Jackson McKinley wrote:
Dshield is showing a down swing.. have you got packet captures?
http://isc.sans.org/port_details.php?port=8041&repax=1&tarax=2&srcax=2&percent=N&days=70
I haven't found much co-relation between what dshield usually shows and
the traffic that we get. It is very poss
Is this what script-kiddying has come to?
I have so little faith in the next generation. Really, it's quite
simply disappointing. For shame, Edgardo. For shame.
On Aug 23, 2005, at 9:37 PM, Edgardo Zavala wrote:
hello, somebody can help me with this:
root:OM0PNa4I9RlNk:0:3:gecos:/home/root:
Dshield is showing a down swing.. have you got packet captures?
http://isc.sans.org/port_details.php?port=8041&repax=1&tarax=2&srcax=2&percent=N&days=70
On Tue, Aug 23, 2005 at 09:39:39AM +0530, Rajesh wrote:
> Hi All,
>
> Is anyone else seeing a very large increase of SYN packets coming to
>
On Tue, 23 Aug 2005, KF (lists) wrote:
> That is a patch for my vulnerability from 2 months ago...
> http://www.digitalmunition.com/DMA%5B2005-0614a%5D.txt
> http://www.digitalmunition.com/virobot_ex.pl
>
> Hopefully you didn't miss the advisory. =]
It's already listed in CAN-2005-2041, but poin
On 8/23/05, Adam Gardner <[EMAIL PROTECTED]> wrote:
> Sure, its:
>
> root:*:0:3:gecos:/home/root:/sbin/sh
>
man crypt
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia
Sure, its:
root:*:0:3:gecos:/home/root:/sbin/sh
On Aug 23, 2005, at 9:37 PM, Edgardo Zavala wrote:
hello, somebody can help me with this:
root:OM0PNa4I9RlNk:0:3:gecos:/home/root:/sbin/sh
I have the curiosity of knowing as soon as time obtains somebody this
password to me using John or lopht
hello, somebody can help me with this:
root:OM0PNa4I9RlNk:0:3:gecos:/home/root:/sbin/sh
I have the curiosity of knowing as soon as time obtains somebody this
password to me using John or lopht or other.
___
Full-Disclosure - We believe in it.
Charter: ht
Hello,
is someone able to confirm this?
--
Advisory: mplayer buffer overflow
Product: mplayer
Affected Version: 1.0_pre7 (tested), 1.0_pre6-r4 (tested),
1.0pre6-3.3.5-20050130 (confirmed)
OS affected: Linux 2.4.* (tested), 2.6
Exibar wrote:
Bah! FTP's not guaranteed to be replicated I simply zip my critical
data up, encrypt it, and post it to the alt.binaries.big-boob usenet
groups Literally let the world's server be my backup :-)
Know where to find cyrptography test sets then :)
Bah! FTP's not guaranteed to be replicated I simply zip my critical
data up, encrypt it, and post it to the alt.binaries.big-boob usenet
groups Literally let the world's server be my backup :-)
Exibar
> -Original Message-
> From: Technica Forensis [mailto:[EMAIL PROTECTED]
> Sen
Amen. I don't remember the last time I backed up anything.
Paul
Formerly of Greyhats Security
- Original Message -
From: "Technica Forensis" <[EMAIL PROTECTED]>
To:
Sent: Tuesday, August 23, 2005 11:14 AM
Subject: Re: [Full-disclosure] An old/new security list
On 8/22/05, Ill will <
On Aug 22, 2005, at 4:44 PM, Todd Towles wrote:
James, I agree with you.
It was n3td3v that stated the following - "The wireless devices were
most likely the primary source of the spread. Media outlets are
reporting wireless devices were only an accessory to the spread of the
worm."
I think h
Since we are talking about HAURI... there are a few exploitable system()
calls in the local setuid binaries. I have been to lazy to write them
up. Perhaps soon I'll get off my ass and document them.
Off the top of my head I think the setuid virobot binary calls
system("clear");
-KF
Steven M.
