Re: [Full-disclosure] Plague Proof of Concept Linux backdoor

2006-10-22 Thread Andrew Farmer
On 22 Oct 06, at 04:29, [EMAIL PROTECTED] wrote: > even if they have ssh access, there is still nothing they can do, > except > to create two files in there $HOME directories containing > expressions from > paths.h and sysexits.h ? > > Why would that be considered a backdoor? The awk commands

Re: [Full-disclosure] Plague Proof of Concept Linux backdoor

2006-10-22 Thread daylasoul
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sun, 22 Oct 2006 19:50:02 -0500 Dude VanWinkle <[EMAIL PROTECTED]> wrote: >On 10/22/06, [EMAIL PROTECTED] ><[EMAIL PROTECTED]> wrote: >> >> On Sun, 22 Oct 2006 06:29:35 -0500 [EMAIL PROTECTED] wrote: >> >even if they have ssh access, there is still

Re: [Full-disclosure] HP Tru64 dtmail bug - Really exploitable?

2006-10-22 Thread Dude VanWinkle
On 10/22/06, K F (lists) <[EMAIL PROTECTED]> wrote: > Where were the politics? I was simply stating the facts. > -KF crap, trolls. I just responded to the same person or one of his friends who disputed the usage of the word their.. damn It seems to be trying to get a response with a one liner tha

Re: [Full-disclosure] Plague Proof of Concept Linux backdoor

2006-10-22 Thread Dude VanWinkle
On 10/22/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > > On Sun, 22 Oct 2006 06:29:35 -0500 [EMAIL PROTECTED] wrote: > >even if they have ssh access, there is still nothing they can do, > >except > You said "there" when it should be "their." Err, this isnt alt.nitpickers.english, and in fac

Re: [Full-disclosure] HP Tru64 dtmail bug - Really exploitable?

2006-10-22 Thread K F (lists)
Where were the politics? I was simply stating the facts. -KF > Politics should be avoided at all costs. > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://

[Full-disclosure] AROUNDMe 0.6.9 remonte file inclusion

2006-10-22 Thread noislet . nospam
== AROUNDMe 0.6.9 remonte file inclusion vendor site: http://barnraiser.org/ vulnerable versions: 0.6.9 (and possibly older) discovered by: noislet ( http://www.noislet.org/ ) vendor informed: 21.10.2006 published: 22.10.2006 ===

Re: [Full-disclosure] Plague Proof of Concept Linux backdoor

2006-10-22 Thread cdejrhymeswithgay
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sun, 22 Oct 2006 06:29:35 -0500 [EMAIL PROTECTED] wrote: >even if they have ssh access, there is still nothing they can do, >except >to create two files in there $HOME directories containing >expressions from >paths.h and sysexits.h ? > >Why would

Re: [Full-disclosure] HP Tru64 dtmail bug - Really exploitable?

2006-10-22 Thread K F (lists)
Roman Medina-Heigl Hernandez wrote: > > More or less according to HP advisory ("HPSBTU02163 SSRT061223") which > marks the impact as POTENTIAL ("Potential Security Impact: Local execution > of arbitrary code") Don't mind the smoke and mirrors. HP always says that. Even with working root exploits

[Full-disclosure] [SECURITY] [DSA 1197-1] New python2.4 packages fix arbitrary code execution

2006-10-22 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1197-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff October 22nd, 2006

Re: [Full-disclosure] HP Tru64 dtmail bug - Really exploitable?

2006-10-22 Thread cdejrhymeswithgay
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sun, 22 Oct 2006 14:49:22 -0500 "K F (lists)" <[EMAIL PROTECTED]> wrote: >Roman Medina-Heigl Hernandez wrote: >> >> More or less according to HP advisory ("HPSBTU02163 SSRT061223") >which >> marks the impact as POTENTIAL ("Potential Security Impac

[Full-disclosure] [ GLSA 200610-09 ] libmusicbrainz: Multiple buffer overflows

2006-10-22 Thread Matthias Geerdsen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200610-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-disclosure] HP Tru64 dtmail bug - Really exploitable?

2006-10-22 Thread Roman Medina-Heigl Hernandez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, I had a look to this bug and it seems NOT to be exploitable. More or less according to HP advisory ("HPSBTU02163 SSRT061223") which marks the impact as POTENTIAL ("Potential Security Impact: Local execution of arbitrary code") but just the opp

Re: [Full-disclosure] Plague Proof of Concept Linux backdoor

2006-10-22 Thread hijacker
even if they have ssh access, there is still nothing they can do, except to create two files in there $HOME directories containing expressions from paths.h and sysexits.h ? Why would that be considered a backdoor? Regards, -Nikolay Kichukov > On 10/22/06, J. Oquendo <[EMAIL PROTECTED]> wrote: >

Re: [Full-disclosure] Who is n3td3v?

2006-10-22 Thread daylasoul
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Fri, 20 Oct 2006 22:09:03 -0500 "Alice Bryson <[EMAIL PROTECTED]>" <[EMAIL PROTECTED]> wrote: >It's OK anybody start vulnerability research from script(php or >perl), >but it's not good for someone to stay at "script kid" level, huh? > >- >mai

Re: [Full-disclosure] Plague Proof of Concept Linux backdoor

2006-10-22 Thread Dude VanWinkle
On 10/22/06, J. Oquendo <[EMAIL PROTECTED]> wrote: > > Plague is an odd proof of concept backdoor keeping > tool based on the premise of using existing system > files and commands to keep and maintain a backdoor > on Linux systems. I could have modified this for > BSD, Solaris, etc., but I didn't f