[Full-disclosure] n3td3v / Andrew Wallace's psychological profile
Earlier this year, a very well educated FD member posted the psychological profile of Mr. Wallace. (Found here: http://seclists.org/fulldisclosure/2009/Jan/415 ) Interesting to view in retrospect, because I find it depicts him to a T. This profile is almost like an instruction set for n3td3v's life. A self-fulfilling prophecy if you will. An eery example: Anyone here remember how n3td3v posted as full-censorship a few months ago claiming to be a martyr? http://seclists.org/fulldisclosure/2009/Oct/45 . His profile states "Martyr glamorizations" aren't just n3td3v trolling you, he really considers himself as such. All the while you go out and bang your girlfriends and have fun with your friends, he's thinking the world revolves around him. Another example is his frequent, obvious, though earnest attempts at using pseudonyms to defend himself. Often speaking of himself in third-person, as a hired lawyer, a hacker, zealous advocate, an underground "Full censorship" movement, etc. It's possible as of late he may have done another attention-seeking false suicide. He hasn't updated his Google Page or Twitter in over 48 hours. I'm seriously worried. He may be wasting taxpayer money with fake suicide attempts. He's trolling society now. I would like to post Andrew Wallace's psychological profile verbatim: === Psychological profile of n3td3v / Andrew Wallace === Andrew is a special kind of crazya friend of mine and former colleague who I highly respect (practicing Psych., who profiles individuals for a real doggone intel agency...alas, not MI-Jive) labeled Andrew as a probable schizophrenic with grandiose idealizations. These types of people usually can't hold a job. The most active period of delusions occur from 17-33, some think the drop-off may be due to decreased levels of testosterone as they age. Intelligence agency intrigue & innuendo is a classic manifestation, along with imaginary friends, martyr glamorizations, alternate personalities and repeated exclamations that they will curtail their behaviors, only to come back, roaringly, foisting themselves upon a group/friend circle with a different guise or mission. Some have said it resembles alcoholic behavior in the promises "to quit..." They constantly need an audience, since 'friends' are temporal at best...they churn through relationships like shit flowing through a goose...as people become estranged/exasperated with the constant epiphany's, revelations and God-like interpretations. Stranger yet is that people like this can be wonderfully charming in real-lifefunny for awhile, but as they age, they start losing boyish charms that previously were forgiven...promulgating even more outlandish behavior as grow older. Sound familiar? We have a baseline here, folks. Also notice he hasn't written anything technical -- it's mostly outlandish hypothesis with pointers to..not infosec...but Andrew. They usually refuse medications to control themselves, because it dulls the essence of what they're trying to portray: someone mysterious, withholding critical information, being the sole-source of knowledge that might somehow change the world. IMHO, I would venture to say Andrew has attempted suicide -- his type is usually unsuccessful, indeed, it's not a suicide attempt but an attention-seeking event. He's bat-shit-fucking-crazy-nuts, but sane enough to fool someone unfamiliar with his MO. That's what is so aggravating about this particular form of mental illness...once again, as long as there's a receptive audience, the monkey will feel the compulsion to perform. It's akin to sexual gratification for him to see he's the subject of people's ire...don't forget that. This type of person will emotionally soul-suck everyone he comes in contact with, and make up dramas if only to suck more people in, because really, it's all about the adulation of n3td3v/Andrew/, nothing else. Solutions: There's a few, but I wouldn't want to be responsible for the end result; once again, n3td3v is a human たまごっち (Tamagotchi) and should be treated accordingly. Source: http://seclists.org/fulldisclosure/2009/Jan/415 ( - o z - ) __ Do You Yahoo!? Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen Massenmails. http://mail.yahoo.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.
Feel free to share your feelings with Greenbaum's boss: Kevin Mowbray Phone: 314-340-8970 E-mail: kmowb...@post-dispatch.com --- mrx schrieb am Fr, 20.11.2009: Von: mrx Betreff: Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer. An: full-disclosure@lists.grok.org.uk Datum: Freitag, 20. November 2009, 0:16 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 No problem regarding the personal post, I have made the same mistake myself. I also see what you mean regarding the language of the privacy statement. "unauthorised use" could be interpreted as any use that has not been given explicit approval before the fact. Weasel words imho. And Mr Holstein if this was the point you were trying to make, I accept it. regards mrx dramacrat wrote: > Sorry, forgot to reply-to-all. > 2009/11/20 dramacrat > >> They're ORs, unfortunately. The language is unclear but it seems to be one >> of those infernal boilerplate pieces of shit that basically invalidate the >> assurances as to privacy. >> >> You could still probably press the suit. "Unauthorised use" has recently >> been defined and redefined, it's an evolving piece of law and if you have >> the resources to get a jury trial they'll *want* to find in favor of the >> plaintiff, which is more important than you might expect. >> >> 2009/11/20 mrx >> >> -BEGIN PGP SIGNED MESSAGE- >>> Hash: SHA1 >>> >>> Michael Holstein wrote: > What Greenbaum did was against the privacy policy of the site: > You seem to be missing the part where the comment was removed (several times) and re-posted. From : http://www.stltoday.com/help/privacy-policy "..to protect against misuse or unauthorized use of our web sites" Cheers, Michael Holstein Cleveland State University >>> >>> So what? Ban the IP address. Admittedly a childish comment but the site is >>> hardly one that is frequented by children. >>> imho Mr K. Greenbaum should be fired and sued. >>> >>> And Mr Holstein you seem to be using your quote above out of context... >>> >>> Compliance with Legal Process >>> We may disclose personal information if we or one of our affiliated >>> companies is required by law to disclose personal information, or if we >>> believe in good faith that such action is necessary to comply with a law >>> or some legal process, to protect or defend our rights and property, to >>> protect against misuse or unauthorized use of our web sites or to protect >>> the personal safety or property of our users or the public. >>> >>> INAL, however I ask where is the legal process in this matter? >>> >>> >>> regards >>> mrx >>> >>> - -- >>> I am not an expert, I have much to learn, I make mistakes. >>> My words are just opinions which may or may not reflect the truth. >>> Be kind to others, yet trust no one. >>> >>> http://www.propergander.org.uk >>> -BEGIN PGP SIGNATURE- >>> Version: GnuPG v1.4.2 (MingW32) >>> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ >>> >>> iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ >>> GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo >>> 14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO >>> WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry >>> EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT >>> qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw== >>> =tE1f >>> -END PGP SIGNATURE- >>> >>> ___ >>> Full-Disclosure - We believe in it. >>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >>> Hosted and sponsored by Secunia - http://secunia.com/ >>> >> > - -- I am not an expert, I have much to learn, I make mistakes. My words are just opinions which may or may not reflect the truth. Be kind to others, yet trust no one. http://www.propergander.org.uk -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEVAwUBSwXfxbIvn8UFHWSmAQL9SQgAvu4cN5dby3AUGPtYyX0NnHvVUEdEeJ6Y yvbKgi5/VOT9uqAnoRWRABLwJh3dcrCpzKA9gjSWpyalqU/YzEQvfB/iFI1QQmZg 9u6N/mZgGkAW1WYeM54AnawrYW8a+2sF1c1QWBhX0gYRGNctOs/Gi7ObvndDb57Q k4CAp537TqXLzbUwzPkoqNBoaDhBCa4CEkONvFYJtVbUTwmry8gH55tWXI48Fz6/ vWaw9XY5SDUmxz1QYnfji0YKg3OR2YPfdxKxRATdFba4iZa8S3AiOgxZ/OXDNewh aeILmusBEeCjG+2Wx//EB6lTf5xr9sr7CMHziG+PZ/EsW/GctyNw1A== =WZoJ -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ __ Do You Yahoo!? Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen Massenmails. http://mail.yahoo.com ___ Full-Disclosure - We believe in it. Charter: http://lis
Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.
