RE: [fd] RE: [Full-Disclosure] [Fwd: Edwards AFB shut down by W32Blaster] (fwd)

2003-08-21 Thread Steve Wray
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Andre Ludwig rant I nominate this thread most useless thread EVAR! With that being said, can you guys please move on, and repeat after me. CERTS MEAN NOTHING! Unless you are trying to get a job and the only thing the

RE: [Full-Disclosure] SoBig.F strange problem

2003-08-21 Thread Dowling, Gabrielle
I believe F-Prot found that 10% of transmissions by this virus do not include the attachment, not due to a broken variant but just doto the coding, and my apologies if I'm not attributing credit properly, I'm tired and there's been a lot of e-mail. I cann definitivey say I learned this from

RE: [Full-Disclosure] Administrivia: Testing Emergency Virus Filter..

2003-08-21 Thread Dowling, Gabrielle
Paul. Are you sure that this is true? I know there was an autoexecution concern with MiMail, for general unzip, but was wrong to begin with with respect to that but even the initial post found it was not a concern with the XP unzipping functionality. I have never seen the XP unzip cause

RE: [Full-Disclosure] SoBig.F strange problem

2003-08-21 Thread Ben Nelson
On August 20, 7:09 am Steve Bremer [EMAIL PROTECTED] wrote: line). But it seems to be broken in other areas, I think I'm getting We've noticed a few problems with it as well. We've received a few e- mails with one of the typical Sobig subject lines, only no attachment. The attachment

[Full-Disclosure] Re: EEYE: Internet Explorer Object Data Remote Execution Vulnerability

2003-08-21 Thread [EMAIL PROTECTED]
!-- This attack may be utilized wherever IE parses HTML, including web sites, e-mail, newsgroups, and within applications utilizing web-browsing functionality. -- W0W ! [harmless .exe] http://www.malware.com/drew.html ouch ! -- http://www.malware.com

[Full-Disclosure] windowsupdate

2003-08-21 Thread *Hobbit*
[Observation stolen from nanog.] Windows Update uses ActiveX Controls and active scripting to display content correctly and to determine which updates apply to your computer. To view and download updates for your computer, your Internet Explorer security settings must meet the

RE: [Full-Disclosure] Re: Administrivia: Testing Emergency VirusFilter..

2003-08-21 Thread Gary E. Miller
Yo Paul! On Wed, 20 Aug 2003, Paul Schmehl wrote: Now change the word virus to trojan or rootkit, and your defense of *nix falls apart. Notice I never used the words UNIX. NT can be run in a trusted manner, just not with an ethernet card according to the US Gov standards. Several OS other

Re: [Full-Disclosure] Administrivia: Testing Emergency Virus Filter..

2003-08-21 Thread Valdis . Kletnieks
On Thu, 21 Aug 2003 11:56:15 +1200, Nick FitzGerald [EMAIL PROTECTED] said: trouble with it. If your solution to this problem is to sugegst that some new file transfer mechanism should be devised and implementations widely distributed, then you will simply move the target of choice for

Re: [Full-Disclosure] windowsupdate

2003-08-21 Thread Jeremiah Cornelius
[Observation stolen from nanog.] Windows Update uses ActiveX Controls and active scripting to display content correctly and to determine which updates apply to your computer. To view and download updates for your computer, your Internet Explorer security settings must meet the

Re: [Full-Disclosure] Re: Administrivia: Testing Emergency Virus Filter..

2003-08-21 Thread Thor Larholm
From: Drew Copley [EMAIL PROTECTED] Actually, quite a few don't, some still rely on piggy backing Outlook. But, yes, this trend should be dissapearing as people upgrade so their Outlook client will no longer be able to be remote controlled by another application. (Current versions not only

RE: [Full-Disclosure] MSBlaster EXE file

2003-08-21 Thread Simon Thornton
Hi, Minor observation; if you want to post samples of virii/trojans/malware, either as an email attachment or on a website, please put it into a pwd protected ZIP/RAR/ARJ etc and include the password with your post. You might even put the password in filename of the attachment (name-passord?).

