Re: [Full-disclosure] ZDI-07-069: CA BrightStor ARCserve Backup Message Engine Insecure Method Exposure Vulnerability

2007-12-01 Thread Williams, James K
> Date: Wed, 28 Nov 2007 03:32:51 + > From: cocoruder. <[EMAIL PROTECTED]> > Subject: Re: [Full-disclosure] ZDI-07-069: CA BrightStor > ARCserve Backup Message Engine Insecure Method Expos > To: , <[EMAIL PROTECTED]> > > it is so amazing that the vendor's advisory has been released

Re: [Full-disclosure] PlayStation 3 predicts next US president (fwd)

2007-12-01 Thread Slythers Bro
is it real ? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] DC4420 - London DEFCON chapter Christmas Party - 11th December

2007-12-01 Thread Major Malfunction
hi all, you are cordially invited to the final DC4420 meet of 2007, which will be held on Tuesday the 11th December, at the usual location - Charing Cross Sports Club, Charing Cross Hospital: http://www.multimap.com/map/browse.cgi?lat=51.4857&lon=-0.2194&scale=5000&icon=x more info here: h

[Full-disclosure] Phioust gets all emotional to gobbles and friends ...

2007-12-01 Thread Gobbles is back
Phioust means business with his real name and all those philosopher (H), CISSP and MCSE (lol) degrees ... see for urself in his dangerously sexy email ... in response to our spam threat :) -- Forwarded message -- From: phioust <[EMAIL PROTECTED]> Date: Nov 30, 2007 9:33 PM Subj

[Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread Kristian Erik Hermansen
I know of many commercial security products which still utilize MD5 to prove integrity of the data they distribute to customers. This should no longer be considered appropriate. Now that tools are readily available to exploit newer MD5 collision research, I think it is safe to say that the public

[Full-disclosure] Firefox 2.0.0.11 File Focus Stealing vulnerability

2007-12-01 Thread carl hardwick
Firefox 2.0.0.11 File Focus Stealing vulnerability: Sorry Mozilla, but the recent file focus fix was not enough. I think Mozilla made another mistake while fixing the previous file/label issue. Because now I embed a file field and a textfield inside one label. When this happens, and you type only

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread Steven Adair
> > > There you have it. Surely a GPL'd tool implementing this attack style > will be available shortly. And since Chinese researchers have been > attacking SHA-1 lately, should SHA-256 be considered the proper > replacement? I am unsure :-( Yes, it would probably be a good idea. I think this

Re: [Full-disclosure] Firefox 2.0.0.11 File Focus Stealing vulnerability

2007-12-01 Thread Juha-Matti Laurio
Netscape Navigator version 9.0.0.4 is affected too. Test done with PoC-type URL mentioned on Mac OS X 10.4.10 fully patched. Vendor was contacted on 1st Dec 2007. - Juha-Matti carl hardwick <[EMAIL PROTECTED]> wrote: > Firefox 2.0.0.11 File Focus Stealing vulnerability: > > Sorry Mozilla, but

[Full-disclosure] rPSA-2007-0255-1 nss_ldap

2007-12-01 Thread rPath Update Announcements
rPath Security Advisory: 2007-0255-1 Published: 2007-11-30 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Local Weakness Updated Versions: [EMAIL PROTECTED]:1/239-9.2-1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-1913 References: htt

Re: [Full-disclosure] High Value Target Selection

2007-12-01 Thread gmaggro
> translation: let's discuss how to discern high degree and/or vulnerable > nodes in critical infrastructure networks. Correct. >> 1. To bring like minded people together while operating under the >> strategy of 'leaderless resistance' >> (http://en.wikipedia.org/wiki/Leaderless_resistance) > > *

Re: [Full-disclosure] Firefox 2.0.0.11 File Focus Stealing vulnerability

2007-12-01 Thread Randal, Phil
And the Mozilla bugzilla number is? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Juha-Matti Laurio Sent: 01 December 2007 15:25 To: carl hardwick; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Firefox 2.0.0.11 File Focus Stealing v

