Re: [Full-disclosure] Open Letter on the Interpretation of "Vulnerability Statistics"

2006-01-11 Thread Matt Zimmerman
On Thu, Jan 12, 2006 at 12:15:35AM +0100, Florian Weimer wrote: > * Matt Zimmerman: > > >> Yes, this puzzles me too, but on the other hand, Debian became a CNA, > >> and Debian's official policy is geared away from "responsible > >> disclosure" -- all bug reports are supposed to be public. > > > >

Re: [Full-disclosure] Bluetooth on Kodak PictureMaker Kiosks...

2006-01-11 Thread Gaddis, Jeremy L.
KF (lists) wrote: Does anyone on the list have access to a Kodak PictureMaker Kiosk? These devices come with Bluetooth enabled and unfortunately shortly after mentioning to a local CVS store that Bluetooth implementations are not always up to snuff, mysteriously all the stores in the area have

[Full-disclosure] Bluetooth on Kodak PictureMaker Kiosks...

2006-01-11 Thread KF (lists)
Does anyone on the list have access to a Kodak PictureMaker Kiosk? These devices come with Bluetooth enabled and unfortunately shortly after mentioning to a local CVS store that Bluetooth implementations are not always up to snuff, mysteriously all the stores in the area have disabled the Bluet

Re: [Full-disclosure] [EEYEB-20051117B] Apple iTunes (QuickTime.qts) Heap Overflow

2006-01-11 Thread Mark Senior
This must be an unintentional repost, surely? >From the description of CAN-2004-0431: Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to execute arbitrary code >From the description of CERT vuln (linked from the above CVE entry): III. Solution Upgrade Upgrade t

Re: [Full-disclosure] Open Letter on the Interpretation of "Vulnerability Statistics"

2006-01-11 Thread Florian Weimer
* Matt Zimmerman: >> Yes, this puzzles me too, but on the other hand, Debian became a CNA, >> and Debian's official policy is geared away from "responsible >> disclosure" -- all bug reports are supposed to be public. > > Debian isn't a CNA; as far as I know, it isn't possible for > organizations t

[Full-disclosure] Critical excel vulnerability for sale, read inside.

2006-01-11 Thread [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 It has not been possible for me to reach an agreement with zdi nor idefense for selling the excel bug because I have publicly warned about a remote command execution in my forum, I have tried to excuse me about my selfstarting mistakes in the rssponsi

Re: [Full-disclosure] WMF Exploit

2006-01-11 Thread wac
HiInteresting. How much? :DRegardsWaldoOn 1/4/06, Todd Towles <[EMAIL PROTECTED] > wrote:Not sure, the last non-exploit pen auction was up pretty high> -Original Message- > From: Georgi Guninski [mailto:[EMAIL PROTECTED]]> Sent: Wednesday, January 04, 2006 3:57 PM> To: Todd Towles> Cc: [EM

Re: [Full-disclosure] Re: ntpd stack evasion exploit

2006-01-11 Thread Valdis . Kletnieks
On Wed, 11 Jan 2006 19:01:09 GMT, Dave Korn said: > > George A. Theall wrote in news:[EMAIL PROTECTED] > > >At least the original poster didn't offer up any hostnames. > > Well, apart from this one: > > >Original-Received: from p3fed1.frb.org (p3fed1.frb.org [199.169.208.132]) Any bets as to

[Full-disclosure] Microsoft fixes patches more quickly under pressures of full disclosure

2006-01-11 Thread Ben Nelson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Nothing earth-shattering for anyone here, but I thought it apropos. http://blogs.washingtonpost.com/securityfix/2006/01/a_timeline_of_m.html - --Ben -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDxVyU3cL8qXKvzcwRAq5dAKDv+iYu

[Full-disclosure] Re: ntpd stack evasion exploit

2006-01-11 Thread Dave Korn
George A. Theall wrote in news:[EMAIL PROTECTED] >At least the original poster didn't offer up any hostnames. Well, apart from this one: >Original-Received: from p3fed1.frb.org (p3fed1.frb.org [199.169.208.132]) cheers, DaveK -- Can't think of a witty .sigline today _

[Full-disclosure] test

2006-01-11 Thread ron
checking if this address works on the list ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Updated Advisories - Incorrect CVE Information

