RE: vBulletin - Critical Information Disclosure

2010-07-23 Thread Jon
Confirmed on some 3.8.6 version. Thanks for spreading this :) -Original Message- From: advisor...@intern0t.net [mailto:advisor...@intern0t.net] Sent: jeudi 22 juillet 2010 20:17 To: bugtraq@securityfocus.com Subject: vBulletin - Critical Information Disclosure Versions Affected: 3.8.6 (O

RE: SEP(Symantec) Bug

2009-02-13 Thread Jon Kloske
c.exe process that was started by the command that crashed, not the smcgui.exe process.) And yes, I tried adding the space after the tilde as you originally quoted in the email :) Regards, Jon. ps: A list of smc.exe command line parameters is available here: http://service1.symantec.com/SUPPORT/

Re: Summary of AS/400 Vulnerability Information

2008-06-23 Thread Jon Kibler
Parser Unspecified Remote Overflow 41518 2008-02-04 IBM OS/400 V5R3M0 / V5R4M0 HTTP Server Expect HTTP Header XSS 46082 2008-06-06 IBM OS/400 BrSmRcvAndCheck Boundary Error Local Overflow I hope this summary is of use. Now, if we can only get some of the vulnerability assessment ve

AS/400 Vulnerabilities

2008-06-13 Thread Jon Kibler
raises a couple of questions: 1) Is anyone really doing any vulnerability research in this area? 2) Are the boxes really just unstable to malformed network data, but not exploitable? THANKS! Jon Kibler - -- Jon R. Kibler Chief Technical Officer Advanced Systems Engineering Technology, Inc

Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability

2008-05-16 Thread Jon Ribbens
On Wed, May 14, 2008 at 05:20:52PM -, [EMAIL PROTECTED] wrote: > It appears there is little that web servers can do to thwart this, > short of changing all '+' characters to %2B. That seems excessive. To be fair, this is what Microsoft has recommended, explicitly for the purpose of preventing

Academic Computer Security Conference

2008-02-21 Thread Jon R. Kibler
Business and IT Security Efforts -- Emerging Threats and Technology Trends -- Computer and Communications Law Contact: Dr. John Stamey Coastal Carolina University [EMAIL PROTECTED] Jon Kibler -- Jon R. Kibler Chief Technical Officer Advanced Systems Engineering Technology, Inc

ANNOUNCE: SquirrelMail 1.4.13 Released

2007-12-14 Thread Jon Angliss
All, Due to the package compromise of 1.4.11, and 1.4.12, we are forced to release 1.4.13 to ensure no confusions. While initial review didn't uncover a need for concern, several proof of concepts show that the package alterations introduce a high risk security issue, allowing remote inclusion of

SECURITY: 1.4.12 Package Compromise

2007-12-13 Thread Jon Angliss
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 All, It has been brought to our attention that the MD5 sums for the 1.4.12 package were not matching the actual package. We've been investigating this issue, and uncovered that the package was modified post release. This was believed to have been ca

Re: Found nice mass exploits for fedora and imap

2007-08-28 Thread Jon Lewis
/hell/save.php > /dev/null 2&>/dev/[EMAIL PROTECTED]@[EMAIL PROTECTED]@Trying to connect to %s port %d ------ Jon Lewis | I route Senior Network Engineer | therefore you are Atlantic Net

Re: RedLevel Advisory #23 - SalesCart Shopping Cart SQL Injection Vulnerability

2007-06-19 Thread Jon Ribbens
On Thu, Jun 14, 2007 at 05:31:14PM -0400, John M. Martinelli wrote: > It is up to the editors of the board to decide whether this > vulnerability is fact or fiction. They don't post incorrect > vulnerability information. Um, no, actually they mostly just post whatever you send them. Whether this

Re: uTorrent overflow

2007-06-06 Thread Jon Ribbens
On Sat, Jun 02, 2007 at 08:15:09PM -, [EMAIL PROTECTED] wrote: > if [ "$X" = "y" ];then > telnet $victamIP $victamport Um, is it just me, or does this "exploit" do nothing at all?

