On 10/31/07, glopeda. com <[EMAIL PROTECTED]> wrote:
> From: [EMAIL PROTECTED]
> Application: less 394 and prior
> Type: Format strings vulnerability
> Priority: Low
> Meager demonstration:
> $ export LESSOPEN=%s%n
> $ less somefile
> Segmentation fault
> $
Interesting...
$ echo $LESSOPEN
|lessp
http://observer.guardian.co.uk/comment/story/0,,2200579,00.html?gusrc=rss&feed=technology
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On Wed, Oct 31, 2007 at 03:00:25AM -, lsi wrote:
> I didn't do much in the way of research, cos this is surely spam, and
> we know spammers forge as much as possible.
[..snipped insiteful analysis..]
I would add that I doubt very much a politician would send out a newsletter
with such lousy
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
glopeda.com wrote:
> From: [EMAIL PROTECTED]
> Application: less 394 and prior
> Type: Format strings vulnerability
> Priority: Low
>
> There exists a format strings bug in the less application present in
> most flavors of UNIX. It could be leveraged
$ LESSOPEN=/bin/sh less /dev/null
sh-3.2$
On Tuesday 30 October 2007, glopeda.com wrote:
> There exists a format strings bug in the less application present in
> most flavors of UNIX. It could be leveraged for privilege escalation
> if the calling application is setuid/setgid and does not properl
From: [EMAIL PROTECTED]
Application: less 394 and prior
Type: Format strings vulnerability
Priority: Low
There exists a format strings bug in the less application present in
most flavors of UNIX. It could be leveraged for privilege escalation
if the calling application is setuid/setgid and does n
I didn't do much in the way of research, cos this is surely spam, and
we know spammers forge as much as possible. So, I presume Derk
Gaston doesn't exist (I note his email address is
[EMAIL PROTECTED], unlikely).
I note the mail is coming from .cn, a quick ping and traceroute
confirm this, ag
Did you try contacting his campaign, and asking them if it was theres?
While they may not fess up, it wouldn't hurt.
Also, if you really believed that it might come from his campaign,
wouldn't it be worth trying to find out if spam had been sent on his
behalf for previous campaigns that he had r
With great sadness, I regret to inform you that Itojun
will not be presenting his great knowledge of IPv6 at
PacSec. I have been informed by several sources
that he passed away yesterday.
Funeral services will be held on Nov 7th at Rinkai-Saijo
in Tokyo. There aren't many details of his passing,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security AdvisoryGLSA 200710-30:02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200710-31
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
The following assessments of recent cases of malware embedded attacks
can come very handy for cyber forensics training purposes, and
hopefully provide further clues in ongoing CYBERINT investigations
related to malware embedded attacks.
Possibility Media's Malware Fiasco
http://ddanchev.blogspot.c
IBM AIX bellmail Stack Buffer Overflow Vulnerability
iDefense Security Advisory 10.30.07
http://labs.idefense.com/intelligence/vulnerabilities/
Oct 30, 2007
I. BACKGROUND
bellmail is a mail user-agent (MUA) and is commonly used for accessing
locally stored electronic mail messages. Under AIX, th
IBM AIX ftp domacro Parameter Buffer Overflow Vulnerability
iDefense Security Advisory 10.30.07
http://labs.idefense.com/intelligence/vulnerabilities/
Oct 30, 2007
I. BACKGROUND
The ftp program is a client application for accessing data stored on FTP
servers. This client is responsible for inter
IBM AIX lquerypv Stack Buffer Overflow Vulnerability
iDefense Security Advisory 10.30.07
http://labs.idefense.com/intelligence/vulnerabilities/
Oct 30, 2007
I. BACKGROUND
The lquerypv utility is used to examine the properties of a physical
volume in a volume group. It is installed set-uid root b
IBM AIX lqueryvg Stack Buffer Overflow Vulnerability
iDefense Security Advisory 10.30.07
http://labs.idefense.com/intelligence/vulnerabilities/
Oct 30, 2007
I. BACKGROUND
The lqueryvg utility is used to examine the properties of disk volume
groups. It is installed set-uid root by default on mult
IBM AIX dig dns_name_fromtext Integer Underflow Vulnerability
iDefense Security Advisory 10.30.07
http://labs.idefense.com/intelligence/vulnerabilities/
Oct 30, 2007
I. BACKGROUND
dig is a utility that is commonly used for DNS diagnostics. Under AIX
5.2, the dig program is installed by default a
IBM AIX 5.2 crontab BSS Buffer Overflow Vulnerability
iDefense Security Advisory 10.30.07
http://labs.idefense.com/intelligence/vulnerabilities/
Oct 30, 2007
I. BACKGROUND
The crontab program is a user utility that enables users to create,
remove, and edit cron jobs. The cron jobs will then late
IBM AIX swcons Local Arbitrary File Access Vulnerability
iDefense Security Advisory 10.30.07
http://labs.idefense.com/intelligence/vulnerabilities/
Oct 30, 2007
I. BACKGROUND
The swcons program is a set-uid root application which is installed by
default on IBM AIX. It allows for console logs to
On 10/29/07, Leif Ericksen <[EMAIL PROTECTED]> wrote:
> Either way they are doing it to advance their own agenda.
>
> bottom line that is what their lack of action is all about. Their own
> agenda.
I think his "agenda" was to make the guys who support the war actually
go on record as supporting t
Is this a political science list or an information security list? ;) I
mean, I'm all for a debate about the inherent war powers of the President,
or the War Powers Act in specific, but I'm not sure that's really the point
here. ;)
On 10/29/07, Leif Ericksen <[EMAIL PROTECTED]> wrote:
>
> Either w
==
Secunia Research 30/10/2007
- IPSwitch IMail Server IMail Client Buffer Overflow -
==
Table of Contents
Affected Software
Note: This advisory should have been published several months ago;
apologies for the delay -- John Heasman
===
Summary
===
Name: Memory overwrites in JVM via malformed TrueType font
Release Date: 29 October 2007
Reference: NGS00419
Discover: John Heasman <[EMAIL PROTECTED]>
Vendor: Sun Mic
Note: This advisory should have been published several months ago;
apologies for the delay -- John Heasman
===
Summary
===
Name: Untrusted Java applet can connect to localhost
Release Date: 29 October 2007
Reference: NGS00443
Discover: John Heasman <[EMAIL PROTECTED]>
Vendor: Sun Microsyst
===
Summary
===
Name: Heap overflow in RealPlayer ID3 tag parsing code
Release Date: 29 October 2007
Reference: NGS00432
Discover: John Heasman <[EMAIL PROTECTED]>
Vendor: RealNetworks
Systems Affected: Several builds of RealPlayer 10.5,
All builds of RealPlayer 10.
For additional affec
rPath Security Advisory: 2007-0225-2
Published: 2007-10-26
Updated:
2007-10-29 added thunderbird update
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
[EMAIL PROTECTED]:1/2.0.0.8-0.1-1
[EMAIL PRO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1388-3[EMAIL PROTECTED]
http://www.debian.org/security/ Noah Meyerhans
October 29, 2007h
Folks,
I'm pleased to announce the release of the latest version of the open
source RFID python library, RFIDIOt: 0.1q
Not a huge amount in this update, but I'm gonna be on the road for a
couple of weeks so I thought I'd better get it out:
fix asn1 field length calculation in mrpkey.py
a
28 matches
Mail list logo