Re: [Full-disclosure] High Value Target Selection

2007-12-01 Thread gmaggro
Forgot to tack these onto the last post. The wikipedia entry http://en.wikipedia.org/wiki/Submarine_communications_cable has some amusing links in it's reference section: http://www.telegeography.com/products/map_cable/images/sub_cable_2007_large.jpg http://www1.alcatel-lucent.com/submarine/refs/W

Re: [Full-disclosure] Firefox 2.0.0.11 File Focus Stealing vulnerability

2007-12-01 Thread Nate McFeters
More than likely all the gecko based browsers will be vulnerable to this. So that would include Mozilla, Camino, SeaMonkey... possibly even things like Thunderbird if you could get it to render. Nice find guys! Nate On 12/1/07, Juha-Matti Laurio <[EMAIL PROTECTED]> wrote: > > Netscape Navigator

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread James Matthews
I agree! It should be changed and i have no idea why people still use it! On Dec 1, 2007 4:20 PM, Steven Adair <[EMAIL PROTECTED]> wrote: > > > > > > There you have it. Surely a GPL'd tool implementing this attack style > > will be available shortly. And since Chinese researchers have been > >

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread Enno Rey
because they perform risk-analysis: - what are the threats to my assets? - which role does MD5 play there? - any subsequent risk then from using it? - high priority risk? mitigating controls or risk acceptance? would you be so kind to show me a real-world attack against a VPN using MD5 hashing? .

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread Tim
> because they perform risk-analysis: > - what are the threats to my assets? > - which role does MD5 play there? > - any subsequent risk then from using it? > - high priority risk? mitigating controls or risk acceptance? Don't kid yourself. Very few businesses in my experience think about this st

Re: [Full-disclosure] Firefox 2.0.0.11 File Focus Stealing vulnerability

2007-12-01 Thread Static Rez
Doesn't work in Gran Paradiso 3.0a7 On Dec 1, 2007 12:37 PM, Nate McFeters <[EMAIL PROTECTED]> wrote: > > More than likely all the gecko based browsers will be vulnerable to this. > So that would include Mozilla, Camino, SeaMonkey... possibly even things > like Thunderbird if you could get it to

[Full-disclosure] Firefox explicit charset inheritance

2007-12-01 Thread Paul Szabo
I found that Firefox 2.0.0.10 will inherit the charset of the parent page, when that had been selected manually (does not inherit the charset specified in headers or meta). I found this inheritance to work both with [a href] links and [iframe src] in the parent page. See also: http://www.mozilla.o

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread Paul Schmehl
--On December 1, 2007 2:20:21 PM -0500 Tim <[EMAIL PROTECTED]> wrote: >> because they perform risk-analysis: >> - what are the threats to my assets? >> - which role does MD5 play there? >> - any subsequent risk then from using it? >> - high priority risk? mitigating controls or risk acceptance? >

[Full-disclosure] Phioust is now getting really emotional ...

2007-12-01 Thread Gobbles is back
Phioust, we love you .. google your name for the christmas gift !!! -- Forwarded message -- From: phioust <[EMAIL PROTECTED]> Date: Dec 1, 2007 2:33 PM Subject: Re: spam? To: Gobbles is back <[EMAIL PROTECTED]> Why are you doing this ? i dont even know you. i would appriciate if y

[Full-disclosure] Phioust is now getting really emotional ...

