Re: [Full-disclosure] Default SSL Keys in Multiple Routers

2010-12-20 Thread Larry Seltzer
And from one firmware revision to another? Could you make that change with a #pragma in the code or something like that? *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Thor (Hammer of God) *Sent:* Sunday, December 19, 2010 12:

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-17 Thread Larry Seltzer
did not say that he wrote code. He said that "Jason Wright and several other developers were responsible for those backdoors" -Original Message- From: Paul Schmehl [mailto:pschmehl_li...@tx.rr.com] Sent: Friday, December 17, 2010 12:12 PM To: Larry Seltzer; full-disclosure@li

Re: [Full-disclosure] Backdoor in OpenBSD Explained proof of Theo's lieying

2010-12-16 Thread Larry Seltzer
is a fucking laugh riot this thread! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-16 Thread Larry Seltzer
Instead of an overt back-door, is it possible that Theo's old friend (;)) is referring to exploitable vulnerabilities. These vulnerabilities may or may not have been found in the interim and fixed, but not recognized as backdoors. As you said, it's impossible to prove a negative (prove to me that

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-16 Thread Larry Seltzer
here are already probably already a latent vulnerability in it already? Then there is no deniability concerns and no audit trail of the source code. My 2 cents On 16/12/2010, at 1:04 PM, mark seiden wrote: > > On Dec 15, 2010, at 5:23 PM, Graham Gower wrote: > >> On 16 December 20

Re: [Full-disclosure] Allegations regarding OpenBSD IPSEC

2010-12-15 Thread Larry Seltzer
> Has anyone read this yet? > > http://www.downspout.org/?q=node/3 > > Seems IPSEC might have a back door written into it by the FBI? > Surely the thing to do now is not to audit *your own* OpenBSD code, but to audit the OpenBSD code from about 8 years ago. If there's nothing there, then the claim

Re: [Full-disclosure] OpenBSD Paradox

2010-12-15 Thread Larry Seltzer
Theo, How would one go about getting the code that was worked on at the time? I don't see it at openbsd.org. Also, do you have a sense of what other projects used that code? Presumably at least some of them did audits as well. LJS ___ Full-Disclosure

Re: [Full-disclosure] verizon vs m$

2010-12-07 Thread Larry Seltzer
>>> 2. some interpret it as a feature and some as a bug? > Does it have to be either? It sounds to me as if this is a deliberate design decision, and people are disagreeing over the severity of its implications. LJS ___ Full-Disclosure - We believe in

Re: [Full-disclosure] verizon vs m$

2010-12-05 Thread Larry Seltzer
I think the Intranet zone was Medium in IE6 but of course there was no Protected Mode there. Maybe that's where the confusion is from. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Thor (Hammer of God) Sen

Re: [Full-disclosure] Hijack SSL with a Man-In-The-Middle Attack

2010-11-23 Thread Larry Seltzer
I've made a lot of money writing papers inspired by Moxie's work, so I can relate. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Eyeballing Weev Sent: Tuesday, November 23, 2010 4:44 PM To: full-disclosure

Re: [Full-disclosure] OT: Hacking Pink Floyd

2010-10-14 Thread Larry Seltzer
It says “My name is Roger Waters and I’m a completely selfish asshole and I’m taking my ball and going home now.” *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Thor (Hammer of God) *Sent:* Thursday, October 14, 2010 6:33 PM *

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-09-14 Thread Larry Seltzer
also illustrates the extent of the problem, because each of those installations is likely vulnerable. -Original Message- From: Dan Kaminsky [mailto:d...@doxpara.com] Sent: Tuesday, September 14, 2010 6:54 PM To: Stefan Kanthak Cc: Larry Seltzer; full-disclosure@lists.grok.org.uk; valdis.klet

Re: [Full-disclosure] [GOATSE SECURITY] Clench: Goatse's way to say "screw you" to certificate authorities

2010-09-08 Thread Larry Seltzer
It's true that conventional certs have been completely devalued by the bottom-feeders. This is a good argument for EV. Goatse may dismiss EV as a joke, but there are very few EV CAs and none of them are TELECOM MINISTRY OF BUTTFUCKISTAN. The spec requires that they authenticate the operation of the

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-02 Thread Larry Seltzer
I don’t think you read my e-mail. They fixed it. Have you retested today? *From:* Christian Sciberras [mailto:uuf6...@gmail.com] *Sent:* Thursday, September 02, 2010 9:44 AM *To:* Larry Seltzer *Cc:* full-disclosure@lists.grok.org.uk *Subject:* Re: [Full-disclosure] DLL hijacking POC (failed

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-02 Thread Larry Seltzer
FYI everyone, ACROS has fixed the POC for 64-bit systems. The old one failed on my Win7 64-bit and the new one works. http://www.binaryplanting.com/test.htm I did notice that if you just click on the link (\\www.binaryplanting.com\demo\windows_address_book_64) Windows turns it into a file:// url

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-08-27 Thread Larry Seltzer
signatures are consistent with the EXE. *From:* Arthur Orr [mailto:a...@gci.com] *Sent:* Friday, August 27, 2010 1:52 PM *To:* Larry Seltzer; Dan Kaminsky; Christian Sciberras *Cc:* full-disclosure@lists.grok.org.uk; valdis.kletni...@vt.edu *Subject:* RE: [Full-disclosure] DLL hijacking with

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-08-27 Thread Larry Seltzer
:* Friday, August 27, 2010 10:50 AM *To:* Christian Sciberras *Cc:* Larry Seltzer; full-disclosure@lists.grok.org.uk; valdis.kletni...@vt.edu *Subject:* Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive ...up till the moment you realize that the interface doesn't really differen

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-08-27 Thread Larry Seltzer
, August 27, 2010 10:08 AM *To:* Larry Seltzer *Cc:* valdis.kletni...@vt.edu; full-disclosure@lists.grok.org.uk *Subject:* Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive h0h0h0. There be history, Larry. Short version: Go see how many DLLs exist outside of c:\windows\system32. Look

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-08-27 Thread Larry Seltzer
Clearly desktops need to be able to run arbitrary code. That’s what they’re there for. Why wouldn’t eliminating the CWD from the DLL search order fix the problem? I asked Microsoft about this ( http://blogs.pcmag.com/securitywatch/2010/08/list_of_dll_vulnerability_wind.php) and they said the obv

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-08-26 Thread Larry Seltzer
> Instead of it executing "wab.exe (Windows Address Book) and open the > file test.vcf", one can directly get any .exe file open. Users have shown themselves very willing to open up test.vcf.exe. LJS ___ Full-Disclosure - We believe in it. Charter: htt

Re: [Full-disclosure] Expired certificate

2010-07-16 Thread Larry Seltzer
It's better than nothing, but it speaks ill of the agency. Yes, the encryption is the same. Certificates have expiration dates so that the verification that happens at the time the cert is acquired can have some "freshness." So if it's just expired, well it's no biggie, especially if this is a pla

Re: [Full-disclosure] My private key

2010-06-12 Thread Larry Seltzer
Oh cool, this is like those TV ads where the guy parades his social security # around, right? *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Thor (Hammer of God) *Sent:* Friday, June 11, 2010 11:33 PM *To:* full-disclosure@lis

Re: [Full-disclosure] RDP, can it be done safely?

2010-06-10 Thread Larry Seltzer
onsider the ramifications > of the “VPN first” model before assuming it grants you some inherent > security. > > > > t > > > > *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: > full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Larry Seltzer > *

Re: [Full-disclosure] RDP, can it be done safely?

2010-06-09 Thread Larry Seltzer
See http://technet.microsoft.com/en-us/library/cc782610(WS.10).aspx If you connect through a VPN it should be as secure as anything else you’re going to consider. *From:* full-disclosure-boun...@lists.grok.org.uk [mailto: full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Jeffrey Walto

Re: [Full-disclosure] RDP, can it be done safely?

2010-06-09 Thread Larry Seltzer
Click here to retrieve your free beer. http://bit.ly/4a8VOA *From:* Benji [mailto:m...@b3nji.com] *Sent:* Wednesday, June 09, 2010 7:08 PM *To:* Larry Seltzer *Cc:* Thor (Hammer of God); noloa...@gmail.com; Daniel Sichel; full-disclosure@lists.grok.org.uk *Subject:* Re: [Full-disclosure] RDP

Re: [Full-disclosure] RDP, can it be done safely?