Mr. Kurt Greenbaum made a mistake. Privacy violated, because there are other mechanism's like baninig the IP, email or whatever is necessary to submit the post. If this fails then you should conntact the ISP of the "spammer" based on the IP. -- netinfinity ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] SecurityReason: KDE KDELibs 4.3.3 Remote Array Overrun (Arbitrary code execution)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ KDE KDELibs 4.3.3 Remote Array Overrun (Arbitrary code execution) ] Author: Maksymilian Arciemowicz and sp3x http://SecurityReason.com Date: - - Dis.: 07.05.2009 - - Pub.: 20.11.2009 CVE: CVE-2009-0689 Risk: High Remote: Yes Affected Software: - - KDELibs 4.3.3 NOTE: Prior versions may also be affected. Original URL: http://securityreason.com/achievement_securityalert/74 - --- 0.Description --- KDELibs is a collection of libraries built on top of Qt that provides frameworks and functionality for developers of KDE-compatible software. The KDELibs libraries are licensed under LGPL. - --- 1. KDE KDELibs 4.3.2 Remote Array Overrun (Arbitrary code execution) --- The main problem exist in dtoa implementation. KDE has a very similar dtoa algorithm to the BSD, Chrome and Mozilla products. Problem exist in dtoa.cpp file http://websvn.kde.org/tags/KDE/4.3.3/kdelibs/kjs/dtoa.cpp?revision=1042584&view=markup and it is the same like SREASONRES:20090625. http://securityreason.com/achievement_securityalert/63 but fix for SREASONRES:20090625, used by openbsd was not good. More information about fix for openbsd and similars SREASONRES:20091030, http://securityreason.com/achievement_securityalert/69 We can create any number of float, which will overwrite the memory. In Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and it is possible to call 16<= elements of freelist array. - --- 2. Proof of Concept (PoC) --- - --- var a=0.; - --- If we use konqueror to see this PoC, konqueror will crash. For example - --- var a=0.; - --- Program received signal SIGSEGV, Segmentation fault. [Switching to process 24845, thread 0x7e6e6800] 0x090985c3 in diff () from /usr/local/lib/libkjs.so.5.0 0x06db85c3 : mov%esi,(%ecx) #0 0x090985c3 in diff () from /usr/local/lib/libkjs.so.5.0 #1 0x0909901b in kjs_strtod () from /usr/local/lib/libkjs.so.5.0 #2 0x090738e5 in KJS::Lexer::lex () from /usr/local/lib/libkjs.so.5.0 #3 0x0907300c in kjsyylex () from /usr/local/lib/libkjs.so.5.0 #4 0x09072f86 in kjsyyparse () from /usr/local/lib/libkjs.so.5.0 #5 0x090805cf in KJS::Parser::parse () from /usr/local/lib/libkjs.so.5.0 #6 0x0908337f in KJS::InterpreterImp::evaluate () (gdb) i r eax0x0 0 ecx0x220ff000 571469824 edx0x0 0 ebx0x220fbb00 571456256 esp0xcfbc04e0 0xcfbc04e0 ebp0xcfbc0518 0xcfbc0518 esi0xc71c71c7 -954437177 edi0x0 0 eip0x21415c30x21415c3 esi=0x71c71c7 - --- 3. SecurityReason Note --- Officialy SREASONRES:20090625 has been detected in: - - OpenBSD - - NetBSD - - FreeBSD - - MacOSX - - Google Chrome - - Mozilla Firefox - - Mozilla Seamonkey - - KDE (example: konqueror) - - Opera - - K-Meleon This list is not yet closed. US-CERT declared that will inform all vendors about this issue, however, they did not do it. Even greater confusion caused new CVE number "CVE-2009-1563". Secunia has informed that this vulnerability was only detected in Mozilla Firefox, but nobody was aware that the problem affects other products like ( KDE, Chrome ) and it is based on "CVE-2009-0689". After some time Mozilla Foundation Security Advisory ("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";) was updated with note : "The underlying flaw in the dtoa routines used by Mozilla appears to be essentially the same as that reported against the libc gdtoa routine by Maksymilian Arciemowicz ( CVE-2009-0689)". This fact ( new CVE number for Firefox Vulnerability )and PoC in javascript (from Secunia), forced us to official notification all other vendors. We publish all the individual advisories, to formally show all vulnerable software and to avoid wrong CVE number. We do not see any other way to fix this issue in all products. - --- 4. Fix --- NetBSD fix (optimal): http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h OpenBSD fix: http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/sum.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorx.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtord.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorQ.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtof.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtodg.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtod.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/smisc.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/hdtoa.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gethex.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gdtoa.h http://www.openbsd.org/
