdd.c
http://www.openbsd.org

[Full-disclosure] SecurityReason: SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution)

2009-11-19 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[ SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution) ]

Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009

CVE: CVE-2009-0689
Risk: High
Remote: Yes

Affected Software:
- - SeaMonkey 1.1.18

Fixed in:
- - SeaMonkey 2.0

NOTE: Prior versions may also be affected.

Original URL:
http://securityreason.com/achievement_securityalert/71


- --- 0.Description ---
The SeaMonkey project is a community effort to develop the SeaMonkey
all-in-one internet application suite (see below). Such a software suite
was previously made popular by Netscape and Mozilla, and the SeaMonkey
project continues to develop and deliver high-quality updates to this
concept. Containing an Internet browser, email & newsgroup client with
an included web feed reader, HTML editor, IRC chat and web development
tools, SeaMonkey is sure to appeal to advanced users, web developers and
corporate users.


- --- 1. SeaMonkey 1.1.18 Remote Array Overrun (Arbitrary code
execution) ---
The main problem exist in dtoa implementation. SeaMonkey has the same
dtoa as a KDE, Opera and all BSD systems. This issue has been fixed in
Firefox 3.5.4 and fix

http://bonsai.mozilla.org/cvsview2.cgi?diff_mode=context&whitespace_mode=show&file=jsdtoa.c&branch=&root=/cvsroot&subdir=mozilla/js/src&command=DIFF_FRAMESET&rev1=3.41&rev2=3.42

has been used to patch SeaMonkey 2.0.

This flaw has been detected in may 2009 and signed SREASONRES:20090625.

http://securityreason.com/achievement_securityalert/63

but fix for SREASONRES:20090625, used by openbsd was not good.
More information about fix for openbsd and similars SREASONRES:20091030,

http://securityreason.com/achievement_securityalert/69

We can create any number of float, which will overwrite the memory. In
Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and it
is possible to call 16<= elements of freelist array.


- --- 2. Proof of Concept  (PoC) ---

- ---

var a=0.;

- ---

If we use SeaMonkey to  see this PoC, SeaMonkey will crash. For example

- ---

var a=0.;

- ---

127# gdb seamonkey-bin seamonkey-bin.core
...
#0  0x28df0ecb in ?? ()
...
(gdb) i r
eax0x0  0
ecx0x2  2
edx0xbfbfd2fc   -1077947652
ebx0x28da9b6c   685415276
esp0xbfbfd2ac   0xbfbfd2ac
ebp0xbfbfd2c8   0xbfbfd2c8
esi0xb  11
edi0xb  11
eip0x28df0ecb   0x28df0ecb
...

esi = esi = 11


- --- 3. SecurityReason Note ---

Officialy SREASONRES:20090625 has been detected in:
- - OpenBSD
- - NetBSD
- - FreeBSD
- - MacOSX
- - Google Chrome
- - Mozilla Firefox
- - Mozilla Seamonkey
- - KDE (example: konqueror)
- - Opera
- - K-Meleon

This list is not yet closed. US-CERT declared that will inform all
vendors about this issue, however, they did not do it. Even greater
confusion caused new CVE number "CVE-2009-1563". Secunia has informed
that this vulnerability was only detected in Mozilla Firefox, but nobody
was aware that the problem affects other products like ( KDE, Chrome )
and it is based on "CVE-2009-0689". After some time Mozilla Foundation
Security Advisory
("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";)
was updated with note :
"The underlying flaw in the dtoa routines used by Mozilla appears to be
essentially the same as that reported against the libc gdtoa routine by
Maksymilian Arciemowicz ( CVE-2009-0689)".
This fact ( new CVE number for Firefox Vulnerability )and PoC in
javascript (from Secunia), forced us to official notification all other
vendors. We publish all the individual advisories, to formally show all
vulnerable software and to avoid wrong CVE number. We do not see any
other way to fix this issue in all products.

Please note:
Patch used in Firefox 3.5.4 does not fully solve the problem. Dtoa
algorithm is not optimal and allows remote Denial of Service in Firefox
3.5.5 giving long float number.


- --- 4. Fix ---
NetBSD fix (optimal):
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h

OpenBSD fix:
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/sum.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorx.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtord.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorQ.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtof.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtodg.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtod.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/smisc.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/hdtoa.c
http://www.openbsd.org/cgi-b

Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread mrx
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

No problem regarding the personal post, I have made the same mistake myself.

I also see what you mean regarding the language of the privacy statement.
"unauthorised use" could be interpreted as any use that has not been given 
explicit approval before the fact.

Weasel words imho.

And Mr Holstein if this was the point you were trying to make, I accept it.

regards
mrx



dramacrat wrote:
> Sorry, forgot to reply-to-all.

> 2009/11/20 dramacrat 
> 
>> They're ORs, unfortunately. The language is unclear but it seems to be one
>> of those infernal boilerplate pieces of shit that basically invalidate the
>> assurances as to privacy.
>>
>> You could still probably press the suit. "Unauthorised use" has recently
>> been defined and redefined, it's an evolving piece of law and if you have
>> the resources to get a jury trial they'll *want* to find in favor of the
>> plaintiff, which is more important than you might expect.
>>
>> 2009/11/20 mrx 
>>
>> -BEGIN PGP SIGNED MESSAGE-
>>> Hash: SHA1
>>>
>>> Michael Holstein wrote:
> What Greenbaum did was against the privacy policy of the site:
>
 You seem to be missing the part where the comment was removed (several
 times) and re-posted.

  From : http://www.stltoday.com/help/privacy-policy

 "..to protect against misuse or unauthorized use of our web sites"


 Cheers,

 Michael Holstein
 Cleveland State University
>>>
>>> So what? Ban the IP address. Admittedly a childish comment but the site is
>>> hardly one that is frequented by children.
>>> imho Mr K. Greenbaum should be fired and sued.
>>>
>>> And Mr Holstein you seem to be using your quote above out of context...
>>>
>>> Compliance with Legal Process
>>> We may disclose personal information if we or one of our affiliated
>>> companies is required by law to disclose personal information, or if we
>>> believe in good faith that such action is necessary to comply with a law
>>> or some legal process, to protect or defend our rights and property, to
>>> protect against misuse or unauthorized use of our web sites or to protect
>>> the personal safety or property of our users or the public.
>>>
>>> INAL, however I ask where is the legal process in this matter?
>>>
>>>
>>> regards
>>> mrx
>>>
>>> - --
>>> I am not an expert, I have much to learn, I make mistakes.
>>> My words are just opinions which may or may not reflect the truth.
>>> Be kind to others, yet trust no one.
>>>
>>> http://www.propergander.org.uk
>>> -BEGIN PGP SIGNATURE-
>>> Version: GnuPG v1.4.2 (MingW32)
>>> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>>>
>>> iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ
>>> GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo
>>> 14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO
>>> WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry
>>> EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT
>>> qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw==
>>> =tE1f
>>> -END PGP SIGNATURE-
>>>
>>> ___
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>
> 


- --
I am not an expert, I have much to learn, I make mistakes.
My words are just opinions which may or may not reflect the truth.
Be kind to others, yet trust no one.

http://www.propergander.org.uk
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEVAwUBSwXfxbIvn8UFHWSmAQL9SQgAvu4cN5dby3AUGPtYyX0NnHvVUEdEeJ6Y
yvbKgi5/VOT9uqAnoRWRABLwJh3dcrCpzKA9gjSWpyalqU/YzEQvfB/iFI1QQmZg
9u6N/mZgGkAW1WYeM54AnawrYW8a+2sF1c1QWBhX0gYRGNctOs/Gi7ObvndDb57Q
k4CAp537TqXLzbUwzPkoqNBoaDhBCa4CEkONvFYJtVbUTwmry8gH55tWXI48Fz6/
vWaw9XY5SDUmxz1QYnfji0YKg3OR2YPfdxKxRATdFba4iZa8S3AiOgxZ/OXDNewh
aeILmusBEeCjG+2Wx//EB6lTf5xr9sr7CMHziG+PZ/EsW/GctyNw1A==
=WZoJ
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread dramacrat
They're ORs, unfortunately. The language is unclear but it seems to be one
of those infernal boilerplate pieces of shit that basically invalidate the
assurances as to privacy.