Cosign SSO Authentication Bypass

2007-04-11 Thread Jon Oberheide
Author: Jon Oberheide <[EMAIL PROTECTED]> Date:Wed, April 11th, 2007 Summary === Application: Cosign Single Sign-On Affected Versions:2.0.1 and previous Vendor Website: http://weblogin.org Type of Vulnerability:Authentication Bypass -

Remote DoS in libevent DNS parsing <= 1.2a

2007-02-19 Thread Jon Oberheide
Author: Jon Oberheide <[EMAIL PROTECTED]> Date:Sun, February 18th, 2007 Summary === Application: libevent Affected Versions:1.2 - 1.2a Vendor Website: http://monkey.org/~provos/libevent/ Type of Vulnerability:Denial of Service - Remote Back

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-25 Thread Jon Oberheide
ested yet) on FreeBSD6 (and maybe on some other BSD flavors). And of course, it wouldn't be complete without a python port: http://jon.oberheide.org/projects/0trace/ Regards, Jon Oberheide -- Jon Oberheide <[EMAIL PROTECTED]> GnuPG Key: 1024D/F47C17FE Fingerprint: B716 DA66 8173 6

Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-10 Thread Jon Oberheide
LFT is similar to tcptraceroute in that it uses TCP SYN probes. As Michal stated in his original message, 0trace is different as it piggybacks on an already established TCP connection. Regards, Jon Oberheide On Tue, 2007-01-09 at 09:03 +0100, Alessandro Dellavedova wrote: > Hi, >

Re: SYMSA-2006-011: JBoss Java Class DeploymentFileRepository Directory Traversal

2006-11-28 Thread Jon Hart
s it'll give admins one less way to shoot themselves in the foot. Similar to how most *nix admins `alias mv='mv -i'`. -jon

feedsplitter considered harmful

2006-08-30 Thread jon
I was looking through the feedsplitter.php script avaiable from http://chxo.com/software/feedsplitter/, version 2006-01-21 (revision 1.7 according to the RCS $Id$, but that looks out of date) today, and noticed a few problems. (Background: feedsplitter turns RSS feeds into HTML or javascript so

Cisco MARS < 4.2.1 remote compromise

2006-07-20 Thread Jon Hart
by Cisco DDTS CSCse47646, and fixed in version 4.2.1 and newer. Enjoy, -jon #!/usr/bin/perl # # Cisco/Protego CS-MARS < 4.2.1 remote command execution, system compromise # via insecure JBoss installation. # # Fully functional POC code by Jon Hart <[EMAIL PROTECTED]> # # Addressed in CSCse47

Re: [Full-disclosure] Re: Linux Kernel 2.6.x PRCTL Core Dump Handling - Local r00t Exploit ( BID 18874 / CVE-2006-2451 )

2006-07-15 Thread Jon Hart
ELsmp (provided with RH EL 4 update 1) is also vulnerable. If this is the case of backporting, this should come as no surprise. If it is not a backport issue, what vulnerability is being exploited on these supposedly older kernels? -jon

Re: On the Recent PGP and Truecrypt Posting

2006-05-30 Thread Jon Callas
ur systems and the way things are presently done are as a result of that testing. However, count thoroughly on continued improvements based on continued testing. However, we do not make Truecrypt, we make PGP. The Truecrypt people make Truecrypt. Jon -- Jon Callas CTO, CSO PGP Co

Re: On the Recent PGP and Truecrypt Posting

2006-05-29 Thread Jon Callas
he core of this, there is a very complex issue. We're discussing if we should do something in response to the real issue here. But the base issue, that there is some flaw in PGP and Truecrypt and other software that only an idiot could have let out is flat out false. Jon -- Jon

