Re: OpenBSD's IPSEC is Backdoored

2010-12-15 Thread Michael Scheidell
On 12/14/10 8:35 PM, musnt live wrote: Original e-mail is from Theo DeRaadt http://marc.info/?l=openbsd-techm=129236621626462w=2 Then also read Jason Wright's response and clear denial: http://marc.info/?l=openbsd-techm=129244045916861w=2 -- Michael Scheidell, CTO o: 561-999-5000 d: 561-948

facebook 'routing flaw'?

2010-01-18 Thread Michael Scheidell
problem at the family's wireless carrier, ATT — revealed a little known security flaw with far reaching implications for everyone on the Internet, not just Facebook users. -- Michael Scheidell, CTO Phone: 561-999-5000, x 1259 *| *SECNAP Network Security Corporation * Certified SNORT

Re: Insufficient Authentication vulnerability in Asus notebook

2009-05-14 Thread Michael Scheidell
to be set) -- Michael Scheidell, CTO Phone: 561-999-5000, x 1259 *| *SECNAP Network Security Corporation * Certified SNORT Integrator * 2008-9 Hot Company Award Winner, World Executive Alliance * Five-Star Partner Program 2009, VARBusiness * Best Anti-Spam Product 2008, Network Products

Castlecops security site closed for good

2008-12-25 Thread Michael Scheidell
of the Internet in our own way. Let us feel blessed for the impact we made and the relationships created. -- Michael Scheidell, CTO |SECNAP Network Security Winner 2008 Network Products Guide Hot Companies FreeBSD SpamAssassin Ports maintainer

Re: MySQL command-line client HTML injection vulnerability

2008-10-08 Thread Michael Scheidell
into any production version (or am I wrong?) Try this on your system: mysql --html --execute select 'a' If you get this, then its not patched: TABLE BORDER=1TRTHa/TH/TRTRTDa/TD/TR/TABLE If you get this (on 5.1, a little different than 5.0) than its patched: (note the escaped a) -- Michael Scheidell

Re: Verizon FIOS (and DSL?) wireless access point insecure default WEP key

2008-10-07 Thread Michael Scheidell
prefer how verizon did it then the bizillion 'lynksys' WEP keys in the neighborhood. -- Michael Scheidell, CTO |SECNAP Network Security Winner 2008 Network Products Guide Hot Companies FreeBSD SpamAssassin Ports maintainer

Re: Exploiting Google MX servers as Open SMTP Relays

2008-05-10 Thread Michael Scheidell
. (see/'google' for posts in bugtraq and spamassassin users group showing headers from unrelated domains sending spam through google mail servers.. They ignore the emails to [EMAIL PROTECTED]) -- Michael Scheidell, CTO |SECNAP Network Security Winner 2008 Network Products Guide Hot Companies

heanet.dl.sourceforge.net hacked?

2008-04-30 Thread Michael Scheidell
://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.27.tar.bz2: size mismatch: expected 641193, actual 804821 -- Michael Scheidell, CTO Main: 561-999-5000, Office: 561-939-7259 *| *SECNAP Network Security Corporation Winner 2008 Technosium hot company award. www.technosium.com/hotcompanies/ http

Update? Question on BID 19000

2007-09-19 Thread Michael Scheidell
BID 19000 says that its retired since its not exploitable? Seems maybe it is (including maybe www.joomla.org got hacked by same thing) http://forum.joomla.org/index.php/topic,203000.msg955330.html#msg955330 -- Michael Scheidell, CTO Join SECNAP at SecureWorld Detroit 8-9 http

Sourceforge compromized?

2007-02-02 Thread Michael Scheidell
or are there specific directories that can be hacked? Is it just yapig.sourceforge.net? Either case, I should suggest everyone be careful about what you download from sourceforge till they do a full code audit and post the results here. -- Michael Scheidell, CTO SECNAP Network Security 561-999-5000 x 1131

RE: seeking comments on disclosure articles

2007-01-13 Thread Michael Scheidell
for their products. http://www.secnap.com/aboutus.php?pg=4 -- Michael Scheidell, CTO SECNAP Network Security Corporation Web based Security and Privacy training: http://www.secnap.com/training - This email has been scanned

RE: Cisco not honoring update promises?