[Full-disclosure] SecurityReason: Opera 10.01 Remote Array Overrun (Arbitrary code execution)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ Opera 10.01 Remote Array Overrun (Arbitrary code execution) ] Author: Maksymilian Arciemowicz and sp3x http://SecurityReason.com Date: - - Dis.: 07.05.2009 - - Pub.: 20.11.2009 CVE: CVE-2009-0689 Risk: High Remote: Yes Affected Software: - - Opera 10.01 - - Opera 10.10 Beta NOTE: Prior versions may also be affected. Original URL: http://securityreason.com/achievement_securityalert/73 - --- 0.Description --- Opera is a Web browser and Internet suite developed by the Opera Software company. The browser handles common Internet-related tasks such as displaying Web sites, sending and receiving e-mail messages, managing contacts, IRC online chatting, downloading files via BitTorrent, and reading Web feeds. Opera is offered free of charge for personal computers and mobile phones. - --- 1. Opera 10.01 Remote Array Overrun (Arbitrary code execution) --- The main problem exist in dtoa implementation. Opera has a very similar dtoa algorithm to the BSD, Chrome and Mozilla products. It is the same issue like SREASONRES:20090625. http://securityreason.com/achievement_securityalert/63 but fix for SREASONRES:20090625, used by openbsd was not good. More information about fix for openbsd and similars SREASONRES:20091030, http://securityreason.com/achievement_securityalert/69 We can create any number of float, which will overwrite the memory. In Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and it is possible to call 16<= elements of freelist array. - --- 2. Proof of Concept (PoC) --- - --- var a=0.; - --- If we use Opera to see this PoC, Opera will crash. For example - --- var a=0.; - --- OPERA-CRASHLOG V1 desktop 10.01 1844 windows Opera.exe 1844 caused exception C005 at address 67956906 (Base: 40) Registers: EAX=01165C40 EBX=0592064C ECX=A0D589D4 EDX=4200 ESI=C20471EC EDI= EBP=0012E384 ESP=0012E2FC EIP=67956906 FLAGS=00010202 CS=001B DS=0023 SS=0023 ES=0023 FS=003B GS= FPU stack: C020A38F66534266F000 C020A38F66534266F000 3FFBE38E38E38E38D800 3FC78000 1001 0BBE0004 2EBA804E2FDE SW=0122 CW=027F 127# gdb -q opera opera.core ... Program terminated with signal 11, Segmentation fault. #0 0x2960307b in ?? () ... (gdb) i r eax0x71c71c71 1908874353 ecx0x2aa03be4 715144164 edx0x0 0 ebx0x296177f8 694253560 esp0xbfbfb650 0xbfbfb650 ebp0xbfbfb698 0xbfbfb698 esi0x2962d000 694341632 edi0x0 0 eip0x2960307b 0x2960307b ... (gdb) x/100x ($esi)-90 0x2962cfa6: 0x71c71c71 0x1c71c71c 0xc71c71c7 0x71c71c71 0x2962cfb6: 0x1c71c71c 0xc71c71c7 0x71c71c71 0x1c71c71c 0x2962cfc6: 0xc71c71c7 0x71c71c71 0x1c71c71c 0xc71c71c7 0x2962cfd6: 0x71c71c71 0x1c71c71c 0xc71c71c7 0x71c71c71 0x2962cfe6: 0x1c71c71c 0xc71c71c7 0x71c71c71 0x1c71c71c 0x2962cff6: 0xc71c71c7 0x71c71c71 Cannot access memory at address 0x2962cffe ... - --- 3. SecurityReason Note --- Officialy SREASONRES:20090625 has been detected in: - - OpenBSD - - NetBSD - - FreeBSD - - MacOSX - - Google Chrome - - Mozilla Firefox - - Mozilla Seamonkey - - KDE (example: konqueror) - - Opera - - K-Meleon This list is not yet closed. US-CERT declared that will inform all vendors about this issue, however, they did not do it. Even greater confusion caused new CVE number "CVE-2009-1563". Secunia has informed that this vulnerability was only detected in Mozilla Firefox, but nobody was aware that the problem affects other products like ( KDE, Chrome ) and it is based on "CVE-2009-0689". After some time Mozilla Foundation Security Advisory ("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";) was updated with note : "The underlying flaw in the dtoa routines used by Mozilla appears to be essentially the same as that reported against the libc gdtoa routine by Maksymilian Arciemowicz ( CVE-2009-0689)". This fact ( new CVE number for Firefox Vulnerability )and PoC in javascript (from Secunia), forced us to official notification all other vendors. We publish all the individual advisories, to formally show all vulnerable software and to avoid wrong CVE number. We do not see any other way to fix this issue in all products. - --- 4. Fix --- Opera fix: The vulnerability was fixed in the latest release candidate Opera RC3 : http://snapshot.opera.com/windows/Opera_1010_1890_in.exe In shortly time we can expect the final verion of Opera with the fix. NetBSD fix (optimal): http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h OpenBSD fix: http://www.openbsd.org/cgi-bin
[Full-disclosure] SecurityReason: K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) ] Author: Maksymilian Arciemowicz and sp3x http://SecurityReason.com Date: - - Dis.: 07.05.2009 - - Pub.: 20.11.2009 CVE: CVE-2009-0689 Risk: High Remote: Yes Affected Software: - - K-Meleon 1.5.3 NOTE: Prior versions may also be affected. Original URL: http://securityreason.com/achievement_securityalert/72 - --- 0.Description --- K-Meleon is an extremely fast, customizable, lightweight web browser based on the Gecko layout engine developed by Mozilla which is also used by Firefox. K-Meleon is free, open source software released under the GNU General Public License and is designed specifically for Microsoft Windows (Win32) operating systems. - --- 1. K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) --- The main problem exist in dtoa implementation. K-Meleon has the same dtoa as a KDE, Opera and all BSD systems. This issue has been fixed in Firefox 3.5.4 and fix http://securityreason.com/achievement_securityalert/63 but fix for SREASONRES:20090625, used by openbsd was not good. More information about fix for openbsd and similars SREASONRES:20091030, http://securityreason.com/achievement_securityalert/69 We can create any number of float, which will overwrite the memory. In Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and it is possible to call 16<= elements of freelist array. - --- 2. Proof of Concept (PoC) --- - --- var a=0.; - --- K-Meleon will crash with Unhandled exception at 0x01800754 in k-meleon.exe: 0xC005: Access violation reading location 0x0bc576ec. 01800754 mov eax,dword ptr [ecx] EAX 0002 ECX 0BC576EC EDI 028FEB51 - --- 3. SecurityReason Note --- Officialy SREASONRES:20090625 has been detected in: - - OpenBSD - - NetBSD - - FreeBSD - - MacOSX - - Google Chrome - - Mozilla