2010-06-09 Thread Larry Seltzer
I might be able to buy you one beer with the money, but it won’t be anything good. *From:* Thor (Hammer of God) [mailto:t...@hammerofgod.com] *Sent:* Wednesday, June 09, 2010 6:56 PM *To:* Larry Seltzer; noloa...@gmail.com; Daniel Sichel *Cc:* full-disclosure@lists.grok.org.uk *Subject:* RE

Re: [Full-disclosure] RDP, can it be done safely?

2010-06-09 Thread Larry Seltzer
10 years ago I wrote a book on Terminal Services for Windows 2000. Believe it or not, I still get trivial royalties on it, $6.81 for the first quarter of this year, and the book has been out of print for years. Someone out there in 2010 is buying a book on Windows 2000, sucking out the last co

Re: [Full-disclosure] denial-of-service vulnerability in theMicrosoft Malicious Software Removal Tool

2010-05-23 Thread Larry Seltzer
Don't you get it? Your customers installed malware while logged in as administrator on XP. MSRT isn't magic. From this you tell people "Don't run Windows"? And if your customers' apps require admin privileges and they have to run on XP then they really can't

Re: [Full-disclosure] KHOBE - 8.0 earthquake for Windows desktop security software

2010-05-13 Thread Larry Seltzer
d and they didn't reply. More than one antivirus vendor has said that their products are not vulnerable to the technique. It's hard to say who is telling the truth, but given all their overstatement matousec doesn't deserve the benefit of the doubt. Larry Seltzer Contributing Edito

Re: [Full-disclosure] XSS in Drupal Better Formats Module

2010-04-27 Thread Larry Seltzer
You need admin privileges for it. It's not a vulnerability, it's a feature. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Justin C. Klein Keane Sent: Tuesday, April 27, 2010 3:07 PM To: full-disclosure@lis

Re: [Full-disclosure] Java Deployment Toolkit Performs InsufficientValidation of Parameters

2010-04-09 Thread Larry Seltzer
jws seems to be one of those gifts that keeps on giving. I don't have actual numbers, but it seems to me I see it mentioned regularly in their vulnerability reports. -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Beh

Re: [Full-disclosure] To Ryan Naraine

2010-03-03 Thread Larry Seltzer
Per Ryan Naraine (a friend and former colleague), the story has been updated and corrected: http://blogs.zdnet.com/security/?p=5573 Larry Seltzer From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Berend-Jan Wever Sent: Wednesday

Re: [Full-disclosure] Internet Exploiter 2 - bypassing DEP

2010-03-01 Thread Larry Seltzer
e 256 randomization slots? The point of it is that if you're going to crash the system 255 out of 256 times it's not worth attacking. Larry Seltzer From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Berend-Jan Wever Sent: Monday, Marc

Re: [Full-disclosure] about jit and dep+aslr

2010-02-08 Thread Larry Seltzer
Google translates this as “Sun your mother!” Larry Seltzer Contributing Editor, PC Magazine larry_selt...@ziffdavis.com http://blogs.pcmag.com/securitywatch/ From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of yuange Sent

Re: [Full-disclosure] about jit and dep+aslr

2010-02-05 Thread Larry Seltzer
Full-Disclosure has been submitted to ISO as a discussion standard, requiring English posting, but allowing for a subposting field with referrals to internationalized versions Larry Seltzer Contributing Editor, PC Magazine larry_selt...@ziffdavis.com http://blogs.pcmag.com/securitywatch

Re: [Full-disclosure] win7x64 Direct General

2010-02-05 Thread Larry Seltzer
eivable by then, as a distinct southern culture had already emerged. Larry Seltzer Contributing Editor, PC Magazine larry_selt...@ziffdavis.com http://blogs.pcmag.com/securitywatch/ ___ Full-Disclosure - We believe in it. Charter: http://l

Re: [Full-disclosure] win7x64 Direct General

2010-02-03 Thread Larry Seltzer
Wow, that’s a searing indictment if I’ve ever heard one, I think. Larry Seltzer Contributing Editor, PC Magazine larry_selt...@ziffdavis.com http://blogs.pcmag.com/securitywatch/ From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On

