Re: Millions of PDF invisibly embedded with your internal disk paths

2009-12-07 Thread Nick FitzGerald
collections of such files. Is it a big security exposure issue? That depends on your situation, the risks you're prepared to accept, etc, etc. Does disclosing this issue so more people are aware of it help or hurt? Regards, Nick FitzGerald

Re: Millions of PDF invisibly embedded with your internal disk paths

2009-12-07 Thread Nick FitzGerald
such. Regards, Nick FitzGerald

Re: Symantec Fax Viewer Control v10 (DCCFAXVW.DLL) remote buffer overflow exploit

2009-05-01 Thread Nick FitzGerald
takes the published PoC and adds it to one or more of the various web exploitation kits out there... Regards, Nick FitzGerald

RE: New Paper: More than 600 million users surf at high risk

2008-07-02 Thread Nick FitzGerald
probably have system updates disabled. Regards, Nick FitzGerald

Re: Exploit in IE6,7

2008-01-28 Thread Nick FitzGerald
sense did you discovr this? Why do you think we might care? And do you have you any idea of whether and/or how it actually works? Regards, Nick FitzGerald

Re: [Full-disclosure] what is this?

2008-01-15 Thread Nick FitzGerald
(if not perfect) chance of success. Regards, Nick FitzGerald

Re: [Full-disclosure] what is this?

2008-01-14 Thread Nick FitzGerald
that this attacker will come back, it equally does nothing to close the hole they used in the first place, and the next attacker searching for that hole will hit you just as easily and indiscriminately... Regards, Nick FitzGerald

Re: mac trojan in-the-wild

2007-11-02 Thread Nick FitzGerald
obviously, but by some other form -- this kind of specialist ignorance is behind well-considered physicists and mathematicians being taken in by demonstrations of paranormal ability that professional magicians always see through). Regards, Nick FitzGerald

Re: iDefense Security Advisory 10.09.07: Microsoft Windows Mail and Outlook Express NNTP Protocol Heap Overflow

2007-10-10 Thread Nick FitzGerald
and snews URI handlers... Regards, Nick FitzGerald

Re: Exploit In Internet Explorer

2007-07-30 Thread Nick FitzGerald
exploit... Regards, Nick FitzGerald

RE: Defeating Citibank Virtual Keyboard protection using screenshot method

2007-05-11 Thread Nick FitzGerald
use such simple things as OSK's and your OTP card? Regards, Nick FitzGerald

RE: Defeating Citibank Virtual Keyboard protection using screenshot method

2007-05-10 Thread Nick FitzGerald
, those who develop security solutions for the banking fraternity. Regards, Nick FitzGerald

Re: [Full-disclosure] A Botted Fortune 500 a Day

2007-04-18 Thread Nick FitzGerald
noting this may not be the case. And they made an obvious (or much more subtle) error like this where? Regards, Nick FitzGerald

Re: [ GLSA 200611-03 ] NVIDIA binary graphics driver: Privilege escalation vulnerability

2006-11-14 Thread Nick FitzGerald
slackers gets the rating of the severity and scope of this kind of vuln right. Any hope of Linux distro folk getting that clued? Regards, Nick FitzGerald

Re: [Full-disclosure] Yet another 0day for IE (Disabling Javascript no longer a fix)

2006-09-25 Thread Nick FitzGerald
careful about our use of terminology, this should all have been rather clear from the start. Regards, Nick FitzGerald

RE: Microsoft DNS resolver: deliberately sabotaged hosts-file lookup

2006-04-20 Thread Nick FitzGerald
: This value is not supported. Of course, what the dox say and what works may be two different things... Regards, Nick FitzGerald

Re: CAIDA analysis on CME-24/BlackWorm

2006-02-07 Thread Nick FitzGerald
] the lessons of history, but as computer science in general, and comp- sec in particular, in its geek-oid rush to be at the bleeding edge of change seems to put so little value in teaching (or learning) its history, I expect the effect would be lost... -- Nick FitzGerald Computer Virus Consulting

Re: New worm crawling trough blogs?!

2006-02-03 Thread Nick FitzGerald
may not please the list moderators (or at least, may agitate their lawyers were the moderators to accept such a posting), one will resist... Regards, Nick FitzGerald

Re: WTF??

2006-01-05 Thread Nick FitzGerald
[EMAIL PROTECTED] wrote: Anyone know anything about: http://www.frame4.net/mdpro It appears to be a pay for VX site. There've been a couple already that, AFAICT, just faded away. I mean, why pay for it when the bad guys shovel it at you faster than most folk can keep up?? Regards, Nick

Re: WMF browser-ish exploit vectors

2006-01-04 Thread Nick FitzGerald
on. Regards, Nick FitzGerald

Re: ServU FTP Service (Win32) is able to relay email

2003-07-12 Thread Nick FitzGerald
admin passwords on Internet-visible Windows networking) it's a fair bet that banner scanning and the like to find them won't be detected _at the sites hosting these ServU servers_. -- Nick FitzGerald Computer Virus Consulting Ltd. Ph/FAX: +64 3 3529854

RE: Windows 2000 Service Pack 3 now available.

