[Full-disclosure] Free antivirus software

2006-05-11 Thread ArsenKirillov
Hi! Looking for something like Free AV software for Win32 OS's. If u r using something good - pls let me know! Arsen Kirillov ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored b

Re: [Full-disclosure] Free antivirus software

2006-05-11 Thread Ivan .
Arsen, Grisoft AVG has a free edition for home use http://free.grisoft.com/doc/1 cheers Ivan On 5/11/06, ArsenKirillov <[EMAIL PROTECTED]> wrote: Hi! Looking for something like Free AV software for Win32 OS's. If u r using something good - pls let me know! Arsen Kirillov __

Re: [Full-disclosure] Free antivirus software

2006-05-11 Thread Eliah Kagan
On 5/11/06, ArsenKirillov wrote: > Hi! > > Looking for something like Free AV software for Win32 OS's. If u r using something > good - pls let me know! On 5/11/06, Ivan wrote: Arsen, Grisoft AVG has a free edition for home use http://free.grisoft.com/doc/1 cheers Ivan I have used AVG and a

Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability

2006-05-11 Thread 0x80
Shouldnt this be considered low risk and not medium? On Wed, 10 May 2006 17:01:09 -0700 Avert <[EMAIL PROTECTED]> wrote: >McAfee, Inc. >McAfee Avert(tm) Labs Security Advisory >Public Release Date: 2006-05-09 > >Microsoft MSDTC NdrAllocate Validation Vulnerability > >CVE-2006-0034 >__

Re: [Full-disclosure] Free antivirus software

2006-05-11 Thread Valdis Shkesters
Hi! Review: Free Antivirus Software http://antivirus.about.com/od/antivirussoftwarereviews/a/freeav.htm Regards, Valdis Shkesters - Original Message - From: "ArsenKirillov" <[EMAIL PROTECTED]> To: Sent: Thursday, May 11, 2006 11:10 AM Subject: [Full-disclosure] Free antivirus softw

[Full-disclosure] RE: Oracle - the last word

2006-05-11 Thread Joseph Finley
This has always been the problem with Oracle especially from the top down, "arrogance" Joe -Original Message- From: David Litchfield [mailto:[EMAIL PROTECTED] Sent: Tuesday, May 09, 2006 10:34 PM To: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk; [EMAIL PROTECTED]; [EMAIL

Re: [Full-disclosure] Free antivirus software

2006-05-11 Thread Geo.
> Review: Free Antivirus Software > http://antivirus.about.com/od/antivirussoftwarereviews/a/freeav.htm I believe I've seen Mary post here before, so if you're reading Mary, how come this time you didn't test removal capabilities? Lots of times people don't actually go looking for a free AV progra

RE: [Full-disclosure] Free antivirus software

2006-05-11 Thread Randall M
http://www.clamwin.com/ Thank You Randall M = "You too can have your very own Computer!" Note: Side effects include: Blue screens; interrupt violation; illegal operations; remote code exploitations; virus and malware infestations; and other unknown vulnerabilities.

[Full-disclosure] [TZO-042006] Insecure Auto-Update and File execution (2)

2006-05-11 Thread Thierry Zoller
Dear List, As my advisory has been a bit unclear in certain regards, I would like to clarify a few questions I have received briefly : - The Auto update problem with Zango Adware remains, there was no fix. - The Adware component is distributed by over 10.000 affilates everyday and I expect it

[Full-disclosure] Secunia Research: UltimateZip unacev2.dll Buffer Overflow Vulnerability

2006-05-11 Thread Secunia Research
== Secunia Research 11/05/2006 - UltimateZip unacev2.dll Buffer Overflow Vulnerability - == Table of Contents Affected Software

[Full-disclosure] [ GLSA 200605-13 ] MySQL: Information leakage

2006-05-11 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200605-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: [Full-disclosure] MS06-019 - How long before this develops into a self propagating email worm

2006-05-11 Thread n3td3v
On 5/10/06, Juha-Matti Laurio <[EMAIL PROTECTED]> wrote: threat meters: Seriously, threat meters are a waste of time and should be scraped by all. UK has said it will never implement a terrorism threat meter, as the Bush administration already does to create a sense of public fear when the pol

