[Full-disclosure] n3td3v.com

2008-05-29 Thread Sec Guy
I just saw n3td3v.com up for sale on sedo... https://sedo.com/search/details.php4?domain=n3td3v.com&tracked=&partnerid=&language=us -SecGuy ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Ho

[Full-disclosure] Request for Information on Exploit 'Novell eDirectory evtFilteredMonitorEventsRequest() function Buffer Overflow vulnerability'

2008-05-29 Thread M P Sairam
Hi, I'm developing a tool for testing the effectiveness of IPS/IDS devices against various exploits. I could not find any working Poc for this particular vulnerability. Please help me out with any information about any working exploit for this vulnerability or Poc. Details: Explo

[Full-disclosure] Apple Mail Denial of Service Vulnerability (with bonus IBM Lotus Notes DoS!)

2008-05-29 Thread David Wharton
***Summary*** A maliciously crafted e-mail message can cause a denial of service in multiple versions of the Apple Mail email client. ***Scope*** Apple Mail version 3.1 (914/915) Apple Mail version 3.2 (919/919.2) Note: other versions of this product may be vulnerable as well; I have not t

[Full-disclosure] Greetz security community members

2008-05-29 Thread n3td3v
Its time to come over and to my place and post some messages ;-) http://n3td3v.googlepages.com/ n3td3v predictz Sebastian Muniz of CORE Security Technologies is about to release his Cisco IOS rootkit presentation to the web. n3td3v says because Cisco released an out of cycle patch release last w

Re: [Full-disclosure] Thank you for help with management.

2008-05-29 Thread Valdis . Kletnieks
On Thu, 29 May 2008 14:07:57 +0200, Claus Bitten said: > I have read a lot of good reasons why this server is a bad idea, but how > about making it work? The difficulty in "making it work" is directly related to how "work" is defined. You need a *clear* idea of why the server is there, what busi

[Full-disclosure] [ GLSA 200805-23 ] Samba: Heap-based buffer overflow

2008-05-29 Thread Tobias Heinlein
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200805-23 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] [ GLSA 200805-22 ] MPlayer: User-assisted execution of arbitrary code

2008-05-29 Thread Tobias Heinlein
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200805-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: [Full-disclosure] Thank you for help with management.

2008-05-29 Thread Claus Bitten
Hi, I have read a lot of good reasons why this server is a bad idea, but how about making it work? With all costs involved? (seperated network segment, own firewall protection with deep inspection, access-proxy with virus-scan etc. running in front of the unknow fileserver...) >From my experience

[Full-disclosure] Secunia Research: Samba "receive_smb_raw()" Buffer Overflow Vulnerability

2008-05-29 Thread Secunia Research
== Secunia Research 28/05/2008 - Samba "receive_smb_raw()" Buffer Overflow Vulnerability - == Table of Contents Affected Software..

[Full-disclosure] Secunia Research: imlib2 PNM and XPM Buffer Overflow

2008-05-29 Thread Secunia Research
== Secunia Research 29/05/2008 - imlib2 PNM and XPM Buffer Overflows - == Table of Contents Affected Software