[Full-disclosure] MDKSA-2005:164 - Updated XFree86/x.org packages fix vulnerability

2005-09-14 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: XFree86 Advisory ID:

[Full-disclosure] NUL Character Evasion

2005-09-14 Thread ju
The Problem: Internet Explorer ignores NUL characters -- i.e. ascii characters with the value 0x00 -- most security software does not. This behaviour of IE does not depend on the charset in the Content-Type-Header. En Detail You can embed NUL characters at any place in an HTML

RE: [Full-disclosure] FireFox Host: Buffer Overflow is not justexploitable on FireFox

2005-09-14 Thread Peter Kruse
Hi Juha! I have informed the vendor Netscape being affected on 9th September 2005. I did the same on the 10th of September - still no reply nor official statement from Netscape which makes me a little worried. 2) Disabling IDN support via about:config (or prefs.js file) is possible in

[Full-disclosure] Mozilla / Mozilla Firefox authentication weakness

2005-09-14 Thread 3APA3A
Dear bugTraq, I have reported this issue some time ago: http://www.security.nnov.ru/Fnews19.html but it looks like it was ignored, and not fixed in latest mozilla and firefox releases, so I decided to send formal advisory Issue: Mozilla browsers authentication weakness

Re: [Full-disclosure] Re: Full-Disclosure Digest, Vol 7, Issue 25

2005-09-14 Thread Peer Janssen
lonely wolf wrote: Peer Janssen wrote: Aditya Deshmukh wrote: (on system you want to copy) dd if=/dev/hda | nc otherhost 5000 If you are running bash, then you do not even need netcat: dd if=/dev/hda /dev/tcp/otherhost/5000 This is interesting. Indeed :-) Which version of

[Full-disclosure] WiFi encryption performance comparrison?

2005-09-14 Thread Paul Day
Howdy, Does anyone have any real-world info/papers/figures on comparing the performance of WEP64 vs 128 vs WPA vs WPA2 etc on recent-ish hardware? ie, same hardware, different encryption methods, performance trade-offs from each. Google's not being awfully helpful. Thanks in advance. :) Cheers,

RE: [Full-disclosure] Mozilla Firefox Host: Buffer Overflow Exploit

2005-09-14 Thread Larry Seltzer
There was some confusion as to whether this bug (https://bugzilla.mozilla.org/show_bug.cgi?id=307259 in bugzilla) was similar or identical to https://bugzilla.mozilla.org/show_bug.cgi?id=267669. David Baron of Mozilla is saying (I think - see

[Full-disclosure] Secunia Research: AVIRA Antivirus ACE Archive Handling Buffer Overflow

2005-09-14 Thread Secunia Research
== Secunia Research 14/09/2005 - AVIRA Antivirus ACE Archive Handling Buffer Overflow - == Table of Contents Affected

Re: [Full-disclosure] WiFi encryption performance comparrison?

2005-09-14 Thread Xyberpix
Hey Paul, What sort of info exactly are you looking for? Throughput figures, etc? The difference you will notice in network performance between WEP 128 and WPA is really minimal, to be honest with you, you shouldn't really notice any performance hit at all. When it comes to WEP 64 and WEP 128,

[Full-disclosure] Security Conference

2005-09-14 Thread Ron Bidule
For those of you that are interested in :hack.lu 2005The purpose of the hack.lu convention is to give an open and freeplayground where people can discuss the implication of new technologies (mainly security) on society. hack.lu is a balanced convention wheretechnical and non-technical people can

[Full-disclosure] Fwd: SF new mailing list announcement: BS 7799 Security

2005-09-14 Thread n3td3v
-- Forwarded message -- From: Daniel Hanson [EMAIL PROTECTED] Date: Sep 14, 2005 3:02 PM Subject: SF new mailing list announcement: BS 7799 Security To: [EMAIL PROTECTED] The following mailing list was just added to the SecurityFocus collection of moderated mailing lists: BS

Re: [Full-disclosure] Mozilla / Mozilla Firefox authentication weakness

2005-09-14 Thread Daniel Veditz
This is https://bugzilla.mozilla.org/show_bug.cgi?id=281851 3APA3A wrote: I have reported this issue some time ago: http://www.security.nnov.ru/Fnews19.html but it looks like it was ignored, and not fixed in latest mozilla and firefox releases, so I decided to send formal advisory

RE: [Full-disclosure] Fwd: SF new mailing list announcement: BS 7799Security

2005-09-14 Thread ad
What a news!!keep up the good work n3td3v :D -Message d'origine- De : [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] De la part de n3td3v Envoyé : mercredi 14 septembre 2005 19:11 À : full-disclosure@lists.grok.org.uk Objet : [Full-disclosure] Fwd: SF new mailing list announcement: BS

