Re: [Full-disclosure] Who Do I Contact?

2006-04-23 Thread CrYpTiC MauleR
How many times do I have to tell everyone I am NOT in the same state as the school right now I am at my parents' house for the week. So looking up my IP addy won't get you even close to where the school is located. Second, I have called it a school, it could be a Univeristy, College, Community C

Re: [Full-disclosure] Who Do I Contact?

2006-04-23 Thread Dude VanWinkle
Hey man. I used to work at a university so I might be able to lend some assistance here. for example, if you go to stonybrook university, you should go to the head of SUNY. If the University of Georgia was the culprit, then go the the University System of Georgia. Each school (if state run) sho

Re: [Full-disclosure] Who Do I Contact?

2006-04-23 Thread Valdis . Kletnieks
On Sun, 23 Apr 2006 02:24:35 CDT, CrYpTiC MauleR said: > How many times do I have to tell everyone I am NOT in the same state as the > school Might want to re-read what I said. I said that your estimate of the inbound student count tells us *more* than the traceroute (in other words, I'm agreein

Re: [Full-disclosure] Proxy Detection

2006-04-23 Thread Joachim Schipper
On Sat, Apr 22, 2006 at 03:31:31PM -0500, Justin Terry wrote: > Hello List! > > I am a long time reader, first time poster, and everything like that. > > I use a proxy service that runs in my system tray, (the onion router, and > privoxy, in conjunction) and when i use this software, everything

Re: [Full-disclosure] Proxy Detection

2006-04-23 Thread Andrew A
There are Tor DNSBLs, which have been incorporated into popular blacklists such as SORBS. Since you can poll the directory server for a list of exit nodes this is rather easy to compile. Tor does not give an x-forward-for. To avoid getting hosts that have been blacklisted, use newer proxies that ha

Re: [Full-disclosure] Who Do I Contact?

2006-04-23 Thread A . L . M . Buxey
Hi, I think we're missing something here. So, you're not going to disclose a security hole until the scholl has sorted the situation out, yes? but is the system in use a home-built application or an off-the-shelf system. if its the former then some people need to be looking at what policies are i

[Full-disclosure] Advisory: My Gaming Ladder Combo System <= 7.0 Remote File Inclusion Vulnerability.

2006-04-23 Thread Mustafa Can Bjorn IPEKCI
--Security Report-- Advisory: My Gaming Ladder Combo System <= 7.0 Remote File Inclusion Vulnerability. --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 22/04/06 13:37 PM --- Contacts:{ ICQ: 10072 MSN/Email: [EMAIL PROTECTED] Web: http://www.nukedx.com } --- Vendor: MyGamingLad

Re: [Full-disclosure] security at .edus

2006-04-23 Thread Fixer
Brian Eaton wrote: Universities tend to be fairly decentralized places, where academic freedom can count for a lot more than a secure network. Plus a university network has fewer secrets to protect than a business. Depending on the University, I might or might not agree with that. I know

Re: [Full-disclosure] security at .edus

2006-04-23 Thread Gadi Evron
Brian Eaton wrote: than a secure network. Plus a university network has fewer secrets to protect than a business. University networks also have thousands to tens of thousands of bored students with high-speed Internet access and little machine-side policy enforcement. In my experience t

[Full-disclosure] Re: Re: Who Do I Contact?

2006-04-23 Thread Dave \"No, not that one\" Korn
john kalergis wrote: >> So, let's see Washington... Virginia Ohio Illinois >> Missouri >> >> You're in Kansas, right? > woweverybody here is more than impressed > Well, I don't suppose *everybody* has had a sense of humour bypass. And there's a valid point I was

[Full-disclosure] Re: Who Do I Contact?

2006-04-23 Thread Dave \"No, not that one\" Korn
[EMAIL PROTECTED] wrote: > The number of US universities big enough to have 7,000 incoming students > is extremely limited. *that* little tidbit probably tells us more than > the fact his traceroute ends in Kansas. Plus he just gave away that his parents work there, so we can cut it down

[Full-disclosure] Re: Who Do I Contact?

2006-04-23 Thread Dave \"No, not that one\" Korn
CrYpTiC MauleR wrote: > students attending. So everyone please dont wast your time trying to > play 'who can guess what school it is or where it is?' because I > really will not verify if you are correct or not and plain do not > want to play that game. I just asked FD on advice of what to do > co

[Full-disclosure] Re: security at .edus

2006-04-23 Thread Dave \"No, not that one\" Korn
Fixer wrote: > Brian Eaton wrote: >> than a secure network. Plus a university network has fewer secrets >> to protect than a business. > > > Depending on the University, I might or might not agree with that. I > know of several that have DoD funded research projects going on that > require Top S

Re: [Full-disclosure] Proxy Detection

2006-04-23 Thread str0ke
On 4/23/06, Andrew A <[EMAIL PROTECTED]> wrote: > Tor does not give an x-forward-for. Easy fix to detect the Tor users is just to dump a cache file every hour or so and regex the connecting ip address. http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?sortbw=1&addr=1&textonly=1 > use newer proxies

Re: [Full-disclosure] security at .edus

2006-04-23 Thread Brian Eaton
On 4/23/06, Randal T. Rioux <[EMAIL PROTECTED]> wrote: > > I suspect the anonymous educational institution in question is hardly > > the only vulnerable site out there. Universities tend to be fairly > > decentralized places, where academic freedom can count for a lot more > > than a secure networ

Re: [Full-disclosure] Re: Who Do I Contact?

