[Full-disclosure] Mozilla Firefox "Host:" Buffer Overflow

2005-09-08 Thread Tom Ferris
Mozilla Firefox "Host:" Buffer Overflow Release Date: September 8, 2005 Date Reported: September 4, 2005 Severity: Critical Vendor: Mozilla Versions Affected: Firefox Win32 1.0.6 and prior Firefox Linux 1.0.6 and prior Firefox 1.5 Beta 1 (Deer Park Alpha 2) Overview: A buffer overflow vulne

[Full-disclosure] [SECURITY] [DSA 806-1] New cvs packages fix insecure temporary files

2005-09-08 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 806-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze September 9th, 2005

Re: [Full-disclosure] [Fwd: MM - #$%@ Kill Google!]

2005-09-08 Thread Gareth Davies
Micheal Espinola Jr wrote: Ahem, but they still like the products, problems or not. Killing MS is not the answer. Contrary to uber-nerd beleif, there is no rule about top posting - but yea, I shoulda still trimmed. Answer: Usually below the question. Question: Where do you see answers in r

Re: [Full-disclosure] [Fwd: MM - #$%@ Kill Google!]

2005-09-08 Thread Micheal Espinola Jr
Ahem, but they still like the products, problems or not.  Killing MS is not the answer.   Contrary to uber-nerd beleif, there is no rule about top posting - but yea, I shoulda still trimmed.  On 9/8/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: Ahem.  Part of the *problem* is that 90%+ of the p

[Full-disclosure] Worldwide WEP Vulnerability Disclosure

2005-09-08 Thread Spinoza DesCartes
Product:Remote Wireless Panties http://www.kissntellparties.com/wirelessremote.html Versions: All Bug:DoS vulnerability Impact: Attacker's can cause overflow. Date: Septmber 08, 2005 Author: Spinoza DesCartes Perfidious Secur

Re: [Full-disclosure] Moderated?

2005-09-08 Thread Lee Quinton
I don't know what I would do without my daily dose of drama, God forbid do NOT make me watch daytime soaps! On 9/8/05, Andre Ludwig <[EMAIL PROTECTED]> wrote: Would you by chance have a bit of Chabichou du Poitou? Oh its simplymarvelous with a good chardonnay. DreOn 9/8/05, Glenn Hamblin <[EMAIL PR

Re: [Full-disclosure] Moderated?

2005-09-08 Thread Andre Ludwig
Would you by chance have a bit of Chabichou du Poitou? Oh its simply marvelous with a good chardonnay. Dre On 9/8/05, Glenn Hamblin <[EMAIL PROTECTED]> wrote: > > You guy's need some cheese to go with that WHINE!, > Life is short and there's nothing wrong with a good laugh > now and then. Relax

Re: [Full-disclosure] [Fwd: MM - #$%@ Kill Google!]

2005-09-08 Thread Valdis . Kletnieks
On Thu, 08 Sep 2005 16:41:34 EDT, Micheal Espinola Jr said: > Yea, because no one likes or uses thier products. Booo000o! Ahem. Part of the *problem* is that 90%+ of the people out there use their products. Oh, and (a) don't top-post, and (b) trim out any extraneous context - there was no need

[Full-disclosure] Moderated?

2005-09-08 Thread Glenn Hamblin
You guy's need some cheese to go with that WHINE!, Life is short and there's nothing wrong with a good laugh now and then. Relax and smell the roses along the way. Glenn At 10:35 AM 9/8/2005, you wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi all, i read this list now for a few

Re: [Full-disclosure] [Fwd: MM - #$%@ Kill Google!]

2005-09-08 Thread Micheal Espinola Jr
Yea, because no one likes or uses thier products.  Booo000o! On 9/8/05, Jason Coombs <[EMAIL PROTECTED]> wrote: When will somebody get around to the important job of killing Microsoft? Original Message Subject:MM - +ACMAJAAlAEA- Kill Google!Date:   Thu, 8 Sep 2005 18:58:17

Re: [Full-disclosure] Socks Vulnerability Also Effects Underwear(Package Compromised)

2005-09-08 Thread Mike Hoye
On Thu, Sep 08, 2005 at 02:39:15PM -0400, y0himba wrote: > Date: 9/8/2005 > Vulnerability Found: Hole In y0himba's Underwear > Affected System: Male Underwear(Possibly Female As Well) I've done some preliminary analysis of this problem, and it appears to be much worse

[Full-disclosure] [Fwd: MM - #$%@ Kill Google!]