[Full-disclosure] Exploiting an online store

2005-09-14 Thread Josh perrymon
I was reading an article about an attacker that could have changed a price in an online shopping cart- Snip Next, Reshef performed a little number he calls ``electronic shoplifting'': He edited the site's online order form to reduce the price of a book from $22.95 to $2.95. Had

RE: [Full-disclosure] Exploiting an online store

2005-09-14 Thread Thomas Quinlan
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Josh perrymon Sent: Wednesday, September 14, 2005 4:05 PM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] Exploiting an online store I was reading an article about an attacker that could have

[Full-disclosure] Oracle Reports: Generic SQL Injection Vulnerability via Lexical References

2005-09-14 Thread Kornbrust, Alexander
Red-Database-Security GmbH - Oracle Reports Security Advisory Generic SQL Injection Vulnerability in Oracle Reports via Lexical References NameGeneric SQL Injection Vulnerability in Oracle Reports

Re: [Full-disclosure] Mozilla / Mozilla Firefox authentication weakness

2005-09-14 Thread Juha-Matti Laurio
This is https://bugzilla.mozilla.org/show_bug.cgi?id=281851 It seems that this is assigned to http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2395 (in July '05) too. - Juha-Matti ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-disclosure] FireFox Host: Buffer Overflow is not justexploitable on FireFox

2005-09-14 Thread Juha-Matti Laurio
Hi Juha! I have informed the vendor Netscape being affected on 9th September 2005. I did the same on the 10th of September - still no reply nor official statement from Netscape which makes me a little worried. Good to know. It seems that's their way to act. They had a coverage Security

Re: [Full-disclosure] Exploiting an online store

2005-09-14 Thread Valdis . Kletnieks
On Thu, 15 Sep 2005 03:29:25 +0200, Gadi Evron said: Check the date of the article. That company no longer exists and SQL injections are not THAT big of an issue for established eCommerce sites as they were in 1999. Which is exactly why the previous posting on the list was an SQL injection

[Full-disclosure] FF IDN buffer overflow workaround works in Netscape too

2005-09-14 Thread Juha-Matti Laurio
Summary about Firefox IDN buffer overflow vulnerability workarounds in Netscape Browser [a new, more informative title used] Instructions and methods described at Mozilla Foundation Security Advisory What Firefox and Mozilla users should know about the IDN buffer overflow security issue

[Full-disclosure] [FLSA-2005:163274] Updated CUPS packages fix security issue

2005-09-14 Thread Marc Deslauriers
- Fedora Legacy Update Advisory Synopsis: Updated CUPS packages fix security issue Advisory ID: FLSA:163274 Issue date:2005-09-14 Product: Red Hat Linux, Fedora Core Keywords:

[Full-disclosure] [FLSA-2005:163047] Updated squirrelmail package fixes security issues

2005-09-14 Thread Marc Deslauriers
- Fedora Legacy Update Advisory Synopsis: Updated squirrelmail package fixes security issues Advisory ID: FLSA:163047 Issue date:2005-09-14 Product: Red Hat Linux, Fedora Core

[Full-disclosure] [FLSA-2005:162680] Updated Zlib packagea fix security issues

2005-09-14 Thread Marc Deslauriers
- Fedora Legacy Update Advisory Synopsis: Updated Zlib packagea fix security issues Advisory ID: FLSA:162680 Issue date:2005-09-14 Product: Fedora Core Keywords: Bugfix CVE

[Full-disclosure] [FLSA-2005:160202] Updated mozilla packages fix security issues

2005-09-14 Thread Marc Deslauriers
- Fedora Legacy Update Advisory Synopsis: Updated mozilla packages fix security issues Advisory ID: FLSA:160202 Issue date:2005-09-14 Product: Red Hat Linux, Fedora Core Keywords:

RE: [Full-disclosure] Exploiting an online store

2005-09-14 Thread Josh Perrymon
I know that bad programming habits exist on some of the sites out there and still use Hidden fields to pass prices over.. Although not very commonI found one this morning after sending the email... My question is more on the theory I suppose... What laws are out there to protect

RE: [Full-disclosure] Exploiting an online store

2005-09-14 Thread lyal.collins
I would have thought that obtaining value by deception is just simple fraud. The detection of the incident and prosecution of the guilty is usually more challenging than committing the offence, I understand. Lyal I know that bad programming habits exist on some of the sites out there and still

[Full-disclosure] [SECURITY] [DSA 812-1] New turqstat packages fix buffer overflow

2005-09-14 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 812-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze September 15th, 2005

Re: [Full-disclosure] NUL Character Evasion

2005-09-14 Thread Williams, James K
List: full-disclosure Subject:[Full-disclosure] NUL Character Evasion From: ju () heisec ! de Date: 2005-09-13 21:24:42 The Problem: Internet Explorer ignores NUL characters -- i.e. ascii characters with the value 0x00 -- most security software does