Re: [Full-disclosure] Surge in Skype Spam activity

2010-01-11 Thread Larry Seltzer
It’s harmless, he’s just blowing his own company’s horn. Speaking of spam… h, shall I click a tinyurl coming from a f-d poster? n/n, pick one this is email, not twitter. if you're sharing a legitimate link, there's no reason not to directly link to it. 2010/1/11 Chen Levkovich S

Re: [Full-disclosure] Software developer looks at CRU code

2009-11-30 Thread Larry Seltzer
>>> Recent evidence shows that the globe is again cooling >> So the CO2 emissions are the only things saving us, right Paul? Post-hoc, ergo propter hoc. It's a staple of climate science. Larry Seltzer Contributing Editor, PC Magazine larry_selt...@ziffdavis.com ht

Re: [Full-disclosure] Microsoft Patents the "sudo" command

2009-11-13 Thread Larry Seltzer
to request privilege elevation and a system which handles it automatically is a better one. And as the article says, the claim in the subject line of this thread is nonsense. It's obvious to anyone who reads the patent, which is a very short one. Larry Seltzer Contributing Editor, PC Magazi

Re: [Full-disclosure] 3rd party patch for XP for MS09-048?

2009-09-16 Thread Larry Seltzer
Yes, they used the bulletin to soft-pedal the description, but at the same time I think they send a message about XP users being on shaky ground. Just because they've got 4+ years of Extended Support Period left doesn't mean they're going to get first-class treatment. Larry Seltz

Re: [Full-disclosure] 3rd party patch for XP for MS09-048?

2009-09-16 Thread Larry Seltzer
would have rated it at least Medium. If I'm wrong about that then the "Low" rating is misleading. Larry Seltzer Contributing Editor, PC Magazine larry_selt...@ziffdavis.com http://blogs.pcmag.com/securitywatch/ -Original Message- From: full-disclosure-boun...@lists

[Full-disclosure] Windows Live profile spam

2009-06-14 Thread Larry Seltzer
I’ve never before received anything like this for Windows Live. I got a second invite just like this through Live Messenger. (Soon this will be changing to Bing profile spam) Larry Seltzer Contributing Editor, PC Magazine larry_selt...@ziffdavis.com http://blogs.pcmag.com/securitywatch

Re: [Full-disclosure] ZDI-09-014: Adobe Acrobat getIcon() StackOverflow Vulnerability

2009-03-24 Thread Larry Seltzer
It looks like this was fixed in 9.1, the version from a week or two ago. Why wasn't the vulnerability disclosed until now? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine larry

Re: [Full-disclosure] BBC cybercrime probe backfires

2009-03-14 Thread Larry Seltzer
>> They keep saying that the BBC "hacked" 22,000 computers, when in reality the original articles said the BBC "acquired" or "hijacked" the botnet. Strawman for the win? If they paid for access to the botnet then there's no real moral difference. Larry

[Full-disclosure] Collision

2009-01-19 Thread Larry Seltzer
75ca3011ae2a15f851cc3334cf7918ae851c92f1 Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine larry.selt...@ziffdavisenterprise.com ___ Full-Disclosure - We

Re: [Full-disclosure] The war in Palestine

2009-01-06 Thread Larry Seltzer
Jeez, the "stolen" part was a joke. Finally someone says something on this thread related to computer security and you all jump on me. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine

Re: [Full-disclosure] The war in Palestine

2009-01-05 Thread Larry Seltzer
Also stolen from the Palestinian people: their domain name. The web site of the Permanent Observer Mission of Palestine to the United Nations: http://www.palestine-un.org/ Click some of the links on the left and check the whois. Larry Seltzer eWEEK.com Security Center Editor http

Re: [Full-disclosure] The war in Palestine

2009-01-04 Thread Larry Seltzer
German population. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine larry.selt...@ziffdavisenterprise.com ___ Full-Disclosure - We believe in it. Charter

Re: [Full-disclosure] Google Chrome Browser Vulnerability

2008-09-02 Thread Larry Seltzer
Holy crap, a crash bug in a beta browser! Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of

[Full-disclosure] Free Beer

2008-03-27 Thread Larry Seltzer
Moving beyond the old partisan politics, a cause we can all get behind. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ <http://security.eweek.com/> <http://blogs.pcmag.com/securitywatch/> http://blogs.pcmag.com/securitywatch/ <http://blogs.pcmag.co

Re: [Full-disclosure] OpenID. The future of authentication on the web?

