Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Keith Kilroy
Lock down your server so only needed ports are open, move ssh above the norm scan range, setup SNORT and learn how to use it, harden and update all progz. Check for web app holes.buffer overflows etc. The only box that is safe is the one unplugged hdd removed and destroyed and rest of s

[Full-disclosure] FLEA-2008-0003-1 nss_ldap

2008-02-12 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2008-0003-1 Published: 2008-02-11 Rating: Minor Updated Versions: nss_ldap=/[EMAIL PROTECTED]:devel//1/239-9.2-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.4.2-0.7-3 References: http://cve.mitre.org/cg

Re: [Full-disclosure] "Andrew A" -> Benjamin Trott, Six Apart/Live Journal hacker, and belligerent anti-gay remarks?

2008-02-12 Thread T Biehn
Kristian Erik Hermansen, Oh man, get sued for libel much? Warm regards, Travis On Feb 12, 2008 3:13 AM, Kristian Erik Hermansen <[EMAIL PROTECTED]> wrote: > After the recent death of Justin Polazzo -- a dude who I only > corresponded with over the net -- I noticed another post from "Andrew > A",

[Full-disclosure] FLEA-2008-0005-1 e2fsprogs

2008-02-12 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2008-0005-1 Published: 2008-02-11 Rating: Minor Updated Versions: e2fsprogs=/[EMAIL PROTECTED]:devel//1/1.37-3.3-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.4.2-0.7-3 References: http://cve.mitre.org/

[Full-disclosure] FLEA-2008-0006-1 tetex tetex-dvips tetex-fonts

2008-02-12 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2008-0006-1 Published: 2008-02-11 Rating: Minor Updated Versions: tetex=/[EMAIL PROTECTED]:devel//1/2.0.2-28.10-1 tetex-dvips=/[EMAIL PROTECTED]:devel//1/2.0.2-28.10-1 tetex-fonts=/[EMAIL PROTECTED]:dev

[Full-disclosure] FLEA-2008-0002-1 python

2008-02-12 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2008-0002-1 Published: 2008-02-11 Rating: Moderate Updated Versions: python=/[EMAIL PROTECTED]:devel//1/2.4.1-20.14-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.4.2-0.7-3 References: http://cve.mitre.o

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Abilash Praveen
Hello experts, Thank for all your rude, honest, polite, helpful replies. I'm really glad I posted here and most of your replies (if not all) are very useful to me. Sorry iam not able to reply individually to everyone and thank you. I've been using a couple of servers and it was very unusal for me

[Full-disclosure] FLEA-2008-0007-1 gd

2008-02-12 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2008-0007-1 Published: 2008-02-11 Rating: Trivial Updated Versions: gd=/[EMAIL PROTECTED]:devel//1/2.0.33-4.6-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.4.2-0.7-3 References: http://cve.mitre.org/cgi

[Full-disclosure] "Andrew A" -> Benjamin Trott, Six Apart/Live Journal hacker, and belligerent anti-gay remarks?

2008-02-12 Thread Kristian Erik Hermansen
After the recent death of Justin Polazzo -- a dude who I only corresponded with over the net -- I noticed another post from "Andrew A", which touted some horrible remarks. I don't know who "Andrew A" is, but he and I have had a running conversation publicly and privately. He has proven to be quit

[Full-disclosure] FLEA-2008-0004-1 rsync

2008-02-12 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential Advisory: 2008-0004-1 Published: 2008-02-11 Rating: Minor Updated Versions: rsync=/[EMAIL PROTECTED]:devel//1/2.6.8-1.2-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.4.2-0.7-3 References: http://cve.mitre.org/cgi

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread A . L . M . Buxey
Hi, > have pasted and also the advice on keeping the SSH on a different port. run SSH on a different port? oka, dumb scanners wont find it, but others will. just dont use password-based SSH and dont let it be wide open to the whole internet (firewall it to the addresses you need - and add in a p

