Re: [Full-disclosure] sans handler gives out n3td3v e-mail to public

2008-03-21 Thread scott
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 n3td3v wrote: > On Fri, Mar 21, 2008 at 3:18 PM, Kern <[EMAIL PROTECTED]> wrote: >> Well . . . worried DOES have a good point . . . I think SANS dropped the >> ball on that, BUT I don't know if this is going to be a "media event". >> >> I have had a li

[Full-disclosure] Buffer-overflow in ASUS Remote Console 2.0.0.24

2008-03-21 Thread Luigi Auriemma
### Luigi Auriemma Application: ASUS Remote Console http://www.asus.com/999/html/share/9/icon/9/index.htm#asmb3 Versions: <= 2.0.0.24 Platforms:Windows Bug: buffer ove

[Full-disclosure] worried exposed on IRC again

2008-03-21 Thread Mister Swole
Exposed ... the truth behind worried and his script kiddiocy [15:49] * Now talking in ##kiddiots [15:55] someone actually asked for me? you mean I made a friend [15:55] yes worried, I believe your expertise [15:56] h4x0r, I am the leetest on the planet[15:49] * Now talking in ##kiddiots [15:5

[Full-disclosure] (no subject)

2008-03-21 Thread Mister Swole
Exposed ... the truth behind worried and his script kiddiocy [15:49] * Now talking in ##kiddiots [15:55] someone actually asked for me? you mean I made a friend [15:55] yes worried, I believe your expertise [15:56] h4x0r, I am the leetest on the planet [15:57] worried, I knew this the moment

Re: [Full-disclosure] sans handler gives out n3td3v e-mail to public

2008-03-21 Thread DUDE DUDERINO
For the love of everything sane, please seek medical attention, and grow up. On Fri, Mar 21, 2008 at 8:00 AM, n3td3v <[EMAIL PROTECTED]> wrote: > [15:49] * Now talking in ##security > [15:55] someone wants my attention > [15:55] worried, best way to make them go away: Don't give it to > them. >

[Full-disclosure] {securityreason.com}PHP 5 *printf() - Integer Overflow

2008-03-21 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [PHP 5.2.5 and prior : *printf() functions Integer Overflow ] Author: Maksymilian Arciemowicz (cXIb8O3) SecurityReason.com and SecurityReason.pl Date: - - Written: 01.03.2008 - - Public: 20.03.2008 SecurityReason Research SecurityAlert Id: 52 CVE-20

Re: [Full-disclosure] sans handler gives out n3td3v e-mail to public

2008-03-21 Thread n3td3v
On Fri, Mar 21, 2008 at 3:18 PM, Kern <[EMAIL PROTECTED]> wrote: > Well . . . worried DOES have a good point . . . I think SANS dropped the > ball on that, BUT I don't know if this is going to be a "media event". > > I have had a little dealing with various handlers (the few I have talked to > see

Re: [Full-disclosure] sans handler gives out n3td3v e-mail to public

2008-03-21 Thread Kern
Well . . . worried DOES have a good point . . . I think SANS dropped the ball on that, BUT I don't know if this is going to be a "media event". I have had a little dealing with various handlers (the few I have talked to seemed nice enough). But this is common; an employee using a written policy t

Re: [Full-disclosure] sans handler gives out n3td3v e-mail to public

2008-03-21 Thread Kurt Dillard
Thanks Paul! I wasn't looking forward to reading that wall of text!!! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Paul Schmehl Sent: Friday, March 21, 2008 11:38 AM To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] sans handler gives

Re: [Full-disclosure] sans handler gives out n3td3v e-mail to public

2008-03-21 Thread Paul Schmehl
To sum it all up nicely: Bozo with incredibly inflated sense of self-worth waits with bated breath for the world's media to pick up a story that no one but himself would ever care about. News at 11. Meanwhile, Britney Spears was spotted entering a grocery store in West Hollywood with kid in t

[Full-disclosure] sans handler gives out n3td3v e-mail to public

2008-03-21 Thread n3td3v
[15:49] * Now talking in ##security [15:55] someone wants my attention [15:55] worried, best way to make them go away: Don't give it to them. [15:56] njan, query me their IP address [15:57] worried, sorry, we don't hand out that sort of information. [15:57] you fail [15:58] where there is a w

Re: [Full-disclosure] When standards attack...

2008-03-21 Thread Florian Weimer
* H. D. Moore: > The WebKit folks just added client-side SQL database support: > > http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage/ > http://glazkov.com/blog/html5-gears-wrapper/ > > In addition to all of the existing attacks through a web browser, we can > now take in

[Full-disclosure] [MSA02240108] IE7 allows overwriting of several headers leading to Http request Splitting and smuggling.

2008-03-21 Thread Minded Security Research Labs
MSA01240108: IE7 allows overwriting of several headers leading to Http request Splitting and smuggling. Date: March 21th, 2008 Tested Versions: Internet Explorer 7.0.5730.11 Tested OS: Windows XP Professional SP2 Italian Minded Security ReferenceID: MSA02240108 Credits:

[Full-disclosure] [MSA01240108] IE7 Transfer-Encoding: chunked allows Request Splitting/Smuggling.

2008-03-21 Thread Minded Security Research Labs
MSA01240108: IE7 Transfer-Encoding: chunked allows Request Splitting/Smuggling. Date: March 21th, 2008 Tested Versions: Internet Explorer 7.0.5730.11 Tested OS: Windows XP Professional SP2 Italian Minded Security ReferenceID: MSA01240108 Credits: Discovery by

[Full-disclosure] [INFIGO-2008-03-07]: Surgemail 38k4 IMAP server remote stack overflow

2008-03-21 Thread infocus
INFIGO IS Security Advisory #ADV-2008-03-07 http://www.infigo.hr/en/ Title: Surgemail 38k4 IMAP server remote stack overflow Advisory ID: INFIGO-2008-03-07 Date: 2008-03-21 Advisory URL: http://www.infigo.hr/e