2006-04-23 Thread CrYpTiC MauleR
My parents do not work there, I never said they do. Did it ever occur to you that the school would have stored parent info from financial aid? also I do not plan on revealing any SSNs to anyone even to make a point. That will definetly get me jail time even if its in good faith. > - Origin

Re: [Full-disclosure] Re: Who Do I Contact?

2006-04-23 Thread CrYpTiC MauleR
Wouldn't it matter on which state? I know California for instance has strict laws about telling public of breaches, but not sure about other states. I will be calling the Attorney General of the the school's state tomorrow so should have a good answer. > - Original Message - > From: "

[Full-disclosure] Buffer-overflow and crash in Fenice OMS 1.10

2006-04-23 Thread Luigi Auriemma
### Luigi Auriemma Application: Fenice - Open Media Streaming Server http://streaming.polito.it/server Versions: <= 1.10 and current SVN 2005-07-26 Platforms:*nix, *BSD and oth

[Full-disclosure] Denial of service bugs in OpenTTD 0.4.7

2006-04-23 Thread Luigi Auriemma
### Luigi Auriemma Application: OpenTTD http://www.openttd.org Versions: <= 0.4.7 Platforms:Windows, *nix, *BSD, Mac and others Bugs: A] program termination through big

[Full-disclosure] Format string bug in Skulltag 0.96f

2006-04-23 Thread Luigi Auriemma
### Luigi Auriemma Application: Skulltag http://www.skulltag.com Versions: <= 0.96f Platforms:Windows Bug: format string Exploitation: remote, versus server Date:

[Full-disclosure] [ GLSA 200604-12 ] Mozilla Firefox: Multiple vulnerabilities

2006-04-23 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200604-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200604-13 ] fbida: Insecure temporary file creation

2006-04-23 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200604-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200604-14 ] Dia: Arbitrary code execution through XFig import

2006-04-23 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200604-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: [Full-disclosure] Proxy Detection

2006-04-23 Thread Justin Terry
Thanks for the answers guys! What would be an example of one of those newer proxies that was mentioned? ~ JD ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://

Re: [Full-disclosure] Re: Who Do I Contact?

2006-04-23 Thread Paul Schmehl
--On April 23, 2006 1:48:16 PM -0500 CrYpTiC MauleR <[EMAIL PROTECTED]> wrote: Wouldn't it matter on which state? I know California for instance has strict laws about telling public of breaches, but not sure about other states. I will be calling the Attorney General of the the school's state to

Re: [Full-disclosure] Re: Who Do I Contact?

2006-04-23 Thread Paul Schmehl
--On April 23, 2006 3:11:40 PM +0100 "Dave \"No, not that one\" Korn" <[EMAIL PROTECTED]> wrote: CM, my suggestion would be to phone up the Dean/Principal while he's in the middle of his sunday lunch and read out his SSN to him and tell him how he can go to his computer and see it for himself

Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-04-23 Thread Ben Lambrey
On Sunday 23 April 2006 01:30, Michal Zalewski wrote: > Perhaps not surprisingly, there appears to be a vulnerability in how > Microsoft Internet Explorer handles (or fails to handle) certain > combinations of nested OBJECT tags. This was tested with MSIE > 6.0.2900.2180.xpsp.040806-1825 and mshtml

[Full-disclosure] RE: Advisory: Simplog <= 0.93 Multiple Remote Vulnerabilities.

2006-04-23 Thread Ashcraft, Jeremy
Title: RE: Advisory: Simplog <= 0.93 Multiple Remote Vulnerabilities. patched in version 0.9.3.1 -Original Message- From: Mustafa Can Bjorn IPEKCI [mailto:[EMAIL PROTECTED]] Sent: Fri 4/21/2006 2:54 PM To: full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com; [EMAIL PROTECTE

[Full-disclosure] Advisory: Clansys <= 1.1 PHP Code Insertion Vulnerability.

2006-04-23 Thread Mustafa Can Bjorn IPEKCI
--Security Report-- Advisory: Clansys <= 1.1 PHP Code Insertion Vulnerability. --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 23/04/06 21:07 PM --- Contacts:{ ICQ: 10072 MSN/Email: [EMAIL PROTECTED] Web: http://www.nukedx.com } --- Vendor: Clansys (http://www.clansys.de.vu/) V

RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-04-23 Thread Paul Nickerson
Confirmed on IE 7 beta 2 on Windows XP SP2 For the record, I don't approve of your disclosure practices, Mr. Zalewski, but good work none-the-less. Paul -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ben Lambrey Sent: Sunday, April 23, 2006 12:17 PM To:

Re: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-04-23 Thread KF (lists)
Out of curriosity ... do you approve of your vendors (M$ in this case) poor coding practices? How about the disclosure practices that THEY use? Didn't think so... -KF Paul Nickerson wrote: Confirmed on IE 7 beta 2 on Windows XP SP2 For the record, I don't approve of your disclosure practices

RE: [Full-disclosure] MSIE (mshtml.dll) OBJECT tag vulnerability

2006-04-23 Thread 0x80
OH NOES! Paul Nickerson doesn't approve. Who the fuck is Paul Nickerson? Better yet who cares. On Sun, 23 Apr 2006 17:34:02 -0700 Paul Nickerson <[EMAIL PROTECTED]> wrote: >Confirmed on IE 7 beta 2 on Windows XP SP2 > >For the record, I don't approve of your disclosure practices, Mr. >Zal

[Full-disclosure] [SECURITY] [DSA 1039-1] New blender packages fix several vulnerabilities

2006-04-23 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1039-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze April 24th, 2006