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Keith Kilroy
To clarify my last post. I agree with alan. I mean it will help with the low hanging fruit. and I didn't get that deep into how to run his auth. Thanks for adding. also disable remote root access su to root if you need that. root=localhost only. port knocking works very well too. Thanks ag

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread T Biehn
Read the ART OF DECEPTION and KNOW THAT THE ONLY DEFENSE IS NO DEFENSE AT ALL! HA HA HA On Feb 12, 2008 4:24 AM, Keith Kilroy <[EMAIL PROTECTED]> wrote: > To clarify my last post. I agree with alan. > > I mean it will help with the low hanging fruit. and I didn't get that > deep into how to run hi

[Full-disclosure] [ MDVSA-2008:044 ] - Updated kernel packages fix multiple vulnerabilities and bugs

2008-02-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:044 http://www.mandriva.com/security/ ___

[Full-disclosure] Directory traversal and DoS in WinIPDS G52-33-021

2008-02-12 Thread Luigi Auriemma
### Luigi Auriemma Application: Intermate WinIPDS http://www.intermate.com/ipdssoftware Versions: <= Release 3.3 Revision G52-33-021 Platforms:Windows Bugs: A] director

Re: [Full-disclosure] Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0

2008-02-12 Thread jfvanmeter
Thanks for the info, I'll try it somemore. Take Care --John -- Original message -- From: Luigi Auriemma <[EMAIL PROTECTED]> > [EMAIL PROTECTED] wrote: > > Interresting, how are you running the Get command? Is safenet > > installed on a workstation or server? >

[Full-disclosure] Unicode buffer-overflow in RPM Remote Print Manager 4.5.1.11

2008-02-12 Thread Luigi Auriemma
### Luigi Auriemma Application: RPM Remote Print Manager http://lpd.brooksnet.com Versions: <= 4.5.1.11 (tested both the Elite and Select versions) the beta version 5

Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Andrew A
Sorry dude. I'm sure you tell people that your shitty sysad job at Virginia Tech makes you a part of the Information Security industry but clearly you are getting paid 45k a year to read post to full-disclosure 7 hours a day and every once in a while maintenance shitty perl. "LOL" On Feb 12, 2008

Re: [Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread J. Oquendo
You need to check your spelling. Libel != Lible Death -- Yes, legally, it is no problem to speak ill of the dead. For example, in James Bamford's The Puzzle Palace, a book about the National Security Agency, a former government employee is called a Russian spy even though he was never convict

Re: [Full-disclosure] [funsec] death of "Dude" brings out the "Rude"

2008-02-12 Thread Blue Boar
Randy Mueller wrote: > Wow. It is amazing to read the out right disrespect for another’s life > and rights. > > I’m stunned. Almost speechless. And yet, I like to think that JP would have enjoyed giving them one last reason to demonstrate that they have no class.

Re: [Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread J. Oquendo
Simon Smith wrote: Ok, Big deal I typed it wrong once. More significantly, your interpretation of what I wrote is inaccurate. Why are you supporting the trolls? Did you see any support of any trolls? I stay out of trolling. Besides death is death, its a sad loss but life moves on. People come

[Full-disclosure] [SECURITY] [DSA 1495-1] New nagios-plugins packages fix several vulnerabilities

2008-02-12 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1495-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff February 12, 2008

Re: [Full-disclosure] TROLLS WITH NOT RESPECT

2008-02-12 Thread Andrew A
Valdis can't you just fucking go back to Latvia already? On Feb 12, 2008 3:14 PM, <[EMAIL PROTECTED]> wrote: > On Tue, 12 Feb 2008 17:05:14 CST, Randy Mueller said: > > STOP FEEDING THESE IDIOT TROLLS > > Many would claim, based on the message you're replying to, that you are, > in fact, suggesti

[Full-disclosure] iDefense Security Advisory 02.12.08: Microsoft Internet Explorer Property Memory Corruption Vulnerability

