[Full-Disclosure] Fwd: Re: xbl vulnerabilty

2003-07-09 Thread auto94042
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 this joey is giving me the nod of confidense, yes it is the one, we make some fix and tell the ppl - - phew ! - - Forwarded Message from Joey Hess [EMAIL PROTECTED] - [EMAIL PROTECTED] wrote: if ( strcmp(argv[i],-display)==0 )

[Full-Disclosure] Fwd: xbl vulnerabilty

2003-07-09 Thread auto94042
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 shy jo and debian team not give me the thanks for the work i do for them to protet cutsomers _. so i forward the privilige corespond between me and shy jo i must do this one becuase everybody know i work for the prop, other guy make the dough -

[Full-Disclosure] Administriva: Anniversary

2003-07-09 Thread Len Rose
One year ago today we created this list in the hopes it would renew the principles of open, unfettered discourse that used to be common in earlier days. It has occasionally been rough, and we know often people despair at the immaturity and noise that the list generates at times. We're grateful

[Full-Disclosure] Fwd: Re: xbl vulnerabilty

2003-07-09 Thread auto94042
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 holos everyone this is the last that shy jo and me share the word but he blow me off BIG time(he send me to the /dev/null) and than i see debian make xbl advisery but not thank me for the hard work - - fellows please make notice that i do not make

Re: [Full-Disclosure] RE: Symantec Change Posting Criteria

2003-07-09 Thread Alfred Huger
Not that it's worth encouraging this thread but my post to pen-test is direct and true. My previous finances are not anyones business. Further when I did invest in CORE it was well before they had an american presence (1998 to be exact) The share at the time which is long since a non-issue was

RE: [Full-Disclosure] RE: Symantec Change Posting Criteria

2003-07-09 Thread Steve W. Manzuik
Al, This wasn't an attempt to stir anything and I would have gladly posted this to *your* list be you have seen it fit to block pretty much everything I post to your lists. Something that in my opinion is uncalled for and quite immature but that issue is older than the archive I dragged out of

[Full-Disclosure] Re: Fwd: xbl vulnerabilty

2003-07-09 Thread martin f krafft
also sprach [EMAIL PROTECTED] [EMAIL PROTECTED] [2003.07.09.0608 +0200]: shy jo and debian team not give me the thanks for the work i do for them to protet cutsomers _. so i forward the privilige corespond between me and shy jo If you don't give us a name, we can't credit you. We will not say

[Full-Disclosure] List Charter

2003-07-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright [EMAIL PROTECTED] and Len Rose [EMAIL PROTECTED] Introduction Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created on 9th July 2002 by

Re: [Full-Disclosure] Re: Fwd: xbl vulnerabilty

2003-07-09 Thread Martin Peikert
Hello, martin f krafft wrote: If you don't give us a name, we can't credit you. We will not say that mysterious [EMAIL PROTECTED] found that... there was a discussion on pen-test about anonymity, so I won't start that here again. But maybe some of the arguments mentioned there are necessary to

[Full-Disclosure] Coda RPC2 Denial of service

2003-07-09 Thread andrewg
_,'| _.-''``-...___..--';) /_ \'. __..-' , ,--...--''' \.`--''' ` /' `-';' ; ; ; __...--'' ___...--_..' .;.' fL (,__'''

Re: [Full-Disclosure] Internet Explorer 6 DoS Bug

2003-07-09 Thread xc3ed
duplicated in Windows 2003 Server, datacenter edition, IE v6.0.3790.0 regards, xsr - Original Message - From: KF [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Monday, July 07, 2003 3:19 PM Subject: Re: [Full-Disclosure] Internet Explorer 6 DoS Bug I can NOT

[Full-Disclosure] TerminatorX local root

2003-07-09 Thread andrewg
Program: terminatorX 3.80 Impact: Users can gain local root Discovered: jaguar Writeup and exploits: Andrew Griffiths 1) Background 'terminatorX is a realtime audio synthesizer that allows you to scratch on digitally sampled audio data (*.wav, *.au, *.ogg, *.mp3, etc.) the way

[Full-Disclosure] [ANNOUNCE][SECURITY] Apache 2.0.47 released

2003-07-09 Thread Apache HTTP Server Project
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Apache 2.0.47 Released The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the tenth public release of the Apache 2.0 HTTP Server. This Announcement notes the significant changes

Re: [Full-Disclosure] Re: Fwd: xbl vulnerabilty

2003-07-09 Thread Steve Kemp
On Wed, Jul 09, 2003 at 09:12:01AM +0200, martin f krafft wrote: If you don't give us a name, we can't credit you. We will not say that mysterious [EMAIL PROTECTED] found that... Some bugs are credited nicely, for example DSA-327 which was my initial XBL report. (Don't know how I missed

[Full-Disclosure] IE Object Type Overflow Exploit

2003-07-09 Thread ash
_,'| _.-''``-...___..--';) /_ \'. __..-' , ,--...--''' \.`--''' ` /' `-';' ; ; ; __...--'' ___...--_..' .;.' fL (,__'''

[Full-Disclosure] piercing NetScreen firewalls

2003-07-09 Thread new InquisiTeam
SUBJECT: piercing NetScreen firewalls = This is an advisory of a major flaw discovered on NetScreen firewall devices. You may publish it as is. The software vendor -- NetScreen Technologies -- was notified 3 weeks ago. == I. SUMMARY ==

[Full-Disclosure] Bankruptcy Court IT Security Contact

2003-07-09 Thread Bernie, CTA
Does anyone know the email address of the person responsible for the Security of the information systems of the United States Bankruptcy Court? I attempted to write them and bring attention to a simple security/privacy flaw in their system, which if exploited enables identity thieves to

SV: [Full-Disclosure] Does the Windows AUX bug affect Web servers also?

2003-07-09 Thread Peter Kruse
Hi Richard, AFAIK it can´t be done with a http://www.someserver./aux but there´re several other ways to exploit this DoS. It can be done over network shares and anywhere we include HTML and scripts (webpages, e-mails, internal documents and so on). I have succesfully crashed a server placering

Re: [Full-Disclosure] Does the Windows AUX bug affect Web servers also?

2003-07-09 Thread morning_wood
Is it possible to also crash a Web server hosted on a Windows box using a URL something like: http://www.somebody.com/aux http://192.168.0.2/aux --- unconfirmed on ANhttpd 1.4h wood ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-Disclosure] Does the Windows AUX bug affect Web servers also?

2003-07-09 Thread Matthew Murphy
Richard Smith writes: Is it possible to also crash a Web server hosted on a Windows box using a URL something like: http://www.somebody.com/aux If this particular URL is okay, maybe there are other URLs that will cause a crash. For example, POSTing a form to a URL containing AUX.

[Full-Disclosure] Acroread 5.0.7 buffer overflow

2003-07-09 Thread Paul Szabo
I. BACKGROUND Acroread from http://www.adobe.com is the pre-eminent PDF file viewer. The latest version Acroread 5.0.7 for Linux was released on 17 June 2003. II. DESCRIPTION Despite recent security fixes, an exploitable buffer overflow with long URL strings remains. The overflow occurs when