2005-09-08 Thread Jason Coombs
When will somebody get around to the important job of killing Microsoft? Original Message Subject:MM - #$%@ Kill Google! Date: Thu, 8 Sep 2005 18:58:17 UT From: Michael Robertson<[EMAIL PROTECTED]> To: [EMAIL PROTECTED] If this message is not displaying proper

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Vladimir Parkhaev
Dave, your work around is very complicated and requires usage of 2 feet. Only Windows users have to perform this complex task of sock switching. There is a simple workaround for UNIX users: It is enough for UNIX users to simply turn the sock inside out and continue wearing it on the same foot.

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Exibar
the Soloman socks. long may they live :-) Exibar - Original Message - From: "Mary Landesman" <[EMAIL PROTECTED]> To: Sent: Thursday, September 08, 2005 2:33 PM Subject: Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock > This flaw is incredibly old. In the latter part of the

Re: [Full-disclosure] Socks Vulnerability Also Effects Underwear(Package Compromised)

2005-09-08 Thread Danny
Mike Hoye [mailto:[EMAIL PROTECTED] wrote: > I've done some preliminary analysis of this problem, and it appears to be > much worse than the earlier Sock vulnerabilities. This particular ware ships > with _three_ unpatched holes, and occasionally a fourth that is only > slightly secured. The U.S.

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Danny
On 9/8/05, Dave Cawley <[EMAIL PROTECTED]> wrote: > Date: 9/8/2005 > > Vulnerability Found:Hole In Dave's Socket > > Affected System:Dave's Right Sock > > Severity: Rating: Moderately Critical >Impact: System acc

[Full-disclosure] Crucial goes Ballistix

2005-09-08 Thread DudeVanWinkle
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Since its slow on the list, I will risk the Wrath of the Flaming Godz and the risk of having skidmarked underwear and holy socks thrown at me by asking if anyone knows of a system board that will support the new Ghz memory. (whew) Crucial 1GHz Ballist

[Full-disclosure] MDKSA-2005:161 - Updated apache2 packages to address multiple vulnerabilities

2005-09-08 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: apache2 Advisory ID:

RE: [Full-disclosure] Socks Vulnerability Also Effects Underwear(Package Compromised)

2005-09-08 Thread y0himba
Software vendor (Kmart) notified. I am the hardware vendor, so no notification is needed. -Original Message- From: Mike Hoye [mailto:[EMAIL PROTECTED] Sent: Thursday, September 08, 2005 3:22 PM To: y0himba Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Socks Vulner

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Vladimir Parkhaev
Quoting Jason Bethune ([EMAIL PROTECTED]): > I am protected against this attack; I have "Sandals 3.0 v.34" in place at > this time. I urge all to switch to this robust system. > What are Sandals and Socks? Is this a new technology? Is it supported by Microsockt? __ Vladimir Parkhaev, CISSP (C

Re: [Full-disclosure] Moderated?

2005-09-08 Thread Rachael Treu Gomes
If you've been lurking here for years, you should also be able to remember 2 things... 1. This list is is based on unmoderated communications. 2. This list is notorious for the colorful belligerence and of its posters and rampant barking of wild animals. Where have you been? ;) Searching the

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Daffey Duck
All users had been warned to update their Soft Wear. Thos who didn't are now experiencing the horrible consequences of their incompetence. I realize that for new users, like Dave, soft wear can be confusing and frustrating. It was for me, as well until I educated myself. As usual, the Birkenstock

[Full-disclosure] Re: Security hole in Dave's Sock - More implications

2005-09-08 Thread worried
GE, Maytag, Kenmore and numerous others have been implicated in a massive skimming scheme. Socks placed into washers and dryers with the appropriate mate tend to exit the cleaning process alone. Several Gov't agencies released today the findings of a multi-year investigation and have conclude

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock - it gets worse....