Firefox - - Mozilla Seamonkey - - KDE (example: konqueror) - - Opera - - K-Meleon This list is not yet closed. US-CERT declared that will inform all vendors about this issue, however, they did not do it. Even greater confusion caused new CVE number "CVE-2009-1563". Secunia has informed that this vulnerability was only detected in Mozilla Firefox, but nobody was aware that the problem affects other products like ( KDE, Chrome ) and it is based on "CVE-2009-0689". After some time Mozilla Foundation Security Advisory ("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";) was updated with note : "The underlying flaw in the dtoa routines used by Mozilla appears to be essentially the same as that reported against the libc gdtoa routine by Maksymilian Arciemowicz ( CVE-2009-0689)". This fact ( new CVE number for Firefox Vulnerability )and PoC in javascript (from Secunia), forced us to official notification all other vendors. We publish all the individual advisories, to formally show all vulnerable software and to avoid wrong CVE number. We do not see any other way to fix this issue in all products. Please note: Patch used in Firefox 3.5.4 does not fully solve the problem. Dtoa algorithm is not optimal and allows remote Denial of Service in Firefox 3.5.5 giving long float number. - --- 4. Fix --- NetBSD fix (optimal): http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h OpenBSD fix: http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/sum.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorx.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtord.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorQ.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtof.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtodg.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtod.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/smisc.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/hdtoa.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gethex.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/gdtoa.h http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/dtoa.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/dmisc.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/stdio/vfprintf.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/arch/vax/gdtoa/strtof.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorxL.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorf.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtordd.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopxL.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopx.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopf.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtopdd.c http://www.openbsd.org
[Full-disclosure] SecurityReason: SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [ SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution) ] Author: Maksymilian Arciemowicz and sp3x http://SecurityReason.com Date: - - Dis.: 07.05.2009 - - Pub.: 20.11.2009 CVE: CVE-2009-0689 Risk: High Remote: Yes Affected Software: - - SeaMonkey 1.1.18 Fixed in: - - SeaMonkey 2.0 NOTE: Prior versions may also be affected. Original URL: http://securityreason.com/achievement_securityalert/71 - --- 0.Description --- The SeaMonkey project is a community effort to develop the SeaMonkey all-in-one internet application suite (see below). Such a software suite was previously made popular by Netscape and Mozilla, and the SeaMonkey project continues to develop and deliver high-quality updates to this concept. Containing an Internet browser, email & newsgroup client with an included web feed reader, HTML editor, IRC chat and web development tools, SeaMonkey is sure to appeal to advanced users, web developers and corporate users. - --- 1. SeaMonkey 1.1.18 Remote Array Overrun (Arbitrary code execution) --- The main problem exist in dtoa implementation. SeaMonkey has the same dtoa as a KDE, Opera and all BSD systems. This issue has been fixed in Firefox 3.5.4 and fix http://bonsai.mozilla.org/cvsview2.cgi?diff_mode=context&whitespace_mode=show&file=jsdtoa.c&branch=&root=/cvsroot&subdir=mozilla/js/src&command=DIFF_FRAMESET&rev1=3.41&rev2=3.42 has been used to patch SeaMonkey 2.0. This flaw has been detected in may 2009 and signed SREASONRES:20090625. http://securityreason.com/achievement_securityalert/63 but fix for SREASONRES:20090625, used by openbsd was not good. More information about fix for openbsd and similars SREASONRES:20091030, http://securityreason.com/achievement_securityalert/69 We can create any number of float, which will overwrite the memory. In Kmax has defined 15. Functions in dtoa, don't checks Kmax limit, and it is possible to call 16<= elements of freelist array. - --- 2. Proof of Concept (PoC) --- - --- var a=0.; - --- If we use SeaMonkey to see this PoC, SeaMonkey will crash. For example - --- var a=0.; - --- 127# gdb seamonkey-bin seamonkey-bin.core ... #0 0x28df0ecb in ?? () ... (gdb) i r eax0x0 0 ecx0x2 2 edx0xbfbfd2fc -1077947652 ebx0x28da9b6c 685415276 esp0xbfbfd2ac 0xbfbfd2ac ebp0xbfbfd2c8 0xbfbfd2c8 esi0xb 11 edi0xb 11 eip0x28df0ecb 0x28df0ecb ... esi = esi = 11 - --- 3. SecurityReason Note --- Officialy SREASONRES:20090625 has been detected in: - - OpenBSD - - NetBSD - - FreeBSD - - MacOSX - - Google Chrome - - Mozilla Firefox - - Mozilla Seamonkey - - KDE (example: konqueror) - - Opera - - K-Meleon This list is not yet closed. US-CERT declared that will inform all vendors about this issue, however, they did not do it. Even greater confusion caused new CVE number "CVE-2009-1563". Secunia has informed that this vulnerability was only detected in Mozilla Firefox, but nobody was aware that the problem affects other products like ( KDE, Chrome ) and it is based on "CVE-2009-0689". After some time Mozilla Foundation Security Advisory ("http://www.mozilla.org/security/announce/2009/mfsa2009-59.html";) was updated with note : "The underlying flaw in the dtoa routines used by Mozilla appears to be essentially the same as that reported against the libc gdtoa routine by Maksymilian Arciemowicz ( CVE-2009-0689)". This fact ( new CVE number for Firefox Vulnerability )and PoC in javascript (from Secunia), forced us to official notification all other vendors. We publish all the individual advisories, to formally show all vulnerable software and to avoid wrong CVE number. We do not see any other way to fix this issue in all products. Please note: Patch used in Firefox 3.5.4 does not fully solve the problem. Dtoa algorithm is not optimal and allows remote Denial of Service in Firefox 3.5.5 giving long float number. - --- 4. Fix --- NetBSD fix (optimal): http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h OpenBSD fix: http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/sum.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorx.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtord.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtorQ.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtof.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtodg.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/strtod.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/smisc.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/hdtoa.c http://www.openbsd.org/cgi-b
Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 No problem regarding the personal post, I have made the same mistake myself. I also see what you mean regarding the language of the privacy statement. "unauthorised use" could be interpreted as any use that has not been given explicit approval before the fact. Weasel words imho. And Mr Holstein if this was the point you were trying to make, I accept it. regards mrx dramacrat wrote: > Sorry, forgot to reply-to-all. > 2009/11/20 dramacrat > >> They're ORs, unfortunately. The language is unclear but it seems to be one >> of those infernal boilerplate pieces of shit that basically invalidate the >> assurances as to privacy. >> >> You could still probably press the suit. "Unauthorised use" has recently >> been defined and redefined, it's an evolving piece of law and if you have >> the resources to get a jury trial they'll *want* to find in favor of the >> plaintiff, which is more important than you might expect. >> >> 2009/11/20 mrx >> >> -BEGIN PGP SIGNED MESSAGE- >>> Hash: SHA1 >>> >>> Michael Holstein wrote: > What Greenbaum did was against the privacy policy of the site: > You seem to be missing the part where the comment was removed (several times) and re-posted. From : http://www.stltoday.com/help/privacy-policy "..to protect against misuse or unauthorized use of our web sites" Cheers, Michael Holstein Cleveland State University >>> >>> So what? Ban the IP address. Admittedly a childish comment but the site is >>> hardly one that is frequented by children. >>> imho Mr K. Greenbaum should be fired and sued. >>> >>> And Mr Holstein you seem to be using your quote above out of context... >>> >>> Compliance with Legal Process >>> We may disclose personal information if we or one of our affiliated >>> companies is required by law to disclose personal information, or if we >>> believe in good faith that such action is necessary to comply with a law >>> or some legal process, to protect or defend our rights and property, to >>> protect against misuse or unauthorized use of our web sites or to protect >>> the personal safety or property of our users or the public. >>> >>> INAL, however I ask where is the legal process in this matter? >>> >>> >>> regards >>> mrx >>> >>> - -- >>> I am not an expert, I have much to learn, I make mistakes. >>> My words are just opinions which may or may not reflect the truth. >>> Be kind to others, yet trust no one. >>> >>> http://www.propergander.org.uk >>> -BEGIN PGP SIGNATURE- >>> Version: GnuPG v1.4.2 (MingW32) >>> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ >>> >>> iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ >>> GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo >>> 14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO >>> WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry >>> EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT >>> qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw== >>> =tE1f >>> -END PGP SIGNATURE- >>> >>> ___ >>> Full-Disclosure - We believe in it. >>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >>> Hosted and sponsored by Secunia - http://secunia.com/ >>> >> > - -- I am not an expert, I have much to learn, I make mistakes. My words are just opinions which may or may not reflect the truth. Be kind to others, yet trust no one. http://www.propergander.org.uk -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEVAwUBSwXfxbIvn8UFHWSmAQL9SQgAvu4cN5dby3AUGPtYyX0NnHvVUEdEeJ6Y yvbKgi5/VOT9uqAnoRWRABLwJh3dcrCpzKA9gjSWpyalqU/YzEQvfB/iFI1QQmZg 9u6N/mZgGkAW1WYeM54AnawrYW8a+2sF1c1QWBhX0gYRGNctOs/Gi7ObvndDb57Q k4CAp537TqXLzbUwzPkoqNBoaDhBCa4CEkONvFYJtVbUTwmry8gH55tWXI48Fz6/ vWaw9XY5SDUmxz1QYnfji0YKg3OR2YPfdxKxRATdFba4iZa8S3AiOgxZ/OXDNewh aeILmusBEeCjG+2Wx//EB6lTf5xr9sr7CMHziG+PZ/EsW/GctyNw1A== =WZoJ -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.