On the Recent PGP and Truecrypt Posting

2006-05-26 Thread jon
s put on the web and posted on bugtraq. Had we been contacted, we could discuss this in private rather than have to air the details of this misunderstanding in a public forum. I am truly sorry for the sake of the Information Security Institute of Quebec and its staff that this complex issue has turne

Poll: Emerging Threats

2006-05-01 Thread Jon R. Kibler
erwise. TIA for your opinions! Jon Kibler -- Jon R. Kibler Chief Technical Officer A.S.E.T., Inc. Charleston, SC USA (843) 849-8214 == Filtered by: TRUSTEM.COM's Email Filtering Service http://www.trustem.com/ No Spam. No Viruses. Just Good Clean Email.

Re: Vulnerabilites in new laws on computer hacking

2006-02-18 Thread Jon Gucinski
Wow...this is definitely a big can of worms to open... I both agree and disagree with your stance. Hopefully I'm caffeinated enough to express my reasoning clearly. While I don't feel like elaborating too much, my drive to become an InfoSec professional was driven mostly by the hacker scene/cult

RE: Is this a new exploit?

2005-12-28 Thread Portz, Jon
Windows .wmf vulnerability, look here: http://secunia.com/advisories/18255/ JTP -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Tuesday, December 27, 2005 3:20 PM To: bugtraq@securityfocus.com Subject: Is this a new exploit? Warning the following URL success

Update on the PGP NTFS File Wipe Issue, 16 Dec 2005

2005-12-16 Thread Jon Callas
PGP Desktop 9.0.4 that includes this fix. We expect to release PGP Desktop 9.0.4 next Wednesday, 21 Dec 2005. Jon -- Jon Callas CTO, CSO PGP Corporation Tel: +1 (650) 319-9016 3460 West Bayshore Fax: +1 (650) 319-9001 Palo Alto, CA 94303 PGP: ed15 5bdf cd41 adfc 00f3

Status on PGP NTFS File Wipe issue, 11 Dec 2005

2005-12-12 Thread Jon Callas
d responsive and is a pleasure to work with. We are working now to investigate this issue thoroughly and come up with the best solution for our customers. Jon -- Jon Callas CTO, CSO PGP Corporation Tel: +1 (650) 319-9016 3460 West Bayshore Fax: +1 (650) 319-9001 Palo Alto, C

Re: Red Hat 9: free tickets

2003-07-12 Thread Jon Hart
t must be met for this (or similar) attacks to work properly -- /var/run/sudo/$USER/ must exist. This means that the user must have previously sudo'd at lease once and /var/run/sudo/$USER/ will have been created. I'm sure there are ways to work around this, but in my experiments, /var/run/sudo/$USER/ must exist if you hope to exploit something like this with the predictable file name creation + symlink trick. -jon

Re: @(#)Mordred Labs advisory - Integer overflow in PHP str_repeat() function

2003-04-04 Thread Jon Ribbens
Javi Lavandeira <[EMAIL PROTECTED]> wrote: > You seem to be forgetting about PHP's safe_mode, disable_functions > and open_basedir directives. If configured properly, a user in a > server with PHP support should not be able to execute commands, read > other users' files or do anything outside his d

Sendmail testing tool.

2003-03-04 Thread Jon Larabee
re of. Thanks, Jon Larabee

Re: Solaris Signals

2003-02-13 Thread Jon Masters
ng at and ended up not being terribly clear. Hope that makes sense. Jon.

Solaris Signals

2003-02-12 Thread Jon Masters
attached for those who really do not see my point. This is bound to be covered somewhere, I just want to get viewpoints. Jon. /* sigtest.c * A quick and dirty hack for proof of concept exploit against local Solaris * system scripts which have +x permission without +r. This allows the user

Re: PGP Corporation Beta License Agreement

2002-10-18 Thread Jon Callas
o get these things right, and we're trying to eschew boilerplate, as boilerplate licenses frequently have things in them none of us like. Send me mail, let me know what you find confusing, and I'll look at it personally. Jon -- Jon Callas CTO, CSO PGP Corporation 3460 West Bayshore Palo Alto, CA 94303