RE: [Full-Disclosure] Re: Filtering sobig with postfix

2003-08-21 Thread Bojan Zdrnja
-Original Message- From: Craig Pratt [mailto:[EMAIL PROTECTED] Sent: Thursday, 21 August 2003 5:52 p.m. To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Re: Filtering sobig with postfix You'd better check for a lot more than just .pif files. .scr and

AW: [Full-Disclosure] Al Qaida claims responsibility for blackout

2003-08-21 Thread vogt
http://www.foxnews.com/story/0,2933,95049,00.html In the entire history of FirstEnergy, FirstEnergy spokesman Todd Schneider said there hasn't been an outage of any system due to hackers, and that that the weather in northeastern Ohio did more damage. In light of this: [...] see:

Re: [Full-Disclosure] Administrivia: Testing Emergency Virus Filter..

2003-08-21 Thread Nick FitzGerald
[EMAIL PROTECTED] to me: trouble with it. If your solution to this problem is to sugegst that some new file transfer mechanism should be devised and implementations widely distributed, then you will simply move the target of choice for the bad guys from SMTP to Paul And Richard's

Re: [Full-Disclosure] Re: Filtering sobig with postfix

2003-08-21 Thread securdz
I did it by setting up DrWeb antivirus software, that works quite nice with Postfix (and IMHO is the best FREE antivirus daemon for *nix servers). I turned off bounce email notification to the sender of the virus (with this evil virii they are innocent in 99,9% of cases), so it is already less

AW: [Full-Disclosure] Re: Filtering sobig with postfix

2003-08-21 Thread vogt
Yep, as the OP is using postfix, he could use the header_checks directive, which can identify MIME headers, so he can easily stop this worm. Just check for Content-Disposition header and block everything with .pif in filename. Thought about that, but doesn't quite work. The headers only

RE: [Full-Disclosure] windowsupdate

2003-08-21 Thread Mike Fratto
[Observation stolen from nanog.] Windows Update uses ActiveX Controls and active scripting to display content correctly and to determine which updates apply to your computer. ---snip--- What the hell are you people thinking?! Try configuring the trusted zone in IE, set your

[Full-Disclosure] HP Tandem NonStop servers

2003-08-21 Thread david king
I was told by a few that the HP tandem NonStop servers are the most secure servers ? i have got myself a box and have been tasksed to do a security review. Does anyone have any recomdations/idea how i should go abt doing it ?Yahoo! Plus - For a better Internet experience

Re: [Full-Disclosure] Re: Administrivia: Testing Emergency VirusFilter..

2003-08-21 Thread Nick FitzGerald
martin f krafft [EMAIL PROTECTED] wrote: The problem with virii such as this is not the software but the wetware - the bewildered enduser who fails to use his machine in a secure manner responsible to his community. Only partially right, the other part is bugs in software and automation

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: BinaryExecutables w/o Source

2003-08-21 Thread Nick FitzGerald
Jason Coombs [EMAIL PROTECTED], whose input is usually intelligent, considered and well-reasoned, chose to fall from his pedestal thus: Curt Purdy opined: FWIW I disagree with any moderation at all. The point is, this is a FREE forum, one of the few left in the world. I agree

Re: [Full-Disclosure] HP Tandem NonStop servers

2003-08-21 Thread KF
What OS do they run? Everyone knows that all HP issues are only Potential issues thus making them rock solid. (sarcasm). -KF david king wrote: I was told by a few that the HP tandem NonStop servers are the most secure servers ? i have got myself a box and have been tasksed to do a security

RE: [Full-Disclosure] Administrivia: Testing Emergency VirusFilter..

2003-08-21 Thread Dan Stromberg
On Wed, 2003-08-20 at 16:56, Nick FitzGerald wrote: 2. I suspect that Mr Turing and a his halting problem will intervene in any attempt to devise a foolproof this message contains an attachment mechanism. The obvious choice to break any such system is steganographic encoding of a binary

[Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Sch4143291
Hi everyone, I'm getting warnings that the file jdbgmgr.exe which shows up under properties as a java debugger file (create date 1999) is actually a virus which will shut down your machines in 14 days. The warning states that it copies your address book and sends itself out. Does anyone have

Re: [Full-Disclosure] HP Tandem NonStop servers

2003-08-21 Thread Tom Knienieder
On Thu, 21 Aug 2003, KF wrote: What OS do they run? NonStop Kernel is UNIX based and was developed by Tandem in the 90's Everyone knows that all HP issues are only Potential issues thus making them rock solid. (sarcasm). -KF david king wrote: I was told by a few that the HP tandem

RE: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Anthony Aykut
http://securityresponse.symantec.com/avcenter/venc/data/jdbgmgr.exe.file.hoa x.html http://hoaxbusters.ciac.org/HBMalCode.shtml#jdbgmgr http://antivirus.about.com/library/hoaxes/blenjdb.htm -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED]

[Full-Disclosure] Thanks for the hoax info.

2003-08-21 Thread Sch4143291
Thanks for the information showing it is a hoax. Sch4143291

Re: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Alexander Müller
Does anyone have info on this? Is this a hoax? Try this: http://www.symantec.com/avcenter/venc/data/jdbgmgr.exe.file.hoax.html ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] HP Tandem NonStop servers

2003-08-21 Thread KF
Well if its a unix based OS I would start with a suid / sgid listing... as well as checking the listening services... Shoot me a find / -perm -4000 and a find / -perm -2000 along with a netstat -a and we can go from there. If you are willing to give up a shell I'll beat on the suids myself for

RE: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Rizwan Jiwan
It is a hoax http://www.symantec.com/avcenter/venc/data/jdbgmgr.exe.file.hoax.html -Riz -Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]Sent: Thursday, August 21, 2003 11:05 AMTo: [EMAIL PROTECTED]Subject: [Full-Disclosure] jdbgmgr.exe hoax virus?Hi

Re: [Full-Disclosure] HP Tandem NonStop servers

2003-08-21 Thread Larry W. Cashdollar
On Thu, 21 Aug 2003, KF wrote: Well if its a unix based OS I would start with a suid / sgid listing... as well as checking the listening services... Shoot me a find / -perm -4000 and a find / -perm -2000 along with a netstat -a and we can go from there. If you are willing to give up a

Re: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Jim Race
What? Did AOL turn off access to Google? http://www.symantec.com/avcenter/venc/data/jdbgmgr.exe.file.hoax.html Can we quit with discussions of SoBig, Blaster and other garbage for awhile please? -jim [EMAIL PROTECTED] wrote: Hi everyone, I'm getting warnings that the file _jdbgmgr.exe_

Re: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread David Gianndrea
See this. http://vil.nai.com/vil/content/v_99436.htm [EMAIL PROTECTED] wrote: Hi everyone, I'm getting warnings that the file jdbgmgr.exe which shows up under properties as a java debugger file (create date 1999) is actually a virus which will shut down your machines in 14 days. The

Re: [SPAM] [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread henry j. mason
HOAX! that file really is what it says it is. check google before ya post, say I. henry [EMAIL PROTECTED] wrote: Hi everyone, I'm getting warnings that the file jdbgmgr.exe which shows up under properties as a java debugger file (create date 1999) is actually a virus which will

Re: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Christoph Handel
On Thu, 21 Aug 2003 11:04:36 EDT [EMAIL PROTECTED] wrote: Hi everyone, I'm getting warnings that the file jdbgmgr.exe which shows up under properties as a java debugger file (create date 1999) is actually a virus which will shut down your machines in 14 days. The warning

[Full-Disclosure] Thanks re: info on jdbgmgr hoax

2003-08-21 Thread Sch4143291
Thanks everyone for the info and links. Don't want to take up any more time on Full Disclosure on this. You folks have been great. Sch4143291

[Full-Disclosure] [Fwd: Caveat Emptor: Verizon's email service and ol 'live' customersupport challenges]

2003-08-21 Thread Adam H. Pendleton
Observations from a Verizon customer (emphasis is mine): Original Message Recently switched to Verizon's dsl service. Following experience should be noted by present and prospective Verizon email users. Today, after returning from a 2 day weekend away from downloading

[Full-Disclosure] Anyone? Important Security Update for the .NET Messenger Service

2003-08-21 Thread Koen Van Impe
This seems closely related to my previous post: http://slashdot.org/article.pl?sid=03/08/20/221226 --- Hi List, Has anyone seen this recent so called 'update' for MSN Messenger? This (full-email follows below) was in my mailbox today but as far as I know there is no critical update needed

Re: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Saturn
Hello everybody, Yes, it's a Hoax: http://www.symantec.com/avcenter/venc/data/jdbgmgr.exe.file.hoax.html(for example) Regards, Saturn S;-D - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, August 21, 2003 5:04 PM Subject:

[Full-Disclosure] quit the dumd chat man!!