You could still probably press the suit. "Unauthorised use" has recently
been defined and redefined, it's an evolving piece of law and if you have
the resources to get a jury trial they'll *want* to find in favor of the
plaintiff, which is more important than you might expect.

2009/11/20 mrx 

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Michael Holstein wrote:
> >> What Greenbaum did was against the privacy policy of the site:
> >>
> >
> > You seem to be missing the part where the comment was removed (several
> > times) and re-posted.
> >
> >  From : http://www.stltoday.com/help/privacy-policy
> >
> > "..to protect against misuse or unauthorized use of our web sites"
> >
> >
> > Cheers,
> >
> > Michael Holstein
> > Cleveland State University
>
>
> So what? Ban the IP address. Admittedly a childish comment but the site is
> hardly one that is frequented by children.
> imho Mr K. Greenbaum should be fired and sued.
>
> And Mr Holstein you seem to be using your quote above out of context...
>
> Compliance with Legal Process
> We may disclose personal information if we or one of our affiliated
> companies is required by law to disclose personal information, or if we
> believe in good faith that such action is necessary to comply with a law or
> some legal process, to protect or defend our rights and property, to
> protect against misuse or unauthorized use of our web sites or to protect
> the personal safety or property of our users or the public.
>
> INAL, however I ask where is the legal process in this matter?
>
>
> regards
> mrx
>
> - --
> I am not an expert, I have much to learn, I make mistakes.
> My words are just opinions which may or may not reflect the truth.
> Be kind to others, yet trust no one.
>
> http://www.propergander.org.uk
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.2 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ
> GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo
> 14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO
> WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry
> EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT
> qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw==
> =tE1f
> -END PGP SIGNATURE-
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread mrx
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Michael Holstein wrote:
>> What Greenbaum did was against the privacy policy of the site:
>>
> 
> You seem to be missing the part where the comment was removed (several 
> times) and re-posted.
> 
>  From : http://www.stltoday.com/help/privacy-policy
> 
> "..to protect against misuse or unauthorized use of our web sites"
> 
> 
> Cheers,
> 
> Michael Holstein
> Cleveland State University


So what? Ban the IP address. Admittedly a childish comment but the site is 
hardly one that is frequented by children.
imho Mr K. Greenbaum should be fired and sued.

And Mr Holstein you seem to be using your quote above out of context...

Compliance with Legal Process
We may disclose personal information if we or one of our affiliated companies 
is required by law to disclose personal information, or if we
believe in good faith that such action is necessary to comply with a law or 
some legal process, to protect or defend our rights and property, to
protect against misuse or unauthorized use of our web sites or to protect the 
personal safety or property of our users or the public.

INAL, however I ask where is the legal process in this matter?


regards
mrx

- --
I am not an expert, I have much to learn, I make mistakes.
My words are just opinions which may or may not reflect the truth.
Be kind to others, yet trust no one.

http://www.propergander.org.uk
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ
GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo
14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO
WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry
EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT
qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw==
=tE1f
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread Michael Holstein

>
> What Greenbaum did was against the privacy policy of the site:
>

You seem to be missing the part where the comment was removed (several 
times) and re-posted.

 From : http://www.stltoday.com/help/privacy-policy

"..to protect against misuse or unauthorized use of our web sites"


Cheers,

Michael Holstein
Cleveland State University

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.

2009-11-19 Thread Sam Haldorf
I smell a lawsuit coming on for our friend Greenbaum.

"ReadWriteWeb has an article up today discussing an incident in which a school 
employee lost his job after leaving a comment on the website of the St. Louis 
Post-Dispatch newspaper. After the school employee responded to the newspaper's 
poll of 'the strangest thing you've ever eaten' with a feline-inspired 
vulgarity, Kurt Greenbaum, the site's director of social media, tracked down 
the commenter's identity through his IP address and reported him to school 
officials. When confronted, the school employee resigned from his job."

http://yro.slashdot.org/story/09/11/19/0526239/Vulgar-Comment-On-Newspaper-Site-Costs-Man-His-Job

The comment in question:

"I have eaten many different animals (or at least parts of them), including 
rattlesnake, crocodile, alligator, iguana, turtle, and many different molluscs, 
arthropods, echinoids, and whatnot from sea or river. I have also eaten 
squirrel, bear, dog, and cat. So, I can say I have eaten pussy, and you can 
interpret or misinterpret it any way you want. Oh, and woof-woof, too."

