Re: [Full-Disclosure] Multiple Vulnerabilities in Microsoft Vulnerabilities

2004-02-04 Thread Luca Mihailescu
You gotta be kidding me.This is one of the worst disclosure i've seen lately.

L.

Quoting Willie G [EMAIL PROTECTED]:

 
 Multiple Vulnerabilities in Microsoft Vulnerabilities
 Original issue date: February 02, 2004
 Last revised: -- February 04, 2004
 Source: PERFIDIOUS DOT ORG SECURITY TEAM
 
 Systems Affected
 
 All Microsoft Products
 
 Overview
 
 Microsoft contains multiple vulnerabilities within their vulnerabilities
 the most serious of which could allow another vulnerability to execute
 another vulnerability and open a Pandora's box of vulnerabilities which
 can lead to a Denial of Service attack on an administrator's inbox.
 
 Description
 
 Microsoft Security Bulletins describe vulnerabilities. When issuing these
 vulnerability bulletins, Microsoft has been creating localhost based
 Denial of Service attacks on administrator mailboxes worldwide. The
 problem arises by various security organizations releasing too many
 Microsoft vulnerability alerts for programs which have security flaws.
 
 /
 [EMAIL PROTECTED]:~ mutt -y
 --- Mutt --- defrauded : ~/Maildir/.ms-sec  [ 1743765209473471876432 msgs
 
 SEGMENTATION FAULT
 /
 
 Impact
 
 This problem is becoming a costly one for administrators worldwide and a
 estimates show billions of dollars in losses incurred by this
 vulnerability because of the time spent sifting through these
 vulnerabilities, adding patches, updating, etc.
 
 Solutions
 
 Remove your email address from mailing lists which post Microsoft Security
 updates
 
 Install an alternative Operating System
 
 
 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 That vulnerability is theoretical
 
 Willie G.
 [EMAIL PROTECTED]
 Shafted US Security Team
 00-212-555-1269
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] antivirus s/w

2004-01-27 Thread Luca Mihailescu
You can also take a look @ BitDefender ( www.bitdefender.com ). Got pretty good
reviews and good pricining.

/luca

Quoting Patrick J Okui [EMAIL PROTECTED]:

 Hi all,
 
 (.*flames.*/dev/null)
 
 1. I'm trying to decide on an AV solution for a campus wide n/w.
 I'm basically looking for something that'll respond as quick as
 possible to new viruses. I'm currently evaluating NAV, and Fprot.
 Any other suggestions/recomendations?
 
 2. Fprot have an AV 4 linux/bsd workstationsdoes this just
 scan for virii from infected winbloze or are there un*x virii i'm
 ignorant about?
 
 
 thx.
 patrick.
 
 -- 
 patrick
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Anti-MS drivel

2004-01-17 Thread Luca Mihailescu

David,

Your company is obivously a geek friendly enviroment where not using m$
products is ok and not a business requirement.But when you have tons of
presentations monthly where the client is only using Powerpoint ( and only
powerpoint because it's working for him ) , using OpenOffice it's NOT an
option.Same goes for the rest of office products.
We have around 600 desktops running a mix of win 2k/ xp pro and maybe 50
servers
running 2k server and 2k3 server.We use a checkpoint fw and symantec corporate
edition for antivir.
Last time I've seen a server infected was 3 years ago ( one nt machine
everybody
forgot about got owned using unicode exploit ).As for virii we NEVER had an
infection.
It all boils down to keeping an eye on what's out there in terms of exploits
and
being pro-active.And don't give the we dont have enough manpower to deal with
all the windows exploits stuff.
I dont even remember when was the last time i had to go to a machine and
install
a patch ( we're using software update services for that - does a good job and
it's free ). The antivirus server is deploying updated virus def files as soon
is it gets any...and so on.
Ah, and the mail server strips any funny mail attachments.

Luca.





Quoting Edward W. Ray [EMAIL PROTECTED]:

 Mary:
 
 Cisco at least has competition.  Juniper Networks has about a 25% share of
 the router market, which keeps Cisco honest.  Microsoft has almost market
 penetration at the desktop for both the home and business.  IMHO, they
 deserve all the anti-MS drivel people can dish out.  I will tire of it when
 I don't have to spend an hour each month clearing my firewall logs of
 attempted Code Red and Nimda infection attempts
 
 Edward W. Ray  
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Mary Landesman
 Sent: Thursday, January 15, 2004 10:55 AM
 To: David F. Skoll; [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Subject: Re: [Full-Disclosure] Re: January 15 is Personal Firewall Day, help
 the cause
 
 That's pretty much like teaching your kids to never talk to strangers, or
 never visit the bad part of town. Fact is, most crimes are committed by
 people we know. Microsoft is often victimized, mainly because they are so
 ubiquitous. Cisco is running a poll right now to see which of the 17
 critical patches are most important to users, because they only have the
 manpower to fix 10 of them. Should we all stop using Cisco products?
 
