[Full-disclosure] detecting targetted malware

2007-01-22 Thread lsi
This is probably patented and implemented already but nonetheless its a new idea for me, so I mention it... While mass-produced malware remains an issue for a most users, an significant threat is also posed by malware customised for a specific victim (so called 'targetted malware'). This

Re: [Full-disclosure] What happens to Your Computer if you Mispell Google.com

2007-01-22 Thread Troy Cregger
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 HA! Nice one. pdp (architect) wrote: http://www.gnucitizen.org/blog/what-happens-to-your-computer-if-you-mispell-googlecom it is worth seeing this -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla

[Full-disclosure] Rixstep attempt a response

2007-01-22 Thread Rixstep Pwned
Your lovely writeup hasn't made the list yet, I assume that it's just taking its time and this isn't to be attributed to an inability to send an email competently. For those who haven't found it, have a read at their top-quality response here: http://rixstep.com/2/20070121,00.shtml What's

Re: [Full-disclosure] 'Rixstep still aren't as leet as they thought they were'

2007-01-22 Thread contact
http://seclists.org/fulldisclosure/2007/Jan/0303.html Re: 'Rixstep still aren't as leet as they thought they were' Oh it's been fixed all right. Mr Anonymous with the Bent didn't stay around long enough to find out. What's interesting of course is that Mr Anonymous 'backdated' the advisory to

Re: [Full-disclosure] Check Point Connectra End Point security bypass

2007-01-22 Thread Felix Lindner
Hi, On Mon, 22 Jan 2007 07:37:29 +0200 Roni Bachar [EMAIL PROTECTED] wrote: The vulnerability can be exploited by doing the following stages: Sending a post request as followed: POST https://serverip/sre/params.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent:

Re: [Full-disclosure] 'Your message to Full-Disclosure awaits moderator approval'

2007-01-22 Thread noreply
No matter if you publish; we already did and we get more hits than you. http://rixstep.com/2/20070121,00.shtml Still, right is right and you should publish to set the record straight. Regards, John ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] detecting targetted malware

2007-01-22 Thread 3APA3A
Dear lsi, This approach is already implemented, at least partially, to limit functionality of unknown applications. It can be found in multiple personal firewalls or things like http://www.securesize.com/GeSWall/ There is a better approach - every good application should be signed

Re: [Full-disclosure] Wikipedia and Pedophilia

2007-01-22 Thread ahapxnct
On 1/19/07, V Vendetta [EMAIL PROTECTED] wrote: Voilà! In view, a humble vaudevillian veteran, cast vicariously as both victim and villain by the vicissitudes of Fate. This visage, no mere veneer of vanity, is a vestige of the vox populi, now vacant, vanished. However, this valorous visitation

[Full-disclosure] [x0n3-h4ck] bitweaver 1.3.1 XSS Exploit

2007-01-22 Thread corrado.liotta
-=[ADVISORY---]=- bitweaver 1.3.1 Author: CorryL[EMAIL PROTECTED] -=[---]=- -=[+]

Re: [Full-disclosure] detecting targetted malware

2007-01-22 Thread kevin fielder
Hi What you are referring to is a 'white-list' of applications, e.g. you have an application that runs at a low level and only allows a list of approved or allowed applications to run. These do not necessarily need to scan you system as they can work at run-time - each time an application of any

Re: [Full-disclosure] Major gcc 4.1.1 and up security issue

2007-01-22 Thread Valdis . Kletnieks
On Sun, 21 Jan 2007 12:07:18 GMT, Marcin Owsiany said: I also think that CPUs can detect internally when an overflow happens - is there a way to use that feature in C somehow, in a portable way? (Somehow I feel that the answer is that not all CPUs do that, so - no.) The fact that some CPUs

[Full-disclosure] [ GLSA 200701-13 ] Fetchmail: Denial of Service and password disclosure

2007-01-22 Thread Matthias Geerdsen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [Full-disclosure] Major gcc 4.1.1 and up security issue

2007-01-22 Thread Marcin Owsiany
On Mon, Jan 22, 2007 at 02:50:21PM -0500, [EMAIL PROTECTED] wrote: It's generally considered performance-crippling to add inline code that does a test condition/branch pair after *every single* opcode that might cause an overflow - so the C paradigm is to leave them out and have the

Re: [Full-disclosure] detecting targetted malware

2007-01-22 Thread Nick FitzGerald
lsi wrote: This is probably patented and implemented already but nonetheless its a new idea for me, so I mention it... snip simple description of executable white-listing Fred Cohen invented this anti-malware approach in discussing the mitigation of computer viruses in his seminal (Ph.D.