RE: remote DoS in Mozilla 1.0

2002-06-13 Thread Jon Keating
>From what I have received personally from my post, 2 * resolution_height sounds like a good idea. Jon > -Original Message- > From: Keith Warno [mailto:[EMAIL PROTECTED]] > Sent: Thursday, June 13, 2002 9:48 AM > To: 'Tom'; [EMAIL PROTECTED] > Subject: R

RE: remote DoS in Mozilla 1.0

2002-06-11 Thread Jon Keating
thing that we discuss in this thread. Unfortunately, there is no easy answer because we put our dependence on a 3rd party library. This thread leaves a funny taste in my mouth. Jon

Re: Amazon.com Password limit

2002-04-19 Thread jon schatz
le, I found that the limit for Passport passwords is 15 characters (mine was longer). This is (obviously) much more difficult to brute force than an 8 character password, but unpublished password limits piss me off. -jon -- [EMAIL PROTECTED] || www.divisionbyzero.com gpg key: www.divisionbyzero.com

Wide-scale Code Red Damage Assessment and Report

2001-07-23 Thread Jon O .
During the infection phase of Code Red (on the 19th) we wrote a small tool for research purposes. This tool read in logs of machines sending the default.ida attack and connected back to them on port 80, made a GET request and dumped the resulting data. This tool was run continuously from 3 un

Re: "Code Red" worm - there MUST be at least two versions.

2001-07-20 Thread Jon-o Addleman
ystem32\cmd.exe+c:\inetpub\scripts\ shell.exe" 404 - The machine that sent that to me had that same web page up, and I also got one from a different IP (on the same subnet) a few hours before that. That was a week ago though - July 13... -- Jon-o Addleman

Re: php mail function bypass safe_mode restriction

2001-07-19 Thread Jon Ribbens
Laurent Sintes <[EMAIL PROTECTED]> wrote: > extra_cmd = php_escape_shell_arg(Z_STRVAL_PP(argv[4])); > > But it is not a suffisant check because php_escape_shell_arg > does not escape all charaters. False. escape_shell_arg will successfully escape all characters from shells.

Re: cayman strikes again

2001-07-15 Thread Jon O .
Login incorrect However, just another example of a company leaving their users open to stupid attacks, hacks and providing DDoS ammo. Cayman, please require the user to set BOTH passwords before doing anything else and/or at least warn them... Thanks, Jon On 11-Jul-2001, Russell Handorf wr

Re: OpenBSD 2.9,2.8 local root compromise

2001-06-15 Thread jon
doesn't seem to work on OpenBSD 2.6: foo:/tmp$ uname -mrsv OpenBSD 2.6 GENERIC#696 i386 foo:/tmp$ whoami jon foo:/tmp$ ./vvopenbsd Written by Georgi Guninski Shall jump to dfbfde1d Started pid1=22257 target=22257 Attached! sig=4479 Suspended (signal) eip=400543c7 esp=dfbfdb74 exiting ex

Re: CHINANSL Security Advisory(CSA-200108)

2001-04-01 Thread Jon Stevens
> (http://www.chinansl.com) What is with this Copyright stuff? #1. Please report security issues to [EMAIL PROTECTED] and/or [EMAIL PROTECTED] first. It seems like that is a common courtesy. #2. Please test against the latest Tomcat 4.0 which is 4.0b2. I believe that this has already been fixed. p.s. Your [EMAIL PROTECTED] email address bounces. -jon

STAT Security Advisory: Trend Micro's ScanMail for Exchange store s passwords in registry unprotected

2001-03-31 Thread Maucher, Jon
HKLM\Software\TrendMicro\ScanMail for Exchange\RemoteManagement HKLM\Software\TrendMicro\ScanMail for Exchange\UserInfo The vendor is implementing a new encryption method that will be available in version 5.1 of ScanMail for Exchange. 4. Credits This vulnerability was discovered and researche

