[Full-disclosure] Buffer overflows in smcFanControl 2.1.2 for OSX

2008-11-11 Thread KaiJern Lau
vnsecurity.net ADVISORY 2008-11 === :Title: Buffer overflows in smcFanControl 2.1.2 for OSX :Severity: Critical :Reporter: KaiJern, Lau ( kjlau at vnsecurity.net) :Products: smcFanControl 2.1.2 :OS: OSX :Fixed in: to be release smcFanControl 2.1.3 About smcFanControl

[Full-disclosure] Joke, Full Version, 0 day exploit for “PING”

2006-12-07 Thread KaiJern Lau
Hi, Something to share with everyone :) Still remember the the last post that i have posted ? Sometimes script kiddies is always a script kiddies. They never want to read, i guess that is the reason why they can't code. After the ping exploit post

[Full-disclosure] FCE Ultra buffer overflow, yet another local exploit without any fancy stuff.

2006-08-08 Thread KaiJern, Lau
ty.net.my] has confirmed this vulnerability on FCE Ultra 0.98.1 and below. All previous versions are suspected vulnerable to this issue. VI. VENDOR RESPONSE nothing at the moment VIII. DISCLOSURE TIMELINE 7th August 2006, Initial vendor notification IX. CREDIT Bug Founder : KaiJe

[Full-disclosure] Advisory 2006-03-11 DoS Vulnerability in ISC OpenReg

2006-03-11 Thread KaiJern Lau
/openreg/ APPENDIX B. - References NONE CONTACT: *KaiJern Lau [EMAIL PROTECTED] *1-888-LOL-WHAT *CISSP GSAE CCE CEH CSFA GREM SSP-CNSA SSP-MPA GIPS GHTQ GWAS ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure

[Full-disclosure] mysec.org Security Advisory : Xmame buffer overflow, with a possibility of privilege escalation.

2006-01-10 Thread KaiJern Lau
With Exploit Code :http://www.milw0rm.com/id.php?id=1412-- Forwarded message --From: KaiJern Lau <[EMAIL PROTECTED]>Date: Jan 11, 2006 3:35 AMSubject: mysec.org Security Advisory : Xmame buffer overflow, with a possibility of privilege escalation. To: full-disc

[Full-disclosure] mysec.org Security Advisory : Xmame buffer overflow, with a possibility of privilege escalation.

2006-01-10 Thread KaiJern Lau
installed xmame. Do not run xmame.x11, xmame.sdl is recommended. VI. VENDOR RESPONSE Upgrade to CVS version. http://x.mame.net/download.html VIII. DISCLOSURE TIMELINE   1st Jan 2006, Initial vendor notification 2nd January 2006,  Initial vendor response 11th January 2006, Vendor reply, bug fixed. 11th