RE: [Full-Disclosure] TinyURL

2003-10-31 Thread Steffen Kluge
Ahh well, who would not remember the famous unbreakable DBMS...

Their QA department is recruiting again: http://tinyurl.com/dork

Cheers
Steffen.

On Thu, 2003-10-30 at 02:11, Bassett, Mark wrote:
 Anyone want an Asus Motherboard from newegg? :)
 
 http://www.tinyurl/boob
 
 
 Mark Bassett
 Network Administrator
 World media company
 Omaha.com
 402-898-2079
 
 
 -Original Message-
 From: Joel R. Helgeson [mailto:[EMAIL PROTECTED] 
 Sent: Wednesday, October 29, 2003 5:19 AM
 To: [EMAIL PROTECTED]
 Subject: [Full-Disclosure] TinyURL
 
 This is an information leak rather than a real vulnerability. I thought
 it
 might be of interest to others...
 
 www.tinyurl.com is a website that will convert a long url to a short
 one. If
 you want to email a link to say, driving directions on mapquest, the url
 is
 rather long and will get broken up. Tinyurl will store that long link,
 and
 give you a short one that looks like: http://tinyurl.com/abcd
 
 It appears that the last four letters are incremented one letter at a
 time,
 so my URL may be , then aaab, and so forth.
 If people are using the tiny URL service to pass along URL's to
 sensitive
 information, it is easy to guess these URL's.
 
 I recently sent an email to someone with a tinyurl, and decided to
 change
 one character in the url and came across a link to a kiddie porn site...
 http://tinyurl.com/stab
 
 Its a coincidence that stab is a word, but its just a few characters off
 from my URL, staa  stac are also valid URL's.
 
 The TinyURL service should use a randomly created string, rather than
 one
 that is incremented by one character.  Regardless, users of this service
 could have the information they intend to share with others viewed by
 anyone
 that types in the string.
 
 Thoughts?
 
 Joel R. Helgeson
 Director of Networking  Security Services
 SymetriQ Corporation
 
 Give a man fire, and he'll be warm for a day; set a man on fire, and
 he'll
 be warm for the rest of his life.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


signature.asc
Description: This is a digitally signed message part


[Full-Disclosure] IEpatch.exe?

2003-10-31 Thread Jürgen R. Plasser
Has anyone seen this Email before:

From: Microsoft Corp. [EMAIL PROTECTED]
Subject: [Users] You must patch your Internet Explorer.
Text:

Microsoft official patch for IE, AntiBlasterWorm 1.1

Microsoft released a security patch on 20.10.2003 designed
to fix two security vulnerabilities in all versions of its
Internet Explorer web browser.
The worm, W32.Blaster.Worm and its variants infects your
computer through security holes in Microsoft web browser,
Internet Explorer.This worm also has the potential to exploit
a similar issue that is addressed by Microsoft Security
Bulletin MS03-039. These issues concern a vulnerability in the
Remote Procedure Call (RPC) function.
So, we ask you that you patched your version of Internet Explorer.
You must patch your version of Internet Explorer,otherwise,
virus can infect your computer at days.
Your patch-program was attached to this letter.

1. Personal Information
   --
-
---*** Your KEY: HFKFLW63JKGFF348FLD0467D ***
-
---
If you have any questions, please read a file (README.TXT).
2. Technical support
   ---
  For technical support questions, please go to
  http://www.microsoft.com
--
   Thank you for using Microsoft!
--
Attachment: IEpatch.exe, README.txt

The README.txt contains:


Microsoft Internet Explorer official patch AntiBlasterWorm 1.1
==
Version: 1.1
(c) Copyright Microsoft, Inc. All Rights Reserved.

1. Personal Information
   ---
   Your KEY:  HFKFLW63JKGFF348FLD0467D
   ---
Table of Contents
-
  2. Installation instructions
  3. Technical support
Installation instructions
-
  To install AntiBlasterWorm 1.1, you should follow the following simple
steps:
  1. Run the installer program by double-clicking on the
 IEpatch.exe icon.
  3. Follow the instructions of the installer program to install the
 AntiBlasterWorm 1.1.
  4. Done! The Internet Explorer should be patched.
Technical support
-
  For technical support questions, please go to
  http://www.microsoft.com
--
Jürgen
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re:[Full-Disclosure] stcloader.exe / slmss.exe ??

2003-10-31 Thread Tom Koehler
James Bruce wrote
Anyone seeing this file stcloader.exe (Nortons does not detect)
downloading a slmss.exe file (which nortons detects as Downloader.
Trojan)
I just had 3 computers with it all around the same time. Stcloader.exe
is the run part of the registry and in the system32 directory.  After
deleting then both the smlss.exe did not show back up. 
 
Hi James,
looks like FreeScratchCards
look here:
http://www.pestpatrol.com/PestInfo/f/freescratchcards.asp
HtH
tom


-- 
NEU FÜR ALLE - GMX MediaCenter - für Fotos, Musik, Dateien...
Fotoalbum, File Sharing, MMS, Multimedia-Gruß, GMX FotoService

Jetzt kostenlos anmelden unter http://www.gmx.net

+++ GMX - die erste Adresse für Mail, Message, More! +++

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Corsaire Security Advisory: BEA Tuxedo Administration CGI multiple argument issues

2003-10-31 Thread advisories

-- Corsaire Security Advisory --

Title: BEA Tuxedo Administration CGI multiple argument issues
Date: 04.07.03
Application: BEA Tuxedo 8.1 and prior
Environment: Various
Author: Martin O'Neal [EMAIL PROTECTED]
Audience: General distribution
Reference: c030704-009


-- Scope --

The aim of this document is to clearly define several issues in the 
argument handling functionality of the BEA Tuxedo Administration Console 
application, as supplied by BEA Systems, Inc [1]. 


-- History --

Vendor notified: 04.07.03 
Document released: 31.10.03


-- Overview --

The BEA Tuxedo Administration Console is a CGI application that allows 
the remote administration of Tuxedo functions. One of the start-up 
arguments it accepts is a path to an INI file containing environmental 
settings. By entering various path values into this argument it is 
possible to:

- Confirm the existence of files outside of the web server environment.
- Cause a Denial of Services (DoS) on the web server host.
- Execute a cross-site scripting (XSS) attack through the application.


-- Analysis --

The BEA Tuxedo Administration Console is a CGI application that allows 
the remote administration of Tuxedo functions. One of the start-up 
arguments that this CGI application accepts is a path to an INI file. 
This file contains environmental variables, such as the default 
installation path of the Tuxedo application etc.  

The INIFILE argument appears not to be checked for any basic formatting 
issues such as a path outside of the web root, the use of device names, 
or for the presence of HTML constructs. 

By entering various path values into the INIFILE argument it is possible 
to use the Administration Console to confirm the existence of files 
outside of the web server environment, including those on different 
logical filesystems and even network drives. Through this approach it is 
possible to enumerate files, drives and hosts that are contactable by 
the target web server, so that they might be used with other exploits. 

By using standard device names (CON, AUX, COM1, COM2 etc) within the 
arguments, the server thread will become unresponsive until the 
service/daemon is restarted. 

By using HTML constructs, mobile code such as JAVA can be executed 
within the users context. This style of attack can be used to gain 
access to sensitive information, such as session cookies etc.


-- Proof of concept --

This proof of concept is known to work with a default BEA Tuxedo 
installation on a Windows platform. To make it work within different 
environments, you may need to alter the path used in the URL 
appropriately.

To replicate the XSS issue, initiate a connection to the server that is 
hosting the Tuxedo application, then use the following URL. 

   http://host/udataobj/webgui/cgi-bin/tuxadm.exe?
   INIFILE=scriptalert('XSS')/script

This should result in an error, accompanied by a popup script dialog 
containing the message XSS.


-- Recommendations --

The application should be reviewed in line with security best practises, 
such as those recommended by the OWASP project [2], with special 
consideration paid to the validation of input and output fields.

Access to administrative tools such as this should be restricted to 
trusted domains only and where possible, should also be protected by 
additional measures, such as strong authentication. 

BEA have released an advisory (BEA03-38.00) [3] detailing the 
availability of a patch to correct the issues. This should be reviewed 
and if found to be suitable, the patch should be applied. 


-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
Multiple numbers to this issue: 

CAN-2003-0621 BEA Tuxedo Administration CGI file disclosure issue
CAN-2003-0622 BEA Tuxedo Administration CGI DoS issue
CAN-2003-0623 BEA Tuxedo Administration CGI XSS issue

These are candidates for inclusion in the CVE list, which standardises 
names for security problems (http://cve.mitre.org). 


-- References --

[1] http://www.bea.com
[2] http://www.owasp.org
[3] http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/
advisory03_38_00.jsp


-- Revision --

a. Initial release.
b. Revised to include vendors recommendations.


-- Distribution --

This security advisory may be freely distributed, provided that it 
remains unaltered and in its original form. 


-- Disclaimer --

The information contained within this advisory is supplied as-is with 
no warranties or guarantees of fitness of use or otherwise. Corsaire 
accepts no responsibility for any damage caused by the use or misuse of 
this information.


Copyright 2003 Corsaire Limited. All rights reserved. 



--
CONFIDENTIALITY:  This e-mail and any files transmitted with it are
confidential and intended solely for the use of the recipient(s) only.
Any review, retransmission, dissemination or other use of, or taking
any action in reliance upon this 

[Full-Disclosure] SUSE Security Announcement: thttpd (SuSE-SA:2003:044)

2003-10-31 Thread Thomas Biege
-BEGIN PGP SIGNED MESSAGE-

__

SUSE Security Announcement

Package:thttpd
Announcement-ID:SuSE-SA:2003:044
Date:   Friday, Oct 31st 2003 13:04 MEST
Affected products:  7.3, 8.0, 8.1, 8.2, 9.0
Vulnerability Type: remote privilege escalation/
information leak
Severity (1-10):5
SUSE default package:   no
Cross References:   CAN-2003-0899
CAN-2002-1562

Content of this advisory:
1) security vulnerability resolved:
- buffer overflow
- information leak (virtual hosting)
   problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- libnids
- KDE
- postgresql
- frox
- sane
- ircd
- fileutils
- mc
- apache1/2
3) standard appendix (further information)

__

1)  problem description, brief discussion, solution, upgrade information

Two vulnerabilities were found in the tiny web-server thttpd.
The first bug is a buffer overflow that can be exploited remotely
to overwrite the EBP register of the stack. Due to memory-alignment of
the stack done by gcc 3.x this bug can not be exploited. All thttpd
versions mentioned in this advisory are compiled with gcc 3.x and are
therefore not exploitable.
The other bug occurs in the virtual-hosting code of thttpd. A remote
attacker can bypass the virtual-hosting mechanism to read arbitrary
files.

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command rpm -Fhv file.rpm to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.

Intel i386 Platform:

SuSE-9.0:
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/thttpd-2.23beta1-165.i586.rpm
  e33f3897cac1e1fe117eff8ca252ec0f
patch rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/thttpd-2.23beta1-165.i586.patch.rpm
  cd5c2aeb6d31d6a6781f392af17a4989
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/thttpd-2.23beta1-165.src.rpm
  c6e2446bc94c8c00d35b7741b67df678

SuSE-8.2:
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/thttpd-2.23beta1-164.i586.rpm
  a491b55f562fa0f3b1679ee819140c72
patch rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/thttpd-2.23beta1-164.i586.patch.rpm
  bbb3dd624b19d8683223049a070d4cf2
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/thttpd-2.23beta1-164.src.rpm
  2710751ff1ee8fbab3c2934c5cb09f3d

SuSE-8.1:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/thttpd-2.23beta1-163.i586.rpm
  428db4fb2eccebb5ed16cb28161ba2a5
patch rpm(s):

ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/thttpd-2.23beta1-163.i586.patch.rpm
  b32fb0a87d8d7de3ed1953e64da89bc8
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/thttpd-2.23beta1-163.src.rpm
  e64bc1488747a414f6bd60735f82385f

SuSE-8.0:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/thttpd-2.20c-98.i386.rpm
  952dcca179b647afdeea02b987e3daf8
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/thttpd-2.20c-98.i386.patch.rpm
  e596221f34a73ba6fdd29abcecb6e211
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/thttpd-2.20c-98.src.rpm
  8500be9c635d1c5c9618ecca2a09a5e7

SuSE-7.3:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n1/thttpd-2.20b-175.i386.rpm
  16ffc5238c1f57b8a1e6e02989524e82
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/thttpd-2.20b-175.src.rpm
  b5c4b9c65182fcd2a326e3edad7b2dfb



PPC Power PC Platform:

SuSE-7.3:
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n1/thttpd-2.20b-112.ppc.rpm
  e7aaff82bd90c459849dd78b1cc47515
source rpm(s):
ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/thttpd-2.20b-112.src.rpm
  8ac31eb38063a891e37ed327a5ddbc0c

__

2)  Pending vulnerabilities in SUSE Distributions and Workarounds:

  - libnids
New libnids packages were released to stop remote command execution
due to a memory corruption in the TCP reassembly code. (CAN-2003-0850)
Please download them from our FTP servers.

  - KDE
New KDE packages are currently being tested. These packages fixes
several 

[Full-Disclosure] Corsaire Security Advisory: BEA WebLogic example InteractiveQuery.jsp XSS issue

2003-10-31 Thread advisories

-- Corsaire Security Advisory --

Title: BEA WebLogic example InteractiveQuery.jsp XSS issue
Date: 04.07.03
Application: BEA WebLogic 8.1 and prior
Environment: Various
Author: Martin O'Neal [EMAIL PROTECTED]
Audience: General distribution
Reference: c030704-008


-- Scope --

The aim of this document is to clearly define a vulnerability in the BEA 
WebLogic InteractiveQuery.jsp example application, as supplied by BEA 
Systems, Inc [1], that would allow an attacker to perform a Cross Site 
Scripting (XSS) attack.


-- History --

Vendor notified: 04.07.03 
Document released: 31.10.03


-- Overview --

The BEA WebLogic InteractiveQuery.jsp example application can be passed 
HTML constructs within arguments. This makes it possible to achieve an 
XSS attack, potentially giving access to confidential information, such 
as session cookies etc.


-- Analysis --

The BEA WebLogic InteractiveQuery.jsp example application is a CGI 
application that demonstrates the use of arguments to query a database. 
One of the start-up arguments that it accepts is a name of a person.  
This argument does not appear to be tested for formatting and if an 
invalid value is passed to the application, the value is simply repeated 
back in a results page. 

By using a carefully constructed value, mobile code such as JAVA, can be 
executed within the users context. This style of attack can be used to 
gain access to sensitive information, such as session cookies etc.


-- Proof of concept --

This proof of concept is known to work with a default BEA WebLogic 
example installation on a Windows platform. To make it work within 
different environments, you may need to alter the path used in the URL 
appropriately.

To replicate this issue, initiate a connection to the server that is 
hosting the WebLogic application, then use the following URL. 

   http://host/examplesWebApp/InteractiveQuery.jsp?
   person=scriptalert('XSS')/script

This should result in a new page, accompanied by a popup script dialog 
containing the message XSS.


-- Recommendations --

Example applications should never be installed within a production 
environment. 

Read and follow the advice contained within the BEA supplied advisory on 
dealing with XSS issues [2].

The application should be reviewed in line with security best practises, 
such as those recommended by the OWASP project [3], with special 
consideration paid to the validation of input and output fields.

When providing example applications for use by developers, vendors 
should uphold the strictest compliance with security best practises, as 
it is common for such examples to be used as templates for real-world 
projects. By providing flawed examples, vendors are perpetuating poor 
development practise.


-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2003-0624 to this issue. This is a candidate for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.


-- References --

[1] http://www.bea.com
[2] http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/
SA_BEA03_36.00.jsp
[3] http://www.owasp.org


-- Revision --

a. Initial release.
b. Included reference for vendor advisory.


-- Distribution --

This security advisory may be freely distributed, provided that it 
remains unaltered and in its original form. 


-- Disclaimer --

The information contained within this advisory is supplied as-is with 
no warranties or guarantees of fitness of use or otherwise. Corsaire 
accepts no responsibility for any damage caused by the use or misuse of 
this information.


Copyright 2003 Corsaire Limited. All rights reserved. 




--
CONFIDENTIALITY:  This e-mail and any files transmitted with it are
confidential and intended solely for the use of the recipient(s) only.
Any review, retransmission, dissemination or other use of, or taking
any action in reliance upon this information by persons or entities
other than the intended recipient(s) is prohibited.  If you have
received this e-mail in error please notify the sender immediately
and destroy the material whether stored on a computer or otherwise.
--
DISCLAIMER:  Any views or opinions presented within this e-mail are
solely those of the author and do not necessarily represent those
of Corsaire Limited, unless otherwise specifically stated.
--
Corsaire Limited, 3 Tannery House, Tannery Lane, Send, Surrey, GU23 7EF
Telephone: +44(0)1483-226000  Email:[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Shortcut...... may cause 100% cpu use!!!

2003-10-31 Thread |reduced|minus|none|
ctv wrote:

Hi |reduced|minus|none|!  @2003.10.30_22:52:12_  
WUT. I THOT HIS ARTICLES WUZ GOOD. YU SCRIPT KIDD.

--
[EMAIL PROTECTED]
AIM: l4m3n00b
MSN: [EMAIL PROTECTED]
http://www.instable.net
GnuPG Public Key: http://www.instable.net/pubkey.asc
The only sovereign you can allow to rule you is reason. - Wizard's 
Sixth Rule, Faith of the Fallen by Terry Goodkind
sod it -^^^
 it's an   |--- CIA agent
Read Dedication on Pillars of Creation
 
 ___

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


wow, interesting dedication for a book of that nature... hmm weird.
--
[EMAIL PROTECTED]
AIM: l4m3n00b
MSN: [EMAIL PROTECTED]
http://www.instable.net
GnuPG Public Key: http://www.instable.net/pubkey.asc
The only sovereign you can allow to rule you is reason. - Wizard's 
Sixth Rule, Faith of the Fallen by Terry Goodkind



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IEpatch.exe?

2003-10-31 Thread Andrei Galca-Vasiliu
It wass discussed earlyer, microsoft doesn`t send patches by mail :))
Regards

--
Andrei Galca-Vasiliu
Customer Support
Brasov Branch
Romania Data Systems
T: +402 68 474133  F: +402 68 474133
www.rdsnet.ro
--
Privileged/Confidential Information may be contained in this message.
If you are not the addressee indicated in this message (or responsable
for delivery of the message to such person), you may not copy or
deliver this message to anyone. In such a case, you should destroy
this message and kindly notify the sender by reply e-mail.
--
- Original Message - 
From: Jürgen R. Plasser [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 31, 2003 1:03 PM
Subject: [Full-Disclosure] IEpatch.exe?


 Has anyone seen this Email before:

 From: Microsoft Corp. [EMAIL PROTECTED]
 Subject: [Users] You must patch your Internet Explorer.

 Text:

  Microsoft official patch for IE, AntiBlasterWorm 1.1
 
  Microsoft released a security patch on 20.10.2003 designed
  to fix two security vulnerabilities in all versions of its
  Internet Explorer web browser.
 
  The worm, W32.Blaster.Worm and its variants infects your
  computer through security holes in Microsoft web browser,
  Internet Explorer.This worm also has the potential to exploit
  a similar issue that is addressed by Microsoft Security
  Bulletin MS03-039. These issues concern a vulnerability in the
  Remote Procedure Call (RPC) function.
 
  So, we ask you that you patched your version of Internet Explorer.
  You must patch your version of Internet Explorer,otherwise,
  virus can infect your computer at days.
 
  Your patch-program was attached to this letter.
 
  1. Personal Information
 --
 

 -
  ---*** Your KEY: HFKFLW63JKGFF348FLD0467D ***
 

 -
  ---
  If you have any questions, please read a file (README.TXT).
 
  2. Technical support
 ---
 
For technical support questions, please go to
http://www.microsoft.com
 
 
  --
 Thank you for using Microsoft!
  --

 Attachment: IEpatch.exe, README.txt

 The README.txt contains:


  Microsoft Internet Explorer official patch AntiBlasterWorm 1.1
  ==
  Version: 1.1
 
  (c) Copyright Microsoft, Inc. All Rights Reserved.
 
 
  1. Personal Information
 ---
 Your KEY:  HFKFLW63JKGFF348FLD0467D
 ---
 
  Table of Contents
  -
 
2. Installation instructions
3. Technical support
 
 
  Installation instructions
  -
 
To install AntiBlasterWorm 1.1, you should follow the following simple
  steps:
 
1. Run the installer program by double-clicking on the
   IEpatch.exe icon.
3. Follow the instructions of the installer program to install the
   AntiBlasterWorm 1.1.
4. Done! The Internet Explorer should be patched.
 
 
  Technical support
  -
 
For technical support questions, please go to
http://www.microsoft.com

 -- 
 Jürgen


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Helmut Hauser
Very interesting MSDN Article:

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwxp/html/securityinxpsp2.asp


Helmut Hauser
Systemadministration EDV

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread yossarian
Most of it appears to be tighten the defaults. Usefull, yes, but not very
new..

New is: Interface restriction (exposed to developers, for example, through
a new registry key called RestrictRemoteClients) modifies the behavior of
all remote procedure call interfaces on the system and will, by default,
eliminate remote anonymous access to RPC interfaces on the system, with some
exceptions.. All I can say is better late than never, this should have
existed ages ago - this is not XP specific. In 2001 when the first RPC
issues appeared on NT4 and W2k, I had expected such a step.

The introduction of an ACL on DCOM: well, why not just disable DCOM? Most
users don't need it, it does not solve problems that could not be solved in
another way. The possibility for 'more granular control' for admins on DCOM
means that more things can be tightened, if you now what they are and have
time to do so in a few thousand or more PC's. Never had much trouble with
PC's that had DCOM completely disabled anyway. Not more security in this SP2
thingie, unless a raise in the TCO is acceptable - things can be secured.

ICF will be enabled by default but will no longer block RPC. Yeah, great.
Oh, it will have a 'shielded mode', to block all RPC till a fix for a new
vulnerability is found. Yeah, same as with previous remark - who really
needs RPC? Many admins have no time to use remote management and/or registry
features and just put a ghosts disk in a faulty machine - quick and
effective. IMHO most admins would not know what to do with the features
anyway, since the insight in what the machine is doing, and what might be
wrong, is completely lacking. Usually they can't be bothered, anyway. As far
s I can see, this feature will make systems more vulnerable (i.e. the ones
using ICF) since RPC will be open unless it is closed on ICF protected
boxes.

The application white list is an extension for ICF that has the same
problem, who knows what apps are valid, who is to manage the list of 'known
to be good' etc. Usually admins consider the Firewall a thing that just is,
and often it is managed by a specialized admin. Now every NT-admin will have
to know the working of an application firewall, and generally, of all the
installed software. This will raise the TCO, and if companies do not employ
more and more skilled support staff, the feature will just be in the way,
and ICF probably disabled.

My 0.02 cents: nice try, but next time go for less is more - less features
is more security, this is just another featuritis.



- Original Message -
From: Helmut Hauser [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 31, 2003 2:26 PM
Subject: [Full-Disclosure] Microsoft plans tighter security measures in
Windows XP SP2


 Very interesting MSDN Article:


http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwxp/html/
securityinxpsp2.asp


 Helmut Hauser
 Systemadministration EDV

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] pipeupadmin

2003-10-31 Thread Vctor
try on google

it's easy
http://content.443.ch/pub/security/blackhat/WinNT%20and%202K/pipeup/W2KPipeUp/
http://www.xillioncomputers.com/modules.php?name=Downloadsd_op=MostPopular


On Fri, 31 Oct 2003 13:46:38
+1000rIvan Coric [EMAIL PROTECTED] wrote:

 does anyone have the source or exe of pipeupadmin/pipeupsam?
 
 thanks
 Ivan
 
 
 
 ***
 Messages included in this e-mail and any of its attachments are those
 of the author unless specifically stated to represent WorkCover Queensland.
 The contents of this message are to be used for the intended purpose only and
 are to be kept confidential at all times. This message may contain privileged
 information directed only to the intended addressee/s. Accidental receipt of
 this information should be deleted promptly and the sender notified. This
 e-mail has been scanned by Sophos for known viruses. However, no warranty nor
 liability is implied in this
 respect.**
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


-- 

it's so easy to forget me

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] pipeupadmin

2003-10-31 Thread .
try on google

it's easy
http://content.443.ch/pub/security/blackhat/WinNT%20and%202K/pipeup/W2KPipeUp/
http://www.xillioncomputers.com/modules.php?name=Downloadsd_op=MostPopular


On Fri, 31 Oct 2003 13:46:38
+1000rIvan Coric [EMAIL PROTECTED] wrote:

 does anyone have the source or exe of pipeupadmin/pipeupsam?
 
 thanks
 Ivan
 
 
 
 ***
 Messages included in this e-mail and any of its attachments are those
 of the author unless specifically stated to represent WorkCover Queensland.
 The contents of this message are to be used for the intended purpose only and
 are to be kept confidential at all times. This message may contain privileged
 information directed only to the intended addressee/s. Accidental receipt of
 this information should be deleted promptly and the sender notified. This
 e-mail has been scanned by Sophos for known viruses. However, no warranty nor
 liability is implied in this
 respect.**
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


-- 

it's so easy to forget me


-- 

it's so easy to forget me

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] pipeupadmin

2003-10-31 Thread allan . vanleeuwen
Euhm .. I think he was asking for SOURCE code of this very publicly
available exploit.

-Original Message-
From: . [mailto:[EMAIL PROTECTED] 
Sent: vrijdag 31 oktober 2003 16:05
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] pipeupadmin


try on google

it's easy
http://content.443.ch/pub/security/blackhat/WinNT%20and%202K/pipeup/W2KPipeU
p/
http://www.xillioncomputers.com/modules.php?name=Downloadsd_op=MostPopular


On Fri, 31 Oct 2003 13:46:38
+1000rIvan Coric [EMAIL PROTECTED] wrote:

 does anyone have the source or exe of pipeupadmin/pipeupsam?
 
 thanks
 Ivan
 
 
 

***
 Messages included in this e-mail and any of its attachments are those
 of the author unless specifically stated to represent WorkCover
Queensland.
 The contents of this message are to be used for the intended purpose only
and
 are to be kept confidential at all times. This message may contain
privileged
 information directed only to the intended addressee/s. Accidental receipt
of
 this information should be deleted promptly and the sender notified. This
 e-mail has been scanned by Sophos for known viruses. However, no warranty
nor
 liability is implied in this

respect.
**
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


-- 

it's so easy to forget me


-- 

it's so easy to forget me

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
===
De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is alleen
bestemd voor de geadresseerde. Indien u dit bericht onterecht ontvangt,
wordt u verzocht de inhoud niet te gebruiken en de afzender direct te
informeren door het bericht te retourneren. Hoewel Orange maatregelen heeft
genomen om virussen in deze email of attachments te voorkomen, dient u ook
zelf na te gaan of virussen aanwezig zijn aangezien Orange niet
aansprakelijk is voor computervirussen die veroorzaakt zijn door deze
email..

The information contained in this message may be confidential and is
intended to be only for the addressee. Should you receive this message
unintentionally, please do not use the contents herein and notify the sender
immediately by return e-mail. Although Orange has taken steps to ensure that
this email and attachments are free from any virus, you do need to verify
the possibility of their existence as Orange can take no responsibility for
any computer virus which might be transferred by way of this email.
===


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Ben Nelson
yossarian wrote:
Most of it appears to be tighten the defaults. Usefull, yes, but not very
new..
New or not, it is one of the major gripes I always hear from Sys Admins 
in reference to MS software.  No doubt, it should have happened a long 
time ago, butas they saybetter late than never.

  The application white list is an extension for ICF that has the same
problem, who knows what apps are valid, who is to manage the list of 'known
to be good' etc. Usually admins consider the Firewall a thing that just is,
and often it is managed by a specialized admin. Now every NT-admin will have
to know the working of an application firewall, and generally, of all the
installed software. This will raise the TCO, and if companies do not employ
more and more skilled support staff, the feature will just be in the way,
and ICF probably disabled.
The application firewall sounds like a good idea.  Of course, it may 
take a few iterations and some bug fixes to get it right and make it 
easy to administer, but you've got to start somewhere and this also 
seems to me like a step in the right direction.  The ultimate fix would 
be to promote better (and more secure code), but since this will also 
protect 3rd party applications that MS has no control over it'll 
definitely help.  A little 'defense in depth' (hardly) ever hurts.

My 0.02 cents: nice try, but next time go for less is more - less features
is more security, this is just another featuritis.
I agree that 'less features is more security', but lets face 
itpeople (by people, I mean the general public) want features and MS 
is in the business of making money.  More features == more money for 
them.  I don't begrudge them this (I work for a software company 
myself), so taking steps to make the additional features more secure (if 
even by using sane defaults) is a good thing.

I have traditionally been an anti-MS bigot.  However, I am always happy 
to see vendors making an effort (however small it may seem) to improve 
the security of the environment that they provide.  I don't even own a 
Windows machine, but if these 'enhancements' help mitigate the spread of 
things like Blaster and SoBig.F, then I don't have to spend my time 
going through a zillion IDS alerts and wasting CPU cycles on my 
Unix-based MTA filtering out crap emails.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Installation Security Issue for DATEV IDVS

2003-10-31 Thread t4rku5
Topic: Installation Security Issue for DATEV IDVS 

Release Date: 2003-10-31


Affected Software: 
== 

- Eigenorganisation comfort (IDVS) 
- Eigenorganisation classic (IDVS) 


Unaffected Software: 
 

- none known 



Summary: 
 

DATEV eG is a German Company, which makes Software for tax advisors and


lawyers. 

During installation/Update of IDVS,sensitive database administrator logon


information may be captured in the installation log file. 


Issue: 
== 

The installation program for IDVS records installation/update data into

a 
log file for troubleshooting purposes related to product installation.

This 
file generally contains basic information about installation/update options

and installation/update processes. User name and password information

related 
to the data base account are captured in the log file. The user name

and 
password is used to connect to the database. 


Workaround: 
=== 

Remove the installation log files after successfully installing/updating


Eigenorganisation (IDVS). The IDVS installation log files (file names


LW:\DATEV\LOG\IDVS\SRV\PostRep*.log | PostUpd*.log | PreRep*.log |


PreUpd*.log) is located in the DATEV log directory. The administrator

should 
delete this file once installation has completed 

This file may be deleted using Windows Explorer or may be deleted by

starting 
a Command Prompt and typing the following command: 

del LW:\DATEV\LOG\IDVS\SRV\Post*.log 
del LW:\DATEV\LOG\IDVS\SRV\Pre*.log 


Credits: 
 

Discovered by t4rku5 




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messengerl=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliatel=427

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Asian Hackers?

2003-10-31 Thread Quaker Oats
Greetings All,

I'm interested in learning a bit more about the Asian hacking scene.
Who are some of the biggest players in the following locations:

Singapore
Hong Kong
South Korea
Kuala Lumpur
Japan

Over the past year, I've heard quite a bit of interest in the Asian market
for security products and services, and I wanted to know if that demand
has driven up the amount of hackers in those areas as well.

QA
...it's mmm mmm good



Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messengerl=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliatel=427

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] 27347

2003-10-31 Thread Ben Nelson
http://www.iss.net/security_center/advice/Exploits/Ports/27374/default.htm

Joe Blow wrote:
Anyone ever find out what this was?


Do you Yahoo!?
Exclusive Video Premiere - Britney Spears 
http://launch.yahoo.com/video/?1093432fs=1redirectURL=http://launch.yahoo.com/promos/britneyspears/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] (no subject)

2003-10-31 Thread t4rku5
Topic: DATEV Nutzungskontrolle Bypassing 

Release Date: 2003-10-31


Affected system: 
 

- Nutzungskontrolle V.2.2 
- Nutzungskontrolle V.2.1 



Unaffected system: 
== 

- none known 



Summary: 
 

DATEV eG is a German Company, which makes Software for tax advisors and


lawyers. The Nutzungskontrolle (NUKO) is a Software to restrict the 
access for the users. For example, a normal user is not allowed to see

the internal reward accounting data. These data are restrictet by the


NUKO by, for example, blocking the advisor number, which is used for

all data in the internal reward accounting. 


Issue: 
== 

It is possible to find out simple or blank passwords in the NUKO, by

searching in the NUKO Database. 

The Problem is that DATEV changed the default database password for all

their databases, except for the NUKO DB. At the moment the Sybase ASA

Database is used to manage this stuff. I will not write the login 
password down here, because i think it is no problem to find this with

google. 

1. First you have to add the default superuser to the group DATEV: 

example: 

GRANT MEMBERSHIP 
IN GROUP DATEV 
TO the superuser login (without ) 


2. Then just make a query to the table u_nkw_passwords for the colum


nk_password to check where a password hash 

3D7595A98BFF809D3D7595A98BFF809D3D7595A98BFF809D3D7595A98BFF809D 

is. 


example: 

select nk_user_id from u_nkw_passwords where nk_password = 
'3D7595A98BFF809D3D7595A98BFF809D3D7595A98BFF809D3D7595A98BFF809D' 


3. Now query the user name of the nk_user_id. 

example: 

select nk_user_name from u_nkw_users where nk_user_id = 'one of the 
userid from 2.' 


4. Now you have a NUKO login with a blank Password. 



Workaround: 
=== 

Change the default database password. 


Credits: 
 

Discovered by t4rku5 




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messengerl=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliatel=427

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IEpatch.exe?

2003-10-31 Thread Jürgen R. Plasser
Hi Andrei,

--On 31.10.2003 14:57 +0200 Andrei Galca-Vasiliu wrote:

It wass discussed earlyer, microsoft doesn`t send patches by mail :))
I already know that! :-) And because of that I assumed to have got a virus 
or worm email. Our anti virus software did not catch it, so I asked this 
list for any references.

Regards,
Jürgen
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] 27347

2003-10-31 Thread Bassett, Mark
Why do people keep posting crap like this.  Its port 27347
not 2737*4*



Mark Bassett
Network Administrator
World media company
Omaha.com
402-898-2079


-Original Message-
From: Ben Nelson [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2003 9:30 AM
To: Joe Blow
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] 27347

http://www.iss.net/security_center/advice/Exploits/Ports/27374/default.h
tm

Joe Blow wrote:
 Anyone ever find out what this was?
 


 Do you Yahoo!?
 Exclusive Video Premiere - Britney Spears 

http://launch.yahoo.com/video/?1093432fs=1redirectURL=http://launch.y
ahoo.com/promos/britneyspears/ 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Omaha World-Herald Company computer systems are for business use only.
This e-mail was scanned by MailSweeper


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Georgi Guninski
quote from the m$ crap:
'Additionally, Microsoft is working with microprocessor companies to help Windows 
support hardware-enforced no execute (or NX) on microprocessors that contain the 
feature.'


Although the only currently shipping processor families with Windows-compatible 
hardware support for execution protection are the AMD K8 and the Intel Itanium 
Processor Family, it is expected that future 32 and 64-bit processors will provide 
execution protection. Microsoft is preparing for and encouraging this trend by 
supporting execution protection in its flagship Windows operating systems.

There have been linux solutions for this for years.
Apparantly m$ can't make it themselves and need help from microprocessor companies, 
lol.

georgi


On Fri, 31 Oct 2003 14:26:17 +0100
Helmut Hauser [EMAIL PROTECTED] wrote:

 Very interesting MSDN Article:
 
 http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwxp/html/securityinxpsp2.asp
 
 
 Helmut Hauser
 Systemadministration EDV
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] stcloader.exe / slmss.exe ??

2003-10-31 Thread Matthew Wagenknecht
Here's your answer..   Google is a beautiful thing..

http://www.pestpatrol.com/PestInfo/f/freescratchcards.asp 


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Matt Wagenknecht  CISSP  |  MCSE
Security Administrator
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Never be afraid to try something new. 
Remember, amateurs built the ark; professionals built the Titanic. 

This email may contain confidential and privileged information for the sole
use of the intended recipient. Any review or distribution by others is
strictly prohibited. If you are not the intended recipient, please contact
the sender and delete all copies of this email message.


-Original Message-
From: Tom Koehler [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2003 4:21 AM
To: [EMAIL PROTECTED]
Subject: Re:[Full-Disclosure] stcloader.exe / slmss.exe ??

James Bruce wrote
Anyone seeing this file stcloader.exe (Nortons does not detect) 
downloading a slmss.exe file (which nortons detects as Downloader.
Trojan)
I just had 3 computers with it all around the same time. Stcloader.exe 
is the run part of the registry and in the system32 directory.  After 
deleting then both the smlss.exe did not show back up.
 
Hi James,
looks like FreeScratchCards
look here:
http://www.pestpatrol.com/PestInfo/f/freescratchcards.asp
HtH
tom


--
NEU FÜR ALLE - GMX MediaCenter - für Fotos, Musik, Dateien...
Fotoalbum, File Sharing, MMS, Multimedia-Gruß, GMX FotoService

Jetzt kostenlos anmelden unter http://www.gmx.net

+++ GMX - die erste Adresse für Mail, Message, More! +++

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] pipeupadmin

2003-10-31 Thread .
On Fri, 31 Oct 2003 16:31:41 +0100
[EMAIL PROTECTED] wrote:

 Euhm .. I think he was asking for SOURCE code of this very publicly
 available exploit.

does anyone have the source or exe of pipeupadmin/pipeupsam? ... source OR exe
... i only know where is the exe 

have a nice day 

 
 -Original Message-
 From: . [mailto:[EMAIL PROTECTED] 
 Sent: vrijdag 31 oktober 2003 16:05
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] pipeupadmin
 
 
 try on google
 
 it's easy
 http://content.443.ch/pub/security/blackhat/WinNT%20and%202K/pipeup/W2KPipeU
 p/
 http://www.xillioncomputers.com/modules.php?name=Downloadsd_op=MostPopular
 
 
 On Fri, 31 Oct 2003 13:46:38
 +1000rIvan Coric [EMAIL PROTECTED] wrote:
 
  does anyone have the source or exe of pipeupadmin/pipeupsam?
  
  thanks
  Ivan
  
  
  
 
 ***
  Messages included in this e-mail and any of its attachments are those
  of the author unless specifically stated to represent WorkCover
 Queensland.
  The contents of this message are to be used for the intended purpose only
 and
  are to be kept confidential at all times. This message may contain
 privileged
  information directed only to the intended addressee/s. Accidental receipt
 of
  this information should be deleted promptly and the sender notified. This
  e-mail has been scanned by Sophos for known viruses. However, no warranty
 nor
  liability is implied in this
 
 respect.
 **
  
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 
 -- 
 
 it's so easy to forget me
 
 
 -- 
 
 it's so easy to forget me
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 ===
 De informatie opgenomen in dit bericht kan vertrouwelijk zijn en is alleen
 bestemd voor de geadresseerde. Indien u dit bericht onterecht ontvangt,
 wordt u verzocht de inhoud niet te gebruiken en de afzender direct te
 informeren door het bericht te retourneren. Hoewel Orange maatregelen heeft
 genomen om virussen in deze email of attachments te voorkomen, dient u ook
 zelf na te gaan of virussen aanwezig zijn aangezien Orange niet
 aansprakelijk is voor computervirussen die veroorzaakt zijn door deze
 email..
 
 The information contained in this message may be confidential and is
 intended to be only for the addressee. Should you receive this message
 unintentionally, please do not use the contents herein and notify the sender
 immediately by return e-mail. Although Orange has taken steps to ensure that
 this email and attachments are free from any virus, you do need to verify
 the possibility of their existence as Orange can take no responsibility for
 any computer virus which might be transferred by way of this email.
 ===
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html


-- 

it's so easy to forget me

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] stcloader.exe / slmss.exe ??

2003-10-31 Thread Matthew Wagenknecht
 
Yeah. Yeah. Yeah. I know.. Flame flame flame.. Here, I'll do it for you..

Tom Koehler already answered, you idiot, Read your f'n email before
replying! 
Did I miss anything?

I'm running on little sleep, here. Give me a break.. =c)


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Matt Wagenknecht  CISSP  |  MCSE
Security Administrator
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Never be afraid to try something new. 
Remember, amateurs built the ark; professionals built the Titanic. 

This email may contain confidential and privileged information for the sole
use of the intended recipient. Any review or distribution by others is
strictly prohibited. If you are not the intended recipient, please contact
the sender and delete all copies of this email message.


-Original Message-
From: Matthew Wagenknecht [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2003 9:00 AM
To: 'Tom Koehler'; [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] stcloader.exe / slmss.exe ??

Here's your answer..   Google is a beautiful thing..

http://www.pestpatrol.com/PestInfo/f/freescratchcards.asp 


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Matt Wagenknecht  CISSP  |  MCSE
Security Administrator
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Never be afraid to try something new. 
Remember, amateurs built the ark; professionals built the Titanic. 

This email may contain confidential and privileged information for the sole
use of the intended recipient. Any review or distribution by others is
strictly prohibited. If you are not the intended recipient, please contact
the sender and delete all copies of this email message.


-Original Message-
From: Tom Koehler [mailto:[EMAIL PROTECTED]
Sent: Friday, October 31, 2003 4:21 AM
To: [EMAIL PROTECTED]
Subject: Re:[Full-Disclosure] stcloader.exe / slmss.exe ??

James Bruce wrote
Anyone seeing this file stcloader.exe (Nortons does not detect) 
downloading a slmss.exe file (which nortons detects as Downloader.
Trojan)
I just had 3 computers with it all around the same time. Stcloader.exe 
is the run part of the registry and in the system32 directory.  After 
deleting then both the smlss.exe did not show back up.
 
Hi James,
looks like FreeScratchCards
look here:
http://www.pestpatrol.com/PestInfo/f/freescratchcards.asp
HtH
tom


--
NEU FÜR ALLE - GMX MediaCenter - für Fotos, Musik, Dateien...
Fotoalbum, File Sharing, MMS, Multimedia-Gruß, GMX FotoService

Jetzt kostenlos anmelden unter http://www.gmx.net

+++ GMX - die erste Adresse für Mail, Message, More! +++

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Schmehl, Paul L
 -Original Message-
 From: yossarian [mailto:[EMAIL PROTECTED] 
 Sent: Friday, October 31, 2003 8:15 AM
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Microsoft plans tighter 
 security measures in Windows XP SP2
 
 The introduction of an ACL on DCOM: well, why not just 
 disable DCOM? Most users don't need it, it does not solve 
 problems that could not be solved in another way.

File and printer sharing is not needed?  Remote administration is not
needed?  Maybe not in home use, but in corporate?

 Many admins 
 have no time to use remote management and/or registry 
 features and just put a ghosts disk in a faulty machine - 
 quick and effective. IMHO most admins would not know what to 
 do with the features anyway, since the insight in what the 
 machine is doing, and what might be wrong, is completely 
 lacking.

We have *students* using RA to get users' machine back up and running.
If admins can't do that, they shouldn't be admins.  I seriously doubt
admins would do this sort of work anyway.  This is basic tech support
stuff.  Admins do remote connections to *servers*, not workstations
(except for personal stuff).

 Usually they can't be bothered, anyway. As far s I 
 can see, this feature will make systems more vulnerable (i.e. 
 the ones using ICF) since RPC will be open unless it is 
 closed on ICF protected boxes.

This makes no sense.  RPC is *already* open.  If ICF leaves it open,
nothing has changed WRT RPC.  A great deal has changed WRT other things,
however.  How do systems become more vulnerable by doing this?
 
 The application white list is an extension for ICF that has 
 the same problem, who knows what apps are valid, who is to 
 manage the list of 'known to be good' etc.

This is the same thing Zone Alarm does.  I don't see too many average
users struggling with the concept, do you?  Internet Explorer wants to
access the Internet.  Do you want to allow this?  Yes!  An unknown
application, mytroj.exe, wants to access the Internet.  Do you want to
allow this?  Huh?  NO!

 Usually admins 
 consider the Firewall a thing that just is, and often it is 
 managed by a specialized admin. Now every NT-admin will have 
 to know the working of an application firewall, and 
 generally, of all the installed software.

In AD you simply set the group policies and you're done.  This is a
*good* thing, which will reduce work for admins and make the enterprise
more secure.  For personal users, they will have a box that is truly a
client and cannot be a server without their specific authorization.
That is a good thing as well.  How many *nix distributions have the
firewall enabled by default?  Not many that I know of.  You usually have
to enable it during the install, and then you have to decide on a
configuration for it.  Granted, RedHat (for example) makes that pretty
easy, but you still have to agree to it.

Instead of griping about this, you should be thankful that MS is finally
starting to get a clue and moving in the right direction.

 This will raise the 
 TCO, and if companies do not employ more and more skilled 
 support staff, the feature will just be in the way, and ICF 
 probably disabled.

This will allow us, for the first time, to deploy personal firewalls
to all our Windows desktops.  I think that's a good thing, don't you?
We looked at several but couldn't afford them.  This allows us to deploy
*and* control desktop firewalls which will provide another layer of
protection for us at no additional cost other than the time spent
writing the group policy, which I'm pretty sure the admins we have can
do in a few minutes.

 My 0.02 cents: nice try, but next time go for less is more - 
 less features is more security, this is just another featuritis.
 
I obviously totally disagree.

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Proxies

2003-10-31 Thread Earl Keyser
Help needed, please.

We use all cisco networking gear. Currently using a cisco cache engine
with SmartFilter to manage the surfing for our staff/students.  As
usual, the little devils figured a way to get around it. 

They went to Google, entered open proxy list and bingo-bango.  From
this list they found open proxies to use in IE.

Besides suspending them, we made one technological change. Outgoing
ports 8000, 8080,  and 3128 are now blocked at the firewall.

Can anyone suggest further refinements to reduce this kind of abuse? I
know some proxies run on port 80, but I'll have to live with that.

TIA

Earl

Earl Keyser, Network Specialist
Wayzata Public Schools
763-745-5105

Unix IS user-friendly. It's just picky about who its friends are.


This outbound message has been scanned for viruses by ISD#284.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Jason Freidman

 In AD you simply set the group policies and you're done.  This is a
 *good* thing, which will reduce work for admins and make the enterprise
 more secure.  For personal users, they will have a box that is truly a
 client and cannot be a server without their specific authorization.
 That is a good thing as well.  How many *nix distributions have the
 firewall enabled by default?  Not many that I know of.  You usually have
 to enable it during the install, and then you have to decide on a
 configuration for it.  Granted, RedHat (for example) makes that pretty
 easy, but you still have to agree to it.

IIRC Anaconda puts the redhat firewall on High security by default.  Which means no 
incoming connections and uses their Lokkit script for DNS and so on.



signature.asc
Description: This is a digitally signed message part


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Jan Meijer
On Fri, 31 Oct 2003, Earl Keyser wrote:

 We use all cisco networking gear. Currently using a cisco cache engine
 with SmartFilter to manage the surfing for our staff/students.  As
 usual, the little devils figured a way to get around it.

 They went to Google, entered open proxy list and bingo-bango.  From
 this list they found open proxies to use in IE.

 Besides suspending them, we made one technological change. Outgoing
 ports 8000, 8080,  and 3128 are now blocked at the firewall.

 Can anyone suggest further refinements to reduce this kind of abuse? I
 know some proxies run on port 80, but I'll have to live with that.

Yeah.  Implement technological measures at the end-nodes to prevent them
from using other proxies then yours.  As long as you allow outgoing
traffic from the end-nodes *and* they can set their own proxies there is
no way to prevent them doing just that.  And there are proxies anywhere,
on any port.  And if there are no proxies available, they'll just set them
up at home, using their broadband connectivity.  Might be a bit slower,
but gets the job done.

And, invest more in organisational measures.  Make sure everyone *knows*
about your local websurfing-rules.  And knows what happens if they don't
adhere.

Focussing on the end-nodes will give you an added bonus if you choose to
implement it: more secure end-nodes.  Nice to have before the next MS worm
hits.

Jan

-- 
/~\ The ASCII / Jan Meijer
\ / Ribbon Campaign-- --SURFnet bv
 X  Against HTML/   http://www.surfnet.nl/organisatie/jm/
/ \ Email   http://cert-nl.surfnet.nl/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Gary E. Miller
Yo Earl!

On Fri, 31 Oct 2003, Earl Keyser wrote:

 Besides suspending them, we made one technological change. Outgoing
 ports 8000, 8080,  and 3128 are now blocked at the firewall.

So what about al the legit services that run on those ports?  You have
now broken a LOT of applications.

 Can anyone suggest further refinements to reduce this kind of abuse? I
 know some proxies run on port 80, but I'll have to live with that.

The Cluebat personally applied is your best and only hope.  They are
way more proxies, open and otherwise, than you will ever be able to
close. They can be on any port, or use no TCP port.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Charles E. Hill
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

You can never get around it, as you're aware -- proxies on ports 80, 20, 21, 
22 or something else really common will always be available.

However, since you need to show due diligence, you can do the following.

1. Have the administration set a policy with some teeth.  If you avoid the 
proxy, your account gets suspended or some such.

2. And I'm not sure how easy this will be... restrict protocols to their known 
ports.  Configure your firewall to only allow HTTP traffic through Port 80, 
and not other ports.  FTP only through 20  21.  SSH only through22, etc.

Don't allow HTTP headers through any other port.


On Friday 31 October 2003 09:20, Earl Keyser wrote:

- -- 
Charles E. Hill
Technical Director
Herber-Hill LLC
http://www.herber-hill.com/

 Help needed, please.

 We use all cisco networking gear. Currently using a cisco cache engine
 with SmartFilter to manage the surfing for our staff/students.  As
 usual, the little devils figured a way to get around it.

 They went to Google, entered open proxy list and bingo-bango.  From
 this list they found open proxies to use in IE.

 Besides suspending them, we made one technological change. Outgoing
 ports 8000, 8080,  and 3128 are now blocked at the firewall.

 Can anyone suggest further refinements to reduce this kind of abuse? I
 know some proxies run on port 80, but I'll have to live with that.

 TIA

 Earl

 Earl Keyser, Network Specialist
 Wayzata Public Schools
 763-745-5105

 Unix IS user-friendly. It's just picky about who its friends are.


 This outbound message has been scanned for viruses by ISD#284.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE/oquDeljutq/VnacRAhvXAJ0ZHREfG345O+vx/3at6m4g+zjh3wCfYra2
J34T2QGPXZ9Nn4DWKBiu9/g=
=hOps
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Proxies

2003-10-31 Thread nosp
On Fri, 2003-10-31 at 17:20, Earl Keyser wrote:
 Besides suspending them, we made one technological change. Outgoing
 ports 8000, 8080,  and 3128 are now blocked at the firewall.
 
 Can anyone suggest further refinements to reduce this kind of abuse? I
 know some proxies run on port 80, but I'll have to live with that.

Make their IE's autoconfigure to a proxy server you set up, then
disallow all internal -- external HTTP connections bar from your
proxy?  Maybe your cisco cache engine = proxy server in which case,
presumably the problem is you can't prevent them changing their proxy
settings?  You can encourage them by preventing internal -- external
HTTP access, I suppose (just based on ports is the crude way).  But if
you don't want to do that you may have to inspect each connection
initiation packet to see if it's HTTP...since it's not hard to spread
the traffic out over any port.


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread yossarian
  -Original Message-
  From: yossarian [mailto:[EMAIL PROTECTED]
  Sent: Friday, October 31, 2003 8:15 AM
  To: [EMAIL PROTECTED]
  Subject: Re: [Full-Disclosure] Microsoft plans tighter
  security measures in Windows XP SP2
 
  The introduction of an ACL on DCOM: well, why not just
  disable DCOM? Most users don't need it, it does not solve
  problems that could not be solved in another way.

 File and printer sharing is not needed?  Remote administration is not
 needed?  Maybe not in home use, but in corporate?

No, sorry Paul. Printers have their own IP address, file and printersharing
was introduced for small networks. But since the mid nineties a network
interface became standard in laserprinters- printersharing became a real non
issue. File sharing: not for workstations, unless you make backups of every
workstation. Not suitable for corporations, user data is corporate property,
needs a back up so MUST be on a server. It is impossible to secure a network
where file and printsharing is common (where is the sensitive info to
secure?) - my personal BOFH way is disable the server service on every
Workstation. And the browser service as well.

Remote administration may be needed, I just said it is rarely used, for
various reasons, the foremost being that the support staff don't know sh**t
about the inner workings of windows, MCP or not.

  Many admins
  have no time to use remote management and/or registry
  features and just put a ghosts disk in a faulty machine -
  quick and effective. IMHO most admins would not know what to
  do with the features anyway, since the insight in what the
  machine is doing, and what might be wrong, is completely
  lacking.

 We have *students* using RA to get users' machine back up and running.
 If admins can't do that, they shouldn't be admins.  I seriously doubt
 admins would do this sort of work anyway.  This is basic tech support
 stuff.  Admins do remote connections to *servers*, not workstations
 (except for personal stuff).

What your students are doing is your problem, and I agree, admins don't do
this kind of work. But technical support in corporates is not done by
students, but by admins. And since it is all about TCO, put back the
standard image is the policy of choice.

BTW, how do you use RA to get a machine up and running? If it is down, so is
RA

  Usually they can't be bothered, anyway. As far s I
  can see, this feature will make systems more vulnerable (i.e.
  the ones using ICF) since RPC will be open unless it is
  closed on ICF protected boxes.
 
 This makes no sense.  RPC is *already* open.  If ICF leaves it open,
 nothing has changed WRT RPC.  A great deal has changed WRT other things,
 however.  How do systems become more vulnerable by doing this?

Better you read the MS paper first, RPC is closed by ICF.

  The application white list is an extension for ICF that has
  the same problem, who knows what apps are valid, who is to
  manage the list of 'known to be good' etc.

 This is the same thing Zone Alarm does.  I don't see too many average
 users struggling with the concept, do you?  Internet Explorer wants to
 access the Internet.  Do you want to allow this?  Yes!  An unknown
 application, mytroj.exe, wants to access the Internet.  Do you want to
 allow this?  Huh?  NO!

Ask your tech staff: what is this DNS service wanting to connect, or any
weird ADS related service? Anyway, zonealarm is more common in small,
unprotected networks, have yet to see it in a corporate network.

  Usually admins
  consider the Firewall a thing that just is, and often it is
  managed by a specialized admin. Now every NT-admin will have
  to know the working of an application firewall, and
  generally, of all the installed software.

 In AD you simply set the group policies and you're done.  This is a
 *good* thing, which will reduce work for admins and make the enterprise
 more secure.  For personal users, they will have a box that is truly a
 client and cannot be a server without their specific authorization.
 That is a good thing as well.  How many *nix distributions have the
 firewall enabled by default?  Not many that I know of.  You usually have
 to enable it during the install, and then you have to decide on a
 configuration for it.  Granted, RedHat (for example) makes that pretty
 easy, but you still have to agree to it.

Like I said before, disabling server and browser service is a lot easier.
Less is more, better not to need a application firewall at all.

 Instead of griping about this, you should be thankful that MS is finally
 starting to get a clue and moving in the right direction.

I have been supporting MS software since 1989. I am not saying that they are
not moving in the right direction when they start caring about security, but
they make the mistake nearly all programmers make: more features. And unlike
what has been said in this thread, users do not ask for more features,
unless it is a screensaver or a PDA connection. As an admin I 

[Full-Disclosure] IE6 - Crash via DOS device

2003-10-31 Thread morning_wood
Oct 30, 2003
Donnie Werner
[EMAIL PROTECTED]

I thought these bugs in Internet Explorer 6 had been fixed...

all of these make use of a local call to a
legacy DOS device, example
( file:///AUX ) as a link, called in an iframe ( XSS ) or used as an IMG
tag.
I tested,  CON, PRN, AUX, COMx, LPTx, CLOCK$ and NUL
only AUX and COM1 caused a lockup of Internet Explorer 6

do these links crash your browser?
1. http://exploitlabs.com/files/notices/AUXcrash.html --- click for links
to crash
2. http://exploitlabs.com/files/notices/AUX-iframe.html -- click this link
to crash
3. http://exploitlabs.com/files/notices/AUX-img.html -- click this link to
crash

note: these can be embeded via Cross Site Scripting ( XSS ) to deny service
to a website to those clients trying to connect via affected versions of IE6

Donnie Werner
http://exploit.labs.com
[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] XSS In mldonkey - But....

2003-10-31 Thread Chris Sharp
Mldonkey is an open source p2p client which supports a
load of networks, it doesn't have a built in UI, you
can telnet into it, or there's a web interface which
can be accessed from http://127.0.0.1:4080/ (or
whatever port you configure it to run on)

They've done a great job at making sure there's no XSS
issues, especially with data coming from the network.
You can inject scripts into the html error page rather
trivially using
http://127.0.0.1:4080/script.../script


But who cares? There are far more dangrous things you
can do if you can make the mldonkey go to URL's for
example
http://localhost:4080/submit?setoption=qoption=allowed_ipsvalue=255.255.255.255
This will unlock the IP based access control, suddenly
everyone in the world can access the search interface.


The whole control system is via http, you can search,
download, whatever all via http. If you can get the
user to go to arbitrary URL's then you can do
dangerous things directly without having to resort to
XSS, although the XSS does have some uses in terms of
automating multiple requests. 

Being really Evil is left as an exercise for the
reader.

Now, if there were some method to inject html via
responses to a p2p search, then the whole thing would
be a little more interesting. Some media files may
contain embedded URL's, that may be an interesting way
of delivering payloads across a P2P network. 

So, at the very least the web iterface should include
some referrer checking to ensure that commands aren't
being generated from untrusted pages. This is a
general problem with any application controlled via
web interfaces.

Chris



__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Jeremiah Cornelius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

FLAME ON!

http://www.itbusiness.ca/index.asp?theaction=61sid=53897

But there are two other techniques: one is called firewalling and the other 
is called keeping the software up to date. None of these problems (viruses 
and worms) happened to people who did either one of those things. If you had 
your firewall set up the right way - and when I say firewall I include 
scanning e-mail and scanning file transfer -- you wouldn't have had a 
problem. But did we have the tools that made that easy and automatic and that 
you could really audit that you had done it? No. Microsoft in particular and 
the industry in general didn't have it.

The second is just the updating thing. Anybody who kept their software up to 
date didn't run into any of those problems, because the fixes preceded the 
exploit. Now the times between when the vulnerability was published and when 
somebody has exploited it, those have been going down, but in every case at 
this stage we've had the fix out before the exploit. So next is making it 
easy to do the updating, not for general features but just for the very few 
critical security things, and then reducing the size of those patches, and 
reducing the frequency of the patches, which gets you back to the code 
quality issues. We have to bring these things to bear, and the very dramatic 
things that we can do in the short term have to do with the firewalls and the 
updating infrastructure. 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/oqq3Ji2cv3XsiSARAlkdAJ0aGkBViYkoE193iZycTmQZohzwbQCg1KDA
SjPLY1EEzamQCtIGKwJT1Vk=
=mIsY
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] nEW wINDOWS EXPLOIT -- 100% D.O.S.

2003-10-31 Thread Steve Wray
Yeah the patch doesn't even work; any 1337 HaQQoR could
easily just rip the square patch of gaffa tape right off
of the switch and then DoS my bOx easy as!

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 [EMAIL PROTECTED]
 Sent: Friday, 31 October 2003 10:23 a.m.
 To: vb
 Cc: [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] nEW wINDOWS EXPLOIT -- 100% D.O.S.
 
 
 Word is ... it affects ALL patched systems regardless of 
 patch level/version ... And the patch is already there 
 ... so there is no fix.
 
 Sorry, a little (additional) levity never hurts .. ;)
  {BIMPIN ADVISORY}
  
  [PLATFORM]
  I TESTED THIS ON A WINDOWS XP BOX. IT WAS PATCHED.
  
  DISCOVERY
  aLMOST EVERY COMPUTER HAS A SWITCH ON IT SOMEWHERE. 
 SOMETIMES THEY ARE
  VIZIBLE, SOMETIMES THEYR HIDDEN. IF A HAQQER WERE TO TAMPER 
 OR MOVE THIS
  SWITCH, IT COULD CAUSE A MASSIVE DOS ON THAT MACHINE.
  
  {THE EXPLOYT}
  
  FIND AN UNATTENDED PC THAT IS TURNED ON. FIND THE SWITCH
  MOVE THE SWITCH UP AND DOWN OR IN AND OUT. IF YOU DO IT 
 RIGHT, THE MACHINE
  WILL DOS1%
  
  mAN, THIS IS SO AWESOME.IM GUNNA BECOME A FAYMOUS 
 CONPUTER SECURITY
  CUNSULTENT. WOW THIS LIST THING IS AWESOME. WOW, MY FRIENDS 
 BACK AT GOBBLES
  HEADQUARTERS ARE GUNNA LIFT ME UPON THER SHOULDERS.
  AND YOU SKRIPT KIDDIES THOUGHT YOU COULD OUTSMART ME
  
  HEHE
  BIMPIN 4 EVA
  
  
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Ben Nelson
Blocking all internal-external traffic and then allowing ONLY the 
needed services from the necessary hosts is the best way to stop this 
sort of abuse.  Then, using a web proxy that filters web content and 
only understands HTTP (to prevent other services from being tunneled 
over port 80), you should be good to go.

--Ben

Earl Keyser wrote:
Help needed, please.

We use all cisco networking gear. Currently using a cisco cache engine
with SmartFilter to manage the surfing for our staff/students.  As
usual, the little devils figured a way to get around it. 

They went to Google, entered open proxy list and bingo-bango.  From
this list they found open proxies to use in IE.
Besides suspending them, we made one technological change. Outgoing
ports 8000, 8080,  and 3128 are now blocked at the firewall.
Can anyone suggest further refinements to reduce this kind of abuse? I
know some proxies run on port 80, but I'll have to live with that.
TIA

Earl

Earl Keyser, Network Specialist
Wayzata Public Schools
763-745-5105
Unix IS user-friendly. It's just picky about who its friends are.

This outbound message has been scanned for viruses by ISD#284.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Ben Nelson
Blocking all internal-external traffic and then allowing ONLY the 
needed services from the necessary hosts is the best way to stop this 
sort of abuse.  Then, using a web proxy that filters web content and 
only understands HTTP (to prevent other services from being tunneled 
over port 80), you should be good to go.

--Ben

Earl Keyser wrote:
Help needed, please.

We use all cisco networking gear. Currently using a cisco cache engine
with SmartFilter to manage the surfing for our staff/students.  As
usual, the little devils figured a way to get around it. 

They went to Google, entered open proxy list and bingo-bango.  From
this list they found open proxies to use in IE.
Besides suspending them, we made one technological change. Outgoing
ports 8000, 8080,  and 3128 are now blocked at the firewall.
Can anyone suggest further refinements to reduce this kind of abuse? I
know some proxies run on port 80, but I'll have to live with that.
TIA

Earl

Earl Keyser, Network Specialist
Wayzata Public Schools
763-745-5105
Unix IS user-friendly. It's just picky about who its friends are.

This outbound message has been scanned for viruses by ISD#284.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Stephen Blass


  the fixes preceded the exploit. 

and pigs fly

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Proxies

2003-10-31 Thread Bassett, Mark
Doesn't matter, you can still set up a squid http proxy on port 80 and
funnel everything through it.  Web traffic will appear through port 80.
If you analyzed the protocols, and made sure nothing but http traffic
was going through port 80 you would eliminate using other apps through
the port 80 proxy, but you cannot eliminate a port 80 http proxy for
http traffic.  You could set a policy in your domain to restrict proxy
settings, but a user could always use a different browser (group policy
only effects IE)  Currently I use a squid http proxy on port 80 to
bypass my own firewall to listen to shoutcast radio, IRC, and ftp to
non-standard ports.  Protocol inspection and analysis could eliminate
some of this, but would the overhead be worth it?  You could do a couple
things to detect that people were using proxies though.  Parse through
your logs / ip accounting for repeated hits to hosts on port 80 and the
source ip, have it email you those ips and investigate.  

Mark Bassett
Network Administrator
World media company
Omaha.com
402-898-2079


-Original Message-
From: Charles E. Hill [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2003 12:36 PM
To: Earl Keyser
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Proxies

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

You can never get around it, as you're aware -- proxies on ports 80, 20,
21, 
22 or something else really common will always be available.

However, since you need to show due diligence, you can do the following.

1. Have the administration set a policy with some teeth.  If you avoid
the 
proxy, your account gets suspended or some such.

2. And I'm not sure how easy this will be... restrict protocols to their
known 
ports.  Configure your firewall to only allow HTTP traffic through Port
80, 
and not other ports.  FTP only through 20  21.  SSH only through22,
etc.

Don't allow HTTP headers through any other port.


On Friday 31 October 2003 09:20, Earl Keyser wrote:

- -- 
Charles E. Hill
Technical Director
Herber-Hill LLC
http://www.herber-hill.com/

 Help needed, please.

 We use all cisco networking gear. Currently using a cisco cache engine
 with SmartFilter to manage the surfing for our staff/students.  As
 usual, the little devils figured a way to get around it.

 They went to Google, entered open proxy list and bingo-bango.  From
 this list they found open proxies to use in IE.

 Besides suspending them, we made one technological change. Outgoing
 ports 8000, 8080,  and 3128 are now blocked at the firewall.

 Can anyone suggest further refinements to reduce this kind of abuse? I
 know some proxies run on port 80, but I'll have to live with that.

 TIA

 Earl

 Earl Keyser, Network Specialist
 Wayzata Public Schools
 763-745-5105

 Unix IS user-friendly. It's just picky about who its friends are.


 This outbound message has been scanned for viruses by ISD#284.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE/oquDeljutq/VnacRAhvXAJ0ZHREfG345O+vx/3at6m4g+zjh3wCfYra2
J34T2QGPXZ9Nn4DWKBiu9/g=
=hOps
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Omaha World-Herald Company computer systems are for business use only.
This e-mail was scanned by MailSweeper


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Kenneth R. van Wyk
Jeremiah Cornelius posted an excerpt from an interview with Bill Gates earlier 
here.  FYI, in response to Mr. Gates's quote, my co-author and I have written 
an _opinion_ piece, included below.  We feel pretty strongly that Mr. Gates 
is missing (at least) a couple of important issues.

Cheers,

Ken van Wyk

=

31 October 2003

In a recent interview for ITBusiness.ca (full text available at
http://www.itbusiness.ca/index.asp?theaction=61sid=53897), Microsoft
Chairman and Chief Software Architect Bill Gates is quoted as having
said:

  You don't need perfect code to avoid security problems. There
  are things we're doing that are making code closer to perfect,
  in terms of tools and security audits and things like that. But
  there are two other techniques: one is called firewalling and
  the other is called keeping the software up to date. None of
  these problems (viruses and worms) happened to people who did
  either one of those things. If you had your firewall set up the
  right way -- and when I say firewall I include scanning e-mail
  and scanning file transfer -- you wouldn't have had a
  problem.

Mr. Gates overlooks here two critical points.

First, firewalling and patching can not in fact shield networks from
all of the impact of worms and viruses. Ask any experienced network
admin. There will always be users who bring into a firewalled network
a laptop that was, for example, infected at home. Once that infected
laptop is connected to the enterprise, the firewall is irrelevant.
Worse yet, no matter how aggressively a company has propagated a patch
throughout the network, the routine influx of vulnerable, unpatched
systems (from that same migrant laptop community) will continue to
supply fresh meat for the malicious software.

Second, the security of the application itself is tightly bound to
its design and implementation as well. A company that writes its own
business software could well go broke following Mr. Gates's advice.

To illustrate this, let's consider a hypothetical example that is very
realistic in today's business environment.  A company writes a
web-based application that enables its customers to login and purchase
its goods.  In keeping with Mr. Gates's recommendations, they install
a high quality, state of the art firewall and put in place processes
for rapidly installing every security patch that Microsoft releases.
(Perhaps they test them in a controlled lab environment first.)

Now, let's further say that the team that wrote the application
software took the above quote by Mr. Gates to be accurate.  But it
turns out that there's a problem in the software that the team wrote.
Because their front-end software (that runs on their web server)
doesn't properly screen users' input -- after all, you don't need
perfect code -- and an attacker discovers that a vulnerability known
as SQL Insertion exists in the application.  The SQL Insertion
vulnerability enables the attacker to enter SQL-based database
inquiries directly to the back-end database server, and make
read/write changes to the database at will -- perhaps he would change
the price of his purchase to $0 and the quantity of his order to
1000, or some such.  You get the drift.

In this hypothetical example, the firewall did its job perfectly.
All systems had up-to-date security patches installed. Yet the
attack succeeded at compromising the database system (AKA the
company's crown jewels).

While it's true that perfect code is probably not achievable,
you do need secure enough code; and achieving that takes a great
deal more than a good firewall and patch maintenance processes.  It
takes a sound design, built on top of a firm architecture. It takes
an implementation of the software that is free of such common flaws as
SQL Insertion, buffer overflows, and the like. And, it takes a well
designed and operated production environment with a firewall and such.

Every Software Designer and Software Architect in major corporations
needs to understand these principles if their own network and business
applications are to be secure.

Mark G. Graff
Kenneth R. van Wyk
Authors, Secure Coding
http://www.securecoding.org

Copyright (C) 2003, Mark G. Graff and Kenneth R. van Wyk.
Permission granted to reproduce and distribute in entirety with credit to 
authors.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IE6 - Crash via DOS device

2003-10-31 Thread morning_wood
 none of them worked for me...
 version 6.0.2800.1106.xpsp2.030422-1633
 windows xp corp. with sp1
 -- 
 [EMAIL PROTECTED]
 AIM: l4m3n00b
 MSN: [EMAIL PROTECTED]
 http://www.instable.net
 GnuPG Public Key: http://www.instable.net/pubkey.asc
 The only sovereign you can allow to rule you is reason. - Wizard's 
 Sixth Rule, Faith of the Fallen by Terry Goodkind

thanks, i was running win2k ie6 2800.1106

in the meantime i stumbled on this, you could try...

http://exploitlabs.com/files/notices/activedesktop.html



Donnie Werner
[EMAIL PROTECTED]
http://exploitlabs.com 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Richard Spiers

- Original Message - 
From: Ben Nelson [EMAIL PROTECTED]
To: Earl Keyser [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, October 31, 2003 8:06 PM
Subject: Re: [Full-Disclosure] Proxies


 only understands HTTP (to prevent other services from being tunneled
 over port 80), you should be good to go.

That isn't going to stop other services from being tunneled over port 80.
There quite a few ways to do this. See Firepass. It is a tunneling tool,
allowing one to bypass firewall restrictions and encapsulate data flows
inside legal ones that use HTTP POST requests. TCP or UDP based protocols
may be tunneled with Firepass

http://www.gray-world.net/pr_firepass.shtml

and no, I don't work for them, I don't know them, and I have no commercial
interest in advertising this freeware product ;p View it as proof of concept
;p

What exactly are you trying to stop these students from doing? Is there a
problem with them visiting certain sites, or using certain services or
bandwith restricitions etc?

Thanks
Richard Spiers

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Jakob Lell
Hello,
you can't really prevent users from accessing some sites. Even if you block 
all direct connection from the clients to external adresses (which would stop 
http proxies), users can still use services like http://www.the-cloak.com/.
The only thing which might help is locking the account of those users trying 
to circumvent the restrictions.
Regards
Jakob


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IE6 - Crash via DOS device

2003-10-31 Thread |reduced|minus|none|
morning_wood wrote:
Oct 30, 2003
Donnie Werner
[EMAIL PROTECTED]
I thought these bugs in Internet Explorer 6 had been fixed...

all of these make use of a local call to a
legacy DOS device, example
( file:///AUX ) as a link, called in an iframe ( XSS ) or used as an IMG
tag.
I tested,  CON, PRN, AUX, COMx, LPTx, CLOCK$ and NUL
only AUX and COM1 caused a lockup of Internet Explorer 6
do these links crash your browser?
1. http://exploitlabs.com/files/notices/AUXcrash.html --- click for links
to crash
2. http://exploitlabs.com/files/notices/AUX-iframe.html -- click this link
to crash
3. http://exploitlabs.com/files/notices/AUX-img.html -- click this link to
crash
note: these can be embeded via Cross Site Scripting ( XSS ) to deny service
to a website to those clients trying to connect via affected versions of IE6
Donnie Werner
http://exploit.labs.com
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
none of them worked for me...
version 6.0.2800.1106.xpsp2.030422-1633
windows xp corp. with sp1
--
[EMAIL PROTECTED]
AIM: l4m3n00b
MSN: [EMAIL PROTECTED]
http://www.instable.net
GnuPG Public Key: http://www.instable.net/pubkey.asc
The only sovereign you can allow to rule you is reason. - Wizard's 
Sixth Rule, Faith of the Fallen by Terry Goodkind



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] IE6 - Crash via DOS device

2003-10-31 Thread Richard Spiers

- Original Message - 
From: morning_wood [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 31, 2003 9:08 PM
Subject: [Full-Disclosure] IE6 - Crash via DOS device


 Oct 30, 2003
 Donnie Werner
 [EMAIL PROTECTED]
 
 I thought these bugs in Internet Explorer 6 had been fixed...
 
 all of these make use of a local call to a
 legacy DOS device, example
 ( file:///AUX ) as a link, called in an iframe ( XSS ) or used as an IMG
 tag.
 I tested,  CON, PRN, AUX, COMx, LPTx, CLOCK$ and NUL
 only AUX and COM1 caused a lockup of Internet Explorer 6

Not on my side. None of those links crashed my browser

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] _another_ Internet explorer vulnerability (spread via IRC) - new variation of irc.trojan.fgt

2003-10-31 Thread Tom Russell



Another worm spreading through IRC - the only 
reported solution to infection being reformatting your computer.

The URL given is: (DO NOT VISIT WITH IE IF YOU 
VALUE YOUR OPERATING SYSTEM)
http://www. 
angelfire.com/pro/pics33/jessica_alba.jpg

The virus/worm is exactly the same as the 
previously reported 'Fgt' britney.jpg virus.
For more information visit the following symantec 
site:

http://securityresponse.symantec.com/avcenter/venc/data/pf/irc.trojan.fgt.html

Regards,
Tom Russell
2tone:development (www.2tone-dev.com)


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Valdis . Kletnieks
On Fri, 31 Oct 2003 10:35:41 PST, Charles E. Hill said:

 Don't allow HTTP headers through any other port.

I'm having some trouble with our webserver.  We send

GET /foobar.cgi HTTP/1.1

*BLAM*no carrierthwe

False positives suck..


pgp0.pgp
Description: PGP signature


RE: [Full-Disclosure] Proxies

2003-10-31 Thread S G Masood

It is more or less impossible with current technology
to set up an automated system to *completely* prevent
users from accessing certain HTTP content. What I mean
here is that everything available can be bypassed. 

How do you block *all* HTTP proxies, for instance(a la
Surfola and party)? How about custom written CGI
proxies? How about JAP like software?


 You could do a couple
 things to detect that people were using proxies
 though.  Parse through
 your logs / ip accounting for repeated hits to hosts
 on port 80 and the
 source ip, have it email you those ips and
 investigate.  

IMHO, these kind of measures are the only thing you
can do to enforce your content access policies.

--
S.G.Masood
Hyderabad,
India.


__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Proxies

2003-10-31 Thread adam.richards
Users can also setup a hotmail account and email themselves links to
site.  Then log into hot and click there link.  As most of you know that
hotmail will open the website within itself and to any logs/traffic it
looks like there surfing on hotmail.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Richard
Spiers
Sent: Friday, October 31, 2003 2:48 PM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Proxies



- Original Message - 
From: Ben Nelson [EMAIL PROTECTED]
To: Earl Keyser [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, October 31, 2003 8:06 PM
Subject: Re: [Full-Disclosure] Proxies


 only understands HTTP (to prevent other services from being tunneled 
 over port 80), you should be good to go.