2005-09-08 Thread Toby Barrick
After an exhaustive investigation - GE, Maytag, Kenmore and numerous others have been implicated in a massive skimming scheme. Socks placed into washers and dryers with the appropriate mate tend to exit the cleaning process alone. Several Gov't agencies released today the findings of a multi

[Full-disclosure] Socks Vulnerability Also Effects Underwear(Package Compromised)

2005-09-08 Thread y0himba
Date: 9/8/2005 Vulnerability Found:Hole In y0himba's Underwear Affected System:Male Underwear(Possibly Female As Well) Severity: Rating: Critical Impact: Package Access Where: Net

[Full-disclosure] Re: Moderated?

2005-09-08 Thread Dave Korn
Original Message >From: Enrico Kern >Message-Id: [EMAIL PROTECTED] > list. Hello? there is no need to fight each other her, nor todo useless > posts (AND REPLYS TO STUPID POSTS). Well, how about we start with you practicing what you preach, eh? cheers, DaveK -- Can't think o

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Mary Landesman
This flaw is incredibly old. In the latter part of the 90s, Dr. Solomon's antivirus team assisted afflicted users by distributing socks at various worldwide conferences. Alas, the socks - and presumably the antivirus software - were later acquired by McAfee, Inc. Since then, McAfee has not only fai

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Exibar
Because of this hole, SANS have just gone from green to argyle as well exibar - Original Message - From: "Exibar" <[EMAIL PROTECTED]> To: "Dave Cawley" <[EMAIL PROTECTED]>; Sent: Thursday, September 08, 2005 1:31 PM Subject: Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

Re: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread John Smith
OMG! It seems the Crank-Bot.A and the Humrlss variant are now being deployed as a polymorphous worm, using the Sock vulnerability as an inital point of infection. The implications are simply enormous...we all knew a "superworm" was just waiting to be developed, but who would have guessed anybody wo

[Full-disclosure] [SECURITY] [DSA 805-1] New Apache2 packages fix several vulnerabilities

2005-09-08 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 805-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze September 8th, 2005

Re: [Full-disclosure] Moderated?

2005-09-08 Thread Valdis . Kletnieks
On Thu, 08 Sep 2005 19:35:08 +0200, Enrico Kern said: > Maybe its no bad idea to get some dedicated guys to sort this bullshit out > here. Just a suggestion. bugtraq@securityfocus.com is over there -> pgpRpfzJ5ND86.pgp Description: PGP signature

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Jason Bethune
I am protected against this attack; I have "Sandals 3.0 v.34" in place at this time. I urge all to switch to this robust system. Jason Bethune IT Specialist Town of Kentville 354 Main Street Kentville, NS B4N 1K6 www.town.kentville.ns.ca -Original Message- From: [EMAIL PROTECTED] [mai

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Philipp Walther
John, John Kinsella wrote: > Is anybody else seeing these attacks? Is this the China hackers > again? Dave wrote it's impact is only locally exploitable, but being serious researchers, we cannot the ignore the fact that it could be some sort of man - or even woman ! - in-the-middle attack.

[Full-disclosure] Moderated?

2005-09-08 Thread Enrico Kern
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi all, i read this list now for a few years and a while ago it was (ok is still is...) a good information source for vulnerabilities and other security relevant informations. But since a while it seems like kids do a good job on taking over this

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread Grant Rietze
I concur, It was fun until it got excessive. > -Original Message- > From: John Smith [mailto:[EMAIL PROTECTED] > Sent: September 8, 2005 1:28 PM > To: full-disclosure@lists.grok.org.uk > Subject: Re: [Full-disclosure] Security Hole Found In Dave's Sock > > Can we all shut up now? I know

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Exibar
I've found out that using Dave's right Sock 1.0 along with Sandals 2.0 will cause this vulnerability to become very appearant and much worse. With this known, Dave's rigth sock 1.0 should never EVER be used with any version of Sandals (currently at v2.0). exibar - Original Message -

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread Ted Frederick
alert toe $EXTERNAL_NET any -> $SNEAKER_NET any (msg:"EXPLOIT: Unauthorized Sock Overflow"; flow:to_Toe,established; content:"/sock/toe"; reference:FullDisclosure,2347; reference:cve,2001-0144; reference:cve,2001-0572; classtype:FootAccess-detect; sid:1324; rev:6;) -Original Message- From

Re: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread John Smith
Can we all shut up now? I know most of you are bored, please try to find something else to occupy yourselves with. I did not sign up to this list for childish banter (even though that is what I get most of the time, this is far exceeding the normal limit). Raj Mathur wrote: "Ted" == Ted Fre

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread Raj Mathur
> "Ted" == Ted Frederick <[EMAIL PROTECTED]> writes: Ted> Dear list, I know that this list is not meant for personal Ted> promotion but I think I would be remiss if I did not mention Ted> that my company has recently released an upgrade to our Ted> initial offering of Shoe 1.0.

