Re: [Full-disclosure] signature for DNS vulnerability?

2008-07-26 Thread crazy frog crazy frog
Thanks everyone for your help.it solved my problem. On Fri, Jul 25, 2008 at 11:52 PM, Albert R. Campa [EMAIL PROTECTED] wrote: check this out http://securabit.com/2008/07/24/latest-snort-signature-to-detect-dns-vulnerability/ On Fri, Jul 25, 2008 at 12:59 PM, crazy frog crazy frog [EMAIL

Re: [Full-disclosure] Dan Kaminsky Disclosure Methodology + Super Critical vulnerability disclosure in Windows

2008-07-26 Thread n3td3v
On Sat, Jul 26, 2008 at 6:02 AM, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Instead of criticizing someone for releasing an exploit (which is a bit like criticizing a cow for making milk) direct your attention to the fact that and industry of professional security researchers sat indian style

Re: [Full-disclosure] Vim: Insecure Temporary File Creation During Build: Arbitrary Code Execution

2008-07-26 Thread Jan Minář
On Fri, Jul 25, 2008 at 4:57 PM, Steven M. Christey [EMAIL PROTECTED] wrote: On Fri, 25 Jul 2008, [UTF-8] Jan MináÅ^Y wrote: The commands do not have to be written there between (1) and (2), they can be in the file long before the ./configure was started -- just because the script does

[Full-disclosure] [SECURITY] [DSA 1616-2] New clamav packages fix denial of service

2008-07-26 Thread Devin Carraway
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1616-2 [EMAIL PROTECTED] http://www.debian.org/security/ Devin Carraway July 26, 2008

Re: [Full-disclosure] Kaminsky's Law

2008-07-26 Thread Adam Chesnutt
That's retarded and I can only hope that this idea never turns into a law. We shouldn't be afraid of information. If the ideas are never decimated it doesn't matter the vulnerabilities still exist. Your essentially making it illegal to talk about the purple elephant in the living room, and that

[Full-disclosure] [SECURITY] [DSA 1618-1] New ruby1.9 packages fix several vulnerabilities

2008-07-26 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1618-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff July 26, 2008

[Full-disclosure] Media backlash begins against HD Moore and I)ruid

2008-07-26 Thread n3td3v
Joel Hruska from Ars Technica has said HD Moore and I)ruid are enterprising little children. New DNS exploit now in the wild and having a blast http://arstechnica.com/news.ars/post/20080726-new-dns-exploit-now-in-the-wild-and-having-a-blast.html All the best, n3td3v

Re: [Full-disclosure] DNS spoofing issue. Thoughts on

2008-07-26 Thread imipak
Hi Paul, The attack isn't impossible, it's more like 1% chance *per hour* that your IDS doesn't notice and stop the attempts. Big difference... The information that I have says it's statistically impossible *if* you are patched. It's not statistically impossible; it just takes 2^16 times

Re: [Full-disclosure] DNS spoofing issue. Thoughts on

2008-07-26 Thread Paul Schmehl
--On Saturday, July 26, 2008 8:34 PM +0100 imipak [EMAIL PROTECTED] wrote: The attack isn't impossible, it's more like 1% chance *per hour* that your IDS doesn't notice and stop the attempts. Big difference... The information that I have says it's statistically impossible *if* you are

Re: [Full-disclosure] DNS spoofing issue. Thoughts on

2008-07-26 Thread n3td3v
On Sat, Jul 26, 2008 at 11:10 PM, Paul Schmehl [EMAIL PROTECTED] wrote: there *is* such a thing as criminal negligence.) Could we not charge HD Moore and I)ruid with this? All the best, n3td3v ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] DNS spoofing issue. Thoughts on

2008-07-26 Thread Paul Szabo
But realizing that going from 11 seconds to (11 * 64512 =3D) 8.21 days is not a significant jump ... We had a browser pointed to an evil page making image requests for aaa.victim.com, aab.victim.com etc, for a few seconds. You cannot expect the browser to stay alive for days. Cheers, Paul

Re: [Full-disclosure] DNS spoofing issue. Thoughts on

2008-07-26 Thread Valdis . Kletnieks
On Sun, 27 Jul 2008 09:05:35 +1000, Paul Szabo said: But realizing that going from 11 seconds to (11 * 64512 =3D) 8.21 days is not a significant jump ... We had a browser pointed to an evil page making image requests for aaa.victim.com, aab.victim.com etc, for a few seconds. You cannot

Re: [Full-disclosure] [inbox] Re: DNS spoofing issue. Thoughts on

2008-07-26 Thread Exibar
Why are you so Jealous of HD Moore? He's done more for the community than you'll ever dream of doing. Didn't you promise to leave this list? Why are you still here anyway? Exibar -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of n3td3v Sent: