-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This is an announcement only email list for the x86 architecture.
Turbolinux Security Announcement 23/Jul/2003
The following
Some time back there was a stated agenda from a blackhat group attacking
whitehats that included destroying Full-Disclosure and Bugtraq...
pr0jekt m4yh3m
Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2
Free, ultra-private instant
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi!
i know there's a lot of stupid jokes about XSS vulns right
now, but I was wondering if there is any firewall or IDS
software that can look for suspicious GET requests ... ie.
GET /vulnerablewebapp/?XSS SHZNIT
Watch out! Not just GET
set digest off
Uwaga! Do konca sierpnia przedluzylismy promocje, do pakietow
wielostanowiskowych dokladamy PenDrive Sprawdz:
http://www.mks.com.pl/promocja-mobile.html
___
Full-Disclosure - We believe in it.
Charter:
since were on the subject now... ill clear up my backlog...
Sites Affected...
Overture
Altavista
MetaCrawler
Excite
Webcrawler
InfoPlease
MarketWatch
Icq
Looksmart
Product affected : Xavi X7028r DSL router
Description :
Telefonica offers to his clients in Spain and South America the possibility
of installing with his ADSL service a wireless router developed by XAVI .
This router is Universal Plug and Play capable and when it receives a
UPNP M-SEARCH
i just have one xss google:
just goto:
http://www.safecenter.net/crosszone/Top/ServerSide/Dir-SS-Known/SS-Top.htm
and click the google icon.
(MSIE only)
but you can't waste too much time on xss. remote
system compromise is more funny.
--- morning_wood [EMAIL PROTECTED]
since were on the
?!?
Hmm. So we have some dislikes about how the list is run. Though I did say:
Accoding to Len they should have received a warning and be on, if not
already done, a ban list shortly. We'll see...
Which reflected my doubts about it being done, however since I'm on the CC -
I'm not endorsing
I'm sorry to add to this, but..
Can't we all just forget about this and get on with posting and discussing
security issues. I'm sure that I'm not the only one that has better things
to do with their time than listen to a discussion regarding the morality of
un-moderated mailing lists. I agree
Why is it that you feel compelled to tell us this? Is it not sufficient
for you to simply use your own judgment and unsubscribe without
subjecting those of us who remain on the list to your personal opinions?
By posting this to the list you become as much a part of the problem as
all the other
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
While I'm unaware of any current virus that exhibits this behavior there
is a reasonable possibility to create one. This possibility relies upon
1 of 2 conditions existing on the mail server:
1) A message parsing vulnerability such as the recent
-Original Message-
From: James Patterson Wicks [mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 22, 2003 3:56 PM
To: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Immature blabla / cisco exploit
I have to agree. I subscribed after hearing about this list
on CNN.COM, but while
I Second the motion.
-Original Message-
From: Hales, Jeff (Elan) [mailto:[EMAIL PROTECTED]
Sent: Wednesday, July 23, 2003 10:31 AM
To: '[EMAIL PROTECTED]'
Subject: [Full-Disclosure] Getting boarded now
I'm sorry to add to this, but..
Can't we all just forget about this and get on with
-Original Message-
From: Steve [mailto:[EMAIL PROTECTED]
Sent: Wednesday, July 23, 2003 8:48 AM
To: Ron DuFresne
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Immature blabla / cisco exploit
We have subscribed to a list which contains a very high noise
ratio. We can
Anyone Heard Any more on The XBOX Hack
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Perhaps we should establish some criteria for this list,
outlining what is and isn't appropriate subjects to
discuss here, and establish a better FAQ explaining
the matters.
The value and the curse of this list is that it is an open forum. I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: phpgroupware
Advisory
Seems I got confused as to whom Len works with. I'm glad it was not
originating from the list owners... My apologies if they were offended!
Steve Szmidt
___
Full-Disclosure - We believe in it.
Charter:
rofl.
/m
- Original Message -
From: PiG_DoG [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, July 23, 2003 8:57 AM
Subject: [Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #970 - 38 msgs
Anyone Heard Any more on The XBOX Hack
I too just signed up and except for the flame war here and there the
information is good and there are good security topic discussions with
intelligent people so im glad to be here
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 22, 2003 5:30 PM
Yes but what affect does this have on the server? How does it comprimise security? Can
you use this to DoS the server? Can you use this to gain access to areas on the server
otherwise not available?
On Wed, 23 Jul 2003 02:18:05 -0700
morning_wood [EMAIL PROTECTED] wrote:
since were on the
On July 22 Curt Purdy [EMAIL PROTECTED] said
If the packet expires in transit i.e. ttl 1 to router 2 hops away means
it
never gets to that router. Not possible to fill a queue with a packet
that
is dropped by the previous router.
Someone said that having the TTL of an evil packet expire on
I thought I'd share the final results of my testing of the recent Cisco
exploit with the list here. I had the concern that the new IOS versions
released by Cisco would be immune to the original exploit but may not cover
variants or other protocols that are susceptible. I recompiled the exploit
both..
Can you use this to DoS the server?
consider that the server must process the requests.. i think it can be a
DoS issue with enough length and quanity of the requests.
Can you use this to gain access to areas on the server otherwise not
available?
many servers assume a call to
Is this new? I read about it on slashdot...
http://lasecpc13.epfl.ch/ntcrack/
Basically, it seems that Microsoft has (yet again) screwed up the
implementation of their encryption scheme. This makes cracking any hash
a matter of seconds. Oops...