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Swain, Kenneth
I have not seen any signatures for snort yet, but I heard that the bleeding snort team is working on it.I have not seen any signatures for snort yet, but I heard that the bleeding snort team is working on it. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Swain, Kenneth
>From my research I have found that the hole can not be exploited unless the socks are being used. If you also use proper and clean shoes then you should be safe from exploits on the street. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Peter Bruderer S

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread y0himba
I think I can help you... My questions: Has somebody already detected a working exploit for this hole in the wild? Yes. He goes by the name of "Digger The Dermatophite" Can this hole be exploited if the socks are laying on a shelf in a cabinet? I think that depends on how well the shelf is secu

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread John Kinsella
Is anybody else seeing these attacks? Is this the China hackers again? I think I saw a hole last week, but my logs aren't that great so I'm going to have to go back and double-check. Could this be related to socks disappearing? Anybody have signatures for snort? John On Thu, Sep 08, 2005 at 01

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Glenn Hamblin
I've black listed all communication with the Dave system until I can be assured that this hole has been properly patched. A scan of my system has found no such vulnerability. I am however also considering complete un-installation of all sock from my system. While I wait for the vendor(s) assuranc

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Peter Bruderer
This hole must be a general misconception of the product. After checking my socks I found a hole in all of them! They are all size 9 1/2. My questions: Has sombody already detected a working exploit for this hole in the wild? Can this hole be exploited if the socks are laying on a shelf in a cab

Re: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread Andre Ludwig
Please note that the following attack vector may be present in any and all "shoe" like devices and systems. http://www.0x90.org/releases/laces0dayAdv.txt Shoe 1.0 - Remote Lace Overflow This Vulnerability is in reference to the new class of remote

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread y0himba
Will "Shoe 2.0" protection from those ugly little trolls? The ones that like to nip? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of miah Sent: Thursday, September 08, 2005 1:01 PM To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Secu

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread Craig, Tobin \(OIG\)
That's a good point Dave. Have you tried rebooting? ___ Tobin Craig, MRSC, CISSP, SCERS, EnCE, CCE IT Forensic Director, Computer Crimes and Forensics Department of Veterans Affairs Office of Inspector General 801 I Street NW Washington DC 20001 Tel: 202 565 7702 Fax: 20

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Dave Cawley
With the work around, putting it on the left foot, the hole will be ABOVE the small toe and should not enlarge. This hasn't been verifed yet, but the computer models point to this. *** Dave D. Cawley | High Speed Interne

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread Ted Frederick
Not out of the box. However there are several third party add-ons to provide some extra protection. I will pass your suggestion on to our developers so that we can keep in mind a hardened foot protection in future releases. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECT

Re: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread miah
Ok you've all had your fun now can you all shut the hell up? Thanks -miah On Thu, Sep 08, 2005 at 12:58:31PM -0400, y0himba wrote: > Is "Shoe 20" a hardened foot protection? > > -Original Message- > From: Ted Frederick [mailto:[EMAIL PROTECTED] > Sent: Thursday, September 08, 2005 12:55

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread y0himba
Is "Shoe 20" a hardened foot protection? -Original Message- From: Ted Frederick [mailto:[EMAIL PROTECTED] Sent: Thursday, September 08, 2005 12:55 PM To: y0himba; full-disclosure@lists.grok.org.uk; Dan Mack; Tim Doyle Subject: RE: [Full-disclosure] Security Hole Found In Dave's Sock Dear

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread Ted Frederick
Dear list, I know that this list is not meant for personal promotion but I think I would be remiss if I did not mention that my company has recently released an upgrade to our initial offering of Shoe 1.0. The upgrade to Shoe 2.0 includes a firewall/anti-virus product previously known as Sock 3.4

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Dave Cawley
The sock came with the factory installed configuration. This hole is not part of that configuration and there is no mechanism in the origial configuration to close this one off. *** Dave D. Cawley | High Speed Internet

