Re: Windows Installer msiexec GUID Buffer Overflow

2008-06-03 Thread 0xjbrown41
Other flags may be vulnerable as well. Microsoft has a thing for unicode.

Re: [SE-2008-01] J2ME Security Vulnerabilities 2008

2008-08-07 Thread 0xjbrown41
* establishing of arbitrary phone calls >From RFC 3966 (http://www.faqs.org/rfcs/rfc3966.html): 11. Security Considerations The security considerations parallel those for the mailto URL [RFC2368]. Web clients and similar tools MUST NOT use the "tel" URI to place telephone cal

Re: Re: [SE-2008-01] J2ME Security Vulnerabilities 2008

2008-08-08 Thread 0xjbrown41
Just a correction, I meant to say tel: not callto:. Thanks.

Re: Re: Re: MS Internet Explorer 7 Denial Of Service Exploit

2008-11-24 Thread 0xjbrown41
Not promoting this bug in any way in particular, but browsers should be stable enough to take input and process it with getting 'blown' away. IMHO just because it 'crashes' doesn't mean its an exploit; just because it there is no fault doesn't make it not an issue.

Re: /bin/login gives root to group utmp

2008-12-02 Thread 0xjbrown41
I'm glad you finally seemed to make the 'bug' fixing team of Debian aware of security issues. I'm just glad I personally haven't seem this much scrutiny from the security team or my faith in Debian maintainers in all areas would significantly drop even more. Nice find.

Re: [USN-684-1] ClamAV vulnerability

2008-12-04 Thread 0xjbrown41
[EMAIL PROTECTED]:~$ clamscan -V ClamAV 0.94.1/8713/Tue Dec 2 14:59:31 2008 >From http://securitytracker.com/alerts/2008/Dec/1021296.html: Version(s): prior to 0.94.2 Description: A vulnerability was reported in Clam AntiVirus. A remote user can cause denial of service conditions on the ta

Re: Re: Multiple XSRF in DD-WRT (Remote Root Command Execution)

2008-12-15 Thread 0xjbrown41
That is why it is called a remote command execution via a CSRF vulnerability. Your code should be AT LEAST checking referrers (weak and obscure but helpful) or implementing many of the other protections that are available. See http://www.owasp.org/index.php/Cross-Site_Request_Forgery for more