Mikael Olsson wrote:
The only solution that even begins to look "good" is to
completely reassemble the TCP stream and not make "educated"
guesses about what packet data belongs on what line and in
which order and state of the FTP protocol.
It doesn't have to be a "proxy" in order to do
ip verify unicast reverse-path
This command drops traffic from an interface if that interface
is not the route back to the address.
^ preferred best
and therein lies the rub
randy
There is a small, but potentially very dangerous vulnerability in Windows
(all versions as far as I know, should be 95,98,NT4 SP*, but only really
dangerous on NT machines) regarding an autorun.inf file.
This is actually a known issue. I believe I reported it about two years ago
to NTBugTraq.
Hello,
This problem also exists on 5.2.1 on the Macintosh platform.
Regards,
DaleW
We tested on 2 computers both ver. 5.2.1 and 5.2.2
computers : Imac 233, Imac 333 powerbook G3 400mhz
OS: Mac 8.6, MacOS 9
tools: telnet, and port thrash (from team2600)
remote connections:
After the baystack code fix (203 code) last year which fixed telnet backdoor
known password, not however console backdoor known password issue,
I would have thought Nortel would have made some official comment ??
Hot news :)
in latest 3.0 code pdf file a comment is made about backdoor password
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
Microsoft Security Bulletin (MS00-010)
Hmm, to keep you busy, here's brute-force spoofing scanner for writable
snmp communities. Requires NetCat and snmp tools (like snmpget) to be
installed. Scanning is mostly harmless - it tries to change
system.sysContact.0 to 'null' using common default communities (according
to securityfocus).
At 11:03 AM 2/16/00 -0800, [EMAIL PROTECTED]:
I've been trying to get ebay to do something about this for a month and a
half, to no avail. See http://avocado.dhs.org/ebpd/ for details, including an
ebay password sniffer.
I noticed that ebay has a link on their Sign In feature page to sign in
Hello,
Sorry if this subject was discussed before..
I have just discovered, that during the install process, SIMS creates a
world-readable /tmp/sims_setup.dat file, which, among the others, contains
all the passwords in clear text.
Here's the example:
administrator-name=Directory Manager
-BEGIN PGP SIGNED MESSAGE-
=
FreeBSD-SA-00:03 Security Advisory
FreeBSD, Inc.
Topic: Asmon/Ascpu
At 12:07 AM 2/18/00 -0500, Eric Stevens wrote:
...
--the meat and an example--
The vulnerability is that it is somewhat arbitrary for a programmer to throw
together a small executable that checks the current user, and possibly that
user's permissions on the local machine. This executable could
On Fri, 18 Feb 2000, GALES,SIMON (Non-A-ColSprings,ex1) wrote:
I was able to reporduce this on a PWS installation under Win98
second edition.
Jeff Dafoe
System Administrator
Evolution Communications, Inc.
Does this only occur on Win9x? Has anyone been able to reproduce this?
Jan,
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
Microsoft Security Bulletin (MS00-011)
On Sun, 20 Feb 2000, Michal Zalewski wrote:
Please use this tool to scan your network only.
Aah, forgotten. Parameters accepted by snmpget seems to be different on
different implementations. For newer Linux ucb-snmp versions, you might
want to change 'snmpget -R 2' to 'snmpget -r 2 -t 2' to
Eric Stevens wrote:
--introduction--
There is a small, but potentially very dangerous vulnerability in Windows
(all versions as far as I know, should be 95,98,NT4 SP*, but only really
dangerous on NT machines) regarding an autorun.inf file.
snip
Eric missed several details in his
-BEGIN PGP SIGNED MESSAGE-
=
FreeBSD-SA-00:04 Security Advisory
FreeBSD, Inc.
Topic: Delegate
Ran Atkinson [[EMAIL PROTECTED]] wrote
NAI is incorrect in asserting that the current public release
of MMDF is 2.43. That version has been outdated for over 5 years.
Folks interested in MMDF might check out "http://www.mmdf.org".
The current public release of MMDF is in fact the 2.44 release
Hi maybe some addition to that:
At 00:07 18.02.00 -0500, you wrote:
administrative privileges, then it invokes Explorer on that directory to
open the directory like normal.
This is not true if the directory is opened with the Workplace and not the
Explorer
very real exploit; no directory
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Local / Remote Exploiteable Buffer Overflow Vulnerability in
InterAccess TelnetD Server 4.0 for Windows NT
USSR Advisory Code: USSR-233
Release Date:
February 22, 2000
Systems Affected:
InterAccess TelnetD Server 4.0 for Windows NT and
Linux already has such an option; just go
for f in /proc/sys/net/ipv4/conf/*/rp_filter; do
echo 1 $f
done
and the routing logic will drop packets with forged source addrs.
It's not on by default. Yet.
Julien Nadeau writes:
I must be
-BEGIN PGP SIGNED MESSAGE-
-
Debian Security Advisory [EMAIL PROTECTED]
http://www.debian.org/security/ Wichert Akkerman
February 20, 2000
-
21 matches
Mail list logo