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Dave Cawley
Sock Type Men's 9-12. *** Dave D. Cawley | High Speed Internet |The number of Unix installations Duryea, PA | has grown to 10, with more expected. (570)451-4311 x104 | - The Unix Programmer'

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Daniel
Hi all, I see, that the hole getting greater if you use the socket without any patches! Can anyone verify this? kind regards Daniel pgpCI7Lz3Oj3t.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Craig, Tobin \(OIG\)
It seems that the proprietary and the open source manufacturers agreed upon a standardized default configuration: all models are designed with one hole, used for deployment. Are you reporting the existence of a second hole, or is this an observation of the factory installed default configuration

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread y0himba
What version socks are these? What type? 4? 4a? 5? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dave Cawley Sent: Thursday, September 08, 2005 12:29 PM To: Craig, Tobin (OIG); full-disclosure@lists.grok.org.uk Subject: RE: [Full-disclosure] Secuirt

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread J Pena
Holey Moley!! --- "Swain, Kenneth" <[EMAIL PROTECTED]> wrote: > I have already heard about an exploit in the wild. > > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] > On Behalf Of Dave > Cawley > Sent: Thursday, September 08, 2005 11:10 AM > To: full-disclosu

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Dave Cawley
It's hard to get the socks from different pairs to sync up. This can cause confusion for people viewing the socks and in turn cause a high volume of inquiries to the system administrator. But I'll give it the old college try. Thanks for the input! **

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread y0himba
Bah I was so overcome by the sheer magnitude of this vulnerability that I double posted. Sorry. I will now nip off and shoot myself. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of y0himba Sent: Thursday, September 08, 2005 12:19 PM To: full-disclosure@l

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Craig, Tobin \(OIG\)
Dave, A number of patches are available, all depenent upon the severity of the vulnerability. I had always assumed this to be a feature, but now that it's been observed elsewhere, I'll initiate a full audit of my environment. I also recommend that you carry spare socks to maintain continuity o

RE: [Full-disclosure] Far too quiet on the list.

2005-09-08 Thread Dave Cawley
On Behalf Of Paul Farrow >I mean for crying out loud, what use is incredibly high speed broadband >in a residential home useful for? Porn, cos we can't surf for it at work... *** Dave D. Cawley | High Speed Internet

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread y0himba
Its ok. I haven't even reported yet so I am sure I will be just as excited. Sit back, relax, take a breath... -Original Message- From: Dave Cawley [mailto:[EMAIL PROTECTED] Sent: Thursday, September 08, 2005 12:22 PM To: y0himba; full-disclosure@lists.grok.org.uk Subject: RE: [Full-disc

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Dave Cawley
Sorry, vendor is Gold Toe. I will alert them immediately. This is my first reporting, I tried to follow protocol as closely as possible. I just got so excited... *** Dave D. Cawley | High Speed Internet |The num

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread y0himba
What company is this sock from? Should I run out and upgrade my socks? I see you failed to notify the vendor. Is there a reason for this? You should always notify the vendor before posting the exploit or hole in public... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTE

Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Rob
Dave, Please don't rehash 1000 year old vulnerabilities unless you are adding new info... Thanks Dave Cawley wrote: Date: 9/8/2005 Vulnerability Found:Hole In Dave's Socket Affected System:Dave's Right Sock Severity: Rating: Moderately

Re: [Full-disclosure] Far too quiet on the list.

2005-09-08 Thread xyberpix
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hehe, in the UK, yep, all the kids went back to school on Monday (thankfully!) xyberpix On 8 Sep 2005, at 16:58, Paul Farrow wrote: Im used to having to fetch mail every few minutes. Have all they kiddies gone back to school or something?! Anyw

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread y0himba
OH NOES!!!11 What company is this sock from? Should I run out and upgrade my socks? I see you failed to notify the vendor. Is there a reason for this? You should always notify the vendor before posting the exploit or hole in public... -Original Message- From: [EMAIL PROTECTED] [mailt

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Swain, Kenneth
I have already heard about an exploit in the wild. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dave Cawley Sent: Thursday, September 08, 2005 11:10 AM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Secuirty Hole Found In Dave's Sock