That isn't going to stop other services from being tunneled over port
80. There quite a few ways to do this. See Firepass. It is a tunneling
tool, allowing one to bypass firewall restrictions and encapsulate data
flows inside legal ones that use HTTP POST requests. TCP or UDP based
protocols may be tunneled with Firepass

http://www.gray-world.net/pr_firepass.shtml

and no, I don't work for them, I don't know them, and I have no
commercial interest in advertising this freeware product ;p View it as
proof of concept ;p

What exactly are you trying to stop these students from doing? Is there
a problem with them visiting certain sites, or using certain services or
bandwith restricitions etc?

Thanks
Richard Spiers

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Exibar
What an idiot

   Take the loveletter worm, when it was first released even if you had a
100% up to date AntiVirus software program, you would still get hit within
the first 8 hours slammer, blaster, etc all the same thing.The took
advantage of holes in the OPERATING SYSTEM

   Yes we have ways of updating our VirusSoftware that works very very well,
McAfee has E-Policy Orchstrator, which I swear by.

  I'm not going to go on, but if Windows was as secure as Bill Gates and
company says it is, why was blaster, slammer, codered etc even an issue?

   Exibar


- Original Message - 
From: Jeremiah Cornelius [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 31, 2003 1:32 PM
Subject: [Full-Disclosure] Gates: 'You don't need perfect code' for good
security


 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 FLAME ON!

 http://www.itbusiness.ca/index.asp?theaction=61sid=53897

 But there are two other techniques: one is called firewalling and the
other
 is called keeping the software up to date. None of these problems (viruses
 and worms) happened to people who did either one of those things. If you
had
 your firewall set up the right way - and when I say firewall I include
 scanning e-mail and scanning file transfer -- you wouldn't have had a
 problem. But did we have the tools that made that easy and automatic and
that
 you could really audit that you had done it? No. Microsoft in particular
and
 the industry in general didn't have it.

 The second is just the updating thing. Anybody who kept their software up
to
 date didn't run into any of those problems, because the fixes preceded the
 exploit. Now the times between when the vulnerability was published and
when
 somebody has exploited it, those have been going down, but in every case
at
 this stage we've had the fix out before the exploit. So next is making it
 easy to do the updating, not for general features but just for the very
few
 critical security things, and then reducing the size of those patches, and
 reducing the frequency of the patches, which gets you back to the code
 quality issues. We have to bring these things to bear, and the very
dramatic
 things that we can do in the short term have to do with the firewalls and
the
 updating infrastructure. 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.2.3 (GNU/Linux)

 iD8DBQE/oqq3Ji2cv3XsiSARAlkdAJ0aGkBViYkoE193iZycTmQZohzwbQCg1KDA
 SjPLY1EEzamQCtIGKwJT1Vk=
 =mIsY
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Valdis . Kletnieks
On Fri, 31 Oct 2003 13:21:56 MST, Stephen Blass [EMAIL PROTECTED]  said:
   the fixes preceded the exploit. 
 
 and pigs fly

From RFC1925:

   (3)  With sufficient thrust, pigs fly just fine. However, this is
not necessarily a good idea. It is hard to be sure where they
are going to land, and it could be dangerous sitting under them
as they fly overhead.




pgp0.pgp
Description: PGP signature


Re: [Full-Disclosure] Proxies

2003-10-31 Thread Ben Nelson
only understands HTTP (to prevent other services from being tunneled
over port 80), you should be good to go.


That isn't going to stop other services from being tunneled over port 80.
There quite a few ways to do this. See Firepass. It is a tunneling tool,
allowing one to bypass firewall restrictions and encapsulate data flows
inside legal ones that use HTTP POST requests. TCP or UDP based protocols
may be tunneled with Firepass
Very true.  Bottom linethere will always be a way.  It's just a 
matter of how sophisticated your clients (K-12 students and teachers in 
this case) are.If you can narrow the illegal traffic down enough 
that any breaches are an anomoly that is caught by your IDS (or some 
other form of monitoring), then you're doing well.  Once the anomoly 
shows up, you can enforce your policy; which I should mention should 
also be an integral part of the security architecture.  If you can't 
enforce the policy, there's no incentive to follow it.

$.02
--Ben
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Robert Ahnemann
   the fixes preceded the exploit.
 
 and pigs fly

The fixes might precede the exploit, but this says nothing to the fact
that A) Not everyone can run the fixes, or B) The fixes actually fix the
problem.

Rob Ahnemann
Intranet Application Developer
1401 S. Lamar St.
Dallas, TX 800.270.8565 x 780
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Kenton Smith
On Fri, 2003-10-31 at 11:12, yossarian wrote:
 snip
  File and printer sharing is not needed?  Remote administration is not
  needed?  Maybe not in home use, but in corporate?
 
 No, sorry Paul. Printers have their own IP address, file and printersharing
 was introduced for small networks. But since the mid nineties a network
 interface became standard in laserprinters- printersharing became a real non
 issue. File sharing: not for workstations, unless you make backups of every
 workstation. Not suitable for corporations, user data is corporate property,
 needs a back up so MUST be on a server. It is impossible to secure a network
 where file and printsharing is common (where is the sensitive info to
 secure?) - my personal BOFH way is disable the server service on every
 Workstation. And the browser service as well.
 
What planet are you working on? I have bought 5 printers in the last
three years and 2 of those had built-in network cards. The others use
jet-Direct type interfaces which require software to be installed on
the server. You're saying I install this on everyone's workstation so
they can connect directly? Uh huh. No file sharing; everything should be
stored on a central server. Sure, no problem I'll just go out and drop
$100k on a SAN to store it all. *Or* I could take advantage of the fact
that every machine I buy comes with at least 40 GB of drive space on it.
And I'm sure you're going to suggest thin clients here, so I'll go out
and buy a small render farm for my graphics guys to do their 3D work on.

 Remote administration may be needed, I just said it is rarely used, for
 various reasons, the foremost being that the support staff don't know sh**t
 about the inner workings of windows, MCP or not.

Right and what inner workings do I need to know to use my remote patch
management software without RPC? It's really handy actually, but then
again maybe there's a better way to do it that I'm just to stupid to
know about.

snip

Hopefully we can all agree that anything Microsoft can do to attempt to
make it's O/S more secure is better than the way it is now.

Kenton


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft plans tighter security measures inWindows XP SP2

2003-10-31 Thread yossarian
 On Fri, 2003-10-31 at 11:12, yossarian wrote:
  snip
   File and printer sharing is not needed?  Remote administration is not
   needed?  Maybe not in home use, but in corporate?
 
  No, sorry Paul. Printers have their own IP address, file and
printersharing
  was introduced for small networks. But since the mid nineties a network
  interface became standard in laserprinters- printersharing became a real
non
  issue. File sharing: not for workstations, unless you make backups of
every
  workstation. Not suitable for corporations, user data is corporate
property,
  needs a back up so MUST be on a server. It is impossible to secure a
network
  where file and printsharing is common (where is the sensitive info to
  secure?) - my personal BOFH way is disable the server service on every
  Workstation. And the browser service as well.
 
 What planet are you working on? I have bought 5 printers in the last
 three years and 2 of those had built-in network cards. The others use
 jet-Direct type interfaces which require software to be installed on
 the server. You're saying I install this on everyone's workstation so
 they can connect directly? Uh huh. No file sharing; everything should be
 stored on a central server. Sure, no problem I'll just go out and drop
 $100k on a SAN to store it all. *Or* I could take advantage of the fact
 that every machine I buy comes with at least 40 GB of drive space on it.
 And I'm sure you're going to suggest thin clients here, so I'll go out
 and buy a small render farm for my graphics guys to do their 3D work on.

I usually work for banks and government agencies - yes SAN systems are
getting fairly normal, nowadays. I think you are in the SoHo market, with 5
printers in three year, 50 users that develop software - the customer I am
working for at the moment has some 5000 printers in the network, all HP with
Jetdirect with an IP adress. I am not a printer admin, so I had to check at
the HP4000 here at home - nope, it runs even when I turn off the server, all
you do is install IP printing service on the workstations, not
printersharing which is a NetBios thingie...  Yeah, you can install software
on the server and share the printer to the users, but to use a shared
resource you do NOT need to install file and printersharing on the
workstations. Like I wrote - workstations, NOT servers.

Jetdirect cards are printerservers, at least the ones in HP's. Connecting a
printer to a PC IMHO makes it a server, albeit a non-ded one - and it is
utterly useless. I am not into thin clients for power users, but this has
absolutely no relation to file or printersharing

And I do consider the big disks in new 'puters a waste of capacity, but
since they cost the same as 4GB few years ago, who cares?
Dunno how it is on the planet you work on, but PC's get stolen on a fairly
regular basis, so having data on it is considered insecure. No need for
firewall, superglue is better here.

And for the SAN thing - I agree people doing rendering takes a lot of disk
space, but Joe Average User won't need so much storage - maybe 50MB per
year. With 2000 users per server - who needs a SAN? Unless you allow them to
store everything - MP3's, holiday snapshots, downloaded software they aren't
allowed to install anyway, bedroom movies, every previous version of every
document, etc. Maybe I am getting old, but what is wrong with disk quota? It
actually increases efficiency, less time needed to find an older document.
Different with developers, graphic types et all, I know, but the large
majority of puterusers type word documents, send e-mail and use big apps
that are serverbased or mainframe based. So no local data.

  Remote administration may be needed, I just said it is rarely used, for
  various reasons, the foremost being that the support staff don't know
sh**t
  about the inner workings of windows, MCP or not.

 Right and what inner workings do I need to know to use my remote patch
 management software without RPC? It's really handy actually, but then
 again maybe there's a better way to do it that I'm just to stupid to
 know about.

Login script. Daisychaining patches. Basic stuff, really.

 snip

 Hopefully we can all agree that anything Microsoft can do to attempt to
 make it's O/S more secure is better than the way it is now.

What is the use of a wrong attempt? A false feeling of security is actually
more dangerous.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread |reduced|minus|none|
Exibar wrote:
What an idiot

   Take the loveletter worm, when it was first released even if you had a
100% up to date AntiVirus software program, you would still get hit within
the first 8 hours slammer, blaster, etc all the same thing.The took
advantage of holes in the OPERATING SYSTEM
loveletter didn't. you had to open it.
--
[EMAIL PROTECTED]
AIM: l4m3n00b
MSN: [EMAIL PROTECTED]
http://www.instable.net
GnuPG Public Key: http://www.instable.net/pubkey.asc
The only sovereign you can allow to rule you is reason. - Wizard's 
Sixth Rule, Faith of the Fallen by Terry Goodkind



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Beaty, Bryan
Correct me if I am wrong but...

I believe every worm listed below could have been prevented had everyone
patched their systems. 

I would like the security community to take more responsibility for
their own (in)actions. If you were hit by Blaster then you failed to
enforce a good patch management policy. Who's fault is that? Patch
management is boring and so we often ignore it. Hackers and worms simply
take advantage of our laziness. I guess blaster could be a form of
social engineering. I know admins don't patch so I can write a worm and
kill the world. 

There is no such thing as perfect code. If you want a completely secure
system you can buy them but they are unbelievably expensive. If you have
a business justification for something that secure then buy it.
Otherwise you have to live with what you can get from Linux, UNIX, or
even Microsoft. 

Microsoft has at least come out with some very good patch management
systems lately (SUS) and they are free. Red Hat charges me a yearly fee
for their RHN. 

I believe the #1 security threat today is poor patch management. Is that
Microsoft's fault?

-- I am off of my soap box now. 

Bryan Beaty

-Original Message-
From: Exibar [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2003 1:40 PM
To: Jeremiah Cornelius; [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Gates: 'You don't need perfect code' for
good security


What an idiot

   Take the loveletter worm, when it was first released even if you had
a 100% up to date AntiVirus software program, you would still get hit
within
the first 8 hours slammer, blaster, etc all the same thing.The
took
advantage of holes in the OPERATING SYSTEM

   Yes we have ways of updating our VirusSoftware that works very very
well, McAfee has E-Policy Orchstrator, which I swear by.

  I'm not going to go on, but if Windows was as secure as Bill Gates and
company says it is, why was blaster, slammer, codered etc even an issue?

   Exibar


- Original Message - 
From: Jeremiah Cornelius [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 31, 2003 1:32 PM
Subject: [Full-Disclosure] Gates: 'You don't need perfect code' for good
security


 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 FLAME ON!

 http://www.itbusiness.ca/index.asp?theaction=61sid=53897

 But there are two other techniques: one is called firewalling and the
other
 is called keeping the software up to date. None of these problems 
 (viruses and worms) happened to people who did either one of those 
 things. If you
had
 your firewall set up the right way - and when I say firewall I include

 scanning e-mail and scanning file transfer -- you wouldn't have had a 
 problem. But did we have the tools that made that easy and automatic 
 and
that
 you could really audit that you had done it? No. Microsoft in 
 particular
and
 the industry in general didn't have it.

