Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread teo
Here's a (VERY BAD) translation of the bold text in the website: Italian: Devo doverosamente ringraziare The Wanderer al quale ho rotto i cosiddetti per le traduzioni e che ora vede reso inutile il proprio lavoro. Mi spiace e cercherò di farmi perdonare ma, che diavolo, talvolta bisogna essere

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread Brendan Dolan-Gavitt
I'll take a stab at it... "This bug speaks for itself and I don't have much to add, except that, given the number of criticisms levied at my English, which as I pointed out and emphasized before, is less than scholarly (and I assure you that I would have taken criticisms against the bugs much bett

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread Larry Seltzer
>>http://moaxb.blogspot.com/ Why is this site in Italian now? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ASA-2007-013: IAX2 users can cause unauthorized data disclosure

2007-05-04 Thread Kevin P. Fleming
> Asterisk Project Security Advisory - ASA-2007-013 > > > +--+ >| Product| Asterisk > | > > |--+--

[Full-disclosure] Multiple vendors ZOO file decompression infinite loop DoS

2007-05-04 Thread Jean-Sébastien Guay-Leroux
Topic: Multiple vendors ZOO file decompression infinite loop DoS Announced: 2007-05-04 Credits:Jean-Sebastien Guay-Leroux Products: Multiple (see section III) Impact: DoS (99% CPU utilisation) CVE

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread Larry Seltzer
Maybe if we issued one every minute we could keep the time frame reasonable Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread Alex Kirk
I don't know...that seems like such a conservative time frame. Given everything I see coming through on SecurityFocus, I'd say it's more like "50 millenia of PHP Remote File Includes." ;-) Alex Kirk > How about "50 years of PHP Remote File Includes"? :) > > Shirkdog > ' or 1=1-- > http://www.shi

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread M. Shirk
How about "50 years of PHP Remote File Includes"? :) Shirkdog ' or 1=1-- http://www.shirkdog.us From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] (Felix von Leitner) CC: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Month of ActiveX Bug Date: Thu, 3 May 2007 20:08:57 -0400 (E

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread bugtraq
> Why don't you do a month of eweek bugs. We won't limit you at all. Any > bug counts. Even XSS bugs in open source perl webmail apps. Anything? If you want xss, then I think we're talking more about the decade of xss than month :) - Robert http://www.cgisecurity.com/ __

Re: [Full-disclosure] Medium security hole affecting DSL-G624T

2007-05-04 Thread Tim Brown
On Thursday 03 May 2007 23:19:55 3APA3A wrote: > Not exactly, read first link carefully: > > Tested on D-Link DSL-G624T > Version: Firmware Version : V3.00B01T01.YA-C.20060616 > > Discovered by: > > Jose Ramon Palanco: jose.palanco(at)eazel(dot).es Fair enough I stand corrected but it's been ther

Re: [Full-disclosure] Medium security hole affecting DSL-G624T

2007-05-04 Thread Tim Brown
On Thursday 03 May 2007 22:13:15 3APA3A wrote: > This vulnerability for D-Link DSL-G624T was already reported by Jose > Ramon Palanco. See > > http://securityvulns.ru/Odocument816.html > > Previously, same problem was reported for D-Link DSL-G604T by Qex > > http://securityvulns.ru/Mdocument57

[Full-disclosure] rPSA-2007-0090-1 gimp

2007-05-04 Thread rPath Update Announcements
rPath Security Advisory: 2007-0090-1 Published: 2007-05-03 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: gimp=/[EMAIL PROTECTED]:devel//1/2.2.8-8.3-1 References: http://cve.mitre.org/cgi-bin/cvenam

[Full-disclosure] rPSA-2007-0089-1 net-snmp net-snmp-utils

2007-05-04 Thread rPath Update Announcements
rPath Security Advisory: 2007-0089-1 Published: 2007-05-03 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote Deterministic Denial of Service Updated Versions: net-snmp=/[EMAIL PROTECTED]:devel//1/5.2.1.2-4.3-1 net-snmp-utils=/[EMAIL PROTECTED]:devel//1/5.2.1.2-

[Full-disclosure] rPSA-2007-0088-1 xscreensaver

2007-05-04 Thread rPath Update Announcements
rPath Security Advisory: 2007-0088-1 Published: 2007-05-03 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Local User Deterministic Weakness Updated Versions: xscreensaver=/[EMAIL PROTECTED]:devel//1/4.22-1.2-1 References: http://cve.mitre.org/cgi-bin/cvename.cgi?n

[Full-disclosure] rPSA-2007-0085-1 lftp

2007-05-04 Thread rPath Update Announcements
rPath Security Advisory: 2007-0085-1 Published: 2007-05-03 Products: rPath Linux 1 Rating: Informational Exposure Level Classification: Indirect User Non-deterministic Unauthorized Access Updated Versions: lftp=/[EMAIL PROTECTED]:devel//1/3.5.10-0.1-1 References: http://cve.mitre.org/c