Re: [Full-disclosure] MS06-019 - How long before this develops into a self propagating email worm

2006-05-11 Thread bkfsec
n3td3v wrote: On 5/10/06, Juha-Matti Laurio <[EMAIL PROTECTED]> wrote: threat meters: Seriously, threat meters are a waste of time and should be scraped by all. Hey, I believe it's right to tell someone when they're wrong and give them credit when they're right... and although I disagre

Re: [Full-disclosure] Free antivirus software

2006-05-11 Thread Mary Landesman
Hi Geo, I do removal tests for spyware/adware only. The virus detection scores come from AV-Test.org and at the time, removal results for those particular products weren't readily available to me. (This doesn't mean that AV-Test.org does not have them or did not at the time - please interpret my l

Re: [Full-disclosure] MS06-019 - How long before this develops into a self propagating email worm

2006-05-11 Thread n3td3v
bkfsec wrote: I have to say that you've got a good point here. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ These threat meters play "lip

Re: [Full-disclosure] MS06-019 - How long before this develops into a self propagating email worm

2006-05-11 Thread Valdis . Kletnieks
On Thu, 11 May 2006 19:15:50 BST, n3td3v said: > "Thereees zero-day in the wild, you're going to get haxx3d" It's more like "We now know about a zero-day that's been on the loose for some unknown amount of time, and you may already be hax0red. And if you haven't, you probably will be as s

Re: [Full-disclosure] **LosseChange::Debunk it??**

2006-05-11 Thread eisi
OK, the video shows a lot of nonsense "facts". I'm not an aviation engineer, but technical educated. I don't think that there where real explosions when the towers went down, but I did not hear any verifyable clarification about the impact in the pentagon. This is the part, which makes me dist

Re: [Full-disclosure] MS06-019 - How long before this develops into a self propagating email worm

2006-05-11 Thread n3td3v
On 5/11/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: On Thu, 11 May 2006 19:15:50 BST, n3td3v said: > "Thereees zero-day in the wild, you're going to get haxx3d" It's more like "We now know about a zero-day that's been on the loose for some unknown amount of time, and you may alread

Re: [Full-disclosure] MS06-019 - How long before this develops into aself propagating email worm

2006-05-11 Thread David Litchfield
> "Thereees zero-day in the wild, you're going to get haxx3d" It's more like "We now know about a zero-day that's been on the loose for some unknown amount of time, and you may already be hax0red. And if you haven't, you probably will be as soon as the script kiddies who are even more lam

Re: [Full-disclosure] **LosseChange::Debunk it??**

2006-05-11 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yo Eisi! On Thu, 11 May 2006, [EMAIL PROTECTED] wrote: > So, if possible - does anyone have an explanation about the pentagon imp > act as > shown in the video? Here is a good start: http://www.indybay.org/news/2005/12/1787340.php It gets a few th

Re: [Full-disclosure] **LosseChange::Debunk it??**

2006-05-11 Thread emmanuel lewis
First disturbing thing about these videos is the amount of people who instanly say how fake they are.  This one was a bit different.  I don't believe the author even thinks he is 100% correct, but if some video from a gas station or a hotel rooftop captured this event, well then why would you not s

[Full-disclosure] Ipswitch WhatsUp Professional multiple flaws

2006-05-11 Thread David Maciejak
WhatsUp is a tool from Ipswitch to monitor application and network, embedding a custom web server on port 8022. Description: This custom web server is prone to multiple flaws. -as authenticated user: *src disclosure http://server:8022/NmConsole/Login.asp. *there are many XSS flaws, as http://

Re: [Full-disclosure] **LosseChange::Debunk it??**

2006-05-11 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yo Emmanuel! As a pilot I have seen the remains of fatal airplane crashes. One containing the remains of a friend of mine. Held airplane wreckage in my hands. You may think that an airplane is a big hulking solid thing. Not true. Most places the

[Full-disclosure] [EEYEB-20060307] Apple QuickTime FPX Integer Overflow

2006-05-11 Thread eEye Advisories
Apple QuickTime FPX Integer Overflow Release Date: May 11, 2006 Date Reported: March 7, 2006 Patch Development Time (In Days): 65 Severity: High (Remote Code Execution) Vendor: Apple Systems Affected: Quicktime on Windows 2000 Quicktime on Windows XP Quicktime on Mac OS X 10.3.9 Referen

