Re: [Full-disclosure] DoS vulnerability in Internet Explorer 6, 7, 8 (access violation)

2013-11-19 Thread laurent gaffie
I can't see any differences with the original advisory apart the tag with your website address. What's the point at posting this on FD...? 2013/11/19 MustLive > Hello list! > > I want to warn you about Denial of Service vulnerability in Internet > Explorer. This is access violation. > > This e

Re: [Full-disclosure] Why PRISM kills the cloud | Computerworld Blogs

2013-06-12 Thread laurent gaffie
Freedom of speech and freedom of anonymous speech is protected by the first amendment.. https://www.eff.org/issues/anonymity 2013/6/11 Philip Whitehouse > > Seems like some people spend way to much time focusing on the second > amendment rather than the first one... > > Well this relates mai

Re: [Full-disclosure] Why PRISM kills the cloud | Computerworld Blogs

2013-06-10 Thread laurent gaffie
Why is the Prims program such a big deal today? Most of us knew about echellon and the patriot act didnt we? This program was unconstinutional at the first place and should have raised indignation when it was approved at that time... Seems like some people spend way to much time focusing on the

Re: [Full-disclosure] SANS PHP Port Scanner Remote Code Execution

2013-03-05 Thread laurent gaffie
ldn't be surprising, he's a > undergrad. But even most grad students make these sorts of mistakes... > academicware ;-) > > Cheers, > Harry > > On 03/05/2013 08:46 PM, laurent gaffie wrote: > > > http://resources.infosecinstitute.com/php-build-your-own-mini-port-sc

[Full-disclosure] SANS PHP Port Scanner Remote Code Execution

2013-03-05 Thread laurent gaffie
http://resources.infosecinstitute.com/php-build-your-own-mini-port-scanner/ Finding the vulnerability in this code is left as an exercise to the reader. PS: "*Your comment will be awaiting moderation forever."* ___ Full-Disclosure - We believe in it. Ch

Re: [Full-disclosure] [Security-news] SA-CORE-2012-004 - Drupal core - Multiple vulnerabilities

2012-12-19 Thread laurent gaffie
In regards to the code exec; Ever heard of whitelisting ? Le 19 déc. 2012 14:39, a écrit : > View online: http://drupal.org/SA-CORE-2012-004 > > * Advisory ID: DRUPAL-SA-CORE-2012-004 > * Project: Drupal core [1] > * Version: 6.x, 7.x > * Date: 2012-December-19 > * Security risk: Modera

Re: [Full-disclosure] Multiple vulnerabilities in SimpGB

2011-02-04 Thread laurent gaffie
Hey Sparky, One of the many many thing you didn't understand during the past 5 years is that you should probably try to identify and fix your stuff on *your* website, before spamming this ML with your crap. cf: http://www.zone-h.org/mirror/id/11367858 e-tard. _

Re: [Full-disclosure] www.google.com xss vulnerability Using mhtml

2011-01-27 Thread laurent gaffie
Not a google vuln. Hunt down MSFT to pay for your bug. Oh wait they dont pay for free research.. 0noz, you wont get any candy ! 2011/1/27, IEhrepus <5up3r...@gmail.com>: > Security is a general,Many security issues are composed of many > different vulnerabilities of different factory. > > like " m

Re: [Full-disclosure] Multiple vulnerabilities in SimpGB

2011-01-26 Thread laurent gaffie
Send your shitty stuff to bugt...@securityfocus.com If it's not obvious, no one give a shit here, seriously. 2011/1/27 MustLive > Hello list! > > I want to warn you about Cross-Site Scripting, Brute Force, Insufficient > Anti-automation and Abuse of Functionality vulnerabilities in SimpGB. > >

Re: [Full-disclosure] Dancho Danchev gone missing in Bulgaria

2011-01-17 Thread laurent gaffie
No sign at all he was crazy at the first place; Question *could be* why is he supposed to be in a psyco hospital by now ? Anyways, who is the source on that one ? Who have a clue, and on what do we rely to have an opinion ? _Blah_ we'll probably never know. Sounds like classic stuff here. 2011/1/

Re: [Full-disclosure] DoS vulnerability in Internet Explorer

2010-06-01 Thread Laurent Gaffie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Sorry Mustlive, i understand you need to see this in clear text finaly. I guess ascii is the best to communicate with you; Hello Full-Disclosure! I want to warn you about a Denial of Service in every browser finaly !!! It actually affect every brow

Re: [Full-disclosure] DoS vulnerability in Internet Explorer

2010-06-01 Thread Laurent Gaffie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Full-Disclosure! I want to warn you about a Denial of Service in every browser finaly !!! It actually affect every browser with a javascript engine build in !!! Adobe may be vulnerable to PoC : 0n0z for (i=0;i<65535;i++) { alert('

[Full-disclosure] Python fuzzing lib released

2010-05-12 Thread laurent gaffie
I'm please to release this python fuzzing lib I've been working on for a couple month, works perfectly for any layer * fuzzing. Works even better on layer 5 fuzzing which allows you to not care about many thing you should care about when fuzzing underlayer protocols... This lib is pretty usefull fr

[Full-disclosure] Turning SMB client side bug to server side

2010-04-16 Thread laurent gaffie
Here's a small technic to compromise via a SMB client side bug the PDC/DMB by abusing the Browser protocol, with no user interaction at all. Browser and NBNS abusing is well known since a long time, as theses protocols wasn't developed with security in mind, this blog post is a simple real case e

[Full-disclosure] Fwd: ICMPv4/IP fuzzer prototype.