2003-08-21 Thread Ferris, Robin
we had a honey pot hit by some canny FTP kiddies using the RPC flaw to load up an FTP server that ran as a service and also then execute a predifned further attack on some specific IP's any one else seen this. very similar exploit to nachia "whatever its called" worm the attack came from

RE: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Chris DeVoney
Here's a useful URL: www.snopes.com And a specific: http://www.snopes.com/computer/virus/jdbgmgr.htm In short, yes, it's a hoax. cdv -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Thursday, August 21, 2003

[Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Chris Cappuccio
Hey folks, ALL LIST MEMBERS ARE ENCOURAGED TO RESPOND AND MAKE A CHOICE AS TO HOW THEY WANT THIS BASIC FUNCTION OF THE LIST TO CONTINUE OPERATING. The subject header is going to change. This is a survey to see whether people want: 1. To have no subject prefix, that is, we remove

RE: [Full-Disclosure] Re: Administrivia: Testing Emergency Virus Filter..

2003-08-21 Thread Drew Copley
-Original Message- From: Gary E. Miller [mailto:[EMAIL PROTECTED] Sent: Wednesday, August 20, 2003 5:38 PM To: Drew Copley Cc: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Re: Administrivia: Testing Emergency Virus Filter.. Yo Drew! On Wed, 20 Aug 2003, Drew Copley

RE: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread Dan Stromberg
If y'all were using a threaded MUA, we might not get so many nearly identical answers to the same question... mutt (text), evolution (gui), sylpheed (gui), mahogany (gui) all run on linux (plus some other platforms), and all have this ability. Probably others too. Except for [EMAIL PROTECTED]

RE: [Full-Disclosure] Re: Administrivia: Testing Emergency Virus Filter..

2003-08-21 Thread Drew Copley
-Original Message- From: Thor Larholm [mailto:[EMAIL PROTECTED] Sent: Thursday, August 21, 2003 1:32 AM To: Drew Copley; [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Re: Administrivia: Testing Emergency Virus Filter.. From: Drew Copley [EMAIL PROTECTED] Actually,

Re: [Full-Disclosure] HP Tandem NonStop servers

2003-08-21 Thread Valdis . Kletnieks
On Thu, 21 Aug 2003 14:11:26 BST, =?iso-8859-1?q?david=20king?= [EMAIL PROTECTED] said: I was told by a few that the HP tandem NonStop servers are the most secure servers ? i have got myself a box and have been tasksed to do a security review. Does anyone have any recomdations/idea how i

RE: [Full-Disclosure] JAP back doored

2003-08-21 Thread Drew Copley
Why is the state of Germany trojanizing applications which may be run by anyone on the planet? How is it they believe they have a right to trojanize someone outside of Germany? This is blatantly illegal in just about every country outside of Germany. Literally. Are they trying to set a

RE: [Full-Disclosure] windowsupdate

2003-08-21 Thread Drew Copley
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of *Hobbit* Sent: Wednesday, August 20, 2003 4:08 PM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] windowsupdate [Observation stolen from nanog.] Windows Update uses ActiveX Controls and

RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Drew Copley
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Chris Cappuccio Sent: Thursday, August 21, 2003 10:43 AM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!! Hey folks, ALL LIST MEMBERS ARE

RE: [Full-Disclosure] SCADA providers say security not our problem

2003-08-21 Thread Drew Copley
Excellent post, thanks for sharing the info. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michael Scheidell Sent: Wednesday, August 20, 2003 7:41 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL

[Full-Disclosure] Re: Thanks for the hoax info.

2003-08-21 Thread martin f krafft
also sprach [EMAIL PROTECTED] [EMAIL PROTECTED] [2003.08.21.1741 +0200]: Thanks for the information showing it is a hoax. Why does noone release a virus that uses such a filename. After all, everyone knows it'll just be a hoax... -- martin; (greetings from the heart of the sun.)

