Re: [Full-disclosure] [+] Vulnerability in less version 394 and prior

2007-10-30 Thread Jeffrey Denton
On 10/31/07, glopeda. com <[EMAIL PROTECTED]> wrote: > From: [EMAIL PROTECTED] > Application: less 394 and prior > Type: Format strings vulnerability > Priority: Low > Meager demonstration: > $ export LESSOPEN=%s%n > $ less somefile > Segmentation fault > $ Interesting... $ echo $LESSOPEN |lessp

[Full-disclosure] Ten ways to thwart Big Brother

2007-10-30 Thread Ivan .
http://observer.guardian.co.uk/comment/story/0,,2200579,00.html?gusrc=rss&feed=technology ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] spammer wades into US Presidential race

2007-10-30 Thread jam
On Wed, Oct 31, 2007 at 03:00:25AM -, lsi wrote: > I didn't do much in the way of research, cos this is surely spam, and > we know spammers forge as much as possible. [..snipped insiteful analysis..] I would add that I doubt very much a politician would send out a newsletter with such lousy

Re: [Full-disclosure] [+] Vulnerability in less version 394 and prior

2007-10-30 Thread Jonathan Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 glopeda.com wrote: > From: [EMAIL PROTECTED] > Application: less 394 and prior > Type: Format strings vulnerability > Priority: Low > > There exists a format strings bug in the less application present in > most flavors of UNIX. It could be leveraged

Re: [Full-disclosure] [+] Vulnerability in less version 394 and prior

2007-10-30 Thread fdlist
$ LESSOPEN=/bin/sh less /dev/null sh-3.2$ On Tuesday 30 October 2007, glopeda.com wrote: > There exists a format strings bug in the less application present in > most flavors of UNIX. It could be leveraged for privilege escalation > if the calling application is setuid/setgid and does not properl

[Full-disclosure] [+] Vulnerability in less version 394 and prior

2007-10-30 Thread glopeda . com
From: [EMAIL PROTECTED] Application: less 394 and prior Type: Format strings vulnerability Priority: Low There exists a format strings bug in the less application present in most flavors of UNIX. It could be leveraged for privilege escalation if the calling application is setuid/setgid and does n

Re: [Full-disclosure] spammer wades into US Presidential race

2007-10-30 Thread lsi
I didn't do much in the way of research, cos this is surely spam, and we know spammers forge as much as possible. So, I presume Derk Gaston doesn't exist (I note his email address is [EMAIL PROTECTED], unlikely). I note the mail is coming from .cn, a quick ping and traceroute confirm this, ag

Re: [Full-disclosure] spammer wades into US Presidential race

2007-10-30 Thread Aaron Katz
Did you try contacting his campaign, and asking them if it was theres? While they may not fess up, it wouldn't hurt. Also, if you really believed that it might come from his campaign, wouldn't it be worth trying to find out if spam had been sent on his behalf for previous campaigns that he had r

[Full-disclosure] In Memoriam: Jun-ichiro Hagino

2007-10-30 Thread Dragos Ruiu
With great sadness, I regret to inform you that Itojun will not be presenting his great knowledge of IPv6 at PacSec. I have been informed by several sources that he passed away yesterday. Funeral services will be held on Nov 7th at Rinkai-Saijo in Tokyo. There aren't many details of his passing,

[Full-disclosure] [ GLSA 200710-30 ] OpenSSL: Remote execution of arbitrary code

2007-10-30 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security AdvisoryGLSA 200710-30:02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-disclosure] [ GLSA 200710-31 ] Opera: Multiple vulnerabilities

2007-10-30 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200710-31 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] Assessing Malware Embedded Attack Campaigns

2007-10-30 Thread Dancho Danchev
The following assessments of recent cases of malware embedded attacks can come very handy for cyber forensics training purposes, and hopefully provide further clues in ongoing CYBERINT investigations related to malware embedded attacks. Possibility Media's Malware Fiasco http://ddanchev.blogspot.c

[Full-disclosure] iDefense Security Advisory 10.30.07: IBM AIX bellmail Stack Buffer Overflow Vulnerability

2007-10-30 Thread iDefense Labs
IBM AIX bellmail Stack Buffer Overflow Vulnerability iDefense Security Advisory 10.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Oct 30, 2007 I. BACKGROUND bellmail is a mail user-agent (MUA) and is commonly used for accessing locally stored electronic mail messages. Under AIX, th

[Full-disclosure] iDefense Security Advisory 10.30.07: IBM AIX ftp domacro Parameter Buffer Overflow Vulnerability

2007-10-30 Thread iDefense Labs
IBM AIX ftp domacro Parameter Buffer Overflow Vulnerability iDefense Security Advisory 10.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Oct 30, 2007 I. BACKGROUND The ftp program is a client application for accessing data stored on FTP servers. This client is responsible for inter

[Full-disclosure] iDefense Security Advisory 10.30.07: IBM AIX lquerypv Stack Buffer Overflow Vulnerability

2007-10-30 Thread iDefense Labs
IBM AIX lquerypv Stack Buffer Overflow Vulnerability iDefense Security Advisory 10.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Oct 30, 2007 I. BACKGROUND The lquerypv utility is used to examine the properties of a physical volume in a volume group. It is installed set-uid root b

[Full-disclosure] iDefense Security Advisory 10.30.07: IBM AIX lqueryvg Stack Buffer Overflow Vulnerability

2007-10-30 Thread iDefense Labs
IBM AIX lqueryvg Stack Buffer Overflow Vulnerability iDefense Security Advisory 10.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Oct 30, 2007 I. BACKGROUND The lqueryvg utility is used to examine the properties of disk volume groups. It is installed set-uid root by default on mult

[Full-disclosure] iDefense Security Advisory 10.30.07: IBM AIX dig dns_name_fromtext Integer Underflow Vulnerability

2007-10-30 Thread iDefense Labs
IBM AIX dig dns_name_fromtext Integer Underflow Vulnerability iDefense Security Advisory 10.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Oct 30, 2007 I. BACKGROUND dig is a utility that is commonly used for DNS diagnostics. Under AIX 5.2, the dig program is installed by default a

[Full-disclosure] iDefense Security Advisory 10.30.07: IBM AIX 5.2 crontab BSS Buffer Overflow Vulnerability

2007-10-30 Thread iDefense Labs
IBM AIX 5.2 crontab BSS Buffer Overflow Vulnerability iDefense Security Advisory 10.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Oct 30, 2007 I. BACKGROUND The crontab program is a user utility that enables users to create, remove, and edit cron jobs. The cron jobs will then late

[Full-disclosure] iDefense Security Advisory 10.30.07: IBM AIX swcons Local Arbitrary File Access Vulnerability

2007-10-30 Thread iDefense Labs
IBM AIX swcons Local Arbitrary File Access Vulnerability iDefense Security Advisory 10.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Oct 30, 2007 I. BACKGROUND The swcons program is a set-uid root application which is installed by default on IBM AIX. It allows for console logs to

Re: [Full-disclosure] spammer wades into US Presidential race

2007-10-30 Thread Dude VanWinkle
On 10/29/07, Leif Ericksen <[EMAIL PROTECTED]> wrote: > Either way they are doing it to advance their own agenda. > > bottom line that is what their lack of action is all about. Their own > agenda. I think his "agenda" was to make the guys who support the war actually go on record as supporting t

Re: [Full-disclosure] spammer wades into US Presidential race

2007-10-30 Thread John C. A. Bambenek, CISSP
Is this a political science list or an information security list? ;) I mean, I'm all for a debate about the inherent war powers of the President, or the War Powers Act in specific, but I'm not sure that's really the point here. ;) On 10/29/07, Leif Ericksen <[EMAIL PROTECTED]> wrote: > > Either w

[Full-disclosure] Secunia Research: IPSwitch IMail Server IMail Client Buffer Overflow

2007-10-30 Thread Secunia Research
== Secunia Research 30/10/2007 - IPSwitch IMail Server IMail Client Buffer Overflow - == Table of Contents Affected Software

[Full-disclosure] Memory overwrites in JVM via malformed TrueType font

2007-10-30 Thread NGSSoftware Insight Security Research
Note: This advisory should have been published several months ago; apologies for the delay -- John Heasman === Summary === Name: Memory overwrites in JVM via malformed TrueType font Release Date: 29 October 2007 Reference: NGS00419 Discover: John Heasman <[EMAIL PROTECTED]> Vendor: Sun Mic

[Full-disclosure] Untrusted Java applet can connect to localhost

2007-10-30 Thread NGSSoftware Insight Security Research
Note: This advisory should have been published several months ago; apologies for the delay -- John Heasman === Summary === Name: Untrusted Java applet can connect to localhost Release Date: 29 October 2007 Reference: NGS00443 Discover: John Heasman <[EMAIL PROTECTED]> Vendor: Sun Microsyst

[Full-disclosure] Heap overflow in RealPlayer ID3 tag parser

2007-10-30 Thread NGSSoftware Insight Security Research
=== Summary === Name: Heap overflow in RealPlayer ID3 tag parsing code Release Date: 29 October 2007 Reference: NGS00432 Discover: John Heasman <[EMAIL PROTECTED]> Vendor: RealNetworks Systems Affected: Several builds of RealPlayer 10.5, All builds of RealPlayer 10. For additional affec

[Full-disclosure] rPSA-2007-0225-2 firefox thunderbird

2007-10-30 Thread rPath Update Announcements
rPath Security Advisory: 2007-0225-2 Published: 2007-10-26 Updated: 2007-10-29 added thunderbird update Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: [EMAIL PROTECTED]:1/2.0.0.8-0.1-1 [EMAIL PRO

[Full-disclosure] [SECURITY] [DSA 1388-3] New dhcp packages fix arbitrary code execution

2007-10-30 Thread Noah Meyerhans
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1388-3[EMAIL PROTECTED] http://www.debian.org/security/ Noah Meyerhans October 29, 2007h

[Full-disclosure] RFIDIOt release - version 0.1q

2007-10-30 Thread Adam Laurie
Folks, I'm pleased to announce the release of the latest version of the open source RFID python library, RFIDIOt: 0.1q Not a huge amount in this update, but I'm gonna be on the road for a couple of weeks so I thought I'd better get it out: fix asn1 field length calculation in mrpkey.py a