2008-02-12 Thread iDefense Labs
iDefense Security Advisory 02.12.08 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 12, 2008 I. BACKGROUND Internet Explorer is a graphical web browser developed by Microsoft Corp. that has been included with Microsoft Windows since 1995. For more information about Internet Explorer, v

[Full-disclosure] iDefense Security Advisory 02.12.08: Microsoft Office Works Converter Stack-based Buffer Overflow Vulnerability

2008-02-12 Thread iDefense Labs
iDefense Security Advisory 02.12.08 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 12, 2008 I. BACKGROUND Microsoft Word is a word processing application which is heavily used in corporate environments. Word comes with Office Converters that allow it to import files from various forma

[Full-disclosure] iDefense Security Advisory 02.12.08: Adobe Flash Media Server 2 Multiple Integer Overflow Vulnerabilities

2008-02-12 Thread iDefense Labs
iDefense Security Advisory 02.12.08 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 12, 2008 I. BACKGROUND Adobe Flash Media Server is an application server for Flash based applications. It provides an environment to run interactive media applications, as well as audio and video stream

[Full-disclosure] iDefense Security Advisory 02.12.08: Adobe Flash Media Server 2 Memory Corruption Vulnerability

2008-02-12 Thread iDefense Labs
iDefense Security Advisory 02.12.08 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 12, 2008 I. BACKGROUND Adobe Flash Media Server is an application server for Flash based applications. It provides an environment to run interactive media applications, as well as audio and video stream

[Full-disclosure] ZDI-08-006: Microsoft Internet Explorer SVG animateMotion.by Code Execution Vulnerability

2008-02-12 Thread zdi-disclosures
ZDI-08-006: Microsoft Internet Explorer SVG animateMotion.by Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-08-006.html February 12, 2008 -- CVE ID: CVE-2008-077 -- Affected Vendor: Microsoft -- Affected Products: Internet Explorer 6 Internet Explorer 7 -- Tipping

Re: [Full-disclosure] TROLLS WITH NOT RESPECT

2008-02-12 Thread Valdis . Kletnieks
On Tue, 12 Feb 2008 17:05:14 CST, Randy Mueller said: > STOP FEEDING THESE IDIOT TROLLS Many would claim, based on the message you're replying to, that you are, in fact, suggesting this to one of the trolls themselves... pgpBGzKqQPItf.pgp Description: PGP signature __

[Full-disclosure] TROLLS WITH NOT RESPECT

2008-02-12 Thread Randy Mueller
STOP FEEDING THESE IDIOT TROLLS -- Message: 6 Date: Tue, 12 Feb 2008 13:38:28 -0600 From: "Fredrick Diggle" <[EMAIL PROTECTED]> Subject: Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo To: "Gadi Evron" <[EMAIL PROTECTED]> Cc: [EMAIL

[Full-disclosure] [SECURITY] [DSA 1496-1] New mplayer packages fix arbitrary code execution

2008-02-12 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1496-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff February 12, 2008

Re: [Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread Simon Smith
Again, It wasn't an assumption, it was a suggestion. J. Oquendo wrote: > Simon Smith wrote: >> Ok, >> >> Big deal I typed it wrong once. More significantly, your interpretation >> of what I wrote is inaccurate. Why are you supporting the trolls? > > Did you see any support of any trolls?

Re: [Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread Simon Smith
Ok, Big deal I typed it wrong once. More significantly, your interpretation of what I wrote is inaccurate. Why are you supporting the trolls? RB wrote: > At least spell 'Libel' correctly for anyone to take you seriously. > You should know vain threats won't help the matter, and will frankly > onl

Re: [Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread Paul Schmehl
--On Tuesday, February 12, 2008 14:58:15 -0500 Simon Smith <[EMAIL PROTECTED]> wrote: > > I'll bet that JP's family can file a lawsuit against the socially > dysfunctional idiots that are tarnishing JP's name. Especially since JP > is deceased. As a result they should be able to subpoena the ISP's

