Re: [Full-disclosure] Seeking comment on disclosure articles

2007-01-12 Thread Valdis . Kletnieks
On Fri, 12 Jan 2007 14:34:21 +0100, Ben Bucksch said: > These are the ground rules. There may be reasons to immediately publish > without pre-notification, e.g. when the bug is too obvious. Under no > circumstance should a fix take longer than one month. Oh, do we wish it were so... Yes, there'

Re: [Full-disclosure] Simcard 0day.

2007-01-12 Thread gabriel rosenkoetter
On Mon, Jan 01, 2007 at 05:43:05PM -0800, Blue Boar wrote: > Does this actually work on people on a security mailing list? Speaking as someone whose current employer has chosen to subscribe its NOC staff group email (a member of which, thankfully, I am not) on an Exchange server to various securit

[Full-disclosure] [ MDKSA-2007:013 ] - Updated libneon0.26 packages fix vulnerability

2007-01-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:013 http://www.mandriva.com/security/ ___

[Full-disclosure] [SECURITY] [DSA 1248-1] New libsoup packages fix denial of service

2007-01-12 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1248-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff January 12nd, 2007

Re: [Full-disclosure] code release: cryptographic attack tool

2007-01-12 Thread Andrew Farmer
On 12 Jan 07, at 08:05, Slythers Bro wrote: > hi, > sorry but i know nothing about the real physical "quantic theory" > i'am not a physician > i just know there are 3 states : 0 ,1 and unknow <...> This approach won't work for anything beyond the most trivial cryptographic computations: attempti

[Full-disclosure] [ GLSA 200701-08 ] Opera: Two remote code execution vulnerabilities

2007-01-12 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200701-07 ] OpenOffice.org: EMF/WMF file handling vulnerabilities

2007-01-12 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200701-06 ] w3m: Format string vulnerability

2007-01-12 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200701-05 ] KDE kfile JPEG info plugin: Denial of Service

2007-01-12 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: [Full-disclosure] Web Honeynet Project: announcement,

2007-01-12 Thread Gadi Evron
On Fri, 12 Jan 2007 [EMAIL PROTECTED] wrote: > The Web Application Security Consortium is also doing such a project at > http://www.webappsec.org/projects/honeypots/ . May be worthwhile to share > data perhaps? My thoughts exactly! Although.. it is high time we started getting out of the mindset

Re: [Full-disclosure] Web Honeynet Project: announcement,

2007-01-12 Thread bugtraq
The Web Application Security Consortium is also doing such a project at http://www.webappsec.org/projects/honeypots/ . May be worthwhile to share data perhaps? - zeno http://www.cgisecurity.com/ Web Application Security news, and more http://www.cgisecurity.com/index.rss [Security RSS Feed] >

[Full-disclosure] [ MDKSA-2007:012 ] - Updated kernel packages fix multiple vulnerabilities and bugs

2007-01-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:012 http://www.mandriva.com/security/ ___

Re: [Full-disclosure] Simcard 0day.

2007-01-12 Thread Thierry Zoller
Dear List, > 1. Open attachment. >Does this actually work on people on a security mailing list? > BB It surely work if moderators do not strip of the attachments and make them availalble in the archives : http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051522.html More interest

Re: [Full-disclosure] code release: cryptographic attack tool

2007-01-12 Thread Slythers Bro
hi, sorry but i know nothing about the real physical "quantic theory" i'am not a physician i just know there are 3 states : 0 ,1 and unknow "How? In what way?" >> look in the .rar "> i used this lib for coding fuckmd5.cpp You did? I can't see any sign of tri-state logic in the final source co

[Full-disclosure] Web Honeynet Project: announcement, exploit URLs this Wednesday

2007-01-12 Thread Gadi Evron
[ Warning: this email message includes links to live web server malware propagated this Wednesday via file inclusions exploits. These links are not safe! ] Hello. The newly formed Web Honeynet Project from SecuriTeam and the ISOTF will in the next few months announce research on real-world web se

Re: [Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Clean Access

2007-01-12 Thread Damir Rajnovic
Hi Mark, On Tue, Jan 09, 2007 at 12:40:47PM -0700, Mark Senior wrote: > Perhaps you can't comment, which I respect, but I wonder - is there a > general Cisco policy on vulnerability announcements being short on technical > detail like this? This advisory seemed pretty much standard for advisories

Re: [Full-disclosure] Seeking comment on disclosure articles

2007-01-12 Thread Ben Bucksch
I hope you realize that you open a highly controversial subject, i.e flamewar. My current approach is: Basic idea is that vendors should have the ability to fix them without the public exploiting it at the same time, but even during the secret time, various parties will see the bug, so this tim

[Full-disclosure] Seeking comment on disclosure articles

2007-01-12 Thread Shawna McAlearney
Vulnerability Disclosure: Where Do You Stand? If you see a glaring security hole in a sensitive application, what will you do? Will you notify the developer? The users? Other hackers? Sometimes it's best not to be the good Samaritan. Read about "The Chilling Effect" and also find out why Bruce S

[Full-disclosure] [USN-406-1] OpenOffice.org vulnerability

2007-01-12 Thread Kees Cook
=== Ubuntu Security Notice USN-406-1 January 12, 2007 openoffice.org/-amd64, openoffice.org2/-amd64 vulnerability CVE-2006-5870 === A security issue affects the following Ubun

[Full-disclosure] Anti-DNS Pinning + Socket in FLASH

2007-01-12 Thread Kanatoko
Hello, I wrote a new article about Anti-DNS Pinning + Socket in FLASH. http://www.jumperz.net/index.php?i=2&a=3&b=3 Demo is here: http://www.jumperz.net/index.php?i=2&a=1&b=8 -- Kanatoko<[EMAIL PROTECTED]> Open Source WebAppFirewall http://guardian.jumperz.net/