Re: [Full-disclosure] Mozilla Firefox "Host:" Buffer Overflow Exploit

2005-09-10 Thread Paul
Skylined, is there anything that you can't exploit? ;-)   On a side note, an article quoting Ferris saying that "Microsoft takes too long to patch stuff so that's why I'm going public" recently was slashdotted (regarding a vulnerability he found in Internet Explorer). Now he goes public with

Re: [Full-disclosure] IIS 5.1 Source Disclosure Under FAT/FAT32 Volumes Using WebDAV

2005-09-10 Thread security curmudgeon
Hi Jerome, : It is possible to remotely view the source code of web script files : though a specially crafted WebDAV HTTP request. Only IIS 5.1 seems to be : vulnerable. The web script file must be on a FAT or a FAT32 volume, web : scripts located on a NTFS are not vulnerable. : : The informa

Re: [Full-disclosure] Drama: Venomous and his F-D folder

2005-09-10 Thread n3td3v
The n3td3v alias is purely a rants and random bullshit ID. The fuller picture is out there, somewhere. On 9/10/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > n3td3v, > Just because you joined a board > > (http://forum.crime-research.org/profile.php?mode=viewprofile&u=8) > /str0ke -- htt

[Full-disclosure] Drama: Venomous and his F-D folder

2005-09-10 Thread str0ke
n3td3v, Its funny how you pick 1 person out of the bunch that complained on the list. Your child porn blah is kind of funny since VeNoMouS used to host Condemned.org, I would hope you know what condemned.org is since your webpage states you have Extensive on hands hacker scene experience (6+ year

Re: [Full-disclosure] Revised paper on "ICMP attacks against TCP"

2005-09-10 Thread Łukasz Bromirski
Florian Weimer wrote: IIRC, those Cisco products that are not vulnerable to the PMTU just don't implement PMTUD, right? You can explicitly enable PMTUD if you want ("ip tcp path-mtu-discovery"). It's recommended to reduce CPU overhead for processing BGP message (no kidding, apparently it id ma

[Full-disclosure] Drama: Venomous and his F-D folder

2005-09-10 Thread n3td3v
"My full-disclosure folder" Venomous, you're full of yourself. By trying to isolate yourself from "kids" makes you more guilty of being directly involved in the "kid scene" of the security community. You're already known to be a regular of such channels as "#hackphreak" and others. Enough said. Y

Re: [Full-disclosure] Mozilla Firefox "Host:" Buffer Overflow Exploit

2005-09-10 Thread Przemyslaw Frasunek
Berend-Jan Wever napisał(a): > The security vulnerability in Mozilla FireFox reported by Tom Ferris is > exploitable on Windows. It's also easly exploitable on Linux -- no problems with jumping to arbitrary address: (gdb) x/i $eip 0x867926c <_ZN16nsTypedSelection5ClearEP14nsIPresContext+2236>:

RE: [Full-disclosure] Mozilla Firefox "Host:" Buffer Overflow

2005-09-10 Thread Larry Seltzer
>>And how exactly do you propose to "leave out the details and PoC" when the presence of the bug and the steps taken to fix it can not be concelaed from public view given that the source code and the entire CVS entries are freely available for anyone to browse? You really don't think it woudl slow

Re: [Full-disclosure] multilinks.com security contact ?

2005-09-10 Thread Lee Quinton
Go here also, http://www.spamhaus.org/ _ Lee Quinton, CISSP. Key:  0x2F6DF7B4 FP:   E841 44EA F7AC E53D 3577 A5EF AA83 65BC 2F6D F7B4 On 9/10/05, Aditya Deshmukh <[EMAIL PROTECTED]> wrote: One of domains is getting a *very* high number of 419 spams from an addressdelegated to mul

Re: [Full-disclosure] Revised paper on "ICMP attacks against TCP"

2005-09-10 Thread Florian Weimer
* Fernando Gont: > IIRC, those Cisco products that are not vulnerable to the PMTU just don't > implement PMTUD, right? You can explicitly enable PMTUD if you want ("ip tcp path-mtu-discovery"). It's recommended to reduce CPU overhead for processing BGP message (no kidding, apparently it id make

RE: [Full-disclosure] Mozilla Firefox "Host:" Buffer Overflow

2005-09-10 Thread Roberto Gomez Bolaños
And how exactly do you propose to "leave out the details and PoC" when the presence of the bug and the steps taken to fix it can not be concelaed from public view given that the source code and the entire CVS entries are freely available for anyone to browse? Mozilla users are getting the considera

[Full-disclosure] multilinks.com security contact ?

2005-09-10 Thread Aditya Deshmukh
One of domains is getting a *very* high number of 419 spams from an address delegated to multilinks.com. Where do I send the spam reports ? I have already send everything to spamcop.net but that has not stopped anything yet ___

[Full-disclosure] Mozilla Firefox "Host:" Buffer Overflow Exploit

2005-09-10 Thread Berend-Jan Wever
(Just a little heads up, no details or PoC attached)   The security vulnerability in Mozilla FireFox reported by Tom Ferris is exploitable on Windows. I developed a working exploit that seems to be 100% stable, though I've only tested it on one system. The exploit will not be released publicly unti

RE: [Full-disclosure] Revised paper on "ICMP attacks against TCP"

2005-09-10 Thread Fernando Gont
At 04:08 p.m. 05/09/2005, alex wrote: Russian version (22.08.2005, with some analysis): http://www.securitylab.ru/contest/239695.php IIRC, those Cisco products that are not vulnerable to the PMTU just don't implement PMTUD, right? ___ Full-Disclo

[Full-disclosure] IE SP2 MHTML way to local intranet

2005-09-10 Thread Alex Smith
Simple http redirection http://www.mssx.ws/mhtml_localintranet.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Moderated?

2005-09-10 Thread Glenn Hamblin
Maybe I'm way off base here, (I'm sure you'll let me know) but if you don't even bother opening the full-disclosure folder, How did you find something so offensive in it?? Kinda like I never watch porn but I'm totally offended by the #$%@&^%$#$@ stuff! Pretty curious to me. Well dude(s) and(d