2006-12-19 Thread Michael Scheidell
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Monday, December 18, 2006 12:53 PM To: bugtraq@securityfocus.com Subject: Re: Cisco not honoring update promises? Michael, This message came to my attention this morning via your posting to bugtraq.

Cisco not honoring update promises?

2006-12-18 Thread Michael Scheidell
in the world) * e-mail: [EMAIL PROTECTED] Please have your product serial number available and give the URL of this notice as evidence of your entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC. -- Michael Scheidell, CTO SECNAP Network Security

RE: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation

2006-12-06 Thread Michael Scheidell
-Original Message- From: lucretias [mailto:[EMAIL PROTECTED] Sent: Wednesday, December 06, 2006 7:56 AM To: Michael Scheidell Subject: RE: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation I think the issue is the process does not return in it's

RE: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation

2006-12-05 Thread Michael Scheidell
-Original Message- From: ss_team [mailto:[EMAIL PROTECTED] Sent: Monday, December 04, 2006 11:28 AM To: bugtraq@securityfocus.com Subject: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation hello, we've found local privilege escalation in

Password Flaw also in Firefox 1.5.08. Was: Big Flaw in Firefox 2: Password Manager Bug Exposes Passwords

2006-11-23 Thread Michael Scheidell
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Wednesday, November 22, 2006 4:58 AM Subject: Big Flaw in Firefox 2: Password Manager Bug Exposes Passwords Today, Mozilla made public bug #360493, which exposes Firefox's Password Manager on many public

RE: $100 plus several of my books if you can crack my Windows password hashes.

2006-07-22 Thread Michael Scheidell
You probably are who you say you are, and you probably own the accounts these passwords are from, but could not someone post a bunch of NTLM hashes and ask the world to crack them for him? Even if he dint' own the accounts? So, is this a social engineering test as well?

RE: Dell Openmanage CD Vulnerability

2006-06-13 Thread Michael Scheidell
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Thursday, June 08, 2006 5:29 PM To: bugtraq@securityfocus.com Subject: Dell Openmanage CD Vulnerability When you boot up using the Dell PowerEdge Installation and Server Management Disc (P/N: WG126 Rev.

Symantec antivirus software exposes computers

2006-05-27 Thread Michael Scheidell
antivirus product, known as Norton Antivirus 2006, and its current security suite - which includes both antivirus and firewall features - did not appear to be vulnerable. http://www.msnbc.msn.com/id/12990213/ -- Michael Scheidell, CTO 561-999-5000, ext 1131 SECNAP Network Security Corporation

RE: IBM

2006-04-13 Thread Michael Scheidell
Try: [EMAIL PROTECTED] and [EMAIL PROTECTED] (these are in the US, not sure if they segment responsibility) -- Michael Scheidell, CTO 561-999-5000, ext 1131 SECNAP Network Security Corporation Keep up to date with latest information on IT security: Real time security alerts: http

RE: WebVulnCrawl searching excluded directories for hackable web servers

2006-03-31 Thread Michael Scheidell
Just a quick followup and clarification: -Original Message- From: Michael Scheidell Sent: Wednesday, March 15, 2006 8:38 AM To: bugtraq@securityfocus.com Subject: WebVulnCrawl searching excluded directories for hackable web servers What he is doing is a violation of the RFC's

Insufficient input checking on web site allows dangerous HTML TAGS

2003-07-31 Thread Michael Scheidell
by Michael Scheidell, SECNAP Network Security vulnerability research team. The original problem with Microsoft IE found by George Guninski and involved insecure default reading of a malformed HTML Email in Outlook and OE and insecure running of HTML (see http://www.guninski.com/browsers.html

Anyone know the security alert contact for 3com?

2002-10-31 Thread Michael Scheidell
We need to contact 3com about a potential security problem with one of their products and wanted to know if they had an official email address for such communications. -- Michael Scheidell SECNAP Network Security, LLC Sales: 866-SECNAPNET / (1-866-732-6276) Main: 561-368-9561 / www.secnap.net

SECNAP Security Alert: Radmin Default install options vulnerability

2002-09-02 Thread Michael Scheidell
More information on radmin can be found at www.radmin.com This Security Bulletin is Copyright(c) 2002 SECNAP Network Security, LLC, and can only be copied or forwarded without modification. -- Michael Scheidell, SECNAP Network Security, LLC Sales: 866-SECNAPNET / (1-866-732-6276) Main: 561-368