Re: [Full-disclosure] 'Rixstep still aren't as leet as they thought they were'

2007-01-22 Thread fanboy_macpwnie
http://rixstep.com/2/20070121,00.shtml Oh it's been fixed all right - Mr Anonymous with the Bent didn't stay around long enough to find out. What's interesting of course is that Mr Anonymous 'backdated' the advisory to make the company look bad. This is not 'full disclosure' - this is the

Re: [Full-disclosure] Major gcc 4.1.1 and up security issue

2007-01-22 Thread Valdis . Kletnieks
On Mon, 22 Jan 2007 20:42:35 GMT, Marcin Owsiany said: Actually, I'm old enough to have programmed on 8-bit machines, but we're getting off-topic here :-) That makes you a newbie. The 16-bit PDP-11, and the 12-bit PDP-8, and all the rest of those weird-size machines from DEC (18, 36 bit) and a

Re: [Full-disclosure] Major gcc 4.1.1 and up security issue

2007-01-22 Thread Glenn.Everhart
Actually some of the older machines (pdp11 in particular) with their signed and unsigned conditional branches forced you to think about overflow, and if your programs happened to run in memory above 32K bytes (16K words) things were too apt to just crash if you got that stuff wrong. I recall

[Full-disclosure] [ GLSA 200701-14 ] Mod_auth_kerb: Denial of Service

2007-01-22 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-disclosure] [ GLSA 200701-16 ] Adobe Acrobat Reader: Multiple vulnerabilities

2007-01-22 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-disclosure] [ MDKSA-2007:024 ] - Updated kdegraphics packages fix crafted pdf file vulnerability

2007-01-22 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:024 http://www.mandriva.com/security/

Re: [Full-disclosure] detecting targetted malware

2007-01-22 Thread Randall M
[ [-- [ [Message: 1 [Date: Mon, 22 Jan 2007 12:42:43 - [From: lsi [EMAIL PROTECTED] [Subject: [Full-disclosure] detecting targetted malware [To: Full-disclosure@lists.grok.org.uk [Message-ID: [EMAIL PROTECTED] [Content-Type:

Re: [Full-disclosure] detecting targetted malware

2007-01-22 Thread Randall M
[-- [ [Message: 15 [Date: Tue, 23 Jan 2007 10:50:08 +1300 [From: Nick FitzGerald [EMAIL PROTECTED] [Subject: Re: [Full-disclosure] detecting targetted malware [To: Full-disclosure@lists.grok.org.uk [Message-ID: [EMAIL PROTECTED] [Content-Type: text/plain;

[Full-disclosure] Bluetooth DoS by obex push

2007-01-22 Thread Armin Hornung
Hello, during a course project studying security and privacy related to Bluetooth, we discovered a simple but effective DoS attack using OBEX push. Using ussp-push [1], it is possible to send out files very quickly. By continuously trying to push a file, the target is flooded with prompts whether

[Full-disclosure] CSRF-ing “Blogger Classic”

2007-01-22 Thread pagvac
A few days ago, an experiment on hijacking blogs through CSRF attacks was published on GNUCITIZEN. In this particular case, the chosen blogging platform for the experiment was Blogger. Now, a few days later, I can confirm that Google has tokenized the requests that made it possible to hijack a

[Full-disclosure] [New Tool]PReplay - A pcap traffic replay tool

2007-01-22 Thread crazy frog crazy frog
Hi All, For some work i wanted to replay the traffic which i captured using the ethereal.i searched the net but i have not found any good tool for windows(there are many for *nix) so i decided to code my own.so here it is PReplay - a traffic replay tool. i hope it will be helpful to you all. from