Re: CHINANSL Security Advisory(CSA-200105)

2001-03-30 Thread Jon Stevens
ct that it isn't). I also may have missed your posting, but giving advance notice to [EMAIL PROTECTED] and/or [EMAIL PROTECTED] would be more appropriate than posting to bugtraq first. thanks, Jon S. Stevens [EMAIL PROTECTED] ASF Member PMC Member - Jakarta Group -- If you come from a Perl or

Re: Vulnerability in Novell Netware

2001-03-14 Thread Jon Miner
is by design. It is mentioned in every Novell manual I've read, and is well known. It's a fact of life, Printers need to log in to get to the queue directories. Just don't assign rights to the container that queues are in. jon -- .Jonathan J. Miner

Re: Patch for Potential Vulnerability in the execution of JSPs outside doc_root

2001-02-13 Thread Jon Stevens
racle or anyone else that they would notify [EMAIL PROTECTED] directly so that the matter can be resolved quickly. thanks, -jon stevens [EMAIL PROTECTED] > Patch for Potential Vulnerability in the execution of JSPs outside > doc_root > > Description of the problem > A potential securit

FW: W2K & ~25000+ temp files = crash + corruption?

2000-03-01 Thread Jon St. Arnaud
Didn't work on an IBM 770 laptop with fat32. Opened 40,000 files with no remarkable events. Here is the system summary: Also, I should add that I had 5 folders opened and one IE 5 browser session going. No email or outlook running. System Information report written at: 03/01/2000 12:03:36 PM

HP Omniback remote DoS

2000-02-29 Thread Jon
d HP about the bug several weeks ago, and they have not yet released a patch. The following sample code will demonstrate the problem, but a better exploit could probably be written. Jon Hittner #!/usr/bin/perl # # Jon Hittner # Raise the memory size for omnilnet until Windows NT crashes # Te

Re: Evil Cookies.

2000-02-07 Thread Jon Paul, Nollmann
e 3 dots in it. The real domain is .com.au. (notice the trailing dot). All FQDNs end in a trailing dot. However, that clearly violates the intent behind the restriction. On the other hand, bugs in the domain verification of cookies are dirt common, so this could be allowed because it'

Re: Anyone can take over virtually any domain on the net...

2000-01-14 Thread Jon Lewis
m was often broken, so I've been using crypt-pw for nearly a year. ------ Jon Lewis *[EMAIL PROTECTED]*| Spammers will be winnuked or System Administrator| nestea'd...whatever it takes Atlantic Net| t

HP Secure Web Console

1999-12-01 Thread Jon Mitchell
ets of letters: You type: abcd Transmits: VUTS You type: ABCD Transmits: vuts Thanks to Joe Munson for helping debug this and coming up with the Secret Decoder Ring reference (which reminded me of the Little Orphan Annie Ring, that only says to drink more Ovaltine, in the Christmas Story). --

Re: recent SCO 5.0.x vulnerabilities

1999-10-20 Thread Jon Mitchell
to be using SCO Doctor or some other such Skunkware utility should uninstall it until patches can be made. Not all of us in support want to wait six months for the next release supplement to fix problems critical to our systems. -- Jon Mitchell Systems Engineer, Subject Wills and Company [EMAIL

Re: KSR[T] Advisories #012: Hybrid Network's Cable Modems

1999-10-12 Thread Jon Paul, Nollmann
;s more likely at this point that Hybrid will merely check the source address (!) of the packets, and compare those addresses with a table configured by the provider. I'd like to believe that Hybrid will fix this in a sane way, but since they're remaining hush-hush about the fix, I think t

Re: (How) Does AntiSniff do what is claimed?

1999-07-26 Thread Jon Marler
2.168.1.3: icmp: echo request (DF) There is a package for hunt that is part of the 'potato' distribution of Debian GNU/Linux. I'm not aware of any RPM's. Jon [EMAIL PROTECTED]