[Full-disclosure] [FD] password recovery for iwork docs

2010-02-12 Thread Dev Null
hi, all. i was wondering if you guys know of any password recovery software (free or otherwise) for recovering password-ed documents created from iWork 09 (Pages, Numbers, Keynote). been scouring the search engines a mile deep with no luck. posted the same query in Apple's discussion forum, t

[Full-disclosure] (no subject)

2010-02-12 Thread 751 ...?
___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Trustwave's SpiderLabs Security Advisory TWSL2010-001

2010-02-12 Thread David Byrne
I respectfully defend our statement as very realistic. The .Net exploit provided in the advisory is all that is required to work; no code-behind is required because the vulnerability related to "innerhtml" lies in the .Net code. The specific flaw is actually in System.Web.UI.HTMLControls.Html

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Valdis . Kletnieks
On Fri, 12 Feb 2010 16:54:48 +0100, Christian Sciberras said: > And who do you know what the bugs are? Risk modeling cannot solve this > kind of issue. Vulnerabilities aren't intentional. > It isn't intentional that I could piggyback a particular process and > get kernel access. Since vulnerabilit

[Full-disclosure] [ MDVSA-2010:036 ] webmin

2010-02-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2010:036 http://www.mandriva.com/security/

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread John Lightfoot
I think she wants to unsubscribe and doesn’t understand why she’s getting so much email from you. Rosa, if you’re trying to unsubscribe from this mailing list, go to https://lists.grok.org.uk/mailman/listinfo/full-disclosure, enter your email address at the bottom and click on the button that s

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Thor (Hammer of God)
OK, coconuts and flames aside, a serious question then... You know, in case I'm really missing something here... Let's move past the "probability of system compromise" in the sense of any one system and look to what I think you are really getting at, which is "of all the systems we have, some

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Thor (Hammer of God)
"Another Thing, your emails are arriving very followed to my buzon... Because?" I don't mean to be rude, but I just don't think this is going to work. If the most my translation engine gives me is something about coconuts, a "ladron" being put in my house, and emails following your buzon (what

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Valdis . Kletnieks
On Fri, 12 Feb 2010 13:09:55 +0100, Christian Sciberras said: > There's a time for finding fancy interesting numbers and a time to get > the system going with the least flaws possible. You don't want "the least flaws possible". We can get very close to zero flaws per thousand lines of code - but

Re: [Full-disclosure] Ron Livingston likes to touch little boys

2010-02-12 Thread Thor (Hammer of God)
Probably the same thing that original poster thought it had to do with a security mailing list, and the same thing that your reply to his reply has ;) The real question isn't "why is this on a mailing list" but "who cares if he's gay or not in the first place." Now if you pardon me, I need to g

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Luis Zaldivar
She said that we should create "something" unbreakable. Rosa, si no quieres recibir correos te puedes desusucribir, en la liga que dice hasta abajo. Aunque sospecho que ya te gusto estarlos leyendo jeje. Saludos. On 12/02/10 11:43, Thor (Hammer of God) wrote: "Throw a coconut"? Craig, did

Re: [Full-disclosure] Google Buzz and blind CSRF attacks

2010-02-12 Thread Kristian Erik Hermansen
On Fri, Feb 12, 2010 at 7:08 AM, Cody Robertson wrote: > Doesn't work for me It has been verified against multiple GMail users. You can try the direct link as well, but the issue is more effective within the "Buzz" interface. It doesn't look like you tested from a gmail account either (hawkhost

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Thor (Hammer of God)
> Well, yeah. I suppose it's *possible* that your system's weak password > system will allow a hacker to get in, and from your system hack into > the LHC and control it to spawn a black hole that eats the Earth. And > even that is still a finite, not "infinitum". I'll site the 2009 Verizon Busine

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Thor (Hammer of God)
"Throw a coconut"? Craig, did you throw a coconut at me? Or did Val throw a coconut at me? I feel a Monty Python joke coming on. Rosa, I don't speak Spanish, so I don't know what that really means. t From: Rosa Maria Gonzalez Pereira [mailto:analui...@hotmail.com] Sent: Friday, February 12,

Re: [Full-disclosure] Google Buzz and blind CSRF attacks

2010-02-12 Thread Cody Robertson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2/12/10 3:37 AM, Kristian Erik Hermansen wrote: > Greetings, > > Google Buzz is an incredibly useful new social networking service. > However, it is also quite vulnerable to persistent CSRF attacks when > data is pulled from external data feeds. F

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Rosa Maria Gonzalez Pereira
Saben, en verdad no se mucho de computacion, redes, prgramas y que se yo, pero por lo poco que he visto para una persona que le heche "coco" a esto pienso que si puede, despues de estudiarlo muy bien, meterse en lo que quiera, deberian de inventar algo o crear un sistema donde el "ladron" no

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Christian Sciberras
-"The problem is that you can't *guarantee* correct function. You *know* the damn thing will escape with bugs, no matter how hard you try. The question is how damaging the bugs are, and how much you want to spend preventing the bugs *through the entire life cycle - design, development, and deploye

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Valdis . Kletnieks
On Fri, 12 Feb 2010 14:37:25 +0100, Christian Sciberras said: > Let's presume 100k was spent on risk modeling, which actually is way > less then the norm, where was the gain again? Citation for "less than the norm", please? I've participated in lots of risk modeling sessions that cost *way* less

Re: [Full-disclosure] Ron Livingston likes to touch little boys

2010-02-12 Thread Rosa Maria Gonzalez Pereira
UUyyy no que feo... ¿por que hablan usando palabras "secretas"? Date: Fri, 12 Feb 2010 09:51:35 +0100 From: a...@experian.dk To: this1...@gmail.com; sahald...@ymail.com CC: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Ron Livingston likes to touch little boys y