2009-11-22 Thread laurent gaffie
Hell no random.randrang -> randrange(_) rtfm. and yeah u'r welcome. 2009/11/23 Andrew Farmer On 22 Nov 2009, at 19:48, laurent gaffie wrote: > > Should be kweel for UTesting > > > http://g-laurent.blogspot.com/2009/11/releasing-icmpv4ip-fuzzer-prototype.html >

[Full-disclosure] ICMPv4/IP fuzzer prototype.

2009-11-22 Thread laurent gaffie
Should be kweel for UTesting http://g-laurent.blogspot.com/2009/11/releasing-icmpv4ip-fuzzer-prototype.html Enjoy. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - ht

[Full-disclosure] Windows 7 , Server 2008R2 Remote Kernel Crash

2009-11-11 Thread laurent gaffie
= - Release date: November 11th, 2009 - Discovered by: Laurent Gaffié - Severity: Medium/High = I. VULNERABILITY - Windows 7 * , Server 2008R2 Remote Kernel Crash II. BACKGROUND ---

Re: [Full-disclosure] Hash

2009-10-28 Thread laurent gaffie
Bonjour Fionnbharr Davies!, I'm glad to make your life easier with the shasum full path, really. Regarding the "Grossly misdiagnosed bug"; That's some funny words to describe one of the most difficult bug to exploit in 2009 (http://seclists.org/dailydave/2009/q4/2) Laurent Bonjour! Is this

[Full-disclosure] Hash

2009-10-26 Thread laurent gaffie
For the record : /usr/bin/shasum advisory.txt 9fefeeb9d3ebf7c6822961e59ae94cfb655bcd53 advisory.txt Regards, ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://

[Full-disclosure] Snort <= 2.8.5 IPV6 Remote DoS

2009-10-22 Thread laurent gaffie
= - Date: October 22th, 2009 - Discovered by: Laurent Gaffié - Severity: Low = I. VULNERABILITY - Snort <= 2.8.5 IPV6 Remote DoS II. DESCRIPTION - A remote DoS

Re: [Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-10-04 Thread laurent gaffie
More explication on cve-2009-3103 http://g-laurent.blogspot.com/2009/10/more-explication-on-cve-2009-3103.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http:/

Re: [Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-09-11 Thread laurent gaffie
Advisory updated : = - Release date: September 7th, 2009 - Discovered by: Laurent Gaffié - Severity: High = I. VULNERABILITY - Windows Vista, Server 2008 < R2, 7 RC : SMB2.0 NEGOTIATE

[Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-09-07 Thread laurent gaffie
= - Release date: September 7th, 2009 - Discovered by: Laurent Gaffié - Severity: Medium/High = I. VULNERABILITY - Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. II

Re: [Full-disclosure] Microsoft Internet Information Server ftpd zeroday

2009-08-31 Thread laurent gaffie
Nice find Kingcope, As Thierry mentioned it, i guess it was a pain to find it, nice one as always, your finding rocks. Cheers 2009/8/31 r1d1nd1rty > why would anyone write a 0day with... > > # bug found & exploited by Kingcope, kcope2googlemail.com > # Affects IIS6 with stack cookie protection >

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
e my day, and create a stupid script to flood with mutiple > request to reset password. > > LOL > > 2009/8/10 Jeremy Brown <0xjbrow...@gmail.com> > > I'm guessing your not a Wordpress administrator, Fabio. Nice find >> Laurent, as usual. >> >> On Mon,

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
Dude, your email is more funny, than serious. It's a pure troll. What ever from now on. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
"Rafal M. Los Security & IT Risk Strategist" where ? @home ? oh boy. 2009/8/11 Rafal M. Los > Empty reply... on purpose or...? > . > > Rafal > > *From:* laurent gaffie > *Sent:* Monday, August 10, 2009 11:43 PM > *To:* Rafal M. Los > *Subject:*

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
. > > Rafal M. Los > Security & IT Risk Strategist > > - Blog: http://preachsecurity.blogspot.com > - LinkedIn: http://www.linkedin.com/in/rmlos > - Twitter: http://twitter.com/RafalLos > > *From:* laurent gaffie > *Sent:* Monday, August 10, 2009 9:0

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
Well, i dont think so, that's why i published this. It very limitated. It's true, someone can make a loop script and avoid any possibility to log back on your wordpress blog, but you also can avoid that functionality easily, you just need to comment out 1 line. Anyways, a patch should come out soon

