[Full-Disclosure] SuSE Security Announcement: openssl (SuSE-SA:2003:011)

2003-02-26 Thread Roman Drahtmueller
-BEGIN PGP SIGNED MESSAGE- __ SuSE Security Announcement Package:openssl Announcement-ID:SuSE-SA:2003:011 Date:

[Full-Disclosure] ./makeunicode2.py release announcement

2003-02-26 Thread 0 0
Immunity, Inc. is pleased to announce the availability of makeunicode2.py - a Python program that will encode arbitrary x86 shellcode into a valid unicode string. This program is available from the BlackHat web site at

RE: [Full-Disclosure] FW: Citibank tries to gag crypto bug disclosure

2003-02-26 Thread John . Airey
Looks to me like the story isn't gagged any longer: http://news.bbc.co.uk/1/hi/england/2798029.stm - John Airey, BSc (Jt Hons), CNA, RHCE Internet systems support officer, ITCSD, Royal National Institute of the Blind, Bakewell Road, Peterborough PE2 6XU, Tel.: +44 (0) 1733 375299 Fax: +44

[Full-Disclosure] MDKSA-2003:025 - Updated webmin packages fix session ID spoofing vulnerability

2003-02-26 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: webmin Advisory ID:

Re: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread yossarian
Title: Cryptome Hacked! Well, the mirror on lessgov is gone too.But http://cryptome.sabotage.org/is still up, anyway. So you can see for yourself that they have PGP as the only crypto product they offer. If they have altered it, anyone can see by comparing the source, which they also provide

[Full-Disclosure] MDKSA-2003:026 - Updated shadow-utils packages fix improper mailspool ownership

2003-02-26 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: shadow-utils Advisory

RE: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread Sung J. Choe
Title: RE: [Full-Disclosure] Cryptome Hacked! Third, the best method of ensuring the integrity of software right now is signed crypographic checksums from someone you trust. What would you use to generate that checksum? Can you trust the software used to generate the checksum? How can you

RE: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread Sung J. Choe
Title: Cryptome Hacked! Let me turn around the issue a bit - any crypto software distributed with the blessing or very active support in development of the Powers That Are in No Such Agency That is my point exactly. Anybody foolish enough to think that the US govt would allow unbreakable

RE: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread batz
On Wed, 26 Feb 2003, Sung J. Choe wrote: : Third, the best method of ensuring the integrity of software right now : is signed crypographic checksums from someone you trust. :What would you use to generate that checksum? Can you trust the software :used to generate the checksum? How can you

RE: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread Steve Wray
You posed a general question; This brings up the following question: What is the best method for ensuring the integrity of software which require a high level of trust? I answered in general terms. But to be particular, I know nothing of this person or his software. Is the sourcecode

Re: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread Kevin Spett
RE: [Full-Disclosure] Cryptome Hacked! a) What do you mean by leftist? By scrutinizing some of the occasional statements made by persons posting at cryptome, one can assume that the politics of the site operators leans towards the left. Read the message traffic generated by The practical

RE: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread Steve Wray
From the group charter: Politics should be avoided at all costs. So discussion about the discussion of politics is ok but discussion of politics is not? 8-/ -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kevin Spett Sent: Thursday, 27 February

[Full-Disclosure] Re: Terminal Emulator Security Issues

2003-02-26 Thread Horms
On Tue, Feb 25, 2003 at 08:07:08AM -0600, H D Moore wrote: On Monday 24 February 2003 08:09 pm, Michael Jennings wrote: I'm not sure what vendor coordination was done, but I know I was never contacted. Just FYI. The vendor coordination was done through the vendor-sec mailing list with

[Full-Disclosure] Buffer Overrun Vulnerability in /sbin/ps on IRIX

2003-02-26 Thread SGI Security Coordinator
-BEGIN PGP SIGNED MESSAGE- __ SGI Security Advisory Title: Buffer Overrun Vulnerability in /sbin/ps Number : 20030202-01-I Date : February 26, 2003 Reference: CVE-1999-0301

Re: [Full-Disclosure] Cryptome Hacked!

2003-02-26 Thread Etaoin Shrdlu
Instead of replying to the arrant nonsense deposited here by someone who should know not to bother his betters, we should all offer our sympathy and respect to one of the few men of integrity. John Young is a successful architect, who pays for cryptome and related efforts out of his pocket. He