 The second is just the updating thing. Anybody who kept their 
 software up
to
 date didn't run into any of those problems, because the fixes preceded

 the exploit. Now the times between when the vulnerability was 
 published and
when
 somebody has exploited it, those have been going down, but in every 
 case
at
 this stage we've had the fix out before the exploit. So next is making

 it easy to do the updating, not for general features but just for the 
 very
few
 critical security things, and then reducing the size of those patches,

 and reducing the frequency of the patches, which gets you back to the 
 code quality issues. We have to bring these things to bear, and the 
 very
dramatic
 things that we can do in the short term have to do with the firewalls 
 and
the
 updating infrastructure. 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.2.3 (GNU/Linux)

 iD8DBQE/oqq3Ji2cv3XsiSARAlkdAJ0aGkBViYkoE193iZycTmQZohzwbQCg1KDA
 SjPLY1EEzamQCtIGKwJT1Vk=
 =mIsY
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Valdis . Kletnieks
On Fri, 31 Oct 2003 15:00:28 MST, Kenton Smith [EMAIL PROTECTED]  said:

 Hopefully we can all agree that anything Microsoft can do to attempt to
 make it's O/S more secure is better than the way it is now.

No.  We can't.

Consider the case of Microsoft letting Bozo the Clown do the design work and
the Three Stooges carrying out the implementation.

Remember that Microsoft is a *business*, and they don't have any responsibility
to you, the customer (since they've managed to thus far evade liability
lawsuits).  They *do* however have a fiduciary responsibility to the
stockholders to maximize the company's bottom line.

As a result, if Bozo, the stooges, and enough press releases to make Gartner
give a pretty 8.5x11 glossy costs $2M, and doing it *right* costs $20M, they
will choose the cheap route unless it's demonstrable that spending $20M will
generate enough additional sales that more than another $18M in profits  will
accrue.

If I were a conspiracy theorist, I'd compare the probable cost of buying off
Guninsky, the @stake crew, and the pivx crew, and compare that to the cost of
actually fixing IE.   Then remember that although the open-source world is
about pride and craftsmanship, Microsoft is all about the benjamins


pgp0.pgp
Description: PGP signature


Re: [Full-Disclosure] Microsoft plans tighter security measures in Windows XP SP2

2003-10-31 Thread Kenton Smith
On Fri, 2003-10-31 at 16:27, [EMAIL PROTECTED] wrote:
 On Fri, 31 Oct 2003 15:00:28 MST, Kenton Smith [EMAIL PROTECTED]  said:
 
  Hopefully we can all agree that anything Microsoft can do to attempt to
  make it's O/S more secure is better than the way it is now.
 
 No.  We can't.
 
 Consider the case of Microsoft letting Bozo the Clown do the design work and
 the Three Stooges carrying out the implementation.
 
I think you maybe got off on a tangent and forgot to explain why you
answered no to my question.
In reference to your anti-capitalist rant... In the last 2 weeks MS has
had to re-release their Oct. 15 patches twice. In that time their stock
price has dropped more than 10%. Could it be that shareholders are
learning that MS needs to do something about their shoddy work?



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents
 First, firewalling and patching can not in fact shield networks from
 all of the impact of worms and viruses. Ask any experienced network
 admin. There will always be users who bring into a firewalled network
 a laptop that was, for example, infected at home.

Part of the problem here is network design. For example, if when laptops are
brought in they were only allowed to connect to a wireless network and that
wireless network was on the far side of the firewall (perhaps slightly more
access than from the internet but still majorly firewalled) and treated as
untrusted systems which they in fact are, then it would not be such an
issue.

There is no rule that says you can't have internal firewalls to separate
untrusted from trusted systems. But you have to design your network around
this idea for it to work.

Geo.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Re: Gates: 'You don't need perfect code' fo r good security

2003-10-31 Thread Andre Ludwig
I think the issue at hand is how Bill has simply given ideas for band aid
patches and not ways to ultimate secure systems.  Fire walling and virus
protection has its place in any environment.  But poorly designed software
with bugs known and unknown should not be a part of a secure system.  So
while some choose to look at the problem at a higher level then others the
issue still remains no matter how many firewalls, av products, IPS's, IDS's
you have in place if your still running shitty software at the end of the
line it is a liability. PLAIN AND SIMPLE

And look at it from Bills view, he cant play on the fact that ultimately it
is the quality of your code that makes a software system safe, not add on
measures.  If he was to openly admit that then it would be the same as Bill
kicking himself in the nuts. Lets face it Bill isn't stupid, he knows what
the real deal is and regardless of what any of us mailing list experts
deem is the truth.  (he is mighty keen on manipulating media as well)

Andre Ludwig, CISSP



-Original Message-
From: Geoincidents [mailto:[EMAIL PROTECTED]
Sent: Friday, October 31, 2003 4:30 PM
To: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code'
for good security


 First, firewalling and patching can not in fact shield networks from
 all of the impact of worms and viruses. Ask any experienced network
 admin. There will always be users who bring into a firewalled network
 a laptop that was, for example, infected at home.

Part of the problem here is network design. For example, if when laptops are
brought in they were only allowed to connect to a wireless network and that
wireless network was on the far side of the firewall (perhaps slightly more
access than from the internet but still majorly firewalled) and treated as
untrusted systems which they in fact are, then it would not be such an
issue.

There is no rule that says you can't have internal firewalls to separate
untrusted from trusted systems. But you have to design your network around
this idea for it to work.

Geo.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-10-31 Thread james
On Fri, 2003-10-31 at 16:50, Beaty, Bryan wrote:
 Correct me if I am wrong but...

I'll be glad to.

 
 I believe every worm listed below could have been prevented had everyone
 patched their systems.

 I would like the security community to take more responsibility for
 their own (in)actions. If you were hit by Blaster then you failed to
 enforce a good patch management policy. Who's fault is that? Patch
 management is boring and so we often ignore it. Hackers and worms simply
 take advantage of our laziness. I guess blaster could be a form of
 social engineering. I know admins don't patch so I can write a worm and
 kill the world. 


Since you directed this to the security community it seems you
are speaking to IT folk and not end users. I **cannot** apply
MS patches till they go through quite a bit of testing. I have been 
bitten with production boxes that are rendered unusable after a round 
of MS patches. We are a BSD/Linux shop with just a few MS boxes but it
still takes a lot of time to make sure the patch(es) will work with
various configurations and applications. I **shudder** to think what
orgs that are all MS have to do to deploy patches.

Who's fault is that?







___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Gary E. Miller
Yo Geo!

On Fri, 31 Oct 2003, Geoincidents wrote:

 Part of the problem here is network design. For example, if when laptops are
 brought in they were only allowed to connect to a wireless network and that
 wireless network was on the far side of the firewall (perhaps slightly more
 access than from the internet but still majorly firewalled) and treated as
 untrusted systems which they in fact are, then it would not be such an
 issue.

So what is your solution for the folks that carry those USB keychain
memories?  People carry those around with virus infected files and
plug them in to whatever machine they are sitting in front of.  Had
people I never seen before try to plug them in to my hosts.  Just
wanted to read my email man

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Gary E. Miller
Yo Geo!

On Fri, 31 Oct 2003, Geoincidents wrote:

  So what is your solution for the folks that carry those USB keychain
  memories?  People carry those around with virus infected files and
  plug them in to whatever machine they are sitting in front of.  Had
  people I never seen before try to plug them in to my hosts.  Just
  wanted to read my email man

 Any virus there should be caught by your AV software. No different than a
 floppy or CD.

And recent experience shows that the virus is a world-wide issue before
the new signatures come out for it.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents
 I think the issue at hand is how Bill has simply given ideas for band aid
 patches and not ways to ultimate secure systems.  Fire walling and virus
 protection has its place in any environment.  But poorly designed software
 with bugs known and unknown should not be a part of a secure system.

You're partially right. Microsoft's biggest mistakes are in 2 places. But
it's not software design, it's default settings and really stupid feature
sets.

First, default settings, they have tended in the past to enable everything
instead of asking where you want to go then only enabling what you need to
get there. Recently I've seen good solid progress being made in this area, a
number of things are now installing OFF or at least have off switches that
are easy to find. I do believe they are on the right track although I'm not
sure they are going to get it right yet.

The second area is adding functions that have no business being there in the
first place. One current example of this is the new functionality they are
adding to office that will allow people who are working in office to
suddenly shoot off to amazon to do some shopping simply because they
mentioned some product in a document. I'll refer to these types of functions
as the desktop salesman.  When this new office feature was first mentioned
here or on one of the other security lists the first comment I saw was
someone asking doesn't this strike anyone as the type of feature that even
SOUNDS exploitable?.

Nobody needs this type of feature but Microsoft being the capitalist they
are know they can make money by charging for advertising space on everyone's
desktops.  Be it web beacons, IE popup windows, Media player exposing DVD
names to outside sites,  picture folders that offer professional printing
services, windowsupdate cataloging your hardware, this new Office feature,
etc. these types of things have no place in a secure desktop environment and
until MS stops selling out the users in favor of the desktop salesman
advertisers we can expect this insanity to continue.

I still see no sign of them relenting on this part of the insanity (with the
exception of email based web beacons, but that was driven by mass revolt).
Microsoft really needs to get back to serving the users and forgetting about
compromising our privacy and anonymity in favor of the marketing types. Only
then will they be able to create a secure desktop environment.

Geo.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents

 So what is your solution for the folks that carry those USB keychain
 memories?  People carry those around with virus infected files and
 plug them in to whatever machine they are sitting in front of.  Had
 people I never seen before try to plug them in to my hosts.  Just
 wanted to read my email man

Any virus there should be caught by your AV software. No different than a
floppy or CD.

Geo.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents

 And recent experience shows that the virus is a world-wide issue before
 the new signatures come out for it.

I think that's more a problem for network spreading of a worm like slammer
or email virus than it is for a virus that infects files you might store on
a memory stick. Typically that type of virus spread would be delayed long
enough that AV should be updated already. But yes, what you suggest is a
possibility.

However, I wasn't saying this is how you create a secure network, I was
just trying to point out one way to deal with the laptop issue. They aren't
trusted systems, don't put them on the trusted network segments.

Geo.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Paul Schmehl
--On Friday, October 31, 2003 5:15 PM -0800 Gary E. Miller 
[EMAIL PROTECTED] wrote:
So what is your solution for the folks that carry those USB keychain
memories?  People carry those around with virus infected files and
plug them in to whatever machine they are sitting in front of.  Had
people I never seen before try to plug them in to my hosts.  Just
wanted to read my email man
Man, that's so easy, I'll answer it.  You just don't allow them to do that. 
It's the just say no method of security.

Hey, it worked for Nancy.  :-)

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Cesar
I am not used to get involved in discussions but i'm
tired of hearing bullshit so here it goes..

Bill said:
... Anybody who kept their software up to date didn't
run into any of those problems, because the fixes
preceded the exploit...

I say:
One of the reasons is because independent security
researchers are being nice with vendors.

Well, i was going to make comments on all what Bill
said but i'm tired. Latelly CEOs of big companies
(Microsoft, Oracle, etc.) have been talking bullshit,
if they would spend more money in QA, security
testing, etc. than marketing the world would be
different, but that's another history this is a
capitalist world the last end is to have good sales.

I say shut up and fix your buggy software and be
thankful that security researchers are being nice with
you, your sales depends a lot on how vulnerabilities
are disclosed and how your software is trusted, so
SHUT UP.

PS: Hey Bill, do you use Outlook for e-mails? I bet
you use a text only e-mail client, you don't want
anyone hacking you, or is your personal computer
running Linux? :)

Cesar.

__
Do you Yahoo!?
Exclusive Video Premiere - Britney Spears
http://launch.yahoo.com/promos/britneyspears/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Charles E. Hill
Gates spoke as a politician.  His comments were very narrowly tailored.

Read them close.  He spoke almost exclusively of Win2003 Server -- which has 
very minimal deployment and is brand new.  I don't know anyone who has 
actually installed Win2k3, yet.

The comments about anyone who patched didn't have these problems and the 
patches proceeded the incidents *WAS CORRECT* -- for the last half-dozen 
issues over the last month -- which is what he was talking about.

It wasn't a general statement on MS security, though it was ambiguous enough.  
He mixed a lot of generalisms (layered security, Windows a target because it 
is more widely deployed) with a lot of non-sequitur specifics (Win2K3 hasn't 
seen a lot of exploits [duh! it isn't widely deployed!  See the last 
sentence!]

Keep in mind how Mr. Gates handled his deposition in the anti-trust trial...

'At other points, Gates has claimed he doesn't know what his interrogators 
mean when they use terms such as concerned, ask and non-Microsoft 
browser.'


-- 
Charles E. Hill
Technical Director
Herber-Hill LLC
http://www.herber-hill.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html