I have Hauri Antivirus, nice research but i remember Alex Hernandez on
the wild with nice bugs, but i dont see nothing on the wild about him
:-) nice research :-)
greets to:
Alex Hernandez and KF
- Mark
CISSP
On 23/08/05, KF (lists) <[EMAIL PROTECTED]> wrote:
> Since we
That is a patch for my vulnerability from 2 months ago...
http://www.digitalmunition.com/DMA%5B2005-0614a%5D.txt
http://www.digitalmunition.com/virobot_ex.pl
Hopefully you didn't miss the advisory. =]
-KF
This vendor page is titled "ViRobot Unix/Linux Server Security
Vulnerability Patch."
Howe
>The vulnerability is caused due to unsafe extraction of compressed
>archives (e.g. ACE, ARJ, CAB, LZH, RAR, TAR and ZIP) into a temporary
>directory before scanning. This can be exploited to write files into
>arbitrary directories when scanning a malicious archive containing
>files that have "/..
###
Luigi Auriemma
Application: Ventrilo
http://www.ventrilo.com
Versions: <= 2.3.0 and >= 2.1.2
Platforms:Windows (x86), Linux (x86), Solaris (SPARC), Solaris
(x
additional hint: the headers for e-mails can be as vauable as the source
code of the application.
Thanks,
Ron DuFresne
On Tue, 23 Aug 2005, Justin Allen wrote:
> Well for one, it would help if you were unsubscribing to the correct list
>
> Suetterlin, Sven wrote:
>
> > Hi @ all,
> >
> >
>
Which is a strong argument for zones, internally a zoned FW structure also
handles this issue as well. A single chokepoint is not longer effective
for any org or any decent size. Now layout your network like a bullseye
and each layer is a zone that requires tighter and tighter contratints to
re
===
Ubuntu Security Notice USN-173-1August 23, 2005
pcre3 vulnerability
CAN-2005-2491
===
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
===
Ubuntu Security Notice USN-172-1August 23, 2005
lm-sensors vulnerabilities
https://bugzilla.ubuntu.com/show_bug.cgi?id=13887
===
A security issue affects the following Ub
On 8/22/05, Ill will <[EMAIL PROTECTED]> wrote:
> thinking security-minded people always backed up their hdds daily :D
>
Real men don't do backups, they just put their work on an FTP site and
let the world mirror it.
--Linus Torvalds
___
Full-Disclosure
On Mon, 22 Aug 2005, Jerry Eblin wrote:
> I will be out of the office starting 08/22/2005 and will not return until
> 08/29/2005.
>
> I will respond to your message when I return.
Dear Jerry,
Thank you for broadcasting the fact that you were out. While you
were gone we took the opport
Hello
We have implemented a free dictionary based Oracle password checker for
Oracle databases called checkpwd. This is a useful and fast (150.000
pw/sec) tool for DBAs to identify Oracle accounts with weak or default
passwords.
Details & Download
http://www.red-database-security.com/software/ch
On Tue, 23 Aug 2005, Suetterlin, Sven wrote:
> Date: Tue, 23 Aug 2005 08:59:40 +0200
> From: "Suetterlin, Sven" <[EMAIL PROTECTED]>
> To: full-disclosure@lists.grok.org.uk
^
^
> Sven S?tterlin
Dear Sven,
You ar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 781-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 23rd, 2005
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 782-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 23rd, 2005
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
Well for one, it would help if you were unsubscribing to the correct
list
Suetterlin, Sven wrote:
Hi @ all,
in order
from my boss, I have to unsubscribe from
this list. I’ve send an Email to [EMAIL PROTECTED]
and the address in the ``List-Unsubscribe'' header of any list m
Hi @ all,
in order from my boss, I have to unsubscribe from
this list. I’ve send an Email to [EMAIL PROTECTED]
and the address in the ``List-Unsubscribe'' header of any list message. But
nothing happen, I didn’t get an confirm message, but I still receive messages
from bugtraq. I’ve als
30 matches
Mail list logo