Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-04 Thread Jason Starks
objectionable > and uncouth sideburns. > > > Your humble servant, > I baffi di Valdis > > On Wed, Mar 4, 2009 at 12:55 PM, Jason Starks > wrote: > > I know, its insane. It is a new trend, though, just like people > registering > > gmail accounts just to flame and

Re: [Full-disclosure] Zabbix 1.6.2 Frontend Multiple Vulnerabilities

2009-03-04 Thread Jason Starks
All bugs are worth something! Not. On Wed, Mar 4, 2009 at 11:23 AM, wrote: > On Wed, 04 Mar 2009 09:13:40 EST, bobby.mug...@hushmail.com said: > > > Is the remark about Italia meant as an excuse for stupidity? > > Racism is not acceptable on this list. > > Oddly enough, I read it as "Italians be

Re: [Full-disclosure] Imera ImeraIEPlugin ActiveX Control Remote Code Execution

2009-03-04 Thread Jason Starks
That is why most of them are submitted to bugtraq (ew), and not FD, where they are often discredited in various ways. You see, bugtraq will reject 4 out of 7 postings if your not a subscriber to their super fun security package, which offers lots of enjoyment of white hat and hacking zone-h labs. O

Re: [Full-disclosure] Cisco Security Advisory: Cisco 7600 Series Router Session Border Controller Denial of Service Vulnerability

2009-03-04 Thread Jason Starks
That is why the world should use Linksys. On Wed, Mar 4, 2009 at 11:30 AM, Cisco Systems Product Security Incident Response Team wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Cisco Security Advisory: Cisco 7600 Series Router Session Border > Controller Deni

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-04 Thread Jason Starks
I know, its insane. It is a new trend, though, just like people registering gmail accounts just to flame and troll on FD! Its like, your credability like, goes like, ok you start like at 0, and then like, it goes like to -1, and like, then even lower like. Absolutely genius. x0x0x0x0x0x0x0x0x0x

[Full-disclosure] Jason Starks has invited you to open a Google mail account

2009-03-03 Thread Jason Starks
I've been using Gmail and thought you might like to try it out. Here's an invitation to create an account. ------- Jason Starks has invited you to open a free Gmail account. To accept this invitation and register for yo

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-03 Thread Jason Starks
e I suggest you consult RFC 2821 > for guidance. > > I am NOT amused. > > > Your humble servant, > V knír z Valdis > > On Tue, Mar 3, 2009 at 6:01 PM, Jason Starks wrote: > > Right.. > > > >>On Tue, Mar 3, 2009 at 5:45 PM, wrote: > >> > >&g

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-03 Thread Jason Starks
Right.. >On Tue, Mar 3, 2009 at 5:45 PM, wrote: > >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Mr. Stark, There. On Tue, Mar 3, 2009 at 5:56 PM, wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Where? > > - -bm >

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-03 Thread Jason Starks
, I do not sport any facial > hair and take offense to your comment, and since you're obviously > lacking basic observational skills I highly doubt you're even as > talented as my Cadburys, at anything. > > - -bm > > On Tue, 03 Mar 2009 11:11:35 -0500 Jason Starks >

Re: [Full-disclosure] [ISecAuditors Security Advisories] CSRF vulnerability in GMail service

2009-03-03 Thread Jason Starks
That is one hell of a timeline. On Tue, Mar 3, 2009 at 5:55 AM, ISecAuditors Security Advisories < advisor...@isecauditors.com> wrote: > = > INTERNET SECURITY AUDITORS ALERT 2007-003 > - Original release date: August 1st, 2007 > - Last revised: January

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-03 Thread Jason Starks
Mr. Mustache, it is obvious that I have more talent than a box of chocolates, and that you envy the sadistic nature of your fellow trolls on this list. Point blank. On Tue, Mar 3, 2009 at 6:18 AM, wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Dear Valdis, > > I have been able to r

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-03-02 Thread Jason Starks
Grow up, really. On Mon, Mar 2, 2009 at 11:41 PM, Valdis' Mustache < security.musta...@gmail.com> wrote: > I would like to point out that I have been able to create a "hung" > state in the Firefox browser by opening 30 simultaneous tabs pointed > at http://www.welcometointernet.org/lawnmower/ and

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Jason Starks
Better yet, name two. On Thu, Feb 26, 2009 at 9:22 PM, Jubei Trippataka wrote: > > > On Fri, Feb 27, 2009 at 12:26 PM, wrote: > >> BM_X-Force_WP_final.pdf is called "Application-Specific Attacks: >> Leveraging the ActionScript Virtual Machine" and if you haven't read it, >> you should. It'll mak

Re: [Full-disclosure] Cambium Group, LLC. CAMAS Advisory

2009-02-26 Thread Jason Starks
I guess these days it isn't so amazing that people can type, and even hit send, rarely sharing their views face to face. Hiding in your grandmother's closet with your indestructable, glow-in-the-dark keyboard from Best Buy is sooo in. Anyways, free Kev.. speech! On Thu, Feb 26, 2009 at 5:22 PM, Sm

Re: [Full-disclosure] Buffer Overflow in dnsmap 0.22 - DNS Network Mapper by pagvac (gnucitizen.org)

2009-02-25 Thread Jason Starks
Sweet. If that is true, you should get to work on an actual exploit right away. We wouldn't want the immortal ./ segmentation fault doesn't affect your stature on this list. On Wed, Feb 25, 2009 at 11:24 AM, srl wrote: > Dear Jason Starks, > > It can be exploited remote vi

Re: [Full-disclosure] New version of webshag is available !

2009-02-25 Thread Jason Starks
Yeah, 'stick it to the dev'! I hope he has learned his lesson and that he will use more correct numbering systems instead of what ever he wants to, just because he wrote the code.. On Wed, Feb 25, 2009 at 3:24 AM, srl wrote: > You should change chapter numbering from from your user manual > http:

Re: [Full-disclosure] Buffer Overflow in dnsmap 0.22 - DNS Network Mapper by pagvac (gnucitizen.org)

2009-02-25 Thread Jason Starks
I'm going to say dnsmap isn't suid or sguid, and a segmentation fault can occur after triggering a simple programming error (you've shown no signs of code execution). Terrrific. On Wed, Feb 25, 2009 at 10:36 AM, srl wrote: > Security Advisory: > > PRODUCT > > http://www.gnucitize

Re: [Full-disclosure] [NETRAGARD SECURITY ADVISORY] [Cambium Group, LLC. CAMAS Content Management System -- Multiple Critical Vulnerabilities][NETRAGARD-20070820]

2009-02-24 Thread Jason Starks
Everybody love everybody? On Tue, Feb 24, 2009 at 4:49 PM, wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Dear SNOSOFT, > > Thanks to you for proving every insult made to your company as > truths. Demonstrating monstrous volume of elementary computer > hacking features in some unna

Re: [Full-disclosure] Worthless Disclosure

2009-02-19 Thread Jason Starks
Of course. You get what you pay for and is there really any real point of relevance in asking? Jason On Thu, Feb 19, 2009 at 11:03 PM, T Biehn wrote: > While I can never hope to live up to Jim Bell's seminal work 'assassination > politics' the following is a rough draft of something that follow

[Full-disclosure] Exploiting buffer overflows via protected GCC

2009-02-13 Thread Jason Starks
I came across a problem that I am sure many security researchers have seen before: ja...@uboo:~$ cat bof.c #include #include int main() { char buf[512]; memset(buf, 'A', 528); return 0; } ja...@uboo:~$ ja...@uboo:~$ ./bof *** stack smashing detected ***: ./bof terminated === Backtrace: