[Full-disclosure] [SECURITY] [DSA 1547-1] New OpenOffice.org packages fix arbitrary code execution

2008-04-17 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1547-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze April 17th, 2008

[Full-disclosure] Announcement - DeepSec Conference 2008, Nov 11-14 2008

2008-04-17 Thread DeepSec Conference
== Announcement and 1st Call for Papers == We are happy to invite you to the second DeepSec In-Depth Security Conference from November 11th to 14th at the Imperial Riding School Renaissance Hotel in Vienna. Pre-registration for conference guests and the call for papers website will be open from

[Full-disclosure] [ GLSA 200804-16 ] rsync: Execution of arbitrary code

2008-04-17 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200804-17 ] Speex: User-assisted execution of arbitrary code

2008-04-17 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200804-18 ] Poppler: User-assisted execution of arbitrary code

2008-04-17 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security AdvisoryGLSA 200804-18:02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] ENOUGH WITH FUCKING NETDEV ALREADY!!!!

2008-04-17 Thread [EMAIL PROTECTED]
That is all. mail2web.com – What can On Demand Business Solutions do for you? http://link.mail2web.com/Business/SharePoint ___ Full-Disclosure - We believe in it. Charter: http://list

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread n3td3v
On Thu, Apr 17, 2008 at 5:25 AM, <[EMAIL PROTECTED]> wrote: > sorry Dear...Now whatever u'll do people won't support u. I know a lot of hackers who have web app sec bugs, so I don't know what you mean. > Well it's nice idea for "Awareness Day" Thanks. __

Re: [Full-disclosure] ENOUGH WITH FUCKING NETDEV ALREADY!!!!

2008-04-17 Thread p0liX
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 YES. I couldn't agree more. ENOUGH!! [EMAIL PROTECTED] wrote: | That is all. | | | mail2web.com – What can On Demand Business Solutions do for you? | http://link.mail2web.com/Busi

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread Razi Shaban
> On Thu, Apr 17, 2008 at 5:25 AM, <[EMAIL PROTECTED]> wrote: > > sorry Dear...Now whatever u'll do people won't support u. > > > I know a lot of hackers who have web app sec bugs, so I don't know > what you mean. What the hell are you talking about? How does that have anything to do with w

Re: [Full-disclosure] ENOUGH WITH FUCKING NETDEV ALREADY!!!!

2008-04-17 Thread Razi Shaban
n3td3v has been trolling on and off from 2005. If you think any amount of flaming will get him off of fd, you are, sadly, mistaken. I've settled on trying to take his posts as amusement, and for your sanity's sake I suggest you do the same. -- Razi On 4/17/08, p0liX <[EMAIL PROTECTED]> wrote: >

Re: [Full-disclosure] ENOUGH WITH FUCKING NETDEV ALREADY!!!!

2008-04-17 Thread Jeremy O'Brien
Or we could all just filter him and stop responding to his messages :P I know that would make my inbox quite a bit cleaner at least. On Thu, Apr 17, 2008 at 11:22 AM, Razi Shaban <[EMAIL PROTECTED]> wrote: > n3td3v has been trolling on and off from 2005. > If you think any amount of flaming will

Re: [Full-disclosure] ENOUGH WITH FUCKING NETDEV ALREADY!!!!

2008-04-17 Thread news
Never. n3td3v is a comic genius. The fact that he's driven half of this list mad makes him star in my book. Renski > Or we could all just filter him and stop responding to his messages :P I > know that would make my inbox quite a bit cleaner at least. > > On Thu, Apr 17, 2008 at 11:22 AM, Razi Sh

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread n3td3v
On Thu, Apr 17, 2008 at 4:08 PM, Razi Shaban <[EMAIL PROTECTED]> wrote: > > On Thu, Apr 17, 2008 at 5:25 AM, <[EMAIL PROTECTED]> wrote: > > > sorry Dear...Now whatever u'll do people won't support u. > > > > > > I know a lot of hackers who have web app sec bugs, so I don't know > > what

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread Valdis . Kletnieks
On Thu, 17 Apr 2008 16:51:56 BST, n3td3v said: > It means people will be posting web app sec bugs on may the 1st, > regardless of what n3td3v enemies say. They'll also likely post bugs on May 2, May 3, April 30, and various other days in the coming weeks. pgpTPobaQrM8Z.pgp Description: PGP sign

