Re: [Full-Disclosure] Off topic programming thread

2003-10-28 Thread Brett Hutley
Bill Royds wrote: A vulnerability on the list today is a perfect example of why C is inherently an insecure programming language and why "thinking in C" is a directo route to insecure code. *code snipped* If instead C allowed a header like static void defang( char* str, char dfstr[dfsize], int

[Full-Disclosure] win32 stack bof & shellcode size

2003-10-28 Thread npguy
Hi, are there any techniques to execute the shellcode if the necessary opcodes cannot fit after the return address! the return address is overwritten with an address of "jmp esp"! some says its not possible, is it? TIA -- npguy mailto:[EMAIL PROTECTED] __

Re: [Full-Disclosure] [Bogus] Microsoft AuthenticodeT webcam viewer plugin

2003-10-28 Thread Nick FitzGerald
"morning_wood" <[EMAIL PROTECTED]> wrote: > funny, didnt know Micro$oft had a > "Microsoft AuthenticodeT webcam viewer plugin " > ... guess there trying to make up for lost revenue by > going into the East European live teen webcam business <> FWIW, I think the biggest "problem" here is that a CA

Fw: [Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread SPAM
Same here.. but now it's dropping as fast as it raises.. did anyone manage to capture what's inside? - Original Message - From: "Eric Bowser" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, October 29, 2003 4:51 AM Subject: Re: [Full-Disclosure] sharp increase on 27347/TCP

Re: [Full-Disclosure] strange wordpad.exe behavior!

2003-10-28 Thread Nick FitzGerald
Bipin Gautam <[EMAIL PROTECTED]> wrote: > Moroons... 'KILL YOURSELF'.. LET'S SWITCH TO THE TOPIC ANYWAY! > --- > i am using windowsxp at the moment!!! How thrilling for you, I'm sure... > the most surprising thing is... SOME

[Full-Disclosure] [Bogus] Microsoft AuthenticodeT webcam viewer plugin

2003-10-28 Thread morning_wood
funny, didnt know Micro$oft had a "Microsoft AuthenticodeT webcam viewer plugin " ... guess there trying to make up for lost revenue by going into the East European live teen webcam business ( mby they should talk to Ifriends.com ) http://www.czechcamgirls.eu.tt/ --- / snip / -

Re: [Full-Disclosure] OSX 10.3 Personal Firewall.

2003-10-28 Thread jamie
On Oct 28, 2003, at 9:02 PM, B-r00t wrote: I know that the underlying ipfw is capable of being configured accordingly, but shouldnt the overlying firewall configuration application at least activate appropriate UDP and ICMP filtering? osx does .. for anyone who uses ipfw in osx in their own custom

Re: [Full-Disclosure] Coding securely, was Linux (in)security

2003-10-28 Thread Gregory Steuck
> "Valdis" == Valdis Kletnieks <[EMAIL PROTECTED]> writes: Valdis> All programming languages that are Turing-complete Valdis> (basically, anything that has a conditional loop) are prone Valdis> to the Turing Halting Problem. Valdis> In other words, you can't prevent DoS-via-in

Re: [Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread morning_wood
dyslexic? i think not some versions of sub7 default to 27347 and / or 27374 ( and my SuperScan3 list 27347 as Sub7 ) Plus... do not rely on port assignmet alone to determine your suspect, only kiDDies use default ports on R.A.T serverz dyslexic? i think not. Donnie Werner E2 Labs Security http:/

Re: [Full-Disclosure] So I have just been studying IE source code and found this strange behaviour..

2003-10-28 Thread Orlando Padilla
adsl-81-7-72-8.takas.lt what a hacker. On Thursday 24 February 2005 10:58, [EMAIL PROTECTED] wrote: > And it did actually tell me something about all this snowflakes around. > > I have been living in Earth! Planet Earth! can you actually imagine it.. I > cannt!. > > So, it's really nice to see s

[Full-Disclosure] OSX 10.3 Personal Firewall.