 This anti-MS drivel is so tiresome.
 
 -- Mary
 
 - Original Message -
 From: David F. Skoll [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Sent: Thursday, January 15, 2004 12:06 PM
 Subject: [Full-Disclosure] Re: January 15 is Personal Firewall Day, help the
 cause
 
 
 On Wed, 14 Jan 2004 [EMAIL PROTECTED] wrote:
 
  I just wanted to remind everybody that tomorrow is Personal Firewall Day.
  http://www.personalfirewallday.org/
 
 That Web site is utterly disingenuous.  Rather than giving low-value
 information, how about high-value information that actually protects people:
 
 1) Don't use Windows.
 2) Don't use Outlook.
 
 Our company uses neither Windows nor Outlook, and although we do have a
 firewall, we do not use anti-virus software.
 
 Of course, the sponsors of the site (Microsoft and a bunch of anti-virus
 vendors) can hardly see it as being in their interest to actually create
 a secure computing environment.
 
 Regards,
 
 David.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.netsys.com/full-disclosure-charter.html
 



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Networking security problem?

2003-07-10 Thread Luca Mihailescu
I have no idea whatsoever where the problem really is...first of all in
9x land you don't have an admin share ( c$, etc ) so the payroll machine
had the entire c drive shared ( talking about security... ). Dunno if
you have a local domain or using a workgroup in which case you shouldn't
even use the word security in this context.
As for a screen saver password protected to reset the network
connections that's something I haven't seen yet.
Take linux for example and your favorite desktop manager ( ximian for
example ).
Lock the screen and see if your still able to access the defined samba
shares ( I'm using samba to be in the same windoze like world ) on that
machine.Well, they're still accessible and if you use nt domain auth you
don't need a u/p to connect ( if you are already logged into the domain
).
If the payroll stuff is so sensible and you guys have a problem w/
disgruntled employees maybe you should install nt/2k on that box and use
ntfs permissions ( much easier to implement if you have a domain ).

Just my 2 penny,
Luca.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of gregh
Sent: Thursday, July 10, 2003 8:56 PM
To: Disclosure Full
Subject: [Full-Disclosure] Networking security problem?

Tested on XP Home and 98SE only.



I wont make this a real long formal thing as it is quite simple and
rather than make it a bug style report, I am asking for your input.

Scenario:
--

Last year I was working on a 98SE network problem that turned out to be
a busted NIC. The particular NIC was in a payroll machine with obviously
very sensitive info in it. In order to give some sense of security to
the payroll woman, at some time in the past, someone had set up a screen
saver password that she knew how to change. Eg, resume from screen saver
required typing the password to get any further on the machine to a
novice and as she kept the payroll room door locked anyway, it was
deemed enough by management. Unfortunately, though, along came I to
fix a minor problem and to be sure the NIC was responding each way (eg,
it could be seen by the machine in the same office) I installed the NIC,
then went to the other machine to ping it and see if programs were
working OK. Normal routine. Prior to me getting to the other machine,
she had questions and we spent 10 minutes talking and then I went to the
other machine and ran programs, pinged, searched the C drive on the !
 payroll machine and came back to the payroll machine. I found the
machine was locked out by password and as she was standing nearby, I got
her to type the password in and away it all went.

Then it hit me - I had been running programs on the payroll machine from
the other machine in the network. Curious, I went to another office and
did the same thing after forcing the screen saver on. Again it all
worked and I could look up sensitive data. The LAN they have there does
have internet access and has a basic out of the box firewall and they
think they are safe. I pointed out how I easily got in from within their
office and others could do the same straight to the payroll machine from
outside but the manager said they couldn't as we have a firewall.
Well, not wanting to push the point as this was the first time I had
been there, I left it alone but then decided to report those findings to
MS. Eventually they did respond but they said they don't see it as a
problem but WOULD make it an OPTION in the next SP for XP and also I
presume the next full OS (Longhorn?) they issue.

Am I being pedantic here? To my mind, if a password is required to use
the machine locally, it should automatically require the network
connection to be broken. XP goes back to the Welcome screen depending on
your settings or the NT looking username and password box you would all
know. I find it totally mystifying that a machine that is protected at
keyboard level by a password so people cant get into it and look up
sensitive info can still be gotten into at least by the local LAN and
info STILL gained. The problem here is if a disgruntled employee went
postal and knew this info, he/she could do what they want. I understand
the programs and data could be protected in other ways but it also hit
me that there must be quite a few small to medium companies living in a
delirious limbo like this, too.

Any comments? Am I just pedantic or is this really a headbanger?

Greg.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html