RE: [Full-disclosure] Security Hole Found In Dave's Sock

2005-09-08 Thread MacDougall, Shane
This vuln was already released on 7/21/05 by Thor. Please don't take credit for other people's findings. -Original Message- From: Dave Cawley [mailto:[EMAIL PROTECTED] Sent: Thu Sep 08 09:11:22 2005 To: full-disclosure@lists.grok.org.uk Subject:[Full-disclosure] Secuirty

RE: [Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread y0himba
OH NOES!!!1 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dave Cawley Sent: Thursday, September 08, 2005 12:10 PM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Secuirty Hole Found In Dave's Sock Date: 9/8/2005 Vulnerabi

[Full-disclosure] Secuirty Hole Found In Dave's Sock

2005-09-08 Thread Dave Cawley
Date: 9/8/2005 Vulnerability Found:Hole In Dave's Socket Affected System:Dave's Right Sock Severity: Rating: Moderately Critical Impact: System access Where: Foot Description of

Re: [Full-disclosure] Quiet

2005-09-08 Thread Swain, Kenneth
Yep that would be it. -Original Message- From: FRLinux <[EMAIL PROTECTED]> To: Swain, Kenneth <[EMAIL PROTECTED]> CC: xyberpix <[EMAIL PROTECTED]>; y0himba <[EMAIL PROTECTED]>; full-disclosure@lists.grok.org.uk Sent: Thu Sep 08 11:05:08 2005 Subject: Re: [Full-disclosure] Quiet On 9/8

Re: [Full-disclosure] Quiet

2005-09-08 Thread FRLinux
On 9/8/05, Swain, Kenneth <[EMAIL PROTECTED]> wrote: > Or it could be that we are all slammed with work we can not post. You mean all busy patching our beloved cisco routers ? :p http://www.theregister.co.uk/2005/09/08/cisco_authentication_bug/ Steph -- "Step by step, penguins are taking my sani

[Full-disclosure] Far too quiet on the list.

2005-09-08 Thread Paul Farrow
Im used to having to fetch mail every few minutes. Have all they kiddies gone back to school or something?! Anyway... might as well start a topic for discusion. Companys say that a pirate (read warez kiddie) for the most part (read 98%) would not enter a store, pick up an audio/movie/software c

RE: [Full-disclosure] Quiet

2005-09-08 Thread Swain, Kenneth
Or it could be that we are all slammed with work we can not post. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of xyberpix Sent: Thursday, September 08, 2005 10:53 AM To: y0himba Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Quiet

Re: [Full-disclosure] Quiet

2005-09-08 Thread xyberpix
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Nope, closed for the day ;-) xyberpix On 8 Sep 2005, at 16:37, y0himba wrote: The list is quiet today... Anyone? Anyone? Beuller? Beuller? -BEGIN GEEK CODE BLOCK- Version: 3.1 GCM/GIT/GO d- s: a C$ UL P L E W N

[Full-disclosure] mimicboard2

2005-09-08 Thread Morning Wood
- EXPL-A-2005-013 exploitlabs.com Advisory 042 - - mimicboard2 - AFFECTED PRODUCTS mimicboard2 #086 < and lower http://www.chitta.com/nobu/download/#mimic2 OVERVIEW Mimic2 is a html open forum type of blog, tailored in particular to the Japaneese

[Full-disclosure] Quiet

2005-09-08 Thread y0himba
The list is quiet today... Anyone? Anyone? Beuller? Beuller? -BEGIN GEEK CODE BLOCK- Version: 3.1 GCM/GIT/GO d- s: a C$ UL P L E W N+ o K++ w O- M- V-- PS+ PE Y++ PGP++ t+ 5-- X+ R* tv++ b+ DI++ D G++ e h r+++ y --END GEEK CODE BL

[Full-disclosure] Secunia Research: NOD32 Anti-Virus ARJ Archive Handling Buffer Overflow

2005-09-08 Thread Secunia Research
== Secunia Research 08/09/2005 - NOD32 Anti-Virus ARJ Archive Handling Buffer Overflow - == Table of Contents Affected Software...

[Full-disclosure] Secunia Research: ALZip ACE Archive Handling Buffer Overflow

2005-09-08 Thread Secunia Research
== Secunia Research 07/09/2005 - ALZip ACE Archive Handling Buffer Overflow - == Table of Contents Affected Software.

[Full-disclosure] [SECURITY] [DSA 804-1] New kdelibs packages fix backup file information leak

2005-09-08 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 804-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze September 8th, 2005