Re: [Full-disclosure] IRM Vendor Alerts: Six critical remote vulnerabilities in TIBCO SmartPGM FX

2007-10-17 Thread Andy Davis
Yeah, you're right - no-one uses TIBCO products http://www.tibco.com/customers/default.jsp Andy From: phioust [mailto:[EMAIL PROTECTED] Sent: 16 October 2007 19:06 To: full-disclosure@lists.grok.org.uk; Andy Davis Subject: Re: [Full-disclosure]

[Full-disclosure] Net System Security 2007

2007-10-17 Thread giovanni manunta
visit this site a very important italian Security meeting november 27, 2007 http://www.atsystemgroup.org/en/conventions/nss07 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored

[Full-disclosure] AST-2007-023: SQL Injection POC and details

2007-10-17 Thread state
for testing purposes the POC of the vulnerabiliy discovered by the KIPH fuzzer RS #!/usr/bin/perl # # Vulnerabily discovered using KiF ~ Kiph # # # # Authors: # #

[Full-disclosure] AST-2007-023: SQL Injection POC and details

2007-10-17 Thread state
for testing purposes the POC of the vulnerabiliy discovered by the KIPH fuzzer RS #!/usr/bin/perl # # Vulnerabily discovered using KiF ~ Kiph # # # # Authors: # #

Re: [Full-disclosure] *****SPAM***** OMG - I just won the lottery! For real!!11!

2007-10-17 Thread jeroen
LOL The 'postcodeloterij' is indeed a lottery in the netherlands, competely legit and pretty wel known. Thousands of dutch people have won prizes... however... the lottery only applies to dutch people. Freely translated 'postcodeloterij' means 'zipcode lottery', and it only uses dutch zipcodes so

Re: [Full-disclosure] *****SPAM***** OMG - I just won the lottery! For real!!11!

2007-10-17 Thread James Matthews
LAMO On 10/17/07, jeroen [EMAIL PROTECTED] wrote: LOL The 'postcodeloterij' is indeed a lottery in the netherlands, competely legit and pretty wel known. Thousands of dutch people have won prizes... however... the lottery only applies to dutch people. Freely translated 'postcodeloterij'

Re: [Full-disclosure] 0-day PDF exploit

2007-10-17 Thread eric
Why everybody said it is a zero day about PDF? it's just a fault in IE7, or just want to make a big media hit? real PDF zero day will exists in the PDF's file format, or some Adobe's expanded functions. Actually, it's about PDF *and* IE7. Both are at fault, and if either one of them was

[Full-disclosure] Net System Security 2007

2007-10-17 Thread giovanni manunta
visit this site a very important italian Security meeting november 27, 2007 http://www.atsystemgroup.org/en/conventions/nss07 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored

Re: [Full-disclosure] password hash, funny myth in the industry!

2007-10-17 Thread upb
this would effectively make the password hash the password. Are you sure this scheme is used?:P On 10/16/07, Bipin Gautam [EMAIL PROTECTED] wrote: hi list, i was reading the article, http://www.f-secure.com/weblog/archives/1293.html but just an example. why do many people out there

[Full-disclosure] Oracle TNS Listener DoS and/or remote memory inspection

2007-10-17 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: Oracle TNS Listener DoS and/or remote memory inspection Systems Affected: Oracle 8.1.7.4, 10g Release 2 and 1, Oracle 9 Severity: High Vendor URL: http://www.oracle.com/ Author: David Litchfield [ [EMAIL PROTECTED] ] Reported: 22nd June 2006

Re: [Full-disclosure] password hash, funny myth in the industry!

2007-10-17 Thread Stephan G.
All BitTorrent Trackers built on the tb-source use this scheme, when you login you recieve a cookie with your password hash, when someone steals the cookie/pw-hash they can steal that account... Funny sidenote, tb-source is ofter vulnerable to XSS upb wrote: this would effectively make the

Re: [Full-disclosure] Third-party patch for CVE-2007-3896, UPDATE NOW

2007-10-17 Thread KJK::Hyperion
KJK::Hyperion ha scritto: The present patch is dramatically under-tested and it has underwent no quality assurance procedure whatsoever, so please deploy with the greatest care. Indeed, I just found a gruesome memory leak in it. A silly bug, brown paperbag-grade shame. If you installed my

Re: [Full-disclosure] password hash, funny myth in the industry!