2008-03-24 Thread Larry Seltzer
4ss!ama" password for amazon.com how long will it take me to figure out all your others? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ <http://security.eweek.com/> <http://blogs.pcmag.com/securitywatch/> http://blogs.pcmag.com/securitywatch/ <http://b

Re: [Full-disclosure] OpenID. The future of authentication on the web?

2008-03-23 Thread Larry Seltzer
ave any of these problems. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.

Re: [Full-disclosure] OpenID. The future of authentication on the web?

2008-03-23 Thread Larry Seltzer
do get your point, but I bet that the best alternative is to give them one set of credentials and make it as strong as possible. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAI

Re: [Full-disclosure] OpenID. The future of authentication on the web?

2008-03-23 Thread Larry Seltzer
It's worth pointing out that some OpenID providers are better than others. An OpenID provider could implement 2-factor authentication, and some have (http://www.infrastructure.ziffdavisenterprise.com/c/a/Blogs/OpenID-In-H ardware/), or other features which could strengthen it. Larry Se

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread Larry Seltzer
lnerable if an attacker gets to the system > while the screen is locked or the computer is asleep (though not if it is hibernating or powered off). So in other words, hibernate does make a difference, especially if you follow their guidelines. Larry Seltzer eWEEK.com Security Center Edi

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread Larry Seltzer
er. >> <http://blogs.technet.com/markrussinovich/archive/2005/12/12/circumventi ng-group-policy-as-a-limited-user.aspx> What he says is that some group policies, not including system-wide security settings, maybe circumvented, even by a limited user. Larry Seltzer eWEEK.com Securit

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-08 Thread Larry Seltzer
off. Even if the memory has some residual charge I'm sure it's far less reliable than with sleep. Everything I've seen in descriptions of that attack tells me they are unfairly conflating sleep and hibernate. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-08 Thread Larry Seltzer
The frozen notebook memory attack seems a little too Mission Impossible for me to get worked up about. And if you're the sort of high-value target who needs to worrry about this sort of attack, there are measures you can take: use drive encryption, use 2-factor authentication, use hibernat

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Larry Seltzer
aiming they can disable password authentication *even while the system is not logged on* - do I have that right? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAI

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Larry Seltzer
Let's say the computer is off. You can turn it on, but that gets you to a login screen. What can the Firewire device do? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL PROT

Re: [Full-disclosure] IE8 beta is available - Challenge

2008-03-07 Thread Larry Seltzer
>>Who can be the one to find and publish the first exploit? I hear you can completely compromise an IE8 system through the Firewire port. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-06 Thread Larry Seltzer
ws (or any OS) to open up DMA for a device only to a certain range? If not, what options are available? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-06 Thread Larry Seltzer
>>...Windows would not do this. It would only open up access to devices that it thought needed DMA. This is why Metlstorm had to make his Linux machine behave like an iPod to fool Windows into spreading it's legs. So the iPod software opens up the whole address space? I don'

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-06 Thread Larry Seltzer
ice compatibility of doing this? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: htt

Re: [Full-disclosure] Chinese backdoors "hidden in router firmware"

2008-03-05 Thread Larry Seltzer
>>Next we'll be seeing "Japanese tactical nukes "Hidden in Toyota trunks" And who knows what the French are putting in that cheese. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ <http://security.eweek.com/> <http://b

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Larry Seltzer
." So does the same capability exist on Macs? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL PROTECTED] ___ Full-Disclosure - We bel

Re: [Full-disclosure] Firefox 2.0.0.12 SSL Spoofing and Domain Guessing vulnerabilities

2008-02-04 Thread Larry Seltzer
I get this same warning on FF 3.0 beta 2 on Vista. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On

Re: [Full-disclosure] Save XP

2008-01-28 Thread Larry Seltzer
One more thing. Nobody is forcing you go buy Vista. Believe it or not, you have alternatives in the market. If Vista sucks so badly in your mind, go buy something else. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing

Re: [Full-disclosure] Save XP

2008-01-28 Thread Larry Seltzer
>>MS is planning on stopping XP sales after June 30,2008. Why don't you start hoarding copies now? Come July you'll run the market! Ha ha ha! Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC

Re: [Full-disclosure] [FDSA] Sort - Critical Format StringVulnerability

2008-01-18 Thread Larry Seltzer
>>This vulnerability allows for arbitrary command execution and is really quite >>severe. So the following proof of concept causes the Windows Calculator to be executed? C:\>calc Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.co

Re: [Full-disclosure] [funsec] eBay redirects: next step in fake blogs and web searchabuse

2007-11-03 Thread Larry Seltzer
The redirect is in this from the blogspot page. No real attempt to hide it. http://homeoflove.selfip.com/ads/ads.php?src=hushmail"; width="468" height="60" scrolling=no frameborder=0> selfip.com is owned by Dyndns and I guess it's used for customer

Re: [Full-disclosure] Firefox 2.0.0.7 has a very serious calculation bug [FIB FOUND/CONFIRMED]

2007-09-28 Thread Larry Seltzer
>>..perhaps one day, this will be exploitable. Consider the possibilities for this code: If ((4.2-0.1) != 4.1) { exploit_client(); } Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PRO

Re: [Full-disclosure] Firefox 2.0.0.7 has a very serious calculation bug

2007-09-28 Thread Larry Seltzer
>>Firefox 2.0.0.7 result: 5.1005 (WRONG!) Internet Explorer 7 result: 5.1 (OK) Maybe they're using Excel 2007 for their math. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAI

Re: [Full-disclosure] Firefox 2.0.0.7 has a very serious calculation bug

2007-09-28 Thread Larry Seltzer
Actually, I see 5.1005 in both browsers. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it

Re: [Full-disclosure] This pages crashes browsers

2007-07-03 Thread Larry Seltzer
>>Found this page, click on "Accessories" then try to print the page, it seems to crash all the browsers I have soon as I try to print. Thought someone here might like to play with the crash. Printed from IE7 and FF 2.0.0.4 no problems. Larry Seltzer eWEEK.com Security Ce

Re: [Full-disclosure] Apple Safari: idn urlbar spoofing

2007-06-25 Thread Larry Seltzer
>>The picture taken on my system: >>http://alt.swiecki.net/idn.png It looks different on my system: http://www.larryseltzer.com/safe2.png Safari 3.0.2 on XPSP2 Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributin

Re: [Full-disclosure] Safari for Windows, 0day URL protocol handler command injection

2007-06-12 Thread Larry Seltzer
_reall y_need_another_windows_browser.html). They have already done this with QuickTime. Safari could develop installed base quickly that way. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PRO

Re: [Full-disclosure] You shady bastards. - CONFIDENTIAL

2007-06-08 Thread Larry Seltzer
>>In luxembourg for instance mails labeled as PRIVATE or CONFIDENTIAL are not allowed to be viewed by the company, ALSO as email. Write it in the subject line. Hey, don't read this. This isn't for you. Larry Seltzer eWEEK.com Security Center Editor http://security

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread Larry Seltzer
>>A more ethical company would have sent HDM a polite note saying that the person no longer works there before curiosity got the best of them. Does your company do this for all former employee e-mail accounts? Let's hope he unsubscribed from all his mailing lists before he left. La

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread Larry Seltzer
>>Really? I have gotten benefits and medical communications at my office addy. That stuff should be going to your home address, not least for this reason. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Edit

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread Larry Seltzer
>>Would you feel the same way if it was a voicemail left on his machine? >>What about a postal letter addressed to the person? To the company phone or address? Yes. Of course. They're company property, there for company purposes. Larry Seltzer eWEEK.com Security C

Re: [Full-disclosure] You shady bastards.