[Full-disclosure] Several flaws in e-business designer (eBD)

2006-05-11 Thread Pedro Andújar
Regards -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 === - Advisory - === Tittle: Several flaws in e-business designer Risk: Critical Date: 03.May.2006 Author: Pedro Andújar

[Full-disclosure] ZDI-06-015: Apple QuickTime H.264 Parsing Heap Overflow Vulnerability

2006-05-11 Thread zdi-disclosures
ZDI-06-015: Apple QuickTime H.264 Parsing Heap Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-015.html May 11, 2006 -- CVE ID: CVE-2006-1463 -- Affected Vendor: Apple -- Affected Products: Apple QuickTime versions prior to 7.1 -- TippingPoint(TM) IPS Customer Protecti

[Full-disclosure] Kenshoto Report: IIS 6.0 Remote Exploit PoC

2006-05-11 Thread Kenshoto CTF
Once again ... kenshoto will be running the Defcon Capture the Flag contest in 2006. This year's CtF will be a knock-down-drag-out-cyberninja war, the likes of which the world has never seen (except maybe last year). For the qualifying round, we've widened the scope from last year. With multiple

[Full-disclosure] Apple QuickTimeStreamingServer RTSP Server Vulnerability [MU-200605-02]

2006-05-11 Thread noreply
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Apple QuickTimeStreamingServer RTSP Server Vulnerability [MU-200605-02] May 11, 2006 http://labs.musecurity.com/advisories.html Affected Product / Versions: QuickTimeStreamingServer 5.5 and earlier Product Overview: The Real Time Streaming Protoco

[Full-disclosure] How secure is software X?

2006-05-11 Thread David Litchfield
How secure is software X? At least as secure as Vulnerability Assessment Assurance Level P; or Q or R. Well, that's what I think we should be able to say. What we need is an open standard, that has been agreed upon by recognized experts, against which the absence of software security vulnerabi

Re: [Full-disclosure] How secure is software X?

2006-05-11 Thread Michael Silk
On 5/12/06, David Litchfield <[EMAIL PROTECTED]> wrote: How secure is software X? At least as secure as Vulnerability Assessment Assurance Level P; or Q or R. Well, that's what I think we should be able to say. What we need is an open standard, that has been agreed upon by recognized experts, ag

Re: [Full-disclosure] How secure is software X?

2006-05-11 Thread David Litchfield
From: "Michael Silk" <[EMAIL PROTECTED]> why do we need this? Take your average bit of common software. I can bet someone's thrown Spike at it, someone else crazyfuzz, and another foofuz. Now let's say that it stood up to everything that was thrown at it - and let's say another product cr

[Full-disclosure] Apple QuickTime udta ATOM Heap Overflow

2006-05-11 Thread Sowhat
Apple QuickTime udta ATOM Heap Overflow By Sowhat of Nevis Labs Date: 2006.05.12 http://www.nevisnetworks.com http://secway.org/advisory/AD20060512.txt Vendor: Apple Inc. Affected Versions: Apple QuickTime versions < 7.1 Overview: We have discovered a critical vulnerability in Quicktime P

Re: [Full-disclosure] Microsoft MSDTC NdrAllocate Validation Vulnerability

2006-05-11 Thread . Solo
Shut the fuck up!!2006/5/11, [EMAIL PROTECTED] <[EMAIL PROTECTED]>: Shouldnt this be considered low risk and not medium?On Wed, 10 May 2006 17:01:09 -0700 Avert <[EMAIL PROTECTED]>wrote:>McAfee, Inc.>McAfee Avert(tm) Labs Security Advisory >Public Release Date: 2006-05-09>>Microsoft MSDTC NdrAlloca

Re: [Full-disclosure] How secure is software X?

2006-05-11 Thread Blue Boar
So pin it down a bit more for me. Do you want just public results of standardized blackbox testing? Something similar to the ICSA firewall certification? (Though, I assume you want actual public results.) Would you include source review? The Sardonix project tried to do that. Who does the