2007-10-17 Thread Valdis . Kletnieks
On Wed, 17 Oct 2007 14:39:28 +0300, upb said: this would effectively make the password hash the password. Are you sure this scheme is used?:P Far too often. I'm continually amazed at how shallow the talent pool for web developers is. There's 140+ million registered domains, there's nowhere

Re: [Full-disclosure] Third-party patch for CVE-2007-3896, UPDATE NOW

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Nice catch. On Wed, 17 Oct 2007 08:16:21 -0400 KJK::Hyperion [EMAIL PROTECTED] wrote: KJK::Hyperion ha scritto: The present patch is dramatically under-tested and it has underwent no quality assurance procedure whatsoever, so please deploy with the

[Full-disclosure] Oracle RDBMS TNS Data packet DoS

2007-10-17 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: Oracle RDBMS Data packet DoS Systems Affected: Oracle 8.1.7.4, 10g Release 2 and 1, Oracle 9 Severity: High Vendor URL: http://www.oracle.com/ Author: David Litchfield [ [EMAIL PROTECTED] ] Reported: 23rd June 2006 Date of Public Advisory: 17th

[Full-disclosure] (no subject)

2007-10-17 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: SQL Injection Flaw in Oracle Workspace Manager Systems Affected: Oracle 10g release 1 and 2, Oracle 9i Severity: High Vendor URL: http://www.oracle.com/ Author: David Litchfield [ [EMAIL PROTECTED] ] Reported: 22nd August 2006 Date of Public

[Full-disclosure] Oracle audit issue with XMLDB ftp service

2007-10-17 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: Oracle audit issue with XMLDB ftp service Systems Affected: Oracle Oracle 9ir2, 10g Release 1 Severity: High Vendor URL: http://www.oracle.com/ Author: David Litchfield [ [EMAIL PROTECTED] ] Reported: 9th March 2006 Date of Public Advisory:

[Full-disclosure] Multiple SQL Injection Flaws in Oracle CTX_DOC package

2007-10-17 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: Multiple SQL Injection Flaws in Oracle CTX_DOC package Systems Affected: Oracle 10g release 1 and 2 Severity: High Vendor URL: http://www.oracle.com/ Author: David Litchfield [ [EMAIL PROTECTED] ] Reported: 6 June 2005 Date of Public Advisory:

[Full-disclosure] SQL Injection Flaw in Oracle Workspace Manager

2007-10-17 Thread David Litchfield
(resend with title...) NGSSoftware Insight Security Research Advisory Name: SQL Injection Flaw in Oracle Workspace Manager Systems Affected: Oracle 10g release 1 and 2, Oracle 9i Severity: High Vendor URL: http://www.oracle.com/ Author: David Litchfield [ [EMAIL PROTECTED] ] Reported: 22nd

Re: [Full-disclosure] 0-day PDF exploit

2007-10-17 Thread Justin Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Adobe has a work around (but doesn't seem to have a fix yet) for this vulnerability (which they categorize as critical). They also state (and testing seems to validate) that impact is limited to Windows XP machines with IE 7.

Re: [Full-disclosure] IRM Vendor Alerts: Six critical remote vulnerabilities in TIBCO SmartPGM FX

2007-10-17 Thread phioust
and how many use the product you found the vulnerability in? On 10/17/07, Andy Davis [EMAIL PROTECTED] wrote: Yeah, you're right – no-one uses TIBCO products…. http://www.tibco.com/customers/default.jsp Andy -- *From:* phioust [mailto:[EMAIL PROTECTED]

[Full-disclosure] Netscape Navigator 9.0 fixes several vulnerabilities

2007-10-17 Thread Juha-Matti Laurio
It appears that new version of Netscape has been released. More information at Release Notes :: Netscape Navigator Web Browser http://browser.netscape.com/releasenotes/ New Netscape Navigator 9 ships security fixes and is multi-platform http://blogs.securiteam.com/?p=1019 The new version is