2007-06-06 Thread Larry Seltzer
Why would this be offensive? It's a company address. Someone might send e-mail containing company business to the address. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PROT

Re: [Full-disclosure] WordPress Community Vulnerable

2007-05-24 Thread Larry Seltzer
>>Check out a recent survey of 50 WordPress blogs conducted at blogsecurity.net <http://blogsecurity.net/> : >>http://blogsecurity.net/wordpress/articles/article-230507/ <http://blogsecurity.net/wordpress/articles/article-230507/> Can the Month of WordPress Bugs be far

Re: [Full-disclosure] Windows POC

2007-05-16 Thread Larry Seltzer
>> http://www.milw0 .. <http://www.milw0rm.com/exploits/3260> for example A word of advice to everyone: Don't send milw0rm links out to the list unless you want to drown in blowback from Antigen gateways. Larry Seltzer eWEEK.com Security Center Editor http://securit

Re: [Full-disclosure] Windows POC

2007-05-16 Thread Larry Seltzer
>>I was wondering if anyone has a few Microsoft Windows Word proof of concept exploits for a demo? Go to http://www.milw0rm.com and search on Word http://www.milw0rm.com/exploits/3260 http://www.milw0rm.com/exploits/3260> for example Larry Seltzer eWEEK.com Security Center Ed

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread Larry Seltzer
>>http://moaxb.blogspot.com/ Why is this site in Italian now? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-04 Thread Larry Seltzer
Maybe if we issued one every minute we could keep the time frame reasonable Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-03 Thread Larry Seltzer
Sorry for the smart-ass tail end to my message, but this *is* F-D after all Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-03 Thread Larry Seltzer
>>I know Larry, wtf is an office exploit good for? nothing thats what.. It's not an Office exploit, it's an exploit in a 3rd-party add-on package. And not an especially popular one. You do understand the difference, don't you? Larry Seltzer eWEEK.com Securi

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-03 Thread Larry Seltzer
Looks like this has turned into the Month of Officeocx bugs, since the first 3 are components sold in that package. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://security.eweek.com/> http://blogs.eweek.com/cheap_hack/ <http://blog.eweek.com

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-01 Thread Larry Seltzer
>>"just a segfault" Remember back when there were crash bugs? Now all we have are DoS's. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Maga

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-01 Thread Larry Seltzer
How do you know that? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.eweek.com/cheap_hack/ Contributing Editor, PC Magazine [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.

Re: [Full-disclosure] Month of ActiveX Bug

2007-05-01 Thread Larry Seltzer
>>http://moaxb.blogspot.com/ Wow, a DoS in a 3rd-party Poiwerpoint viewer. This ought to bring the Internet to its knees. I wonder if he'll have any actual ActiveX bugs or if they'll just be DoS's in controls. ___ Full-Disclosure - We believe in it. Ch

Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow

2007-04-03 Thread Larry Seltzer
ved, is there? >>Maybe the url should be in quites? This works for me: >> It's actually supposed to work with or without quotes I think and I've tried a dozen variants and yours here. No luck. The cursors are straight out of c:\windows\cursors. I'll try it in the mor

Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow

2007-04-03 Thread Larry Seltzer
g with this code? BODY{cursor: url(<a rel="nofollow" href="http://www.larryseltzer.com/DRUM.ANI">http://www.larryseltzer.com/DRUM.ANI</a>);} This is a harmless animated cursor. This is a harmless animated cursor. This is a harmless animated cursor. This is a ha

Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow

2007-04-03 Thread Larry Seltzer
NI code in GDI is fixed. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.eweek.com/blogs/larry%5Fseltzer/ Contributing Editor, PC Magazine [EMAIL PROTECTED] -Original Message- From: Daniel Veditz [mailto:[EMAIL PROTECTED] Sent: Tuesday, April 03, 2007

Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow

2007-04-03 Thread Larry Seltzer
Firefox is vulnerable? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.eweek.com/blogs/larry%5Fseltzer/ Contributing Editor, PC Magazine [EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://

Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow

2007-04-02 Thread Larry Seltzer
Specifically http://developer.mozilla.org/en/docs/Using_URL_values_for_the_cursor_pro perty in the "Limitations" section Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.eweek.com/blogs/larry%5Fseltzer/ Contributing Editor, PC Magazine [EMAIL

Re: [Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow

2007-04-02 Thread Larry Seltzer
>>I just posted a video of exploiting IE7 and Firefox on Vista. The Firefox docs say that it doesn't support .ani files for cursors. How are you exploiting it? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.eweek.com/blogs/larry%5Fseltzer/ C

  1   2   >