Re: [Full-Disclosure] JAP back doored

2003-08-21 Thread Adrian Nutz
But this is not the full storysee http://www.heise.de/newsticker/data/uma-20.08.03-000/ (in german). In short: While the AN.ON-Projekt was forced to put in the logging-function, other mixes are not affected. SPLINE (http://www.spline.de/) for example refuses to implment the logging. They are

Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Noldata TAC
Let it be as it is now On Thu, 2003-08-21 at 12:43, Chris Cappuccio wrote: Hey folks, ALL LIST MEMBERS ARE ENCOURAGED TO RESPOND AND MAKE A CHOICE AS TO HOW THEY WANT THIS BASIC FUNCTION OF THE LIST TO CONTINUE OPERATING. The subject header is going to change. This is a survey to see

Re: [Full-Disclosure] jdbgmgr.exe hoax virus?

2003-08-21 Thread morning_wood
i kind of find it shocking that security people are even questioning t hat its real or a hoax, when simple investigation will reveal its a real file. btw, this has been a hoax for aprox 3 years now. Donnie Werner http://e2-labs.com http://exploitlabs.com

[Full-Disclosure] Google Private IP is 10.7.0.73 !!!!!!

2003-08-21 Thread Gaurav Kumar
-BEGIN PGP SIGNED MESSAGE-Hash: SHA1 Hello friends! I have found private ip address used by google servers. here are thedetails. make sure you have google toolbar installed. 1. go to www.showmyip.com2. it will show your ip address.3. now right click and select Translate Page4.

Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Richard Spiers
I agree with the need for the subject to change, but would much prefer option 2. It makes my life easier ;p. - Original Message - From: Chris Cappuccio [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, August 21, 2003 7:43 PM Subject: [Full-Disclosure] Subject prefix changing! READ

Re: [Full-Disclosure] JAP back doored

2003-08-21 Thread Florian Weimer
Drew Copley [EMAIL PROTECTED] writes: Why is the state of Germany trojanizing applications which may be run by anyone on the planet? Why is the U.S. government interfering with the publication of security advisories if the corresponding software is being run throughout the world? The German

[Full-Disclosure] Idea

2003-08-21 Thread D B
i have always had an idea but never any place to try it i would like people with experience to tell me what they think of it assuming a unix / linux operating system as a server install the services get them configured ...remove all booting hardware except the drive then change

RE: [Full-Disclosure] Re: Popular Net anonymity service back-doored

2003-08-21 Thread Drew Copley
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Florian Weimer Sent: Thursday, August 21, 2003 11:39 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: Thomas C. Greene Subject: [Full-Disclosure] Re: Popular Net anonymity service back-doored

Re: [Full-Disclosure] HP Tandem NonStop servers and other off topic crap

2003-08-21 Thread Kurt Seifried
This is now How do I do a pen-test list? Or is it non-stop dicussion of useless details about well known issues that nobody (except the 5 posters) care about list? I'm confused, can someone resend me the list charter? Moderation isn't desired, but I think this unending flood of crap is even less

Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread John Cartwright
oN tHU, Aug 21, 2003 at 10:43:02AM -0700, Chris Cappuccio wrote: ALL LIST MEMBERS ARE ENCOURAGED TO RESPOND AND MAKE A CHOICE AS TO HOW THEY WANT THIS BASIC FUNCTION OF THE LIST TO CONTINUE OPERATING. This has been covered several times... and we certainly *don't* want this mail coming to the

Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread 8tImER
My vote goes to choice #1. :] -- Greetz, 8tImERmailto:[EMAIL PROTECTED] GPG Key-ID: 0xADD46137 Originaltext: Am 21.08.2003 um 19:43:02 hast du geschrieben: Hey folks, ALL LIST MEMBERS ARE ENCOURAGED TO RESPOND AND MAKE A CHOICE

Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Chris Cappuccio
Len said there needed to be a consensus on the list before he would make a change, but that it would be nice to change! John Cartwright [EMAIL PROTECTED] wrote: oN tHU, Aug 21, 2003 at 10:43:02AM -0700, Chris Cappuccio wrote: ALL LIST MEMBERS ARE ENCOURAGED TO RESPOND AND MAKE A CHOICE AS TO

RE: [Full-Disclosure] Idea

2003-08-21 Thread Joshua Thomas
Title: RE: [Full-Disclosure] Idea to configure or modify things one would have to install boot hardware and then use other boot media containing a shell Or just exploit a vulnerability in the system. Which you have made very hard to upgrade or patch. Doesn't sound like much of an

Re: [Full-Disclosure] Google Private IP is 10.7.0.73 !!!!!!