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
ing or put your admin access > in risk. > > :-P to me , this vulnerability is more "BUZZ" then real deal. LOL > > > 2009/8/10 laurent gaffie > >> Hi there, >> >> This wasn't tested on the 2.7* branch. >> It as been tested on the

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
gt; On Mon, 10 Aug 2009, laurent gaffie wrote: > > > Errata: > > > > "V. BUSINESS IMPACT > > - > > An attacker could exploit this vulnerability to compromise the admin > account > > of any wordpress/wordpress-mu <= 2.8.3" > &g

Re: [Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
the admin account of any wordpress/wordpress-mu <= 2.8.3" Regards Laurent Gaffié 2009/8/10 laurent gaffie > = > - Release date: August 10th, 2009 > - Discovered by: Laurent Gaffié > - Severity: Medium > ==

[Full-disclosure] WordPress <= 2.8.3 Remote admin reset password

2009-08-10 Thread laurent gaffie
= - Release date: August 10th, 2009 - Discovered by: Laurent Gaffié - Severity: Medium = I. VULNERABILITY - WordPress <= 2.8.3 Remote admin reset password II. BACKGROUND ---

Re: [Full-disclosure] AntiSec Lamers Exposed

2009-07-28 Thread laurent gaffie
or face legal action, understood? > > > http://news.cnet.com/8618-27080_3-10295688.html?communityId=2134&targetCommunityId=2134&blogId=245&messageId=8219055&tag=mncol;tback > > Thanks for understanding, > > Andrew > > On Wed, Jul 29, 2009 at 12:06 AM, l

Re: [Full-disclosure] AntiSec Lamers Exposed

2009-07-28 Thread laurent gaffie
Hi there, First of all i dont care about antisec, antisex, anti-sec, n3td3v trolls, and anti-se* But i'll be speaking only about FACTS : You have to prove by A+B, that this man {who ever he is} was really behind his computer while this crime was done, and that his computer wasn't compromised by s

Re: [Full-disclosure] TinyBrowser (TinyMCE Editor File browser) 1.41.6 - Multiple Vulnerabilities

2009-07-28 Thread laurent gaffie
***this also affect any joomla! >1.5.* *** 2009/7/28 YGN Ethical Hacker Group (http://yehg.net) > > == > TinyBrowser (TinyMCE Editor File browser) 1.41.6 - Multiple > Vulnerabilities > > ==

Re: [Full-disclosure] A brief message on the topic of Anti-Sec

2009-07-20 Thread laurent gaffie
"Ok? Well, then have a nice day and don't hold your breathe waiting for the OpenSSH 0day. 0pen0wn.c (http://www.nopaste.com/p/aDTdT5s1C) was it!" ya the hex encoded irc bot & rm -rf ? :) 2009/7/20 > Hi, > > My name is DeadlyData. I enjoy long walks on the beach, getting > pizzas delivered to

[Full-disclosure] Soulseek 157 NS < 13e & 156.* Remote Direct Peer Search Code Execution

2009-07-02 Thread laurent gaffie
Soulseek 157 NS < 13e & 156.* Remote Peer Search Code Execution = - Release date: July 02, 2009 - Discovered by: Laurent Gaffié ; http://g-laurent.blogspot.com/ - Severity: critical = I. VULNERABILITY -

Re: [Full-disclosure] Apple QuickTime 0day

2009-06-15 Thread laurent gaffie
Hi WebDEVIL, You base your PoC on this plugin (http://www.codeplex.com/msecdbg) for windbg (as copy/pasted), but i wonder, what make you think it's really exploitable (on quicktime) ? Have you tried that PoC on Itunes ? Itunes, use Quicktime as a module to read .mov files, but Itunes doesn't have

Re: [Full-disclosure] Soulseek * P2P Remote Distributed Search Code Execution

2009-06-04 Thread laurent gaffie
oulseek-p2p-remote-distributed-search.html#comments > > 2009/5/25 Pete Licoln > > Oh so you have a blog ... >> http://g-laurent.blogspot.com/ >> >> 2009/5/25 laurent gaffie >> >>> = >>> - Relea

[Full-disclosure] Soulseek * P2P Remote Distributed Search Code Execution

2009-05-25 Thread laurent gaffie
= - Release date: May 24th, 2009 - Discovered by: Laurent Gaffié - Severity: critical = I. VULNERABILITY - Soulseek 157 NS * & 156.* Remote Distributed Search Code Execution II. BACKGRO

[Full-disclosure] QuickTime <= 7.4.1 QTPlugin.ocx Multiple Remote Stack Overflow

2008-02-13 Thread laurent gaffie
Application: QuickTime <= 7.4.1 QTPlugin.ocx Multiple Remote Stack Overflow Web Site: http://www.apple.com/fr/quicktime/download/ Platform: Windows Bug: Multiple Remote Stack Overflow --- 1) Introduction 2) Bug 3) Proof of concept 4) Credi