They're ORs, unfortunately. The language is unclear but it seems to be one of those infernal boilerplate pieces of shit that basically invalidate the assurances as to privacy. You could still probably press the suit. "Unauthorised use" has recently been defined and redefined, it's an evolving piece of law and if you have the resources to get a jury trial they'll *want* to find in favor of the plaintiff, which is more important than you might expect. 2009/11/20 mrx > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Michael Holstein wrote: > >> What Greenbaum did was against the privacy policy of the site: > >> > > > > You seem to be missing the part where the comment was removed (several > > times) and re-posted. > > > > From : http://www.stltoday.com/help/privacy-policy > > > > "..to protect against misuse or unauthorized use of our web sites" > > > > > > Cheers, > > > > Michael Holstein > > Cleveland State University > > > So what? Ban the IP address. Admittedly a childish comment but the site is > hardly one that is frequented by children. > imho Mr K. Greenbaum should be fired and sued. > > And Mr Holstein you seem to be using your quote above out of context... > > Compliance with Legal Process > We may disclose personal information if we or one of our affiliated > companies is required by law to disclose personal information, or if we > believe in good faith that such action is necessary to comply with a law or > some legal process, to protect or defend our rights and property, to > protect against misuse or unauthorized use of our web sites or to protect > the personal safety or property of our users or the public. > > INAL, however I ask where is the legal process in this matter? > > > regards > mrx > > - -- > I am not an expert, I have much to learn, I make mistakes. > My words are just opinions which may or may not reflect the truth. > Be kind to others, yet trust no one. > > http://www.propergander.org.uk > -BEGIN PGP SIGNATURE- > Version: GnuPG v1.4.2 (MingW32) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ > > iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ > GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo > 14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO > WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry > EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT > qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw== > =tE1f > -END PGP SIGNATURE- > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael Holstein wrote: >> What Greenbaum did was against the privacy policy of the site: >> > > You seem to be missing the part where the comment was removed (several > times) and re-posted. > > From : http://www.stltoday.com/help/privacy-policy > > "..to protect against misuse or unauthorized use of our web sites" > > > Cheers, > > Michael Holstein > Cleveland State University So what? Ban the IP address. Admittedly a childish comment but the site is hardly one that is frequented by children. imho Mr K. Greenbaum should be fired and sued. And Mr Holstein you seem to be using your quote above out of context... Compliance with Legal Process We may disclose personal information if we or one of our affiliated companies is required by law to disclose personal information, or if we believe in good faith that such action is necessary to comply with a law or some legal process, to protect or defend our rights and property, to protect against misuse or unauthorized use of our web sites or to protect the personal safety or property of our users or the public. INAL, however I ask where is the legal process in this matter? regards mrx - -- I am not an expert, I have much to learn, I make mistakes. My words are just opinions which may or may not reflect the truth. Be kind to others, yet trust no one. http://www.propergander.org.uk -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEVAwUBSwXFRrIvn8UFHWSmAQIwtwf/VNGjwG1wW7wd2BlUYf1XiQyG+DnjUGwQ GLrHcda/hGBw912diOjSGfVEe3jZSgfrK3SAH2lIrRfMK/I+n6IJxzKOks41Ojmo 14DsWiuc/58aAF1Y0heK94Wm1jfzIqMx9GjR7iKLKKAW94YULyCh90xRgwIToNeO WsxT0wP+f5XvZubCpXPVRGQV42XW1kg84t5dzPZXkjiii5dL6hSF7XBOLOrBejry EMw+Eh3RUy1Jm4pjlzOwOUhm0BlHdYwzf+GPNs7X+wCE975gZ6K5P8T+UdvJP7nT qL/jC7S8qNyVi2SBlURKLRaJm50GYv/dY9QDFLwWklcflymw67fMkw== =tE1f -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.
> > What Greenbaum did was against the privacy policy of the site: > You seem to be missing the part where the comment was removed (several times) and re-posted. From : http://www.stltoday.com/help/privacy-policy "..to protect against misuse or unauthorized use of our web sites" Cheers, Michael Holstein Cleveland State University ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Meet Kurt Greenbaum, Director of Social Media, St. Louis Post-Dispatch, Reports commenter to employer.
I smell a lawsuit coming on for our friend Greenbaum. "ReadWriteWeb has an article up today discussing an incident in which a school employee lost his job after leaving a comment on the website of the St. Louis Post-Dispatch newspaper. After the school employee responded to the newspaper's poll of 'the strangest thing you've ever eaten' with a feline-inspired vulgarity, Kurt Greenbaum, the site's director of social media, tracked down the commenter's identity through his IP address and reported him to school officials. When confronted, the school employee resigned from his job." http://yro.slashdot.org/story/09/11/19/0526239/Vulgar-Comment-On-Newspaper-Site-Costs-Man-His-Job The comment in question: "I have eaten many different animals (or at least parts of them), including rattlesnake, crocodile, alligator, iguana, turtle, and many different molluscs, arthropods, echinoids, and whatnot from sea or river. I have also eaten squirrel, bear, dog, and cat. So, I can say I have eaten pussy, and you can interpret or misinterpret it any way you want. Oh, and woof-woof, too." Chilling free speech? It must invade the privacy of the poster to call his place of work over a comment like this. What Greenbaum did was against the privacy policy of the site: "We will not share individual user information with third parties unless the user has specifically approved the release of that information" So should people who run newspaper blogs call up the place of work to report they said an innuendo about cats? http://igreenbaum.com I'll be the first to say it. Kurt Greenbaum is a miraculous hypocrite who's career has basically been ruined. He may as well be like Chris Hansen and expose pedophiles. http://www.youtube.com/watch?v=8CgUXWIOLLw __ Do You Yahoo!? Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen Massenmails. http://mail.yahoo.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Impersonation is a against the law.