2006-01-11 Thread Advisories
Our apologies, the incorrect CVE information was provided with our Apple advisories today. The correct CVE numbers are; [EEYEB-20051220] Apple QuickTime QTIF Stack Overflow = CVE-2005-2340 [EEYEB-20051117B] Apple iTunes (QuickTime.qts) Heap Overflow = CVE-2005-4092 [EEYEB-20051117A] Apple QuickT

[Full-disclosure] [EEYEB-20051031] Apple QuickTime Malformed GIF Heap Overflow

2006-01-11 Thread Advisories
EEYEB-20051031 Apple QuickTime Malformed GIF Heap Overflow Release Date: January 10, 2006 Date Reported: October 31, 2005 Severity: High (Code Execution) Patch Development Time (In Days): 71 Days Severity: High (Code Execution) Vendor: Apple Systems Affected: Quicktime on Windows 2000 Quick

[Full-disclosure] [EEYEB-20051117A] Apple QuickTime STSD Atom Heap Overflow

2006-01-11 Thread Advisories
EEYEB-20051117A Apple QuickTime STSD Atom Heap Overflow Release Date: January 10, 2006 Date Reported: November 17, 2005 Patch Development Time (In Days): 54 Days Severity: High (Code Execution) Vendor: Apple Systems Affected: Quicktime on Windows 2000 Quicktime on Windows XP Quicktime on Mac

[Full-disclosure] [EEYEB-20051117B] Apple iTunes (QuickTime.qts) Heap Overflow

2006-01-11 Thread Advisories
EEYEB-20051117B Apple iTunes (QuickTime.qts) Heap Overflow Release Date: January 10, 2006 Date Reported: November 17, 2005 Patch Development Time (In Days): 54 Days Severity: High (Code Execution) Vendor: Apple Systems Affected: Quicktime on Windows 2000 Quicktime on Windows XP Quicktime on M

[Full-disclosure] [EEYEB-20051220] Apple QuickTime QTIF Stack Overflow

2006-01-11 Thread Advisories
EEYEB-20051229 Apple QuickTime QTIF Stack Overflow Release Date: January 10, 2006 Date Reported: December 29, 2005 Patch Development Time (In Days): 12 days Severity: High (Code Execution) Vendor: Apple Systems Affected: Quicktime on Windows 2000 Quicktime on Windows XP Quicktime on Mac O

[Full-disclosure] Cisco Security Advisory: Default Administrative Password in Cisco Security Monitoring, Analysis and Response System (CS-MARS)

2006-01-11 Thread Cisco Systems Product Security Incident Response Team
) = Document ID: 68605 Advisory ID: cisco-sa-20060111-mars http://www.cisco.com/warp/public/707/cisco-sa-20060111-mars.shtml Revision 1.0 For Public Release 2006 January 11 1600 UTC (GMT) - --- Contents Summary

[Full-disclosure] QUICKTIME vuln: Apple pulls a Microsoft stunt

2006-01-11 Thread CIRT.DK Advisory
Title: QUICKTIME vuln: Apple pulls a Microsoft stunt Hey there Just an update it seems that Apple uses the same developers as Microsoft Apple QuickTime is still vulnerable: Tested on MAC OS X and Windows Platform Save the following file and open with QuickTime http://www.cirt.dk/tools

[Full-disclosure] [USN-240-1] bogofilter vulnerability

2006-01-11 Thread Martin Pitt
=== Ubuntu Security Notice USN-240-1 January 11, 2006 bogofilter vulnerability CVE-2005-4591 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 (Breezy Ba

Re: [Full-disclosure] [CIRT.DK] Apple QuickTime 7.0.3 and earlier - JPG/PICT Buffer Overflow

2006-01-11 Thread virus
Hello, CIRT.DK Advisory wrote: Apple Quicktime are vulnerable to a buffer overflow in the handling of .JPG/.PICT files Read the full advisory http://www.cirt.dk/advisories/cirt-41-advisory.pdf and additional the advisory from Apple, see http://lists.apple.com/archives/security-announce/2006/

[Full-disclosure] Re: iDefense Security Advisory 12.22.05: Linux Kernel Socket Buffer Memory Exhaustion DoS Vulnerability

2006-01-11 Thread Paul Starzetz
[EMAIL PROTECTED] wrote: The vulnerability specifically exists due to a lack of resource checking during the buffering of data for transfer over a pair of sockets. An attacker can create a situation that, depending on the amount of available system resources, can cause the kernel to panic due t

[Full-disclosure] [CIRT.DK] Apple QuickTime 7.0.3 and earlier - JPG/PICT Buffer Overflow