Re: [Full-disclosure] ChemViewX ActiveX Control Mutliple Stack Overflows

2010-02-12 Thread Rosa Maria Gonzalez Pereira
Porque hablan tanto de vulnerabilidad y no entiendo como es que su informacion llega tan fácil a mi buzon de correo ___ > From: paul.cr...@security-assessment.com > To: full-disclosure@lists.grok.org.uk > Date: Fri, 12 Feb 2010 13:25:51 +1300 > Subj

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Christian Sciberras
Let's presume 100k was spent on risk modeling, which actually is way less then the norm, where was the gain again? Why exactly does the flaws have to be fixed economically instead of designing the system correctly in the first place? And on this same argument, why spend a huge amount of time (money

Re: [Full-disclosure] PHP 5.2.12/5.3.1 session.save_path safe_mode and open_basedir bypass

2010-02-12 Thread Stefan Esser
Hello, > safe_mode and open_basedir usually use small providers. Of course, this > is idiotic use safe_mode and open_basedir when we can bypass it via > symlinks. > The Hardened-PHP project already explained in 2006 that open_basedir and symlink do not mix. It is a not fixable design problem. So

Re: [Full-disclosure] Risk measurements

2010-02-12 Thread Christian Sciberras
Dr. Craig, Again, why aim at getting probabilistic results when a system is known to be flawed? Might as well use the budget on fix such a system, no? There's a time for finding fancy interesting numbers and a time to get the system going with the least flaws possible. Why should any entity bother

Re: [Full-disclosure] PHP 5.2.12/5.3.1 session.save_path safe_mode and open_basedir bypass

2010-02-12 Thread Maksymilian Arciemowicz
Christian Sciberras wrote: > What exactly are the implications of this? > Surely no one [website] accepts paths. > safe_mode and open_basedir usually use small providers. Of course, this is idiotic use safe_mode and open_basedir when we can bypass it via symlinks. -- Best Regards, -

[Full-disclosure] ChemViewX ActiveX Control Mutliple Stack Overflows

2010-02-12 Thread Paul Craig
(, ) (, . `.' ) ('.', ). , ('. ( ) ( (_,) .`), ) _ _, / _/ / _ \ _ \ \==/ /_\ \ _/ ___\/ _ \ / \ / \/ |\\ \__( <_> ) Y Y \ /__ /\___|__ / \___ >/|__|_| / \/ \/.-.\/ \/:wq

Re: [Full-disclosure] Ron Livingston likes to touch little boys

2010-02-12 Thread Martin Allert
Hi Jenna, So please tell me - what has this to do with a security mailing list? Could you please discuss this absolutely off-topic subject on your own and in private emails? Thank you for your cooperation. Yours sincerely, Martin Von: full-disclosure-boun...@lists.grok.org.uk

[Full-disclosure] (resend) RE: [WEB SECURITY] Trustwave's SpiderLabs Security Advisory TWSL2010-001

2010-02-12 Thread Chris Weber
The key part of the advisory for me wasn't VIEWSTATE as much as it was the controls, but this statement you made seemed pretty outrageous (with regard to ASP.NET): 'These vulnerabilities show that unsigned client-side viewstates will ALWAYS result in a vulnerability in the affected products.

Re: [Full-disclosure] [WEB SECURITY] Trustwave's SpiderLabs Security Advisory TWSL2010-001

2010-02-12 Thread Chris Weber
The key part of the advisory for me wasn't VIEWSTATE as much as it was the controls, but this statement you made seemed pretty (with regard to ASP.NET): 'These vulnerabilities show that unsigned client-side viewstates will ALWAYS result in a vulnerability in the affected products.' I would d

[Full-disclosure] SQL injection vulnerability in apemCMS

2010-02-12 Thread Maciej Gojny
{ Ariko-Security - Advisory #1/2/2010 } = SQL injection vulnerability in apemCMS Vendor's Description of Software: # http://apem.com.pl/?sc=oferta Dork: #Powered by apemCMS Application Info: # Name: apemCMS # Versions: ALL Vulnerability Info: # Type: SQL inject

[Full-disclosure] Risk measurements

2010-02-12 Thread Craig S. Wright
The simple answer to these posts is that I am passionate about this topic. This has allowed me to be drawn into a flame war with Tim, something he is far better at. Risk and economics matter to security. Like it or not, money is a limited resource and spending it on the most effective measures th

[Full-disclosure] [SECURITY] [DSA 1994-1] New ajaxterm packages fix session hijacking

2010-02-12 Thread Raphael Geissert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1994-1 secur...@debian.org http://www.debian.org/security/ Raphael Geissert February 11, 2010

Re: [Full-disclosure] Ron Livingston likes to touch little boys

2010-02-12 Thread Michal
This is a good follow up http://www.youtube.com/watch?v=8lMbk4DeN7E On 12/02/2010 08:51, Anders Klixbull wrote: > you'd like to gobble that sausage wouldn't you > > > > > *From:* full-disclosure-boun...@lists.grok.org.u

Re: [Full-disclosure] Ron Livingston likes to touch little boys

2010-02-12 Thread Anders Klixbull
you'd like to gobble that sausage wouldn't you From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of jenna Sent: 12. februar 2010 00:11 To: Sam Haldorf Cc: full-disclosure@lists.grok.org.uk Subject: Re

[Full-disclosure] Google Buzz and blind CSRF attacks

2010-02-12 Thread Kristian Erik Hermansen
Greetings, Google Buzz is an incredibly useful new social networking service. However, it is also quite vulnerable to persistent CSRF attacks when data is pulled from external data feeds. For instance, I encourage you to follow me me on Google Buzz by utilizing my profile below and clicking "FOLL