Re: [Full-disclosure] [funsec] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Ag. System Administrator
You such idiot and coward! Go outside, play hide and go fuck yourself!!! I'm looking forward for your death... I can't miss it! I'll sure congratulate this! And some advice for the rest of your useless life - you gona eat a lot of shit, open your mouth wider Have a lot of shit, and bon appe

Re: [Full-disclosure] [inbox] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Paul Schmehl
--On Tuesday, February 12, 2008 07:54:06 -0500 Joey Mengele <[EMAIL PROTECTED]> wrote: > On Mon, 11 Feb 2008 21:33:24 -0500 Exibar <[EMAIL PROTECTED]> > wrote: >> >> Rest in peace JP, the universe is now yours to explore... >> >> Exibar >> > > He is dead you ignorant cunt, he did not become an

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Simon Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Show me proof that you're not talking out of your ass. Andrew A wrote: | How: fistfull of barbituates | Why: he was a fucking failure | | On Feb 12, 2008 9:15 AM, Simon Smith <[EMAIL PROTECTED] | > wrote: | | Anyone find

[Full-disclosure] Disrespecting the respectable Dude VanWinkle / Justin Plazzo, illegal?

2008-02-12 Thread Simon Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 FYI, Lible: An untruthful statement about a person, published in writing or through broadcast media, that injures the person's reputation or standing in the community. Because libel is a tort (a civil wrong), the injured person can bring a lawsuit a

Re: [Full-disclosure] ASUS Eee PC rooted out of the box

2008-02-12 Thread Fredrick Diggle
Fredrick Diggle has it on good authority that netdev, Anonymous, and L Ron Hubbard's ghost are one and the same. I would be careful who you insult Mr college sys admin man. On Feb 11, 2008 10:57 AM, <[EMAIL PROTECTED]> wrote: > On Sat, 09 Feb 2008 21:29:59 GMT, worried security said: > > > the ne

Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Geoffrey Gowey
The problem here is not the "not being mean to anyone" (that's beyond hope on the Internet), but being rude and immature about the passing of a person. Like I said, I didn't know him, but have some respect for those who did. Are the trolls here really so desperate that they don't just kick a pers

Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Fredrick Diggle
Fredrick Diggle would like to remind Gadi that everyone he knows is going to die. If that simple fact means that you can't be mean to anyone then this is not a world that Fredrick Diggle wants to live in. YAY! On Feb 11, 2008 2:43 PM, Gadi Evron <[EMAIL PROTECTED]> wrote: > I was just woken up wi

Re: [Full-disclosure] Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0

2008-02-12 Thread Luigi Auriemma
[EMAIL PROTECTED] wrote: > Interresting, how are you running the Get command? Is safenet > installed on a workstation or server? Here I have Windows XP Pro SP2. All the tests have been made using the raw GET request as I reported in my advisory using netcat because the browsers usually modify the

[Full-disclosure] iDefense Security Advisory 02.12.08: Microsoft Office Works Converter Heap Overflow Vulnerability

2008-02-12 Thread iDefense Labs
iDefense Security Advisory 02.12.08 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 12, 2008 I. BACKGROUND Microsoft Works is a word processor created by Microsoft in the 1980s. Microsoft Office, a widely use productivity suite, is distributed with converters for various versions of th

[Full-disclosure] Cacti 0.8.7a Multiple Vulnerabilities

2008-02-12 Thread s4tan
s attack is mitigated by the PHP framework that doesn't permits CR or LF injection anymore in the header function. IV. DETECTION Cacti 0.8.7a and possibly earlier versions are vulnerable. V. WORKAROUND Proper input validation will fix the vulnerabilities. Magic quotes ON will protect you against

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Simon Smith
Anyone find any info on how or why Dude passed on? [EMAIL PROTECTED] wrote: > On Tue, 12 Feb 2008 03:21:20 EST, Keith Kilroy said: > >> The only box that is safe is the one unplugged hdd removed and >> destroyed and rest of system locked in a closet. > > Actually, no. :) Some clever guys at UIU

