Re: [FD] Mozilla extensions: a security nightmare

2015-08-05 Thread Ansgar Wiechers
lnerability, and that user-installed extensions are not subject to company software update procedures. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period prior to patches becoming available." --Jason Coombs on Bugtraq

Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure

2013-08-11 Thread Ansgar Wiechers
ll haven't learned your lesson from being banned from the postfix-users mailing list. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period prior to patches becoming available." --Jason Coombs on Bugtraq

Re: Microsoft Terminal Services vulnerable to MITM-attacks.

2011-02-09 Thread Ansgar Wiechers
On 2011-02-08 sam.vaug...@gmail.com wrote: > Does this issue still exist ? Depends on the configuration. Unless configured to require network level authentication, RDP is still prone to MitM attacks AFAIK. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period

Re: [Full-disclosure] Flaw in Microsoft Domain Account Caching Allows Local Workstation Admins to Temporarily Escalate Privileges and Login as Cached Domain Admin Accounts (2010-M$-002)

2010-12-13 Thread Ansgar Wiechers
network. In which case your point about the domain admin being "bigger" from the domain perspective is true, but is also completely moot, as a local admin could only impersonate another account with local admin privileges. Which he can do anyway. Regards Ansgar Wiechers -- "All

Re: sudoedit local privilege escalation through PATH manipulation

2010-04-20 Thread Ansgar Wiechers
ers file be configured > to allow the attacker to run sudoedit. Perhaps I'm missing something, but how is this a security flaw? A user who is allowed to run "sudoedit" can edit /etc/sudoers, and thus allow himself to run any command anyway. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period prior to patches becoming available." --Jason Coombs on Bugtraq

Re: ZoneAlarm Security Circumvention

2010-03-15 Thread Ansgar Wiechers
is security service as disabled. When "exploiting" this > "vector" (administrative privileges are assumed Anything starting with "a user with administrative privileges can ..." is neither a vulnerability nor a design flaw. Administrators can by design do anyth

Re: Circumventing Critical Security in Windows XP

2010-03-02 Thread Ansgar Wiechers
n't see any reason at all to switch to UAC. You cannot protect a system from its administrator without demoting him from being administrator. Period. And if you are going to demote him: who is going to fix your system when things go wrong? Regards Ansgar Wiechers -- "If a software dev

Re: Circumventing Critical Security in Windows XP

2010-02-19 Thread Ansgar Wiechers
e there isn't any kind of vulnerability or security flaw. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period prior to patches becoming available." --Jason Coombs on Bugtraq

Re: /proc filesystem allows bypassing directory permissions on Linux

2009-10-26 Thread Ansgar Wiechers
On 2009-10-24 Derek Martin wrote: > 1. It circumvents the fact that to write to a file, you MUST be able > to write to its directory, so that the file attributes can be updated. Wrong, because the file's attributes aren't stored in the directory, but in the respective inode.

Re: Insufficient Authentication vulnerability in Asus notebook

2009-05-19 Thread Ansgar Wiechers
nabled by default on any XP. [1] http://www.stefan-kuhr.de/cms/index.php?option=com_content&view=article&id=62&Itemid=73 Regards Ansgar Wiechers -- "The Mac OS X kernel should never panic because, when it does, it seriously inconveniences the user." --http://developer.apple.com/technotes/tn2004/tn2118.html

Re: Insufficient Authentication vulnerability in Asus notebook

2009-05-14 Thread Ansgar Wiechers
. And autorun on all drives. Regards Ansgar Wiechers -- "The Mac OS X kernel should never panic because, when it does, it seriously inconveniences the user." --http://developer.apple.com/technotes/tn2004/tn2118.html

Re: [DSECRG-09-009] APC PowerChute Network Shutdown's Web Interface - XSS vulnerability

2009-02-26 Thread Ansgar Wiechers
SRG> Bug: XSS/Response Splitting > > DSRG> Solution: Use Firewall > > Just wonder: how can firewall to protect against XSS/response splitting? You don't give the bad guys access to your UPS's web interface? Regards Ansgar Wiechers -- "The M

Re: Has anyone implemented "double forward DNS"?

2008-09-03 Thread Ansgar Wiechers
net [EMAIL PROTECTED]:~ $ host mail.planetcobalt.net mail.planetcobalt.net A 217.10.9.49 [EMAIL PROTECTED]:~ $ _ You can have multiple names resolving to the same IP address, but just one PTR record mapping that address back to a name. Regards Ansgar Wiechers -- "All vulnerabilities de