stopped reading full-disclosure about a year ago, most of the discussions was about netdev. now resumed my subscription: still a lot of talks about netdev. I'm glad that our constantly evolving universe has such islands of stability and predictability. but it's a pity that these islands populated mostly by netnev. > kaibelf escreveu: >> List, >> >> It has come to my attention that my client is being impersonated. >> >> Securityfocus slandered n3td3v in 2006 causing him to drop out of >> university. >> >> n3td3v hasn't been the same health wise since he was targeted by >> Securityfocus and HackerFactor. >> >> n3td3v has had breakdowns from being accused of being a troll or >> accused of being involved with trolls. >> >> It was hurtful for n3td3v to be labelled a "security troll" after >> his years of dedication to fighting cybercrime and reporting >> intelligence to vendors. >> >> It's also been hurtful that individual users of Full-disclosure >> mailing list have targeted him in calling him a troll, everything >> n3td3v has said is sincere and is nothing to do with trolling. >> >> n3td3v was wrongfully banned from Full-disclosure mailing list >> after anonymous users decided to write emails with false truths >> about n3td3v, to upset n3td3v to get a reaction out of him. >> >> There is now a problem with people pretending to be n3td3v and >> pretending to be speaking on behalf of him, this is a really >> damaging situation for n3td3v. >> >> n3td3v has been unable to share his home grown computer skills with >> anyone due to the personal attacks which have affected his personal >> life. >> >> n3td3v began in 1999 where he learnt how hackers worked and learned >> the tools of the trade, he quickly used his knowledge to pass >> useful information to yahoo about folks who were trying to >> compromise them. >> >> n3td3v went onto Full-disclosure mailing list after a fall out with >> a Yahoo engineer who had used n3td3v's information about hackers to >> get further up the corporate ladder at yahoo. >> >> n3td3v left Full-disclosure mailing list in 2006 to gain official >> qualifications at university, and by October Securityfocus and >> HackerFactor wrongfully post slander about n3td3v. >> >> n3td3v began to think he was being followed in real life such was >> the psychological impact of a good guy being talked about as a bad >> guy by Securityfocus. >> >> n3td3v couldn't take the pressure anymore and dropped out of the >> university course which would have made him a security professional. >> >> It was n3td3v's only chance to get a career in information >> security, now ruined by the folks from Securityfocus, HackerFactor >> and individuals from Full-disclosure mailing list. >> >> n3td3v returned to Full-disclosure mailing list after dropping out >> of university to try and clear his name but was set upon by >> anonymous users who claimed the n3td3v group was fake. >> >> The list administrator of Full-disclosure mailing list took sides >> with the anonymous users who were claiming n3td3v was a troll and a >> liar, the list administrator publicly addressed n3td3v and banned >> him. >> >> After n3td3v was banned from Full-disclosure mailing list in 2009, >> anonymous users started to impersonate him, and claim they were >> speaking on behalf of him to further damage his reputation. >> >> In 2009 n3td3v deleted the n3td3v group (the mailing list for the >> n3td3v group on Google Groups) as the personal attacks continued to >> plague his integrity. >> >> n3td3v remains unemployed as of 2009 and is still suffering >> psychological problems socially and is unable to lead a normal life. >> >> n3td3v is unable to work due to lack of official qualifications and >> the personal problems he has due to the personal attacks placed >> upon him, n3td3v however without official qualifications is a very >> capable candidate for a future role in the information security >> industry. >> >> It's a sad case, let's hope in future we don't treat our young >> people in a way that they can't shine to show their talents. >> >> Stop Cyberbullying >> http://www.stopcyberbullying.org/ >> >> What is Cyberbullying >> http://www.direct.gov.uk/en/YoungPeople/HealthAndRelationships/Bully >> ing/DG_070501 >> >> Laugh at it and you're part of it >> http://yp.direct.gov.uk/cyberbullying/ >> >> Wikipedia entry on Cyber-bullying >> http://en.wikipedia.org/wiki/Cyber-bullying >> >> False statements made by Securityfocus >> http://www.securityfocus.com/news/11419 >> >> False statements made by HackerFactor >> http://www.hackerfactor.com/papers/who_is_n3td3v.pdf >> >> >> --- >> >> About Andrew Wallace: >> >> Q: How did you get into Cyber Security? >> A: From 1999 I learned knowledge on how hackers operate and the >> tools of the trade, soon I had learned enough to start passing >> useful information to Yahoo security representatives on hackers who >> were trying to compromise the
Re: [Full-disclosure] Impersonation is a against the law.
STOP THAT BULLSHIT! It's not funny anymore. kaibelf escreveu: > List, > > It has come to my attention that my client is being impersonated. > > Securityfocus slandered n3td3v in 2006 causing him to drop out of > university. > > n3td3v hasn't been the same health wise since he was targeted by > Securityfocus and HackerFactor. > > n3td3v has had breakdowns from being accused of being a troll or > accused of being involved with trolls. > > It was hurtful for n3td3v to be labelled a "security troll" after > his years of dedication to fighting cybercrime and reporting > intelligence to vendors. > > It's also been hurtful that individual users of Full-disclosure > mailing list have targeted him in calling him a troll, everything > n3td3v has said is sincere and is nothing to do with trolling. > > n3td3v was wrongfully banned from Full-disclosure mailing list > after anonymous users decided to write emails with false truths > about n3td3v, to upset n3td3v to get a reaction out of him. > > There is now a problem with people pretending to be n3td3v and > pretending to be speaking on behalf of him, this is a really > damaging situation for n3td3v. > > n3td3v has been unable to share his home grown computer skills with > anyone due to the personal attacks which have affected his personal > life. > > n3td3v began in 1999 where he learnt how hackers worked and learned > the tools of the trade, he quickly used his knowledge to pass > useful information to yahoo about folks who were trying to > compromise them. > > n3td3v went onto Full-disclosure mailing list after a fall out with > a Yahoo engineer who had used n3td3v's information about hackers to > get further up the corporate ladder at yahoo. > > n3td3v left Full-disclosure mailing list in 2006 to gain official > qualifications at university, and by October Securityfocus and > HackerFactor wrongfully post slander about n3td3v. > > n3td3v began to think he was being followed in real life such was > the psychological impact of a good guy being talked about as a bad > guy by Securityfocus. > > n3td3v couldn't take the pressure anymore and dropped out of the > university course which would have made him a security professional. > > It was n3td3v's only chance to get a career in information > security, now ruined by the folks from Securityfocus, HackerFactor > and individuals from Full-disclosure mailing list. > > n3td3v returned to Full-disclosure mailing list after dropping out > of university to try and