2006-01-11 Thread CIRT.DK Advisory
Title: [CIRT.DK] Apple QuickTime 7.0.3 and earlier - JPG/PICT Buffer Overflow Apple Quicktime are vulnerable to a buffer overflow in the handling of .JPG/.PICT files Read the full advisory http://www.cirt.dk/advisories/cirt-41-advisory.pdf CIRT.DK

Re: [Full-disclosure] should have been..' How to Determine My System Vulnerabilities'

2006-01-11 Thread fok yo
2006/1/11, Sean Crawford <[EMAIL PROTECTED]>: Wednesday, January 11, 2006 12:38 PM George A. Theall wrote..>>It's worse than that, I'm afraid - the Federal Reserve Bank is the U.S.>>central bank and, as such, in charge of the country's banking system.>>At least the original poster didn't

Re: [Full-disclosure] ntpd stack evasion 0day exploit

2006-01-11 Thread Graham Bignell
On 11/01/06, Siegfried <[EMAIL PROTECTED]> wrote: > omfg i hope it isn't marcos flavio who invented that shit again (100% > old-modified exploit & fake site) > or get a fucking brain man! > http://downloads.securityfocus.com/vulnerabilities/exploits/ntpd-exp.c Not only is this plagiarism of work f

Re: [Full-disclosure] ntpd stack evasion 0day exploit

2006-01-11 Thread Siegfried
omfg i hope it isn't marcos flavio who invented that shit again (100% old-modified exploit & fake site) or get a fucking brain man! http://downloads.securityfocus.com/vulnerabilities/exploits/ntpd-exp.c > > > We are a cell of pr0j3kt m4yh3m in Latin America and western Europe. > We have owned ma

Re: [Full-disclosure] Gerald Eisenhaur

2006-01-11 Thread John Bond
i fear it is more likly to be Oligarchy On 11/01/06, franco segna <[EMAIL PROTECTED]> wrote: > Thank you Paul, you've relieved me from a great burden. > I feared that the right answer could be *democracy* ... > > Paul Melson wrote: > > -Original Message- > > Subject: Re: [Full-disclosure]

RE: [Full-disclosure] How to Determine My System Vulnerabilities

2006-01-11 Thread Mike
Nice but when you have physical access you don't need to worry about headers:) Plus I would never lick spoons at the company cafe, I would just take them home and give them a good wash. Mike www.infosec.co.nz -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf

RE: [Full-disclosure] How to Determine My System Vulnerabilities

2006-01-11 Thread Mike
I lick spoons in the company cafeteria when no one is looking. (hah, mike left his terminal open) Mike www.infosec.co.nz ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secun

RE: [Full-disclosure] How to Determine My System Vulnerabilities

2006-01-11 Thread Mike
There is of course the other (remote?) possibility that Eugene's company has experienced a serious compromise and various mail accounts are now sending out erroneous emails. Mike www.infosec.co.nz -Original Message- From: Mike [mailto:[EMAIL PROTECTED] Sent: Wednesday, January 11, 2006 1

RE: [Full-disclosure] How to Determine My System Vulnerabilities

2006-01-11 Thread Mike
You may have nailed it Nick, we used unlocked PCs to shock users into compliance at my previous company. (One) of the techniques was to send emails on behalf of the offender. Looks of surprise and denial from the perceived senders "but I didn't send that!" "Lock your PC next time!! And while you'r

Re: [Full-disclosure] Gerald Eisenhaur

2006-01-11 Thread franco segna
Thank you Paul, you've relieved me from a great burden. I feared that the right answer could be *democracy* ... Paul Melson wrote: -Original Message- Subject: Re: [Full-disclosure] Gerald Eisenhaur What MP3 has done for music on the internet, MP4 might do for movies and MP5 for ?? ..

[Full-disclosure] [SECURITY] [DSA 936-1] New libextractor packages fix arbitrary code execution

2006-01-11 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 936-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze January 11th, 2006

Re: [Full-disclosure] ntpd stack evasion 0day exploit

2006-01-11 Thread poo
good to see the pr0j3kt is still rolling!! On 1/10/06, !bSt bitwarz Security Team <[EMAIL PROTECTED]> wrote: We are a cell of pr0j3kt m4yh3m in Latin America and western Europe.We have owned many research centers in Latin America, for example the ntp server at Observatorio Nacional, USP and UFRJ,