2003-08-21 Thread Nicolas Cartron
On 22/08/03 at 00:40, Gaurav Kumar ([EMAIL PROTECTED]) wrote : Hello friends! I have found private ip address used by google servers. here are the details. [...] This 10.7.0.73 is google private ip address. Ouah ! Exciting ! -- Nicolas Cartron [EMAIL PROTECTED]

[Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #1052 - 29 msgs

2003-08-21 Thread Arthur Corliss
Date: Thu, 21 Aug 2003 10:43:02 -0700 From: Chris Cappuccio [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!! Hey folks, ALL LIST MEMBERS ARE ENCOURAGED TO RESPOND AND MAKE A CHOICE AS TO HOW THEY WANT THIS BASIC FUNCTION OF

Re: [Full-Disclosure] Win32 Device Drivers Communication Vulnerabilities + PoC for Symantec Norton AntiVirus '2002 (probably all versions) Device Driver

2003-08-21 Thread [SEC-LABS TEAM]
Hi, Yes You have right, we've got a lot of response after the publication, and we know that title should be different (if You read the paper there is an section The Topic Problem bla bla), yes like You said m$ is not guilty for that, only software (many many device drivers are vulnerable to this

RE: [Full-Disclosure] Re: Filtering sobig with postfix

2003-08-21 Thread Bojan Zdrnja
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Friday, 22 August 2003 12:06 a.m. To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: AW: [Full-Disclosure] Re: Filtering sobig with postfix Yep, as the OP is using

Re[2]: [Full-Disclosure] JAP back doored

2003-08-21 Thread Bernhard Seibold
Hi all, I totally agree on that. And by the way you should think about two things: 1) The site they're logging provides illegal content. AFAIK it's child-pornography. As long as I can be sure that only sites with illegal content get logged I can trust that service. 2) If they had resisted, the

RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Joshua Vince
#2 or #3. How are we supposed to filter emails in our inbox w/o it?? -Original Message- From: 8tImER [mailto:[EMAIL PROTECTED] Sent: Thursday, August 21, 2003 4:02 PM To: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!! My vote goes to

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-21 Thread Jason Coombs
Nick FitzGerald came to his senses and removed me from the pedestal he had placed me on, and then launched into a well-written barrage of fact, beginning thus: I agree completely. The sobig spam is valuable -- it shows us who we should not trust to operate a computer. _If_ you know what to take

[Full-Disclosure] Re: Google Private IP is 10.7.0.73 !!!!!!

2003-08-21 Thread martin f krafft
also sprach Nicolas Cartron [EMAIL PROTECTED] [2003.08.21.2223 +0200]: This 10.7.0.73 is google private ip address. Ouah ! Exciting ! Yeah, especially because google is served by a single server. and no, i doubt they employ virtual IP load balancing. -- martin; (greetings

RE: [Full-Disclosure] Google Private IP is 10.7.0.73 !!!!!!

2003-08-21 Thread Bojan Zdrnja
Title: Message Excuse my ignorance, but what's the point of this? If you read that page, you'll see that they use proxy.google.com, which adds X-Forwarded-For header, so that's how you got internal IP address, but I don't really see any use of this. So what, everyone knows they are using

Re: [Full-Disclosure] Google Private IP is 10.7.0.73 !!!!!!

2003-08-21 Thread Servicios de Seguridad Informatica
El Jue 21 Ago 2003 16:23, Nicolas Cartron escribió: On 22/08/03 at 00:40, Gaurav Kumar ([EMAIL PROTECTED]) wrote : Hello friends! I have found private ip address used by google servers. here are the details. [...] This 10.7.0.73 is google private ip address. has anyone know how this

Re: [Full-Disclosure] JAP back doored

2003-08-21 Thread Valdis . Kletnieks
On Thu, 21 Aug 2003 11:42:43 PDT, Drew Copley [EMAIL PROTECTED] said: Or, do they believe they are superior to other countries, and they may invade at will? That's the US's job, isn't it? ;) pgp0.pgp Description: PGP signature

RE: [Full-Disclosure] Idea

2003-08-21 Thread Steven Alexander
only problem is ...i dont know of anything service wise that requires little to no modification on a regular basis Getting rid of the shell would break any call to system() in any program. ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Schmehl, Paul L
-Original Message- From: Joshua Vince [mailto:[EMAIL PROTECTED] Sent: Thursday, August 21, 2003 3:49 PM To: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!! #2 or #3. How are we supposed to filter emails in our inbox w/o it?? Have