--
This link is to a more technical document on the windows password
flaws...
http://lasecwww.epfl.ch/pub/lasec/doc/Oech03.pdf
--
---
Darren Bennett
CISSP, Certified Unix Admin., MCSE, MCSA, MCP +I
Sr. Systems Administrator/Manager
Science Applications
Why is it that you feel compelled to tell us this?
By posting this to the list you become as much a part of
the problem as all the other baloney that goes on here.
Exactly P.S., so why don't YOU shut up already?
Vic
___
Full-Disclosure - We believe in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Not speaking to these specific vulnerabilities, XSS attacks in general, let
you masquerade info as being legitimate data from the server.
For example, you can present the user with an error page which LOOKS like a
login page with the method in the
all those certs and not a clue...they just spead up an old process
Darren Bennett wrote:
Is this new? I read about it on slashdot...
http://lasecpc13.epfl.ch/ntcrack/
Basically, it seems that Microsoft has (yet again) screwed up the
implementation of their encryption scheme. This makes
Hello,
Anyone Heard Any more on The XBOX Hack
currently there are 4 known exploits against XBOX software.
(order of releasedate)
1) 007: Agent under Fire - Savegame Stackoverflow Exploit
2) Mechassault - Savegame Stackoverflow Exploit
3) Dashboard Font Loader Integer/Heap Overflow
4)
Wednesday, 23 July, 2003
Yet another quaint lead-up to silent delivery and installation of an
executable on a target computer. No client input other than viewing a
web page !
This is getting boring.
A myriad of technical hurdles have been recently placed to disallow
access to files and
On Wed, 2003-07-23 at 12:48, Darren Bennett wrote:
Is this new? I read about it on slashdot...
http://lasecpc13.epfl.ch/ntcrack/
Basically, it seems that Microsoft has (yet again) screwed up the
implementation of their encryption scheme. This makes cracking any hash
a matter of seconds.
This is not a Microsoft screwup, or any kind of screwup in fact. It's a
technique called Hash Chaining, that the guys at Lasec have improved upon.
It's a way of trading off time for memory usage for effectively generating a
table of precomputed hashes; the only flaw here lies in the fact that
As far as your code is concerned any number that suits
(real_vuln_protocol)+256*n should crash the machine. However, this is
meaningless, since, as you say, the IP header's protocol field is only 8
bits, so you can generate larger numbers all day, but only your
least-significant 8 bits are being
Dear Darren Bennett,
Windows uses password hash in a same way as Unix uses cleartext
password. Having password hash you can connect to Windows network
without knowledge of cleartext password (I spent 2 minutes to modify
smbclient to use hash instead of password and 5 minutes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Some quick corrections:
- this paragraph is now readable
One of the original example of XSS was where an exploiter gave a link on his
webpage to a location under the nytime domain, which, when clicked presented
the user with a bogus story.
So why not show one of these legitimate examples instead of the overused window popup
script?
It would just be easier to ascertain the level of severity if an actual DoS string or
this trusted internal call was exploited.
I am sure there are a lot of forms that can be a victim of a xss string,
Here is a yahoo story on the same problem... Others seem to think that
it is indeed a problem (and one that ONLY affects Windows).
http://story.news.yahoo.com/news?tmpl=storycid=620ncid=620e=1u=/nf/20030723/bs_nf/21952On
-Darren
Wed, 2003-07-23 at 13:24, 3APA3A wrote:
Dear
Joshua Thomas wrote:
AFAIK the list is currently unmoderated. I would like to see it
moderated. This list seems to be more like Jerry Springer than
anything else at the moment.
May I recommend bugtraq/unsubscribing/a mail client capable of filtering
what you consider unworthy of your gaze/a
[EMAIL PROTECTED] wrote:
On Wed, 23 Jul 2003 16:57:19 BST, PiG_DoG [EMAIL PROTECTED] said:
Anyone Heard Any more on The XBOX Hack
Which one?
(I'm not being facetious here - I've seen rumors of at least 3 different hacks for
it,
unless said rumors have mutated so widely that they're 3
It really is so site specific that it is hard to say. The thing to
remember about XSS is that general attack vectors are client-to-client.
So user a can attack user b. It is really not a client-to-server
attack. The most common attack scenario that I have seen is getting
user b to click on a
full disclosure is full disclosure.
Good, bad, inappropriate, immature, enlightened, stupid, free, full disclosure of
security issues . discussed by people who may value or ridicule the information.
You're reading this list because you want information that you probably can't get
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Red Hat Security Advisory
Synopsis: Updated semi packages fix vulnerability
Advisory ID: RHSA-2003:234-01
Issue date:2003-07-23
Updated
The advisory announced this morning (MDKSA-2003:077 for phpgroupware)
contains an incorrect CVE name which referenced a mpg123 vulnerability.
The correct CVE names are CAN-2003-0504 and CAN-2003-0582.
My apologies for the confusion.
--
MandrakeSoft Security; http://www.mandrakesecure.net/
1. News and Views
by Paul Thurrott, [EMAIL PROTECTED]
Researchers Crack Windows Passwords in Seconds
Swiss researchers have developed a password-cracking scheme, based
on a method first developed in 1980, that lets them crack most Windows
passwords in about 13 seconds (the
posting to the full disclosure list is like arguing on the internet, or
being retarded or something like that.
On Tue, 22 Jul 2003, Person wrote:
P.S. Remind me never to hire you for a pen-testing gig ;)
[t]
___
Full-Disclosure - We believe in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: xpdf
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: mpg123
Advisory ID:
48 matches
Mail list logo