Re: [Full-disclosure] Full functional 0day exploit builder for sale!

2007-02-04 Thread Matthew Flaschen
0dayDealer 0dayDealer wrote: > Hi List, >Full functional 0day exploit builder for sale! > >This is the one you want. Contact me with the mailbox > A0dayDealer###hotmail.com. > Here is some of the exploits: 0day word2003 all languages universal How can you have a 0-day on a program that's

Re: [Full-disclosure] JavaScript inLine Debugger - The fastest web sites debugger (technique, not a tool)

2007-02-04 Thread Matthew Flaschen
Ben Bucksch wrote: > SirDarckCat wrote: >> JaSiLDBG >> JavaScript inLine Debugger > > Are you selling us the "javascript:" URL as "JaSiLDBG JavaScript inLine > Debugger"? From all I can tell from your doc, you simply renamed > "javascript:" to "JaSiLDBG". Yes, I decided to overlook that. Nothi

Re: [Full-disclosure] Vmare workstation guest isolation weaknesses (clipboard transfer)

2007-02-04 Thread coderman
On 2/4/07, James Matthews <[EMAIL PROTECTED]> wrote: > Is it that bad?? the copy paste issue, probably not. the drag and drop, possibly! remember CVE-2005-0053? the core issue, i suppose, is that VMWare is sacrificing good security and isolation for the sake of convenience and opening up holes i

Re: [Full-disclosure] [Full-Disclosure] (Psexec on *NIX)

2007-02-04 Thread James Matthews
But naturally it happens all the time! That's what i love about computer security when ever you try to tell someone to do something normal and smart they do the polar opposite =) On 2/4/07, Q-Ball <[EMAIL PROTECTED]> wrote: On 2/2/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > On Fri, 02 Fe

Re: [Full-disclosure] Vmare workstation guest isolation weaknesses (clipboard transfer)

2007-02-04 Thread James Matthews
Is it that bad?? On 2/4/07, coderman <[EMAIL PROTECTED]> wrote: On 2/3/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > ... > Type of Risk: isolation failure, information leakage, infection path latest VMWare Player [1.0.2 or above] also affected. damn, was hoping to use this for redistribu

Re: [Full-disclosure] [Full-Disclosure] (Psexec on *NIX)

2007-02-04 Thread Q-Ball
On 2/2/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > On Fri, 02 Feb 2007 13:40:47 +0530, Raj Mathur said: > > I believe we have had this discussion before, but I'll iterate my > > beliefs in favour of allowing direct root access again: > > > - Key-based root logins are quite secure. I don't s

Re: [Full-disclosure] [Full-Disclosure] (Psexec on *NIX)

2007-02-04 Thread Q-Ball
Key-based logon is a bad idea in general because afaik, it's not possible to implement any type of password policy on those keys. This therefore potentially allows someone with access to those keys, access to further accounts or resources on remote systems. The exception to this where the task requ

Re: [Full-disclosure] Full functional 0day exploit builder for sale!

2007-02-04 Thread James Matthews
Lets see um! On 2/4/07, 0dayDealer 0dayDealer <[EMAIL PROTECTED]> wrote: Hi List, Full functional 0day exploit builder for sale! This is the one you want. Contact me with the mailbox A0dayDealer###hotmail.com. Here is some of the exploits: 0day word2003 all languages universal / 0day wor

Re: [Full-disclosure] Vmare workstation guest isolation weaknesses (clipboard transfer)

2007-02-04 Thread coderman
On 2/3/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > ... > Type of Risk: isolation failure, information leakage, infection path latest VMWare Player [1.0.2 or above] also affected. damn, was hoping to use this for redistribution leverage. oh well... :) you can also try the following in your

[Full-disclosure] Full functional 0day exploit builder for sale!

2007-02-04 Thread 0dayDealer 0dayDealer
Hi List, Full functional 0day exploit builder for sale! This is the one you want. Contact me with the mailbox A0dayDealer###hotmail.com. Here is some of the exploits: 0day word2003 all languages universal / 0day word xp/2003 / winrar exploit / pdf exploit etc. When contacting there are s

Re: [Full-disclosure] Web 2.0 backdoors made easy with MSIE & XMLHttpRequest

2007-02-04 Thread Amit Klein
Michal Zalewski wrote: > On Sat, 3 Feb 2007, Michal Zalewski wrote: > > >> xmlhttp.open("GET\thttp://dione.ids.pl/\tHTTP/1.0\n\n";, "x",true); >> > > Funny enough, Paul Szabo was quick to point out that Amit Klein found the > same vector that I used here for client-side backdoors in May 2

[Full-disclosure] rPSA-2007-0023-1 tshark wireshark

2007-02-04 Thread rPath Update Announcements
rPath Security Advisory: 2007-0023-1 Published: 2007-02-03 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote User Deterministic Denial of Service Updated Versions: wireshark=/[EMAIL PROTECTED]:devel//1/0.99.5-0.1-1 tshark=/[EMAIL PROTECTED]:devel//1/0.99.5-0.1-

[Full-disclosure] Vmare workstation guest isolation weaknesses (clipboard transfer)

2007-02-04 Thread [EMAIL PROTECTED]
Suggested severity level: Low Type of Risk: isolation failure, information leakage, infection path Affected Software: VMware Workstation, version 5.5.3 build 34685 (including installation of "VMware tools" of the same version on the guest OS). (Other products by the vendor using the same isol

Re: [Full-disclosure] Any one saw these attacks before?

2007-02-04 Thread Jason Miller
what are you babbling on about? On 1/30/07, Jianqiang Xin <[EMAIL PROTECTED]> wrote: Did anyone see web attack like this? If yes, is the attack generated by worm, spamware, or virus? Thanks. It is one packet with too many headers: The headers are as following: Headers Host : www.microsoft.c