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-21 Thread Jason Coombs
Nick FitzGerald came to his senses and removed me from the pedestal he had placed me on, and then launched into a well-written barrage of fact, beginning thus: I agree completely. The sobig spam is valuable -- it shows us who we should not trust to operate a computer. _If_ you know what to take

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: Binary Executables w/o Source

2003-08-21 Thread Jason Coombs
Nick FitzGerald came to his senses and removed me from the pedestal he had placed me on, and then launched into a well-written barrage of fact, beginning thus: I agree completely. The sobig spam is valuable -- it shows us who we should not trust to operate a computer. _If_ you know what to take

RE: [Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #1052 - 29 msgs

2003-08-21 Thread Leif Sawyer
Fellow Alaskan Arthur Corliss responded to: From: Chris Cappuccio whom exclaimed: The subject header is going to change. This is a survey to see whether people want: 1. To have no subject prefix, that is, we remove [Full-Disclosure] or 2. To shorten the subject prefix from

RE: [Full-Disclosure] Re: Thanks for the hoax info.

2003-08-21 Thread Schmehl, Paul L
-Original Message- From: martin f krafft [mailto:[EMAIL PROTECTED] Sent: Thursday, August 21, 2003 1:46 PM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] Re: Thanks for the hoax info. Why does noone release a virus that uses such a filename. After all, everyone knows it'll

Re: [fd] RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Mike V
Popfile would do a fine job. http://popfile.sourceforge.net - Original Message - From: Joshua Vince [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, August 21, 2003 1:49 PM Subject: [fd] RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!! #2 or #3. How are we

Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Yannick Van Osselaer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 21 August 2003 22:49, Joshua Vince wrote: #2 or #3. How are we supposed to filter emails in our inbox w/o it?? You can always use List-Id (in the e-mail headers). - -- Yannick Van Osselaer Public Key: wwwkeys.us.pgp.net -BEGIN PGP

Re: [Full-Disclosure] Idea

2003-08-21 Thread Elvedin
Well, if all shells are removed and roots and other users shell is changed to /bin/false, you wont be able to install another shell. How would you interface with the system? NO SHELL! From: Schmehl, Paul L [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, August 21, 2003 5:35 PM Subject:

[Full-Disclosure] funny things - SpamAssassin results

2003-08-21 Thread morning_wood
funny things... SpamAssassin results 1. spoof 80.179.152.112.forward.012.net.il (80.179.152.112) Whois: 80.179.152.0 - 80.179.171.255 Please Send Abuse/SPAM complaints To [EMAIL PROTECTED] DNS REG 25 Hsivim st. Petach-Tiikva, Israel [EMAIL PROTECTED] 2. path reveal The uncleanable file

RE: [Full-Disclosure] SCADA providers say security not our problem

2003-08-21 Thread Alan Kloster
Bernie wrote: I believe that like the HIPAA Security rules, regulations should be established to set Security standards which the Power Utilities, as well as and Gas, Water should be held to comply with. They have been trying to come up with a plan. Unfortunately, it appears to lack any

Re: [Full-Disclosure] Idea

2003-08-21 Thread Irwan Hadi
On Thu, Aug 21, 2003 at 11:12:06AM -0700, D B wrote: i have always had an idea but never any place to try it i would like people with experience to tell me what they think of it assuming a unix / linux operating system as a server install the services get them configured

Re: [Full-Disclosure] Google Private IP is 10.7.0.73 !!!!!!

2003-08-21 Thread morning_wood
Title: Message i kinda discoverd google's use as a proxy simply by doing http://translate.google.com/translate?u=http%3A%2F%2Fwhatismyip.com and is essentally the basis of http://exploit.wox.org/tools/googleproxy.html Donnie Werner Chief Technical Officer E2 Labs Information Security

Re: [Full-Disclosure] Google Private IP is 10.7.0.73 !!!!!!

