Re: Reinventing the wheel (aka "Decoding Netscape Mail passwords")

1999-12-16 Thread Aleph One
On Thu, Dec 16, 1999 at 01:33:10PM -0500, Tim Hollebeek wrote: > > In addition, the consequences of this flaw in a Windows environment are > substantially different, due to the lack of access controls. As we > discussed in the technical summary, while there is no perfect solution to > this proble

Microsoft Security Bulletin (MS99-056)

1999-12-16 Thread Aleph One
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. Microsoft Security Bulletin (MS99-056) -

Microsoft Security Bulletin (MS99-057)

1999-12-16 Thread Aleph One
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. Microsoft Security Bulletin (MS99-057) -

Re: Reinventing the wheel (aka "Decoding Netscape Mail passwords")

1999-12-16 Thread John Viega
Hopefully my last email answered your questions, but I will summarize the relevant points if not: 1) The post you mentioned, their crack doesn't work on recent versions of Windows Netscape, which is what we broke. These versions use a much more complex algorithm, which is still very lame. 2) We

Re: SSH 1 Why?

1999-12-16 Thread Emil S Hansen
> > What you are missing is the following: upgrading to SSH 2 > implies upgrading to > > version 2 of the protocol, in order to prevent the > abovementioned problem you > > can no longer support compatibility with version 1.x of the > protocol. So you > > have to update all your SSH servers and cl

Re: [lucid@TERRA.NEBULA.ORG: qpop3.0b20 and below - notes and exploit]

1999-12-16 Thread Qpopper Support
At 12:01 PM 12/16/99 -0800, Richard Trott wrote: >Where these buffer overflows and "other uses of '%s'" that were >repaired only in qpopper 3.x? Are those of us running 2.53 not affected? >Or do we need to upgrade? These bugs only affected 3.0 betas.

Windows NT LSA Remote Denial of Service

1999-12-16 Thread NAI Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 == Network Associates, Inc. SECURITY ADVISORY December 16, 1999 Windows NT LSA Remote Denial of Se

Re: Reinventing the wheel (aka "Decoding Netscape Mail passwords")

1999-12-16 Thread Tim Hollebeek
> I was bit confused with this link ( > http://www.rstcorp.com/news/bad-crypto-tech.html ), since I am not quite > clear if these guys are just reinventing the wheel, or have found > something new. It turns out that the Windows algorithm used in conjunction with the registry is subtly different f

Re: [lucid@TERRA.NEBULA.ORG: qpop3.0b20 and below - notes and exploit]

1999-12-16 Thread Richard Trott
Where these buffer overflows and "other uses of '%s'" that were repaired only in qpopper 3.x? Are those of us running 2.53 not affected? Or do we need to upgrade? Rich On Wed, 1 Dec 1999, Qpopper Support wrote: > All reported buffer overruns are fixed in qpopper3.0b22, which is > available at

Re: SSH 1 Why?

1999-12-16 Thread Iván Arce
Emiel Kollof wrote: > Emiliano Kargieman wrote: > > > > What you are missing is the following: upgrading to SSH 2 implies upgrading to > > version 2 of the protocol, in order to prevent the abovementioned problem you > > can no longer support compatibility with version 1.x of the protocol. So you

Re: Infoseek Ultraseek Remote Buffer Overflow

1999-12-16 Thread Marc
Something we failed to mention, which is rather important, is that only the NT version of Ultraseek is affected. Signed, Marc eEye Digital Security Team http://www.eEye.com | -Original Message- | From: Bugtraq List [mailto:[EMAIL PROTECTED]]On Behalf Of | luciano | Sent: Thursday, Decem

BindView Security Advisory: Vulnerability in Windows NT's SYSKEY feature

1999-12-16 Thread BindView Security Advisory
BindView Security Advisory Windows NT's SYSKEY feature Issue date: December 16, 1999 Contact: Todd Sabin <[EMAIL PROTECTED]> Topic: Vulnerability in Windows NT's SYSKEY encryption Overview: SYSKEY does not fully protect the SAM from off-line attacks. Specifically, dictionary and brute

Cisco Security Advisory: Cisco Cache Engine Authentication Vulnerabilities

1999-12-16 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Cisco Cache Engine Authentication Vulnerabilities Revision 1.2 For public release Thursday, 1999 December 16, at 08:00AM US/Pacific (GMT-0800) === Summary === * A vulnerability

Re: Local / Remote D.o.S Attack in War FTP Daemon 1.70Vulnerability

1999-12-16 Thread ussr secure
Well maybe some times the D.O.S no work in local mode, but in my computer works, in local mode. anyway it works in Remote Mode "Federico - Comnet S.A." wrote: > Yes, we've tried the exploit various computers just for try it, and we can't > use the exploit in the local machine, allways the explo

Re: SSH 1 Why?

1999-12-16 Thread Emiel Kollof
Emiliano Kargieman wrote: > > What you are missing is the following: upgrading to SSH 2 implies upgrading to > version 2 of the protocol, in order to prevent the abovementioned problem you > can no longer support compatibility with version 1.x of the protocol. So you > have to update all your SSH

Xsoldier xploit (was: FreeBSD 3.3 xsoldier root exploit)

1999-12-16 Thread Spidey
Just to make things clear. This is not particular to FreeBSD. This is the xsoldier program compiled normally. In fact, in the distribution of xsoldier, the Makefile precisely specifies that the program should be installed suid: install.bin:: @if [ -d $(BINDIR) ]; then set +x; else

Reinventing the wheel (aka "Decoding Netscape Mail passwords")

1999-12-16 Thread Vanja Hrustic
I was bit confused with this link ( http://www.rstcorp.com/news/bad-crypto-tech.html ), since I am not quite clear if these guys are just reinventing the wheel, or have found something new. Message at: http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-04-15&[EMAIL PROTECTED] c

Infoseek Ultraseek Remote Buffer Overflow

1999-12-16 Thread luciano
USSR & eEye DS Present: Infoseek Ultraseek 3.1 Remote Buffer Overflow USSR Advisory Code:20 eEye DS Advisory Code: AD19991215 Release Date: December 15, 1999 Systems Affected: Infoseek Ultraseek 2.1 to 3.1 and possibly others. The Opener: T1 Internet Connection: $1,000/month D