2002-08-01 Thread Nick FitzGerald
this out _in advance of taking their money_ to all future potential customers... -- Nick FitzGerald Computer Virus Consulting Ltd. Ph/FAX: +64 3 3529854

Re: UPDATE: Re: REFRESH: EUDORA MAIL 5.1.1

2002-07-26 Thread Nick FitzGerald
, depending on the open method used, depsite having been renamed to a non-EXE extension. Thus, http-equiv's discovery that a non-extensioned EXE could be launched through one of these code execution holes is not all that surprising... -- Nick FitzGerald Computer Virus Consulting Ltd. Ph/FAX: +64 3

Re: [BUGTRAQ] Full analysis of the .ida Code Red worm.

2001-07-20 Thread Nick FitzGerald
to the spread like crazy mode. Regards, Nick FitzGerald

Re: MALWARE HOAX FW: Microsoft Security Bulletin MS01-039

2001-07-17 Thread Nick FitzGerald
[EMAIL PROTECTED] Network Associates (US)[EMAIL PROTECTED] Norman (NVC) [EMAIL PROTECTED] Sophos Plc.[EMAIL PROTECTED] Symantec [EMAIL PROTECTED] Trend Micro[EMAIL PROTECTED] -- Nick

Re: SECURITY.NNOV: The Bat! cr bug

2001-04-25 Thread Nick FitzGerald
; first null line ; is message body (This comment is repeated later in Appendix D too.) I'm afrain that Notes is correct on here Yes -- a pity the drafters of those RFCs wrote them so ambiguously and I've always preferred words to formulae (diagrams are good though...). Regards, Nick

Re: SECURITY.NNOV: The Bat! cr bug

2001-04-25 Thread Nick FitzGerald
, nor should the email clients be crashing. I agree the clients shouldn't crash when processing out of bounds input, but the point would be all but moot if the servers were doing what they should. Regards, Nick FitzGerald

Re: SECURITY.NNOV: The Bat! cr bug

2001-04-23 Thread Nick FitzGerald
for some annoying local DoS and Trojan effects though). (For those who don't know -- some spammers have been using this hole to add Favorites to IE and even change its start page to point to their sites, and of course it has been extensively used by several viruses...) Regards, Nick FitzGerald

Re: Administrivia: Broken Antivirus Products

2001-04-04 Thread Nick FitzGerald
s that generate them. Excellent decision! (BTW, for those not on SF's Focus-Virus list, we had a rather "animated" discussion of these issues a couple of weeks back.) Regards, Nick FitzGerald

Re: Invisible file extensions on Windows

2001-04-01 Thread Nick FitzGerald
n use regedit.exe to find all instances of "NeverShowExt" and rename them to "disabled_NeverShowExt". 8-) Definitely a good start! -- Nick FitzGerald Computer Virus Consulting Ltd. Ph/FAX: +64 3 3529854

Re: AUTORUN Vulnerability - Round 2

2001-02-20 Thread Nick FitzGerald
s with network drives that are mapped to a drive letter with Windows Explorer or mounted with the Microsoft Management Console (MMC). As with mounted hardware, a mounted network drive must have an Autorun.inf file in its root directory, and must not be disabled through the registry. -- N

Re: HTML.dropper

2001-01-18 Thread Nick FitzGerald
mail scanning system that does not process message bodies has been a dead-duck. In a perfect world, that means your point would be moot, but in this world... Regards, Nick FitzGerald

Re: NAI/McAfee Viruscan Engine does not scan .VBS files by defau

2000-03-08 Thread Nick FitzGerald
networks, the use of the management tools should make automating this very easy... -- Nick FitzGerald Computer Virus Consulting Ltd. Ph/FAX: +64 3 3529854

Re: Toshiba NoteBooks BIOS Password Backdoor - Password Cracker

2000-02-27 Thread Nick FitzGerald
MI and some others models), you can try CmosPwd (Dos/Win9x, WinNT, Linux versions) avaible at http://www.esiea.fr/public_html/Christophe.GRENIER/ *If* you have boot access, this is a very handy little util! (If you don't have boot access, a screw-driver and a good memory for mainboard layouts

Re: AUTORUN.INF Vulnerability

2000-02-21 Thread Nick FitzGerald
. Note: I could not bring myself to enable Active Desktop, even just for the duration of this testing. I *presume* it acts the same as the My Computer interface (which is really a "dumbed-down Explorer"), but would welcome results from anyone who has tried. -- Nick FitzGerald Computer Virus Consulting Ltd. (NZ) Ph/FAX: +64 3 3529854

Re: FireWall-1 FTP Server Vulnerability

2000-02-17 Thread Nick FitzGerald
ect". Regards, Nick FitzGerald

Re: Bypass Virus Checking

2000-02-04 Thread Nick FitzGerald
imply refusing en masse to use products whose developers do not provide adequate and timely file format details to our security product developers -- if no-one is using a product there cannot be a compelling business reason to do so, so ill-informed managerial pressure to adopt the product would be weakened

Re: ASUS mother board security question...

1999-09-25 Thread Nick FitzGerald
y be advisable to develop an authentication mechanism for this feature" is a classic example of the contempt in which security is held amongst designers at Richmond. Regards, Nick FitzGerald