[Full-disclosure] .NET security audit

2008-05-28 Thread ding dong
hi can anyone recommend any good security and code audit software for ASP.NETand .NET applications? thanks ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

[Full-disclosure] OpenSSL 0.9.8h released

2008-05-28 Thread Mark J Cox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenSSL version 0.9.8h released === OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 0.9.8h of our open source

[Full-disclosure] rPSA-2008-0178-1 php php-mysql php-pgsql

2008-05-28 Thread rPath Update Announcements
rPath Security Advisory: 2008-0178-1 Published: 2008-05-27 Products: rPath Linux 1 Rating: Critical Exposure Level Classification: Remote System User Deterministic Unauthorized Access Updated Versions: [EMAIL PROTECTED]:1/4.3.11-15.17-1 [EMAIL PROTECTED]:1/4.3.11-15.17-1

[Full-disclosure] Assessing the Flash Zero Day Malware Campaign

2008-05-28 Thread Dancho Danchev
In regard to the currently active malware campaign exploiting a zero day vulnerability in Adobe Flash player, the following assessment provides a detailed analysis of the situation, including malicious domains to block, detectio rates for the exploit, and the passwords stealers served on behalf of

[Full-disclosure] [SECURITY] [DSA 1589-1] New libxslt packages fix execution of arbitrary code

2008-05-28 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1589-1 [EMAIL PROTECTED] http://www.debian.org/security/ Steve Kemp May 28, 2008

[Full-disclosure] Bypassing URL Authentication and Authorization with HTTP Verb Tampering

2008-05-28 Thread Arshan Dabirsiaghi
Internetizens, Many URL authentication and authorization mechanisms make security decisions based on the HTTP verb in the request. Many of these mechanisms work in a counter-intuitive way. This fact, in combination with some oddities in the way that both web and application servers handle

[Full-disclosure] Opera - heap based buffer overflow (CVE-2007-6521)

2008-05-28 Thread Alexander Klink
||| Security Advisory AKLINK-SA-2008-006 ||| ||| CVE-2007-6521 (CVE candidate)||| Opera - heap-based buffer overflow == Date released: 28.05.2007 Date reported:

[Full-disclosure] The Holy Grail

2008-05-28 Thread k1ngc0pe
|Where the nuts is my people (seed).| -- Boost your productivity with new office software. Click now! http://tagline.hushmail.com/fc/Ioyw6h4dJ1J9MwoYm9b0dErhcvBkUGP1qTxTqik7ELIrmfD3aWM1EM/ ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] rPSA-2008-0105-1 evolution

2008-05-28 Thread rPath Update Announcements
rPath Security Advisory: 2008-0105-1 Published: 2008-05-28 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: [EMAIL PROTECTED]:1/2.4.1-2.3-1 rPath Issue Tracking System:

[Full-disclosure] Cisco Security Advisory: CiscoWorks Common Services Arbitrary Code Execution Vulnerability

2008-05-28 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: CiscoWorks Common Services Arbitrary Code Execution Vulnerability Advisory ID: cisco-sa-20080528-cw Revision 1.0 For Public Release 2008 May 28 1600 UTC (GMT

Re: [Full-disclosure] CORE-2008-0126: Multiple vulnerabilities in iCal

2008-05-28 Thread Steven M. Christey
On Tue, 27 May 2008, security curmudgeon wrote: No mention of CVE-2008-1035 in the [CORE] advisory other than the header CVE name reference. BID seems to have split the three vulnerabilities, but given two of them the same CVE. CVE does not have descriptions open yet. The descriptions are

[Full-disclosure] [ MDVSA-2008:107 ] - Updated openssl package fixes denial of service vulnerabilities

2008-05-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:107 http://www.mandriva.com/security/

[Full-disclosure] wow.

2008-05-28 Thread Charles Morris
http://www.sowela.edu/elearning.html ... comments? -- Charles Morris [EMAIL PROTECTED], [EMAIL PROTECTED] Network Security Administrator, Software Developer Office of Computing and Communications Services, CS Systems Group Old Dominion University http://www.cs.odu.edu/~cmorris

Re: [Full-disclosure] wow.

2008-05-28 Thread Simon Smith
And people wonder why they get pwned all the time... Charles Morris wrote: http://www.sowela.edu/elearning.html ... comments? -- - simon -- http://www.snosoft.com ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] wow.

2008-05-28 Thread Arshan Dabirsiaghi
What's the issue here? I don't see any problem. Sincerely, swadabirsiaghi64 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Charles Morris Sent: Wednesday, May 28, 2008 4:38 PM To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] wow.

Re: [Full-disclosure] wow.

2008-05-28 Thread Arshan Dabirsiaghi
My young padawan missed the joke. We still love you. XOXO, Arshan -Original Message- From: Marcin Wielgoszewski [mailto:[EMAIL PROTECTED] Sent: Wednesday, May 28, 2008 5:06 PM To: Arshan Dabirsiaghi Cc: Charles Morris; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure]

Re: [Full-disclosure] wow.

2008-05-28 Thread Marcin Wielgoszewski
Logon to non-ssl site, password is same as username, username convention is described right on the site... On Wed, May 28, 2008 at 4:45 PM, Arshan Dabirsiaghi [EMAIL PROTECTED] wrote: What's the issue here? I don't see any problem. Sincerely, swadabirsiaghi64 -Original Message-

[Full-disclosure] [ MDVSA-2008:108 ] - Updated samba packages fix arbitrary code execution vulnerability

2008-05-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:108 http://www.mandriva.com/security/

[Full-disclosure] Repositories of CRLs?

2008-05-28 Thread CaseArmour.net Security Administrator
With the Debian OpenSSL fallout and my distrust of CAs in general, this seems like a great time to stuff Firefox full of CRLs. I found this page -- http://www.geekwisdom.com/dyn/node/189 -- listing a few major CRL sources, but that seems like it leaves out a bucket of the CAs that Firefox comes

Re: [Full-disclosure] wow.

2008-05-28 Thread Simon Smith
Marcin my man, go back and re-read the email... specifically his signature. If you don't get it... well then abandon all hope. ;] Marcin Wielgoszewski wrote: Logon to non-ssl site, password is same as username, username convention is described right on the site... On Wed, May 28, 2008 at

Re: [Full-disclosure] wow.

2008-05-28 Thread Marcin Wielgoszewski
Hahaha, it didn't click when I was writing the reply -- only right after I sent the email to the list did I say, o, duh. Funny one Arshan. :P On Wed, May 28, 2008 at 10:19 PM, Simon Smith [EMAIL PROTECTED] wrote: Marcin my man, go back and re-read the email... specifically his signature.