Chilling free speech? It must invade the privacy of the poster to call his 
place of work over a comment like this.

What Greenbaum did was against the privacy policy of the site:

    "We will not share individual user information with third parties unless 
the user has specifically approved the release of that information"

So should people who run newspaper blogs call up the place of work to report 
they said an innuendo about cats?

http://igreenbaum.com

I'll be the first to say it. Kurt Greenbaum is a miraculous hypocrite who's 
career has basically been ruined. 

He may as well be like Chris Hansen and expose pedophiles. 
http://www.youtube.com/watch?v=8CgUXWIOLLw

__
Do You Yahoo!?
Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen 
Massenmails. 
http://mail.yahoo.com ___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Impersonation is a against the law.

2009-11-19 Thread yaroslav
stopped reading full-disclosure about a year ago, most of the
discussions was about netdev. now resumed my subscription:  still a
lot of talks about netdev. I'm glad that our constantly evolving
universe has such islands of stability and predictability. but it's a
pity that these islands populated mostly by netnev.

> kaibelf escreveu:
>> List,
>>
>> It has come to my attention that my client is being impersonated.
>>
>> Securityfocus slandered n3td3v in 2006 causing him to drop out of
>> university.
>>
>> n3td3v hasn't been the same health wise since he was targeted by
>> Securityfocus and HackerFactor.
>>
>> n3td3v has had breakdowns from being accused of being a troll or
>> accused of being involved with trolls.
>>
>> It was hurtful for n3td3v to be labelled a "security troll" after
>> his years of dedication to fighting cybercrime and reporting
>> intelligence to vendors.
>>
>> It's also been hurtful that individual users of Full-disclosure
>> mailing list have targeted him in calling him a troll, everything
>> n3td3v has said is sincere and is nothing to do with trolling.
>>
>> n3td3v was wrongfully banned from Full-disclosure mailing list
>> after anonymous users decided to write emails with false truths
>> about n3td3v, to upset n3td3v to get a reaction out of him.
>>
>> There is now a problem with people pretending to be n3td3v and
>> pretending to be speaking on behalf of him, this is a really
>> damaging situation for n3td3v.
>>
>> n3td3v has been unable to share his home grown computer skills with
>> anyone due to the personal attacks which have affected his personal
>> life.
>>
>> n3td3v began in 1999 where he learnt how hackers worked and learned
>> the tools of the trade, he quickly used his knowledge to pass
>> useful information to yahoo about folks who were trying to
>> compromise them.
>>
>> n3td3v went onto Full-disclosure mailing list after a fall out with
>> a Yahoo engineer who had used n3td3v's information about hackers to
>> get further up the corporate ladder at yahoo.
>>
>> n3td3v left Full-disclosure mailing list in 2006 to gain official
>> qualifications at university, and by October Securityfocus and
>> HackerFactor wrongfully post slander about n3td3v.
>>
>> n3td3v began to think he was being followed in real life such was
>> the psychological impact of a good guy being talked about as a bad
>> guy by Securityfocus.
>>
>> n3td3v couldn't take the pressure anymore and dropped out of the
>> university course which would have made him a security professional.
>>
>> It was n3td3v's only chance to get a career in information
>> security, now ruined by the folks from Securityfocus, HackerFactor
>> and individuals from Full-disclosure mailing list.
>>
>> n3td3v returned to Full-disclosure mailing list after dropping out
>> of university to try and clear his name but was set upon by
>> anonymous users who claimed the n3td3v group was fake.
>>
>> The list administrator of Full-disclosure mailing list took sides
>> with the anonymous users who were claiming n3td3v was a troll and a
>> liar, the list administrator publicly addressed n3td3v and banned
>> him.
>>
>> After n3td3v was banned from Full-disclosure mailing list in 2009,
>> anonymous users started to impersonate him, and claim they were
>> speaking on behalf of him to further damage his reputation.
>>
>> In 2009 n3td3v deleted the n3td3v group (the mailing list for the
>> n3td3v group on Google Groups) as the personal attacks continued to
>> plague his integrity.
>>
>> n3td3v remains unemployed as of 2009 and is still suffering
>> psychological problems socially and is unable to lead a normal life.
>>
>> n3td3v is unable to work due to lack of official qualifications and
>> the personal problems he has due to the personal attacks placed
>> upon him, n3td3v however without official qualifications is a very
>> capable candidate for a future role in the information security
>> industry.
>>
>> It's a sad case, let's hope in future we don't treat our young
>> people in a way that they can't shine to show their talents.
>>
>> Stop Cyberbullying
>> http://www.stopcyberbullying.org/
>>
>> What is Cyberbullying
>> http://www.direct.gov.uk/en/YoungPeople/HealthAndRelationships/Bully
>> ing/DG_070501
>>
>> Laugh at it and you're part of it
>> http://yp.direct.gov.uk/cyberbullying/
>>
>> Wikipedia entry on Cyber-bullying
>> http://en.wikipedia.org/wiki/Cyber-bullying
>>
>> False statements made by Securityfocus
>> http://www.securityfocus.com/news/11419
>>
>> False statements made by HackerFactor
>> http://www.hackerfactor.com/papers/who_is_n3td3v.pdf
>>
>> 
>> ---
>>
>> About Andrew Wallace:
>>
>> Q: How did you get into Cyber Security?
>> A: From 1999 I learned knowledge on how hackers operate and the
>> tools of the trade, soon I had learned enough to start passing
>> useful information to Yahoo security representatives on hackers who
>> were trying to compromise the