2007-12-01 Thread Gobbles is back
Phioust, we love you .. google your name for the christmas gift !!! -- Forwarded message -- From: phioust < [EMAIL PROTECTED]> Date: Dec 1, 2007 2:33 PM Subject: Re: spam? To: Gobbles is back <[EMAIL PROTECTED]> why are you doing this ? i dont even know you. i would appreciate if

Re: [Full-disclosure] Full-Disclosure Digest, Vol 34, Issue 1

2007-12-01 Thread Randy Mueller
> -- > > Message: 6 > Date: Fri, 30 Nov 2007 23:44:07 +0100 > From: "Max Moser" <[EMAIL PROTECTED]> > Subject: [Full-disclosure] 27Mhz based wireless security insecurities > - Aka - "We know what you typed last summer" > To: [EMAIL PROTECTED], [EMAIL PROTECTED],

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread coderman
On Dec 1, 2007 5:06 AM, Kristian Erik Hermansen <[EMAIL PROTECTED]> wrote: > [MD5 is dead like WEP] yup. > And since Chinese researchers have been > attacking SHA-1 lately, should SHA-256 be considered the proper > replacement? SHA2 is good. (so 256 or 512). the design differs from SHA1 and a

Re: [Full-disclosure] High Value Target Selection

2007-12-01 Thread coderman
On Dec 1, 2007 8:09 AM, gmaggro <[EMAIL PROTECTED]> wrote: > ... > Why not advocate? If you did get in trouble for this post, I don't think > adding a caveat like "of course not advocation" would help you much, if > at all. Like those quips in Phrack or Paladin Press books "For > educational purpos

Re: [Full-disclosure] Firefox 2.0.0.11 File Focus Stealing vulnerability

2007-12-01 Thread Juha-Matti Laurio
N/A unfortunately, but BID26669 points to entries https://bugzilla.mozilla.org/show_bug.cgi?id=258875 and https://bugzilla.mozilla.org/show_bug.cgi?id=56236 via this older one advisory: http://www.securityfocus.com/bid/18308/references Link: http://www.securityfocus.com/bid/26669/discuss (Probab

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread Valdis . Kletnieks
On Sat, 01 Dec 2007 05:06:36 PST, Kristian Erik Hermansen said: > I know of many commercial security products which still utilize MD5 to > prove integrity of the data they distribute to customers. This should > no longer be considered appropriate. Now that tools are readily > available to exploit

Re: [Full-disclosure] MD5 algorithm considered toxic (and harmful)

2007-12-01 Thread Kristian Erik Hermansen
On Dec 1, 2007 7:08 PM, <[EMAIL PROTECTED]> wrote: > Admittedly, MD5 is on its last legs. However, please note that the current > state of the art for MD5 collisions is "create two plaintexts that collide > with the same (but unpredictable) MD5 hash". That's what these binaries > demonstrate. C

Re: [Full-disclosure] High Value Target Selection

2007-12-01 Thread gmaggro
> (in telco land, one SONET span over aerial transport and the other buried > plant is considered sufficient "path diversity/redundancy". never mind that > the same right of way is used...) Ah yes, I remember an old story not too dissimilar... multiple redundant lines, all severed at the same tim

Re: [Full-disclosure] High Value Target Selection

2007-12-01 Thread Valdis . Kletnieks
On Sat, 01 Dec 2007 23:13:31 EST, gmaggro said: > Ah yes, I remember an old story not too dissimilar... multiple redundant > lines, all severed at the same time with the same backhoe. Idiots. To be fair, it's often not "idiots". First, you have to find 2 providers that can get fiber from point A

Re: [Full-disclosure] Signature or checksum? (was: MD5 considered harmful)

2007-12-01 Thread coderman
On Dec 1, 2007 7:08 PM, <[EMAIL PROTECTED]> wrote: > ... > (Note that strictly speaking, what you *really* want is a PGP-signed or > otherwise authenticated MD5/SHA-256 hash. Otherwise, if I'm an attacker, > I can just splat a new binary up, and a new MD5SUMS file that lists the > MD5 sum for the

Re: [Full-disclosure] authentic hackers still do it for the love ... (was: Hell Camp: It never pays enough)

2007-12-01 Thread coderman
On Dec 1, 2007 9:12 PM, Goebbels Amadeus <[EMAIL PROTECTED]> wrote: > ... > Have you ever considered your future in their hands? You've > been working for 50 years, your liver and kidneys start failing, > creating visible symptoms, stains in your skin. You can't handle > life in the same way anymor