Re: FireWall-1 FTP Server Vulnerability

2000-02-21 Thread Emiliano Kargieman
Mikael Olsson wrote: The only solution that even begins to look "good" is to completely reassemble the TCP stream and not make "educated" guesses about what packet data belongs on what line and in which order and state of the FTP protocol. It doesn't have to be a "proxy" in order to do

Re: DDOS Attack Mitigation

2000-02-21 Thread Randy Bush
ip verify unicast reverse-path This command drops traffic from an interface if that interface is not the route back to the address. ^ preferred best and therein lies the rub randy

Re: AUTORUN.INF Vulnerability

2000-02-21 Thread Jesper M. Johansson
There is a small, but potentially very dangerous vulnerability in Windows (all versions as far as I know, should be 95,98,NT4 SP*, but only really dangerous on NT machines) regarding an autorun.inf file. This is actually a known issue. I believe I reported it about two years ago to NTBugTraq.

Re: Timbuktu Pro 2.0b650 DoS

2000-02-21 Thread deepquest
Hello, This problem also exists on 5.2.1 on the Macintosh platform. Regards, DaleW We tested on 2 computers both ver. 5.2.1 and 5.2.2 computers : Imac 233, Imac 333 powerbook G3 400mhz OS: Mac 8.6, MacOS 9 tools: telnet, and port thrash (from team2600) remote connections:

Re: Default password in Bay Networks switches.

2000-02-21 Thread Colin Johnston
After the baystack code fix (203 code) last year which fixed telnet backdoor known password, not however console backdoor known password issue, I would have thought Nortel would have made some official comment ?? Hot news :) in latest 3.0 code pdf file a comment is made about backdoor password

Patch Available for Site Wizard Input Validation Vulnerability

2000-02-21 Thread Microsoft Product Security
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. Microsoft Security Bulletin (MS00-010)

Re: cisco/ascend snmp config tool or exploit? -- Re: snmp problems still alive

2000-02-21 Thread Michal Zalewski
Hmm, to keep you busy, here's brute-force spoofing scanner for writable snmp communities. Requires NetCat and snmp tools (like snmpget) to be installed. Scanning is mostly harmless - it tries to change system.sysContact.0 to 'null' using common default communities (according to securityfocus).

Re: ebay sends passwords in the clear

2000-02-21 Thread Andrew Bennett
At 11:03 AM 2/16/00 -0800, [EMAIL PROTECTED]: I've been trying to get ebay to do something about this for a month and a half, to no avail. See http://avocado.dhs.org/ebpd/ for details, including an ebay password sniffer. I noticed that ebay has a link on their Sign In feature page to sign in

Sun Internet Mail Server

2000-02-21 Thread Michal Krzysztofowicz
Hello, Sorry if this subject was discussed before.. I have just discovered, that during the install process, SIMS creates a world-readable /tmp/sims_setup.dat file, which, among the others, contains all the passwords in clear text. Here's the example: administrator-name=Directory Manager

FreeBSD Security Advisory: FreeBSD-SA-00:03.asmon

2000-02-21 Thread Kris Kennaway
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-00:03 Security Advisory FreeBSD, Inc. Topic: Asmon/Ascpu

Re: AUTORUN.INF Vulnerability

2000-02-21 Thread jeremy logan
At 12:07 AM 2/18/00 -0500, Eric Stevens wrote: ... --the meat and an example-- The vulnerability is that it is somewhat arbitrary for a programmer to throw together a small executable that checks the current user, and possibly that user's permissions on the local machine. This executable could

Re: Doubledot bug in FrontPage FrontPage Personal Web Server.

2000-02-21 Thread Jeff Dafoe
On Fri, 18 Feb 2000, GALES,SIMON (Non-A-ColSprings,ex1) wrote: I was able to reporduce this on a PWS installation under Win98 second edition. Jeff Dafoe System Administrator Evolution Communications, Inc. Does this only occur on Win9x? Has anyone been able to reproduce this? Jan,

Patch Available for VM File Reading Vulnerability

2000-02-21 Thread Microsoft Product Security
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. Microsoft Security Bulletin (MS00-011)

Re: cisco/ascend snmp config tool or exploit? -- Re: snmp problems still alive

2000-02-21 Thread Michal Zalewski
On Sun, 20 Feb 2000, Michal Zalewski wrote: Please use this tool to scan your network only. Aah, forgotten. Parameters accepted by snmpget seems to be different on different implementations. For newer Linux ucb-snmp versions, you might want to change 'snmpget -R 2' to 'snmpget -r 2 -t 2' to

Re: AUTORUN.INF Vulnerability

2000-02-21 Thread Nick FitzGerald
Eric Stevens wrote: --introduction-- There is a small, but potentially very dangerous vulnerability in Windows (all versions as far as I know, should be 95,98,NT4 SP*, but only really dangerous on NT machines) regarding an autorun.inf file. snip Eric missed several details in his

FreeBSD Security Advisory: FreeBSD-SA-00:04.delegate

2000-02-21 Thread Kris Kennaway
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-00:04 Security Advisory FreeBSD, Inc. Topic: Delegate

MMDF

2000-02-21 Thread Cave, Glynis
Ran Atkinson [[EMAIL PROTECTED]] wrote NAI is incorrect in asserting that the current public release of MMDF is 2.43. That version has been outdated for over 5 years. Folks interested in MMDF might check out "http://www.mmdf.org". The current public release of MMDF is in fact the 2.44 release

Re: AUTORUN.INF Vulnerability

2000-02-21 Thread Valentin Pletzer
Hi maybe some addition to that: At 00:07 18.02.00 -0500, you wrote: administrative privileges, then it invokes Explorer on that directory to open the directory like normal. This is not true if the directory is opened with the Workplace and not the Explorer very real exploit; no directory

Local / Remote Exploiteable Buffer Overflow Vulnerability in InterAccess TelnetD Server 4.0 for Windows NT

2000-02-21 Thread Ussr Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Local / Remote Exploiteable Buffer Overflow Vulnerability in InterAccess TelnetD Server 4.0 for Windows NT USSR Advisory Code: USSR-233 Release Date: February 22, 2000 Systems Affected: InterAccess TelnetD Server 4.0 for Windows NT and

Re: rp_filter? (was Re: DDOS Attack Mitigation)

2000-02-21 Thread Chuck Phillips
Linux already has such an option; just go for f in /proc/sys/net/ipv4/conf/*/rp_filter; do echo 1 $f done and the routing logic will drop packets with forged source addrs. It's not on by default. Yet. Julien Nadeau writes: I must be

[Debian] New version of make released

2000-02-21 Thread Aleph One
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman February 20, 2000 -