Re: [Full-disclosure] Impersonation is a against the law.

2009-11-19 Thread Leandro Quibem Magnabosco
STOP THAT BULLSHIT!

It's not funny anymore.

kaibelf escreveu:
> List,
>
> It has come to my attention that my client is being impersonated.
>
> Securityfocus slandered n3td3v in 2006 causing him to drop out of 
> university.
>
> n3td3v hasn't been the same health wise since he was targeted by 
> Securityfocus and HackerFactor.
>
> n3td3v has had breakdowns from being accused of being a troll or 
> accused of being involved with trolls.
>
> It was hurtful for n3td3v to be labelled a "security troll" after 
> his years of dedication to fighting cybercrime and reporting 
> intelligence to vendors.
>
> It's also been hurtful that individual users of Full-disclosure 
> mailing list have targeted him in calling him a troll, everything 
> n3td3v has said is sincere and is nothing to do with trolling.
>
> n3td3v was wrongfully banned from Full-disclosure mailing list 
> after anonymous users decided to write emails with false truths 
> about n3td3v, to upset n3td3v to get a reaction out of him.
>
> There is now a problem with people pretending to be n3td3v and 
> pretending to be speaking on behalf of him, this is a really 
> damaging situation for n3td3v.
>
> n3td3v has been unable to share his home grown computer skills with 
> anyone due to the personal attacks which have affected his personal 
> life.
>
> n3td3v began in 1999 where he learnt how hackers worked and learned 
> the tools of the trade, he quickly used his knowledge to pass 
> useful information to yahoo about folks who were trying to 
> compromise them.
>
> n3td3v went onto Full-disclosure mailing list after a fall out with 
> a Yahoo engineer who had used n3td3v's information about hackers to 
> get further up the corporate ladder at yahoo.
>
> n3td3v left Full-disclosure mailing list in 2006 to gain official 
> qualifications at university, and by October Securityfocus and 
> HackerFactor wrongfully post slander about n3td3v.
>
> n3td3v began to think he was being followed in real life such was 
> the psychological impact of a good guy being talked about as a bad 
> guy by Securityfocus.
>
> n3td3v couldn't take the pressure anymore and dropped out of the 
> university course which would have made him a security professional.
>
> It was n3td3v's only chance to get a career in information 
> security, now ruined by the folks from Securityfocus, HackerFactor 
> and individuals from Full-disclosure mailing list.
>
> n3td3v returned to Full-disclosure mailing list after dropping out 
> of university to try and clear his name but was set upon by 
> anonymous users who claimed the n3td3v group was fake.
>
> The list administrator of Full-disclosure mailing list took sides 
> with the anonymous users who were claiming n3td3v was a troll and a 
> liar, the list administrator publicly addressed n3td3v and banned 
> him.
>
> After n3td3v was banned from Full-disclosure mailing list in 2009, 