Re: [Full-disclosure] URI handling woes in Acrobat Reader, Netscape, Miranda, Skype

2007-10-17 Thread KJK::Hyperion
KJK::Hyperion ha scritto: ShellExecute is not called ExecuteUri [...] This function isn't, either, but it should be close enough: /* --- 8 -- 8 -SNIP- 8 -- 8 -- 8 -SNIP- 8 --- */ /* * Helper functions to unambiguously execute URLs with ShellExecute(Ex). * Author: KJK::Hyperion

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Firewall Services Module

2007-10-17 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Multiple Vulnerabilities in Firewall Services Module Advisory ID: cisco-sa-20071017-fwsm http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml Revision 1.0 For Public Release 2007 October 17 1600 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Cisco Unified Communications Web-based Management Vulnerability

2007-10-17 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco Unified Communications Web-based Management Vulnerability Document ID: 97836 Advisory ID: cisco-sa-20071017-IPCC http://www.cisco.com/warp/public/707/cisco-sa-20071017-IPCC.shtml Revision 1.0 For Public Release 2007

[Full-disclosure] Cisco Security Advisory: Cisco Unified Communications Manager Denial of Service Vulnerabilities

2007-10-17 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco Unified Communications Manager Denial of Service Vulnerabilities Document ID: 98833 Advisory ID: cisco-sa-20071017-cucm http://www.cisco.com/warp/public/707/cisco-sa-20071017-cucm.shtml Revision 1.0 For Public

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco PIX and ASA Appliances

2007-10-17 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Multiple Vulnerabilities in Cisco PIX and ASA Appliances Advisory ID: cisco-sa-20071017-asa http://www.cisco.com/warp/public/707/cisco-sa-20071017-asa.shtml Revision 1.0 For Public Release 2007 October 17 1600 UTC (GMT

Re: [Full-disclosure] OMG - I just won the lottery! For real!!11!

2007-10-17 Thread nigger johnson
Although ... I dont remember entering this lottery - because I havent been 18 that long and it wouldnt be legal!? no one cares. next time send your nudes kthx. -- -BEGIN PGP SIGNATURE- Note: This signature can be verified at https://www.hushtools.com/verify Charset: UTF8 Version: Hush

Re: [Full-disclosure] IRM Vendor Alerts: Six critical remote vulnerabilities in TIBCO SmartPGM FX

2007-10-17 Thread nigger johnson
thanks for the target list andy! D: -- -BEGIN PGP SIGNATURE- Note: This signature can be verified at https://www.hushtools.com/verify Charset: UTF8 Version: Hush 2.5 HACKERShack0d4yc4nh4pp3nTOanyONEfull-disclosureh4ckkfisaniggerEPICLULZ

Re: [Full-disclosure] OMG - I just won the lottery! For real!!11!

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear Dude VanWinkle, I find your alias offensive. On Wed, 17 Oct 2007 13:31:32 -0400 nigger johnson [EMAIL PROTECTED] wrote: Although ... I dont remember entering this lottery - because I havent been 18 that long and it wouldnt be legal!? no one

Re: [Full-disclosure] SQL Injection Flaw in Oracle Workspace Manager

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yessir. On Wed, 17 Oct 2007 10:27:49 -0400 David Litchfield [EMAIL PROTECTED] wrote: (resend with title...) NGSSoftware Insight Security Research Advisory Name: SQL Injection Flaw in Oracle Workspace Manager Systems Affected: Oracle 10g release 1

Re: [Full-disclosure] 0-day PDF exploit

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 They are just covering their asses in case someone figures out a scenario where this bug is actually useful, and tries going on a media whoring campaign talking about how evil Adobe is for not originally rating the vulnerability higher. You bunch of

[Full-disclosure] Most Secure Browser

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear List, I am currently tasked with evaluating which webbrowser is the most secure, to be deployed across all machines at the fortune 500 corporation I'm currently working at. Can you, armchair security enthusiast and full-disclosure reader,

Re: [Full-disclosure] Netscape Navigator 9.0 fixes several vulnerabilities

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In your professional opinion, is upgrading to the latest version the best decision? Or is there a better browser to use? - -JPelinks4lyfe On Wed, 17 Oct 2007 11:55:28 -0400 Juha-Matti Laurio juha- [EMAIL PROTECTED] wrote: It appears that new

[Full-disclosure] Did people power get rid of Gadi Evron from Full-Disclosure?

