Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-15 Thread Peter Besenbruch
[EMAIL PROTECTED] wrote: Some people don't know when to quit when they're behind. Thank you for volunteering to be the first on my ban list. Your stupidity has been duly rewarded. I small tip: Ban all of Hushmail. Nothing good ever comes from that domain. -- Hawaiian Astronomical

[Full-disclosure] [SECURITY] [DSA 1386-1] New wesnoth packages fix denial of service

2007-10-15 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1386-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze October 15th, 2007

[Full-disclosure] [SECURITY] [DSA 1386-2] New wesnoth packages fix denial of service

2007-10-15 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1386-2[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze October 15th, 2007

[Full-disclosure] Microsoft Windows default ZIP handler bug

2007-10-15 Thread Kristian Erik Hermansen
I tested this on three Windows XP machines and was able to make them all crash. There is an issue with the way Microsoft's default compressed file handler deals with embedded compressed files. I don't have much time to investigate further, since I am in Atlanta all this week for SPICON and don't

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-15 Thread Joey Mengele
Best thread ever man. J On Sat, 13 Oct 2007 17:48:11 -0400 worried security [EMAIL PROTECTED] wrote: On 10/13/07, Dude VanWinkle [EMAIL PROTECTED] wrote: Whoops and sorry Richard! I thought you were referring to the conversation between netdev([EMAIL PROTECTED]) and netdev([EMAIL

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-15 Thread pdp (architect)
military grade exploits? :) dude, I am sorry man.. but you are living in some kind of a dream world. get real, most of the military hacks are as simple as bruteforcing the login prompt.. or trying something as simple as XSS. the reason XSS is soo neat is because it bypasses all firewalls... what?,

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-15 Thread pdp (architect)
you win man... I must have been mad to challenge you... check this out.. you are my hero of the day: http://www.gnucitizen.org/about/pdp#comment-58407 On 10/14/07, phioust [EMAIL PROTECTED] wrote: On 10/14/07, pdp (architect) [EMAIL PROTECTED] wrote: military grade exploits? :) dude, I am

Re: [Full-disclosure] Remote Desktop Command Fixation Attacks

2007-10-15 Thread pdp (architect)
CQ, maybe I am making a huge mistake for responding to your message, but let see. this is what I think about security in depth in a bit more detail. let say that we have a wireless network which is guarded by security in depth network administrators. the first thing they will do is to secure

Re: [Full-disclosure] Remote Desktop Command Fixation Attacks

2007-10-15 Thread gjgowey
If you want my take on how to secure a wireless network I'd approach it like this: 1) wpa2 (of course) 2) mac restrictions (yes, keeping a list of legitimate mac's will be required, but if you don't have an automated inventory system in this day and age then how are you ensuring nothing goes

[Full-disclosure] eXtremail(ly easy) remote roots

2007-10-15 Thread mu-b
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 The attached either exploit or demonstrate a rash of remotely exploitable bugs in eXtremail =2.1.1 which perhaps should be renamed to the more apt name of eXtremely-rootable-mail... of course, in the grand schema, these are more-or-less completely

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-15 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I think you're just terribly unfunny. On Sun, 14 Oct 2007 23:20:56 -0400 Dude VanWinkle [EMAIL PROTECTED] wrote: On 10/14/07, [EMAIL PROTECTED] full- [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Explain your joke Mister

Re: [Full-disclosure] [EMAIL PROTECTED]

2007-10-15 Thread crazy frog crazy frog
haha thats really funny :-p u read full disclose on ur black berry :-p On 10/15/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: I wonder if I can start billing for the waste of storage space and time that these stupid emails are causing me. I know it has been proposed to bill spammers

Re: [Full-disclosure] Remote Desktop Command Fixation Attacks

2007-10-15 Thread James (njan) Eaton-Lee
You can take defence in depth too far (or misinterpret it and implement something that's just overcomplex)... actually, I think this e-mail demonstrates how not to do defence in depth. Here's my take on this approach: [EMAIL PROTECTED] wrote: If you want my take on how to secure a wireless

[Full-disclosure] This list sucks

2007-10-15 Thread Vlad Hackula
Can't even keep up with legitimate security related posts anymore. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] This list sucks

2007-10-15 Thread John C. A. Bambenek, CISSP
All mediums of communication eventually fail because of (1) no access to control or authentication of contributors (i.e. e-mail spam), or (2) no/poor moderation (i.e. trolls). On 10/15/07, Vlad Hackula [EMAIL PROTECTED] wrote: Can't even keep up with legitimate security related posts anymore.

[Full-disclosure] tomserson tom serson full disclosure TheSersonFiles

2007-10-15 Thread john myman
Tom Serson (T.C.) notable failed troll. * claims to have edited various articles on Encyclopedia Dramatica * His mother and father had an irl intervention with him over his internet use, srsly. 100% true. * Believes he'll be the next Howard Stern but can currently be found serving coffee at

Re: [Full-disclosure] This list sucks

2007-10-15 Thread crazy frog crazy frog
another thing of failure is sending such mails :-p On 10/15/07, John C. A. Bambenek, CISSP [EMAIL PROTECTED] wrote: All mediums of communication eventually fail because of (1) no access to control or authentication of contributors (i.e. e-mail spam), or (2) no/poor moderation (i.e. trolls).

Re: [Full-disclosure] This list sucks

2007-10-15 Thread Stack Smasher
The list is what YOU make it! The best thing about this list is the raw entertainment and unfiltered commentary by some of the funniest people alive. On 10/15/07, Vlad Hackula [EMAIL PROTECTED] wrote: Can't even keep up with legitimate security related posts anymore.

[Full-disclosure] TheSersonFiles tomserson Tom Serson

2007-10-15 Thread john myman
Tom Serson (T.C.) notable failed troll. * claims to have edited various articles on Encyclopedia Dramatica * His mother and father had an irl intervention with him over his internet use, srsly. 100% true. * Believes he'll be the next Howard Stern but can currently be found serving coffee at

Re: [Full-disclosure] This list sucks

2007-10-15 Thread phioust
http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0445.html this contributes nothing to the security field but you are still bitching a year later. http://www.networksecurityarchive.org/html/FullDisclosure/2007-05/msg00177.html and here is a post of yours talking about myspace

[Full-disclosure] pdp architect, drraid, beastiality, and incest

2007-10-15 Thread imul
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 What do these things have in common? Well for one pdp and drraid share an extremme fetish for sick porn, but also they love to post info on future ( read non-existant ) 0day/exploits that they have possession of. As noted in previous research [1]

Re: [Full-disclosure] Microsoft Windows default ZIP handler bug

2007-10-15 Thread 3APA3A
Dear Kristian Erik Hermansen, Can not reproduce it on patched Windows XP. May be it's DynaZIP library buffer overflows fixed with MS04-34. --Monday, October 15, 2007, 12:19:31 PM, you wrote to full-disclosure@lists.grok.org.uk: KEH I tested this on three Windows XP machines and was able to

Re: [Full-disclosure] This list sucks

2007-10-15 Thread phioust
I did not realize that 'script kiddies' use 'undocumented vulnerabilities'. ( I thought they used milw0rm ). Can you clarfiy? Is anyone that hacks a script kiddie to you? On 10/15/07, Vlad Hackula [EMAIL PROTECTED] wrote: script kiddies were owning myspace using what appeared to be undocumented

Re: [Full-disclosure] CallManager and OpeSer toll fraud and authentication forward attack

2007-10-15 Thread 3APA3A
Dear Radu State, As far as I understood the issue, it requires active Man-in-the-Middle attack. Digest authentication, like any authentication without traffic encryption or traffic signing, doesn't protect against active M-i-t-M, because active M-i-t-M can always force client to

Re: [Full-disclosure] Microsoft Windows default ZIP handler bug

2007-10-15 Thread Kristian Erik Hermansen
On 10/15/07, 3APA3A [EMAIL PROTECTED] wrote: Can not reproduce it on patched Windows XP. May be it's DynaZIP library buffer overflows fixed with MS04-34. I think it should work. Try this and let me know if the ZIP handler crashes... * Open .zip * Then the

Re: [Full-disclosure] Microsoft Windows default ZIP handler bug

2007-10-15 Thread naveed
On a windows xp sp2 opened the zip file - no crash opened the subfile - no crash traversed one level up - crash Almost identical behavior when explorer is attached to OllyDbg but explorer is being respawned when the debugger is closed. its too late for me to check it in detail, anyone else might

Re: [Full-disclosure] CallManager and OpeSer toll fraud and authentication forward attack

2007-10-15 Thread Radu State
The problem in this case is that once you sniff the digest, it can be reused forever. It does not expire on the server side, which is something that should not happen. That is, an attacker can call forever, even though he does not know the secret. The minor issue is that the digest is not

Re: [Full-disclosure] pdp architect, drraid, beastiality, and incest

2007-10-15 Thread scott
Why don't you grow up and go away! [EMAIL PROTECTED] wrote: What do these things have in common? Well for one pdp and drraid share an extremme fetish for sick porn, but also they love to post info on future ( read non-existant ) 0day/exploits that they have possession of. As noted in

[Full-disclosure] [SECURITY] [DSA 1387-1] New librpcsecgss packages fix arbitrary code execution

2007-10-15 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1387[EMAIL PROTECTED] http://www.debian.org/security/ Florian Weimer October 15th, 2007

Re: [Full-disclosure] playing for fun with =IE7

2007-10-15 Thread avivra
Hi, This is actually a 3 years old vulnerability. It can also be used to open any type of file (with .exe extension) using its external application, instead of opening it with the associated browser plug-in (if exists). E.g. I've been able to use this old vuln to automate the PDF attack vector

[Full-disclosure] [ MDKSA-2007:198 ] - Updated util-linux packages fix vulnerability

2007-10-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:198 http://www.mandriva.com/security/

[Full-disclosure] [ MDKSA-2007:197 ] - Updated tar packages prevent buffer overflow

2007-10-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:197 http://www.mandriva.com/security/

[Full-disclosure] [ MDKSA-2007:195 ] - Updated kernel packages fix multiple vulnerabilities and bugs

2007-10-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:195 http://www.mandriva.com/security/

[Full-disclosure] [ MDKSA-2007:196 ] - Updated kernel packages fix multiple vulnerabilities and bugs

2007-10-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:196 http://www.mandriva.com/security/

Re: [Full-disclosure] pdp architect, drraid, beastiality, and incest

2007-10-15 Thread phioust
While it may be immature to make fun of pdp architect and drraid about incest and beastiality while its probably not true, I still wonder why they would post info about vulnerabilities only to not release them. The only thing i can think of is 'fame' and its obviously working against them. *pdp

Re: [Full-disclosure] pdp architect, drraid, beastiality, and incest

2007-10-15 Thread scott
Do you understand the concept of protecting people and corporations from total idiots trying to gain access to their systems?PDP just lets others know what he found,while the offending company is working on a fix,in a minimal way. If you were a true researcher,you should be able to find the same