Re: Messenger/Hotmail passwords at risk

2001-07-09 Thread Peter van Dijk
On Fri, Jul 06, 2001 at 09:32:36PM -, gregory duchemin wrote: [snip] the hash creation process is as follow: == say user toto has a password titan then his client generate the string y.ytitan and the according MD5 hash, say

Re: OpenBSD 2.9,2.8 local root compromise

2001-06-16 Thread Peter van Dijk
On Fri, Jun 15, 2001 at 11:27:23AM -0400, Tony Lambiris wrote: AFAIK its been fixed in -current, and it _will_ be in errata shortly.. in the meantime, there is a hotfix for the code itself, read the mailing lists.. OR in /etc/fstab, make /tmp nosuid and noexec, then mount -u /tmp (you did

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Peter van Dijk
On Fri, Jun 08, 2001 at 12:37:34AM -0700, Peter Ajamian wrote: [snip] computer. A new 1ghz computer could easily crank out 6 char passwords in mere seconds, 8 char passwords in a few hours, and a 10 char password probably in a week to a month or better. crypt() passwords are never more than

Re: SECURITY.NNOV: The Bat! cr bug

2001-04-23 Thread Peter van Dijk
On Mon, Apr 23, 2001 at 12:06:21PM +1300, Nick FitzGerald wrote: The authors of TheBat! suggest above that this problem should not be their concern because the message should never arrive in such a state as it is clearly not standards-compliant. The same could be said of They're wrong. the

Re: OpenBSD 2.8 ftpd/glob exploit (breaks chroot)

2001-04-19 Thread Peter van Dijk
On Wed, Apr 18, 2001 at 10:01:51AM -0400, Bill Sommerfeld wrote: seteuid(0); a = open("..", O_RDONLY); mkdir("adfa", 555); chroot("adfa"); fchdir(a); for(cnt = 100; cnt; cnt--) chdir(".."); chroot(".."); execve("/bin//sh", ..); For the record, I blocked this way of breaking out of

Re: inetd DoS exploit

2001-02-27 Thread Peter van Dijk
On Sun, Feb 25, 2001 at 07:26:07PM +0300, Serega[linux] wrote: Name: inetd DoS exploit Author: Serega[Linux] This is a *very* old and widely-known inetd DoS. It comes down making inetd's ratelimiting kick in. Recent inetd's (like the one that comes with FreeBSD) also have concurrencylimiting,

Re: SSH1 vulnerability ?

2001-02-12 Thread Peter van Dijk
On Sat, Feb 10, 2001 at 03:08:11PM +0200, Tatu Ylonen wrote: On Fri, 9 Feb 2001, Christophe Dupre wrote (on the [EMAIL PROTECTED] list): I just read Razor's vulnerability advisory, as reported on slashdot. Any truth to it, or is it another wannabe ? I suppose you are referring to this one:

Re: vixie cron possible local root compromise

2001-02-12 Thread Peter van Dijk
On Sun, Feb 11, 2001 at 12:38:02AM +0100, Flatline wrote: [snip] - Quick fix (diff output for crontab.c): 146c146 strcpy(User, pw-pw_name); --- strncpy(User, pw-pw_name, MAX_UNAME - 1); Uhm, won't the user running crontab then get another user's crontab, if the 'stripped'

Re: Some more MySql security issues

2001-02-12 Thread Peter van Dijk
On Sun, Feb 11, 2001 at 12:40:48AM +0100, Konrad Rieck wrote: I am a little bit confused about this mail. Maybe the author can explain some issues to me... On Sat, Feb 10, 2001 at 12:54:33AM -, Joao Gouveia wrote: roberto@spike:~ mysql -ublaah (Note: 'blaah' obviously isn't a valid

Re: Palm Pilot - How to view hidden files

2001-02-12 Thread Peter van Dijk
On Sun, Feb 11, 2001 at 05:15:53PM -0300, Paulo Cesar Breim wrote: The software Tiny Sheet, present in all versions of Palm Pilot, has a function called IMPORT file. Well when this function is use ALL FILES, including the hidden files protetex with password, can be imported to a Sheet. One