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread n3td3v
On Thu, Apr 17, 2008 at 5:05 PM, <[EMAIL PROTECTED]> wrote: > On Thu, 17 Apr 2008 16:51:56 BST, n3td3v said: > > > It means people will be posting web app sec bugs on may the 1st, > > regardless of what n3td3v enemies say. > > They'll also likely post bugs on May 2, May 3, April 30, and various

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread mcwidget
> > Valdis is trying to confuse everyone and derail it, we must ignore > what Valdis says. > > n3td3v I don't want to rain on your parade as you actually seem to be trying to do something positive here but I don't get it. You're trying to attract guys who are sitting on web app bugs and haven't

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread Valdis . Kletnieks
On Thu, 17 Apr 2008 19:11:20 BST, mcwidget said: > 1. We wont call you lame/weak if you disclose on this day. > 2. You'll get a mention on netdev's mailing list/website > > Maybe it's just me but I'm not seeing the attraction? One has to wonder how many will choose some other date specifically s

Re: [Full-disclosure] ENOUGH WITH FUCKING NETDEV ALREADY!!!!

2008-04-17 Thread josh
I just filter him now, every variation of his name(s) and signatures. Sent from my BlackBerry® smartphone with SprintSpeed -Original Message- From: [EMAIL PROTECTED] Date: Thu, 17 Apr 2008 16:35:17 To:"Jeremy O'Brien" <[EMAIL PROTECTED]> Cc:full-disclosure@lists.grok.org.uk Subject: Re

[Full-disclosure] [USN-603-1] poppler vulnerability

2008-04-17 Thread Kees Cook
=== Ubuntu Security Notice USN-603-1 April 17, 2008 poppler vulnerability CVE-2008-1693 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6

[Full-disclosure] [USN-603-2] KOffice vulnerability

2008-04-17 Thread Kees Cook
=== Ubuntu Security Notice USN-603-2 April 17, 2008 koffice vulnerability CVE-2008-1693 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread Garrett M. Groff
Fools! Do you really want to be added to Netdev's "List of Enemies To Be Smitten"? More on what happens to Netdev's enemies here: http://en.wikipedia.org/wiki/The_Fate_Of_N3tD3v_Enemies - G - Original Message - From: <[EMAIL PROTECTED]> To: "mcwidget" <[EMAIL PROTECTED]> Cc: Sent: Thu

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread Valdis . Kletnieks
On Thu, 17 Apr 2008 15:03:11 EDT, "Garrett M. Groff" said: > Fools! Do you really want to be added to Netdev's "List of Enemies To Be > Smitten"? All *I* did was point out that people with actual exploits might be enemies of "the n3td3v agenda", whatever the heck that is. If n3td3v wants to get

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread Garrett M. Groff
FYI - my previous email was entirely facetious. To my knowledge, a list entitled "List of Enemies To Be Smitten" does not exist (yet?) and the referenced Wikipedia page is merely a fabrication. - G On Thu, 17 Apr 2008 15:03:11 EDT, "Garrett M. Groff" said: > Fools! Do you really want to be ad

Re: [Full-disclosure] Web Application Security Awareness Day

2008-04-17 Thread RandallMan
-- Message: 12 Date: Thu, 17 Apr 2008 16:51:56 +0100 From: n3td3v <[EMAIL PROTECTED]> Subject: Re: [Full-disclosure] Web Application Security Awareness Day To: full-disclosure@lists.grok.org.uk, n3td3v <[EMAIL PROTECTED]> Message-ID: <[EMAIL PROTECTED]> C

[Full-disclosure] [SECURITY] [DSA 1549-1] New clamav packages fix several vulnerabilities

2008-04-17 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1549-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff April 17, 2008

Re: [Full-disclosure] Secunia Research: Lotus Notes Folio Flat File Parsing Buffer Overflows

2008-04-17 Thread Juha-Matti Laurio
When examining advisory SA28209 http://secunia.com/advisories/28209/ it points to reports listing vulnerabilities in several products and versions (Verity KeyView Viewer SDK 7.x, 8.x, and 9.x) etc. Secunia's Web site lists advisories by a specific product too, see http://secunia.com/product/5570/

[Full-disclosure] Vulnerability Release: CKFD002-ISO9000 "Dave Aitel Sells Exploits to the Chinese"

2008-04-17 Thread Chat Krew
___ ___ _ ____ ___ ( \|\ /|( ___ )\__ __/| \/\( )( \|\ /| | (\/| ) ( || ( ) | ) ( | \ / /| ()|| (\/| ) ( | | | | (___) || (___) | | | | (_/ / | ()|| (__| | _ | | |