2007-10-17 Thread worried security
Did people power get rid of Gadi Evron from Full-Disclosure? The security researcher and robot network expert from Israel hasn't been seen on Full-Disclosure mailing list since the What is a 0-day? fallout between the researcher and members of the security community, including me, n3td3v.

[Full-disclosure] [ MDKSA-2007:199 ] - Updated phpMyAdmin packages fix multiple vulnerabilities

2007-10-17 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:199 http://www.mandriva.com/security/

[Full-disclosure] Fwd: To the list admin: address change.

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 John, I believe I digitally intercepted this blackberry user's email. - - Forwarded message from [EMAIL PROTECTED] - Please change my subscription address to: [EMAIL PROTECTED] Thank you! Erik Laykin Sent via BlackBerry by ATT -

Re: [Full-disclosure] Netscape Navigator 9.0 fixes several vulnerabilities

2007-10-17 Thread Juha-Matti Laurio
It's always recommended to update to the latest version if there are Netscape installations (many public computers have alternative browsers and I have seen many 7.x versions on these computers etc..) But in fact, I prefer Firefox. Netscape Navigator 9 supports Firefox extensions (i.e. Mozilla

[Full-disclosure] Zone-H.org: 10 reasons websites get hacked

2007-10-17 Thread Juha-Matti Laurio
This is dated 10th Oct but always useful: Zone-H.org - 10 reasons websites get hacked http://www.zone-h.org/content/view/14865/1/ based to OWASP Top 10 list. - Juha-Matti ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Zone-H.org: 10 reasons websites get hacked

2007-10-17 Thread Dude VanVinkle
ROFL OMG HAHAHA WTF LOL @ XSS nº1 On 10/17/07, Juha-Matti Laurio [EMAIL PROTECTED] wrote: This is dated 10th Oct but always useful: Zone-H.org - 10 reasons websites get hacked http://www.zone-h.org/content/view/14865/1/ based to OWASP Top 10 list. - Juha-Matti

Re: [Full-disclosure] Zone-H.org: 10 reasons websites get hacked

2007-10-17 Thread worried security
Usually I delete your e-mail but this one is worthy of a comment. Yeah, look at the staff members of Zone-H, they are true script kid of the highest order... http://www.zone-h.org/content/view/14206/139/ And the content management system used on their site alone signals major lameness activity

Re: [Full-disclosure] Zone-H.org: 10 reasons websites get hacked

2007-10-17 Thread Peter Dawson
Why shot the messenger..kill zat darn army (OWASP ) that create the mess in the first place !! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Zone-H.org: 10 reasons websites get hacked

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I thought the main reasons for intrusion were fun and/or profit. I don't see them on your list anywhere. I think your list sucks. On Wed, 17 Oct 2007 16:46:35 -0400 Juha-Matti Laurio juha- [EMAIL PROTECTED] wrote: This is dated 10th Oct but always

Re: [Full-disclosure] Most Secure Browser

2007-10-17 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thanks bud. Incidentally, we have been seeing a lot of s0ftpj.org posts lately - is your hacker group trying to make a comeback? If so, why? I think r00tabega should return as well! - -JPscene historian is written between my bra and ket lulz! On

Re: [Full-disclosure] Most Secure Browser

2007-10-17 Thread Andre Gironda
On 10/17/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: 1) Personal favorite browser, http://crawler.archive.org 2) Most secure browser, links ... not elinks or lynx... links 3) Best browser plugins, none 4) Favorite youtube video, youtube takes down really important content, such as

Re: [Full-disclosure] 0-day PDF exploit

2007-10-17 Thread cocoruder .
Yes, you are right, the adobe's fault is allowing to call mailto URI without user's validate(they checked other URIs such as http but not mailto), but the remote code execute is due to MS's fault, I am not prefer or hate any vendor and anyone, but the initial disclosure misleaded me to believe