[Full-disclosure] [ GLSA 200802-05 ] Gnumeric: User-assisted execution of arbitrary code

2008-02-12 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200802-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: [Full-disclosure] Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0

2008-02-12 Thread Luigi Auriemma
[EMAIL PROTECTED] wrote: > http://www.safenet-inc.com/support/tech/sentinel.asp# Yes I got the files from there. You can see the changing of the version from the Version tab in the properties of the executables. The version change from 7.4.0.0 for Protection and 1.0.3.0 for the Keys server to 7.4

[Full-disclosure] iDefense Security Advisory 02.12.08: ClamAV libclamav PE File Integer Overflow Vulnerability

2008-02-12 Thread iDefense Labs
iDefense Security Advisory 02.12.08 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 12, 2008 I. BACKGROUND Clam AntiVirus is a multi-platform GPL anti-virus toolkit. ClamAV is often integrated into e-mail gateways and used to scan e-mail traffic for viruses. It supports virus scanning

Re: [Full-disclosure] Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0

2008-02-12 Thread jfvanmeter
Interresting, how are you running the Get command? Is safenet installed on a workstation or server? --John -- Original message -- From: Luigi Auriemma <[EMAIL PROTECTED]> > [EMAIL PROTECTED] wrote: > > Hello everyone, was the server rebooted after the patch was i

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Valdis . Kletnieks
On Tue, 12 Feb 2008 17:38:07 +0530, Abilash Praveen said: > Ok - I may not be able to lock in the SSH to a particular IP, but can > ofcourse try port-knocker and a non-password-based SSH. I will research a > bit about these as i'm not very familiar with a port-knocker and a > non-password-based SSH

Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Valdis . Kletnieks
On Mon, 11 Feb 2008 23:14:00 PST, Andrew A said: > oh look, the full disclosure demagogue parade is here to feign sympathy for > a fellow useless IT drone who also never found employment in the information > security industry http://antivirus.about.com/b/2008/02/11/rip-dude.htm Justin Polazzo, a

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Valdis . Kletnieks
On Tue, 12 Feb 2008 03:21:20 EST, Keith Kilroy said: > The only box that is safe is the one unplugged hdd removed and > destroyed and rest of system locked in a closet. Actually, no. :) Some clever guys at UIUC managed to get a quantum CPU that wasn't powered on to do some calculations *anyhow*:

[Full-disclosure] FaceBook ImageUploader4.1.OCX Stack Buffer Overflow Vulnerability

2008-02-12 Thread Dror
FaceBook ImageUploader4.1.OCX Stack Buffer Overflow Vulnerability Release Date: Feb 11, 2008 Date Reported: Dec 23, 2007 Severity: High (Remote Code Execution) Vendor: FaceBook (originally Aurigma) Systems Affected: FaceBook Image Uploader 5.0.14.0 and earlier (Microsoft Windows only) Overvi

Re: [Full-disclosure] "Andrew A" -> Benjamin Trott, Six Apart/Live Journal hacker, and belligerent anti-gay remarks?

2008-02-12 Thread Andrew A
"He wanted to meet me at the art gatherings in San Francisco's 20GOTO10, and give me a piece of his mind" Just to let everyone know, this is complete bullshit. I'd rather spend my time fucking my wife than meet some faggot with aspergers syndrome. However as a response to this post http://archives.

Re: [Full-disclosure] TROLLS WITH NOT RESPECT

2008-02-12 Thread Fredrick Diggle
Not having a mustache capable of sustaining an entire ecosystem does not make Fredrick Diggle a troll. On Feb 12, 2008 5:14 PM, <[EMAIL PROTECTED]> wrote: > On Tue, 12 Feb 2008 17:05:14 CST, Randy Mueller said: > > STOP FEEDING THESE IDIOT TROLLS > > Many would claim, based on the message you're

Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread evilrabbi
RIP JP. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0