> anonymous users started to impersonate him, and claim they were 
> speaking on behalf of him to further damage his reputation.
>
> In 2009 n3td3v deleted the n3td3v group (the mailing list for the 
> n3td3v group on Google Groups) as the personal attacks continued to 
> plague his integrity.
>
> n3td3v remains unemployed as of 2009 and is still suffering 
> psychological problems socially and is unable to lead a normal life.
>
> n3td3v is unable to work due to lack of official qualifications and 
> the personal problems he has due to the personal attacks placed 
> upon him, n3td3v however without official qualifications is a very 
> capable candidate for a future role in the information security 
> industry.
>
> It's a sad case, let's hope in future we don't treat our young 
> people in a way that they can't shine to show their talents.
>
> Stop Cyberbullying
> http://www.stopcyberbullying.org/
>
> What is Cyberbullying
> http://www.direct.gov.uk/en/YoungPeople/HealthAndRelationships/Bully
> ing/DG_070501
>
> Laugh at it and you're part of it
> http://yp.direct.gov.uk/cyberbullying/
>
> Wikipedia entry on Cyber-bullying
> http://en.wikipedia.org/wiki/Cyber-bullying
>
> False statements made by Securityfocus
> http://www.securityfocus.com/news/11419
>
> False statements made by HackerFactor
> http://www.hackerfactor.com/papers/who_is_n3td3v.pdf
>
> 
> ---
>
> About Andrew Wallace:
>
> Q: How did you get into Cyber Security?
> A: From 1999 I learned knowledge on how hackers operate and the 
> tools of the trade, soon I had learned enough to start passing 
> useful information to Yahoo security representatives on hackers who 
> were trying to compromise them.
>
> Q: Why did you start the n3td3v Google Groups group?
> A: From 2004 I started the n3td3v group to act as a central hub for 
> open source intelligence items.
>
> Q: I invited people from the Full-disclosure mailing list to 
> utilize the information.
> A: It worked pretty well with the user interface, I ended the group 
> 2009 as it was 

Re: [Full-disclosure] Impersonation is a against the law.

2009-11-19 Thread mrx
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



With all due respect, can we please not encourage:

kaibelf, Mr Appelbaum, GOBBLES, Jack Bauer, Gary McKinnon etc., etc.

regards mrx


- --
I am not an expert, I have much to learn, I make mistakes.
My words are just opinions which may or may not reflect the truth.
Be kind to others, yet trust no one.

http://www.propergander.org.uk
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEVAwUBSwVWvbIvn8UFHWSmAQIdsAf/eusdi2x59XcVa0oBtQ2IT/sYAd7gQNtf
ksgPqHN5fCOFzXrIxv4yoxhrhfj2Q0M2LtaVCJF/jat6GoVMx8cWTZQnAeBQn6Th
QP3zAIayDhJ6rYwxAmOgXPUxKT+568Q6uANbkVQDPAzM/cll0iI2gzip0+DtEhbF
8N4NKbmwgwZ/vaH9kLyab2WHugcfDCwE1faM3Rr6sqfPWsctvrqtKqFyXAYJFKar
SM4oLENObmZchjRgsTV1TmHZ+ub7PUmMFIGUQr1jk/wKGO4iwzxvOashyt40rofS
Uj+rtU9CAQdGJQvDmozRrNZZqEJHtSr/Xo05Pku9faRDmkxWSbtmEA==
=EjgQ
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Impersonation is a against the law.