2003-08-21 Thread idoru
My message was for Servicios de seguridad informatica :D Regards , -- David F. Madrid , Madrid , Spain ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [inbox] Re: Fwd: Re: [Full-Disclosure] Administrivia: BinaryExecutables w/o Source

2003-08-21 Thread Nick FitzGerald
Jason Coombs [EMAIL PROTECTED] wrote: Nick FitzGerald came to his senses and removed me from the pedestal he had placed me on, and then launched into a well-written barrage of fact, beginning thus: Nice... 8-) I agree completely. The sobig spam is valuable -- it shows us who we should

[Full-Disclosure] IE6 Download

2003-08-21 Thread Peter Ellison
Hello List. I downloaded the patch via Windoze update for Exploder 6 this Morning. No problems with that 2 Min max. Took the shut down option, system reboots all OK. Point Browser @ my ISPs home page to check the config, the firewall tells me modules have changed (as expected) and I release the

[Full-Disclosure] Pinging... And lots of it..

2003-08-21 Thread Calvyn
Hey people, At around 3:30 today my campus lite up like a Christmas tree. I have hundreds of computers pinging each other all over campus. Luckily none of them are from the subnet that I administer. :) I did some searchin but didn't read about any of the new worms using ICMP. Anyone have

Re: [Full-Disclosure] Re: Popular Net anonymity service back-doored

2003-08-21 Thread Florian Weimer
Drew Copley [EMAIL PROTECTED] writes: I would think, I would know, there would be a moral obligation to tell their users. Moral... A conscience obligation, an obligation of conscience. I usually interpret German privacy law much more liberally than ICPP and was really surprised that they

[Full-Disclosure] AD20030820...testing made easy

2003-08-21 Thread Roelof Temmingh
eEye IE (EIIE:)) bug: http://www.eeye.com/html/Research/Advisories/AD20030820.html This here just making it easier to edit commands/play around ...nothing heavy...nothing new... On 10.10.10.10's web server is test.html: - htmlh1 nice webpage/h1 object

[Full-Disclosure] MDKSA-2003:085 - Updated gdm packages fix vulnerabilities

2003-08-21 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mandrake Linux Security Update Advisory Package name: gdm Advisory ID:

Re: [Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #1052 - 29 msgs

2003-08-21 Thread Jack Whitsitt (jofny)
Definitely 2 here... 1. To have no subject prefix, that is, we remove [Full-Disclosure] or 2. To shorten the subject prefix from [Full-Disclosure] to [FD] or 3. Do nothing ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-Disclosure] JAP back doored

2003-08-21 Thread Drew Copley
-Original Message- From: Florian Weimer [mailto:[EMAIL PROTECTED] Sent: Thursday, August 21, 2003 12:23 PM To: Drew Copley Cc: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] JAP back doored Drew Copley [EMAIL PROTECTED] writes: Why is the state of Germany trojanizing

RE: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Nick FitzGerald
Joshua Vince [EMAIL PROTECTED] wrote: #2 or #3. How are we supposed to filter emails in our inbox w/o it?? Well, all the following headers are likely to be as unique to F-D list messages as any arbitrary Subject: line tag: List-Unsubscribe: http://lists.netsys.com/mailman/listinfo/full-

Re: [Full-Disclosure] Subject prefix changing! READ THIS! SURVEY!!

2003-08-21 Thread Jeff Pickell
Shorten it or don't change it just don't remove it altogether. I am on several mailing lists and while I do filter things into different folders, it has always been easier if the subject contains a constant such as [Full-Disclosure]. I wouldn't say that it is strictly necessary, but it

Re: [Full-Disclosure] Win32 Device Drivers Communication Vulnerabilities + PoC for Symantec Norton AntiVirus '2002 (probably all versions) Device Driver

2003-08-21 Thread Spiro Trikaliotis
Hello, On Fri, Aug 02, 2002 at 10:39:44AM +0200, [SEC-LABS TEAM]: wrote: The Sec-Labs security research group found a bug in Win32 Device Drivers Communication, the white-paper for this vulnerability can be viewed at http://sec-labs.hack.pl , the exploit code for Symantec Norton

Re: [Full-Disclosure] Pinging... And lots of it..

2003-08-21 Thread Paul Schmehl
--On Thursday, August 21, 2003 19:33:06 -0400 Calvyn [EMAIL PROTECTED] wrote: Hey people, At around 3:30 today my campus lite up like a Christmas tree. I have hundreds of computers pinging each other all over campus. Luckily none of them are from the subnet that I administer. :) I did

  1   2   >