2008-02-12 Thread jfvanmeter
Were did you get version SafeNet Sentinel Protection and Key Server 7.4.1.0? All i see on the website is 7.4.0, and after I install the patch and reboot, it still shows as version 7.4.0. http://www.safenet-inc.com/support/tech/sentinel.asp# Thanks --John -- Original message --

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread dudevanwinkle
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 NP FULL-DISCLOSURE ALWAYS IS HAPPY TO SUPPORT AL QAEDA On Tue, 12 Feb 2008 03:51:02 -0500 Abilash Praveen <[EMAIL PROTECTED]> wrote: >Hello experts, > >Thank for all your rude, honest, polite, helpful replies. I'm >really glad I >posted here and most

[Full-disclosure] rPSA-2008-0052-1 kernel

2008-02-12 Thread rPath Update Announcements
rPath Security Advisory: 2008-0052-1 Published: 2008-02-12 Products: rPath Linux 1 rPath Appliance Platform Linux Service 1 Rating: Critical Exposure Level Classification: Local Root Deterministic Privilege Escalation Updated Versions: [EMAIL PROTECTED]:1-vmware/2.6.22.18-0.1-1

Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread dudevanwinkle
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 WERD On Mon, 11 Feb 2008 17:28:30 -0500 Prohest <[EMAIL PROTECTED]> wrote: >This is tragic, my thoughts are with those family & friends left >grieving behind. > >He will be missed. > >RIP > >Prohest > >On 2/11/08, Gadi Evron <[EMAIL PROTECTED]> wrote:

Re: [Full-disclosure] Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0

2008-02-12 Thread Luigi Auriemma
[EMAIL PROTECTED] wrote: > Hello everyone, was the server rebooted after the patch was installed? Naturally, in fact before the patch I was able to exploit the directory traversal with both slash and backslash while after having applied the fix only when I use the backslash. I have also uninstall

Re: [Full-disclosure] [funsec] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread dudevanwinkle
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 MY COCK IN DONNAS ASS MAKES HER CRY AND BLEED MAYBE YOU NEED DIVORCE THE COW On Tue, 12 Feb 2008 08:02:03 -0500 Chris Blask <[EMAIL PROTECTED]> wrote: >This so sucks... > >Over the holidays I was discusing this list with Donna (who >tolerates my fasci

Re: [Full-disclosure] Directory traversal in SafeNet Sentinel Protection and Key Server 7.4.1.0

2008-02-12 Thread jfvanmeter
Hello everyone, was the server rebooted after the patch was installed? I just setup a SafeNet Sentinel Protection Server SafeNet Sentinel Keys Server 7.4 and the exploit worked. Once I isntalled the patch, and rebooted, when I try to run the exploit the server repsonds with "The Page Cannot

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Keith Kilroy
Tonnerre, My apologies if I suggested you did not have it setup right or anything bad about your abilities. That was not my intention. I've just had good luck with it. That's the bad part of email as a medium. You have earned my respect. As far as Heat I was speaking more of kiln, molding i

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Tonnerre Lombard
Salut, [EMAIL PROTECTED], On Tue, 12 Feb 2008 08:17:13 -0500 (EST), [EMAIL PROTECTED] wrote: > been using since begining of project, but requires a lot of learning > to setup properly" and as I stated nothing is foolproof or totally > secure. Other measures need deployed as well such as an applica

[Full-disclosure] Article: FaceBook ImageUploader4.1.OCX Stack Buffer Overflow Vulnerability

2008-02-12 Thread Dror
Best, Dror Chevion Founder & Managing Director MC Group Ltd. Aviv Tower 7 Jabotinsky St. Ramat Gan Israel 52520 Tel: +972-73-223 Fax: +972-77-7050013 http://www.MC-Grp.com <>FaceBook ImageUploader4.1.OCX Stack Buffer Overflow Vulnerability