2009-11-19 Thread Valdis . Kletnieks
On Thu, 19 Nov 2009 00:20:54 GMT, kaibelf said:
> n3td3v began to think he was being followed in real life such was 
> the psychological impact of a good guy being talked about as a bad 
> guy by Securityfocus.

Doood. *Take* *Your* *Meds*. 

Seriously.  Get professional help.

If you're a male in your 20's and think you're being followed, it's much more
likely you're suffering from paranoid schizophrenia than you've actually become
important enough to be followed.

Writing about yourself in the third person is wy totally creepy, too.

> After n3td3v was banned from Full-disclosure mailing list in 2009, 
> anonymous users started to impersonate him, and claim they were 
> speaking on behalf of him to further damage his reputation.

Man, bet he wishes he'd been PGP-signing his postings to make it a lot
more difficult to post forgeries. ;)

> In 2009 n3td3v deleted the n3td3v group (the mailing list for the 
> n3td3v group on Google Groups) as the personal attacks continued to 
> plague his integrity.

Wow, even his biggest-security-scene-in-the-world group turned against
him?  Ya know - if everybody keeps telling you the same thing, maybe
it's not them, it's you.

> n3td3v remains unemployed as of 2009 and is still suffering 
> psychological problems socially and is unable to lead a normal life.

Dood. *Take* *your* *meds*. ;)

> Q: Have you been approached for a job in national security?
> A: Not so far, although you never know what might happen in the 
> future.

Hmm..

> Undergound websites:
> http://www.twitter.com/n3td3v
> http://sites.google.com/site/n3td3v
> http://n3td3v.blogspot.com
> http://www.cnet.com/profile/n3td3v/ - Cyber intelligence comments

I suspect that if you don't even understand what 'underground' means,
you're not going to get many calls from MI5, 6, or 7.

> Andrew Wallace, MI7, iJTTF

Interesting, since (a) MI7 has been long defunct and (b) it
was the War Office's offices for censorship and propaganda.

In other words, MI7 was the War Office's troll and anti-troll efforts.

We've not often seen such subtle self-reference in posts relating to
n3td3v - usually it's a sledgehammer...

http://en.wikipedia.org/wiki/MI7


pgpyN3KqEmj35.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Foxit Reader vulnerability has been fixed

2009-11-19 Thread Grace C. Wu
Hello There,

This is Grace Wu from Foxit Corporation. We had noticed the Foxit Reader 
vulnerability posted at http://seclists.org/fulldisclosure/2009/Oct/198. By 
working with Alin from Secunia.com, Foxit development team has fixed this crash 
issue and provided the below solution today. Secunia.com has confirmed the 
issue has been fixed and posted the release of the patch today at 
http://secunia.com/advisories/37049/.

Solution:
Update to version 3.1.3.1030 and install the latest Firefox Plugin via the 
internal update mechanism.

Can you please confirm this and help to post this solution on your site too so 
users who're reading this post http://seclists.org/fulldisclosure/2009/Oct/198 
will know this issue has been fixed? 

Thank you so much!

Grace Wu
Foxit Corporation
www.foxitsoftware.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Impersonation is a against the law.

2009-11-19 Thread Jan G.B.
2009/11/19 kaibelf 

> List,
>
> It has come to my attention that my client is being impersonated.
>
>
Your false statements doesn't revert the truth. He was trolling. The rest is
not of interest.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Auto Manager admin.cgi Multiple Field XSS

2009-11-19 Thread Bugs NotHugs
vendor: interactivetools.com, inc.,
http://www.interactivetools.com/products/automanager/
product: Auto Manager
version: 2.52
script: admin.cgi
fields: Vehicle, Year, Price, Drive Train, Transmission, Body, Engine,
Description, Color, Miles

***

BugsNotHugs
Shared Vulnerability Disclosure Account

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] AssetsSoSimple supplier_admin.php Supplier Field XSS

2009-11-19 Thread Bugs NotHugs
product: AssetsSoSimple
version tested: 0.33
vendor URL: http://assetssosimple.sourceforge.net/
script: supplier_admin.php
field: Supplier

ooo

BugsNotHugs
Shared Vulnerability Disclosure Account

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/