[Full-disclosure] [ MDVSA-2008:164 ] python

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:164 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2008:163 ] python

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:163 http://www.mandriva.com/security/

Re: [Full-disclosure] question

2008-08-07 Thread James Matthews
Use Immunity Debugger and look at the ads section On Thu, Aug 7, 2008 at 1:22 PM, Dennis Yurichev <[EMAIL PROTECTED]> wrote: > Hello, > > I'm sorry, I wrote my question incorrectly. > > I meant, who among software companies would like to know about > vulnerabilities in their own products and *als

Re: [Full-disclosure] No subject

2008-08-07 Thread James Matthews
It;s the new facebook friend adder On Wed, Aug 6, 2008 at 3:11 PM, <[EMAIL PROTECTED]> wrote: > Not just Rouge apps, it's much more widespread: other colors such > as magenta, mauve, fuschia, and even the extremes of pink and > purple can also be impacted. > > On Wed, Aug 6, 2008 at 2:56 PM, John

Re: [Full-disclosure] question

2008-08-07 Thread James Matthews
Sure there are many sell it to Macfee :) On Thu, Aug 7, 2008 at 8:56 AM, <[EMAIL PROTECTED]> wrote: > On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said: > > > Are there any well-known vendors who would like to buy 0day exploits > > for their own products? > > Yes, there are. Next ques

[Full-disclosure] [ MDVSA-2008:162 ] qemu

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:162 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2008:161 ] rxvt

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:161 http://www.mandriva.com/security/

[Full-disclosure] question

2008-08-07 Thread Dennis Yurichev
Hello, I'm sorry, I wrote my question incorrectly. I meant, who among software companies would like to know about vulnerabilities in their own products and *also* would like to pay for this? It's possible to work with them as independent security researcher? -- My PGP public key: http://yurich

Re: [Full-disclosure] question

2008-08-07 Thread Valdis . Kletnieks
On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said: > Are there any well-known vendors who would like to buy 0day exploits > for their own products? Yes, there are. Next question? pgper4x7wU2j2.pgp Description: PGP signature ___ Full-Disclo

[Full-disclosure] When will they ever get it !?!?!?!

2008-08-07 Thread wilder_jeff Wilder
As you will all know I am one never to post, but I had to bring this to a discussion point. I received an e-mail today from the Gallup Journal inviting me to join their LEET management spam list. Within this inventation, they had provided me with my username (Ahhh how nice) and my password (

[Full-disclosure] question

2008-08-07 Thread Dennis Yurichev
Hello, Are there any well-known vendors who would like to buy 0day exploits for their own products? -- My PGP public key: http://yurichev.com/dennis.yurichev.asc pgptYdK7aju9F.pgp Description: PGP signature ___ Full-Disclosure - We believe in it.

Re: [Full-disclosure] [funsec] facebook messages worm

2008-08-07 Thread Gadi Evron
On Thu, 7 Aug 2008, Juha-Matti Laurio wrote: > It has the following mechanism according to McAfee: > http://vil.nai.com/vil/content/v_148955.htm > > They use name W32/Koobface.worm and Kaspersky (Kaspersky Labs originally > discovered this threat) uses name Net-Worm.Win32.Koobface.b. This is goin

[Full-disclosure] facebook messages worm

2008-08-07 Thread Gadi Evron
Hi all. There's a facebook (possibly worm) something malicious sending fake messages from real users (friends). The sample also has a remote drop site (verified by someone who shall remain nameless). This is possibly zlob, not verified. Thanks Nick Bilogorskiy for his help. Infection sites se

Re: [Full-disclosure] [funsec] facebook messages worm

2008-08-07 Thread Gadi Evron
I am constantly updating on this on my twitter account to avoid list clutter: http://twitter.com/gadievron You can watch the infection live on a web counter from the hosting provider that the worm points to. This thing is fast-spreading. Gadi. On Wed, 6 Aug 2008, Gadi Evron wrote: >

[Full-disclosure] No subject

2008-08-07 Thread az-guy
Not just Rouge apps, it's much more widespread: other colors such as magenta, mauve, fuschia, and even the extremes of pink and purple can also be impacted. On Wed, Aug 6, 2008 at 2:56 PM, John C. A. Bambenek, GCIH, CISSP <[EMAIL PROTECTED]> wrote: What's the infection vector? URL Link?

Re: [Full-disclosure] [funsec] facebook messages worm

2008-08-07 Thread Gadi Evron
http://www.kaspersky.com/news?id=20757567 7 days of seeding to impact. Gadi. On Wed, 6 Aug 2008, Gadi Evron wrote: > Hi all. > > There's a facebook (possibly worm) something malicious sending fake > messages from real users (friends). > > The sample also has a remote drop site (verified

[Full-disclosure] infected file ( can someone please report and take it down ? )

2008-08-07 Thread Dr. Mark A. Baiter [Chief Scatological Consultant]
File link http://web292.webbox443.server-home.org/install.exe 77 kb - packed install.exe analysis link http://www.virustotal.com/analisis/4ebbd8e0045798cee6e505f79fe88671 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disc

[Full-disclosure] Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting

2008-08-07 Thread Marc Bevand
Rapid7 Advisory R7-0033 Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting Discovered: July 25, 2008 Published: August 5, 2008 Revision: 1.1 http://www.rapid7.com/advisories/R7-0033 CVE: CVE-2008-2939 1. Affected system(s): KNOWN VULNERABLE: o Apac

[Full-disclosure] Whitepaper: DNS zone redelegation

2008-08-07 Thread Bernhard Mueller
Newly emerging techniques of DNS cache poisoning have caused quite a stir recently, prompting security researchers to speculate on the nature of the issue, and naturally inducing press stunts by some individuals, including "accidential" information leaks and hasty exploit releases. Many other, more