[Full-disclosure] [ GLSA 200802-06 ] scponly: Multiple vulnerabilities

2008-02-12 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200802-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Keith Kilroy
Oh yeah be sure not to use html formatted emails to post... Like I accidently just did had wrong damn client up. That happens with not enough sleep or coffee :( link within has now been disabled On Feb 12, 2008, at 8:17 AM, [EMAIL PROTECTED] wrote: Hello Tonnerre, "I personally think tha

[Full-disclosure] i tried but the whitehouse were having none of it

2008-02-12 Thread worried security
Forwarded conversation Subject: dude vanwinkle From: n3td3v <[EMAIL PROTECTED]> Date: Feb 12, 2008 12:18 AM To: [EMAIL PROTECTED], [EMAIL PROTECTED] i think you should mention dude vanwinkle in your news brief, i don't care about your usual whitehouse journalistic publis

Re: [Full-disclosure] [funsec] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Chris Blask
This so sucks... Over the holidays I was discusing this list with Donna (who tolerates my fascination with technology, but does not share it) and reading her some of the threads. What made the conversation interesting enough to keep her attention was not the topics, it was the people involved.

Re: [Full-disclosure] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Prohest
This is tragic, my thoughts are with those family & friends left grieving behind. He will be missed. RIP Prohest On 2/11/08, Gadi Evron <[EMAIL PROTECTED]> wrote: > I was just woken up with the news of Justin's death and am unsure what to > think or how to respond--I need to. I feel things are

Re: [Full-disclosure] [funsec] RIP Dude VanWinkle

2008-02-12 Thread Blanchard_Michael
Wholly shit, did he really pass on or just his list persona? Damn, that sucks when someone you know dies :-( I know not everyone liked him on the lists, but it's still sad when one of -us- passes on :-( JP -- he who shall be missed, rest in peace. Mike B - Original Message --

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread keith
Hello Tonnerre, "I personally think that Snort is snake oil." It can be a pain to get setup and to actually reduce false positives, been using since begining of project, but requires a lot of learning to setup properly" and as I stated nothing is foolproof or totally secure. Other measures need

Re: [Full-disclosure] [inbox] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Joey Mengele
On Mon, 11 Feb 2008 21:33:24 -0500 Exibar <[EMAIL PROTECTED]> wrote: > > Rest in peace JP, the universe is now yours to explore... > > Exibar > He is dead you ignorant cunt, he did not become an astronaut. -- Click for free info on online degrees and make up to $150K/ year. http://tagline.h

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Michael Simpson
On 2/12/08, Abilash Praveen <[EMAIL PROTECTED]> wrote: > Ok - I may not be able to lock in the SSH to a particular IP, but can > ofcourse try port-knocker and a non-password-based SSH. I will research a > bit about these as i'm not very familiar with a port-knocker and a > non-password-based SSH ye

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Tonnerre Lombard
Salut, Keith, On Tue, 12 Feb 2008 03:21:20 -0500, Keith Kilroy wrote: > Lock down your server so only needed ports are open, move ssh above > the norm scan range, setup SNORT and learn how to use it, harden and > update all progz. Check for web app holes.buffer overflows etc. While I agre

Re: [Full-disclosure] Brute force attack - need your advice

2008-02-12 Thread Abilash Praveen
Ok - I may not be able to lock in the SSH to a particular IP, but can ofcourse try port-knocker and a non-password-based SSH. I will research a bit about these as i'm not very familiar with a port-knocker and a non-password-based SSH yet. Thanks for your advice again. Thanks to Keith too. :o) On

[Full-disclosure] death of "Dude" brings out the "Rude"

2008-02-12 Thread Randy Mueller
Wow. It is amazing to read the out right disrespect for another's life and rights. I'm stunned. Almost speechless. Great! Randy M ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

Re: [Full-disclosure] [funsec] in Memory of Dude VanWinkle / Justin Plazzo

2008-02-12 Thread Simon Smith
What does it take in terms of resources to run a list like Full Disclosure? Does anyone have a head count or a list of resources? -- - simon -- http://www.snosoft.com ___ Full-Disclosure - We believe in it. Charter: http://lists.