[Full-disclosure] ADVISORY: OPENSSHD EXPLOIT / RISK: EXTREMELY HIGH

2008-04-17 Thread Micheal Chatner
How does it feel being a bunch of fat gay goth losers who sit around and jerk off to web app code all day looking for a dumbass injection exploit to jerk off to at a security conference with other fat gay goth jerkoff losers who are fat gay and stupid. You faggots don't even know how to chat. I h

[Full-disclosure] Vulnerability Release: CKFD002-ISO9000 "Dave Aitel Sells Exploits to the Chinese"

2008-04-17 Thread Chat Krew
___ ___ _ ____ ___ ( \|\ /|( ___ )\__ __/| \/\( )( \|\ /| | (\/| ) ( || ( ) | ) ( | \ / /| ()|| (\/| ) ( | | | | (___) || (___) | | | | (_/ / | ()|| (__| | _ | | |

[Full-disclosure] Oracle - Access Control Bypass using Direct Path Export (DB12)

2008-04-17 Thread Amichai Shulman
Full details of the vulnerability DB12 fixed in the Oracle April 2008 CPU can be found in our advisory at http://www.imperva.com/resources/adc/adc_advisories_oracle-dbms-04172008 .html Amichai Shulman CTO 125 Menachem Begin St. Tel Aviv 67010 Israel (972) 3-6840103 Office (972) 54-5885083 Mobi

[Full-disclosure] [SECURITY] [DSA 1550-1] New suphp packages fix local privilege escalation

2008-04-17 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1550-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff April 17, 2008

[Full-disclosure] iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice OLE DocumentSummaryInformation Heap Overflow Vulnerability

2008-04-17 Thread iDefense Labs
iDefense Security Advisory 04.17.08 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 17, 2008 I. BACKGROUND OpenOffice is an open-source desktop office suite for many of today's popular operating systems. Object Linking and Embedding (OLE) is a proprietary binary file format developed b

[Full-disclosure] iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice EMF EMR_BITBLT Record Integer Overflow Vulnerability

2008-04-17 Thread iDefense Labs
iDefense Security Advisory 04.17.08 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 17, 2008 I. BACKGROUND OpenOffice is an open-source desktop office suite for many of today's popular operating systems. One of the file formats that OpenOffice supports is Windows Enhanced Metafile (EMF

[Full-disclosure] iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice QPRO Multiple Heap Overflow Vulnerabilities

2008-04-17 Thread iDefense Labs
iDefense Security Advisory 04.17.08 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 17, 2008 I. BACKGROUND OpenOffice is an open-source desktop office suite for many of today's popular operating systems. One of the file formats that OpenOffice supports is Quattro Pro (QPRO). This forma

[Full-disclosure] iDefense Security Advisory 04.17.08: Multiple Vendor OpenOffice QPRO File Parsing Integer Underflow Vulnerability

2008-04-17 Thread iDefense Labs
iDefense Security Advisory 04.17.08 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 17, 2008 I. BACKGROUND OpenOffice is an open-source desktop office suite for many of today's popular operating systems. One of the file formats that OpenOffice supports is Quattro Pro (QPRO). This forma

[Full-disclosure] CKFD002-ISO9000

2008-04-17 Thread jo jo
___ ___ _ ____ ___ ( \|\ /|( ___ )\__ __/| \/\( )( \|\ /| | (\/| ) ( || ( ) | ) ( | \ / /| ()|| (\/| ) ( | | | | (___) || (___) | | | | (_/ / | ()|| (__| | _ | | |

[Full-disclosure] [ GLSA 200804-19 ] PHP Toolkit: Data disclosure and Denial of Service

2008-04-17 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200804-20 ] Sun JDK/JRE: Multiple vulnerabilities

2008-04-17 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ MDVSA-2008:088 ] - Updated clamav packages fix multiple vulnerabilities

2008-04-17 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:088 http://www.mandriva.com/security/ ___

[Full-disclosure] [ MDVSA-2008:089 ] - Updated poppler packages fix vulnerability

2008-04-17 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:089 http://www.mandriva.com/security/ ___

Re: [Full-disclosure] Secunia Research: Lotus Notes Folio Flat File Parsing Buffer Overflows

2008-04-17 Thread reepex
I find it funny you are the one to complain about too many advisories when you spam the list with sprintf and strcpy bugs you grepped for in random applications everyday On Tue, Apr 15, 2008 at 9:20 AM, Luigi Auriemma <[EMAIL PROTECTED]> wrote: > > Autonomy Keyview Folio Flat File Parsing Buffer