clear his name but was set upon by > anonymous users who claimed the n3td3v group was fake. > > The list administrator of Full-disclosure mailing list took sides > with the anonymous users who were claiming n3td3v was a troll and a > liar, the list administrator publicly addressed n3td3v and banned > him. > > After n3td3v was banned from Full-disclosure mailing list in 2009, > anonymous users started to impersonate him, and claim they were > speaking on behalf of him to further damage his reputation. > > In 2009 n3td3v deleted the n3td3v group (the mailing list for the > n3td3v group on Google Groups) as the personal attacks continued to > plague his integrity. > > n3td3v remains unemployed as of 2009 and is still suffering > psychological problems socially and is unable to lead a normal life. > > n3td3v is unable to work due to lack of official qualifications and > the personal problems he has due to the personal attacks placed > upon him, n3td3v however without official qualifications is a very > capable candidate for a future role in the information security > industry. > > It's a sad case, let's hope in future we don't treat our young > people in a way that they can't shine to show their talents. > > Stop Cyberbullying > http://www.stopcyberbullying.org/ > > What is Cyberbullying > http://www.direct.gov.uk/en/YoungPeople/HealthAndRelationships/Bully > ing/DG_070501 > > Laugh at it and you're part of it > http://yp.direct.gov.uk/cyberbullying/ > > Wikipedia entry on Cyber-bullying > http://en.wikipedia.org/wiki/Cyber-bullying > > False statements made by Securityfocus > http://www.securityfocus.com/news/11419 > > False statements made by HackerFactor > http://www.hackerfactor.com/papers/who_is_n3td3v.pdf > > > --- > > About Andrew Wallace: > > Q: How did you get into Cyber Security? > A: From 1999 I learned knowledge on how hackers operate and the > tools of the trade, soon I had learned enough to start passing > useful information to Yahoo security representatives on hackers who > were trying to compromise them. > > Q: Why did you start the n3td3v Google Groups group? > A: From 2004 I started the n3td3v group to act as a central hub for > open source intelligence items. > > Q: I invited people from the Full-disclosure mailing list to > utilize the information. > A: It worked pretty well with the user interface, I ended the group > 2009 as it was
Re: [Full-disclosure] Impersonation is a against the law.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 With all due respect, can we please not encourage: kaibelf, Mr Appelbaum, GOBBLES, Jack Bauer, Gary McKinnon etc., etc. regards mrx - -- I am not an expert, I have much to learn, I make mistakes. My words are just opinions which may or may not reflect the truth. Be kind to others, yet trust no one. http://www.propergander.org.uk -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEVAwUBSwVWvbIvn8UFHWSmAQIdsAf/eusdi2x59XcVa0oBtQ2IT/sYAd7gQNtf ksgPqHN5fCOFzXrIxv4yoxhrhfj2Q0M2LtaVCJF/jat6GoVMx8cWTZQnAeBQn6Th QP3zAIayDhJ6rYwxAmOgXPUxKT+568Q6uANbkVQDPAzM/cll0iI2gzip0+DtEhbF 8N4NKbmwgwZ/vaH9kLyab2WHugcfDCwE1faM3Rr6sqfPWsctvrqtKqFyXAYJFKar SM4oLENObmZchjRgsTV1TmHZ+ub7PUmMFIGUQr1jk/wKGO4iwzxvOashyt40rofS Uj+rtU9CAQdGJQvDmozRrNZZqEJHtSr/Xo05Pku9faRDmkxWSbtmEA== =EjgQ -END PGP SIGNATURE- ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Impersonation is a against the law.
On Thu, 19 Nov 2009 00:20:54 GMT, kaibelf said: > n3td3v began to think he was being followed in real life such was > the psychological impact of a good guy being talked about as a bad > guy by Securityfocus. Doood. *Take* *Your* *Meds*. Seriously. Get professional help. If you're a male in your 20's and think you're being followed, it's much more likely you're suffering from paranoid schizophrenia than you've actually become important enough to be followed. Writing about yourself in the third person is wy totally creepy, too. > After n3td3v was banned from Full-disclosure mailing list in 2009, > anonymous users started to impersonate him, and claim they were > speaking on behalf of him to further damage his reputation. Man, bet he wishes he'd been PGP-signing his postings to make it a lot more difficult to post forgeries. ;) > In 2009 n3td3v deleted the n3td3v group (the mailing list for the > n3td3v group on Google Groups) as the personal attacks continued to > plague his integrity. Wow, even his biggest-security-scene-in-the-world group turned against him? Ya know - if everybody keeps telling you the same thing, maybe it's not them, it's you. > n3td3v remains unemployed as of 2009 and is still suffering > psychological problems socially and is unable to lead a normal life. Dood. *Take* *your* *meds*. ;) > Q: Have you been approached for a job in national security? > A: Not so far, although you never know what might happen in the > future. Hmm.. > Undergound websites: > http://www.twitter.com/n3td3v > http://sites.google.com/site/n3td3v > http://n3td3v.blogspot.com > http://www.cnet.com/profile/n3td3v/ - Cyber intelligence comments I suspect that if you don't even understand what 'underground' means, you're not going to get many calls from MI5, 6, or 7. > Andrew Wallace, MI7, iJTTF Interesting, since (a) MI7 has been long defunct and (b) it was the War Office's offices for censorship and propaganda. In other words, MI7 was the War Office's troll and anti-troll efforts. We've not often seen such subtle self-reference in posts relating to n3td3v - usually it's a sledgehammer... http://en.wikipedia.org/wiki/MI7 pgpyN3KqEmj35.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Foxit Reader vulnerability has been fixed
Hello There, This is Grace Wu from Foxit Corporation. We had noticed the Foxit Reader vulnerability posted at http://seclists.org/fulldisclosure/2009/Oct/198. By working with Alin from Secunia.com, Foxit development team has fixed this crash issue and provided the below solution today. Secunia.com has confirmed the issue has been fixed and posted the release of the patch today at http://secunia.com/advisories/37049/. Solution: Update to version 3.1.3.1030 and install the latest Firefox Plugin via the internal update mechanism. Can you please confirm this and help to post this solution on your site too so users who're reading this post http://seclists.org/fulldisclosure/2009/Oct/198 will know this issue has been fixed? Thank you so much! Grace Wu Foxit Corporation www.foxitsoftware.com ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] Impersonation is a against the law.
2009/11/19 kaibelf > List, > > It has come to my attention that my client is being impersonated. > > Your false statements doesn't revert the truth. He was trolling. The rest is not of interest. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] Auto Manager admin.cgi Multiple Field XSS
vendor: interactivetools.com, inc., http://www.interactivetools.com/products/automanager/ product: Auto Manager version: 2.52 script: admin.cgi fields: Vehicle, Year, Price, Drive Train, Transmission, Body, Engine, Description, Color, Miles *** BugsNotHugs Shared Vulnerability Disclosure Account ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] AssetsSoSimple supplier_admin.php Supplier Field XSS
product: AssetsSoSimple version tested: 0.33 vendor URL: http://assetssosimple.sourceforge.net/ script: supplier_admin.php field: Supplier ooo BugsNotHugs Shared Vulnerability Disclosure Account ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/