2003-10-28 Thread B-r00t
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Panther OSX 10.3 (Firewall Configuration App) OSX Personal Firewall gives false sense of security due to lack of ICMP and UDP protocol filtering. maki:~ br00t$ sw_vers ProductName:Mac OS X ProductVersion: 10.3 BuildVersion: 7B85 Quoting Ap

Re: [Full-Disclosure] Coding securely, was Linux (in)security

2003-10-28 Thread Valdis . Kletnieks
On Tue, 28 Oct 2003 17:44:55 +1300, Steve Wray <[EMAIL PROTECTED]> said: > Is it beyond all possibility that there exist languages in which > the very reverse is true? ie Languages in which one would have to > reimplement data types and so forth in order to be able to write > insecure code? > >

Re: [Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread Nick FitzGerald
Eric Bowser <[EMAIL PROTECTED]> wrote: > That's what I thought at first, but why the sudden interest in 27374 > then? Also, incidents.org is showing 200+ sources... that a whole > state's worth of dyslexic people... > > Incidents.org is now showing 1.1 million hits today alone. Something > big

Re: [Full-Disclosure] strange wordpad.exe behavior!

2003-10-28 Thread Dick LaGay
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 post that to bugtraq or something. give it up already looks like lorenzo changed his named and done learnt some mo' english... On Tue, 28 Oct 2003 10:20:55 -0800 Bipin Gautam <[EMAIL PROTECTED]> wrote: >Moroons... 'KILL YOURSELF'.. LET'S SWIT

[Full-Disclosure] Re: sh-httpd `wildcard character' vulnerability

2003-10-28 Thread Dave Ahmad
David Mirza Ahmad Symantec PGP: 0x26005712 8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12 -- The battle for the past is for the future. We must be the winners of the memory war. On Tue, 28 Oct 2003, Richard Brittain wrote: > On Mon, 27 Oct 2003, dong-h0un U wrote: > > > Vulnerabi

Re: [Full-Disclosure] New variant of Nachi ?

2003-10-28 Thread KF
Awan, Farrukh (OCTO) wrote: Has any body detected a new variant of the Nachi worm infecting machines not patched with MS03-039. I couldn't find any details on it propagation except once a host is infected, it attempts to propagate via SMB over TCP (port 445). Any details on exploit code /payloa

[Full-Disclosure] FirstClass 7.1 HTTP Server: Remote Directory Listing

2003-10-28 Thread Richard Maudsley
FirstClass 7.1 HTTP Server allow the listing of all files under the web root directory and user web directories. This can be achieved by appending "/Search" to the URL. The browser will present a file searching form. If all check boxes (search options) are selected, and the filename text box is lef

Re: [Full-Disclosure] Has anyone heard about a new rpc vulnerability

2003-10-28 Thread Stephen
you are probably talking about the new variant of the rpc vulnerability (no patch still now !) : Advisory : http://xforce.iss.net/xforce/alerts/id/155 Exploit : http://www.k-otik.com/exploits/10.09.rpcdcom3.c.php i think that the next huge worm will use this lame vuln !! --- [EMAIL PROTECTED] w

[Full-Disclosure] So I have just been studying IE source code and found this strange behaviour..

2003-10-28 Thread agent99
And it did actually tell me something about all this snowflakes around. I have been living in Earth! Planet Earth! can you actually imagine it.. I cannt!. So, it's really nice to see some screens in this and all. but hey thanks. yours trully, friend SPENDERGLER (i meant spengler or spendergay).

Re: [Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread Kristian Hermansen
Look like W32/Spybot.worm.gen discovered on 4/23/2003 and documented here by McAfee: http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100282 ---SNIP--- "The worm copies itself around and into the folder defined by "Kazaa\localcontent" registry key and into "kazaabackupfiles" subd

RE: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Zach Forsyth
>-Original Message- >From: bipin gautam [mailto:[EMAIL PROTECTED] >Sent: Wednesday, October 29, 2003 6:59 AM >To: [EMAIL PROTECTED] >Subject: RE: [Full-Disclosure] when will crap posts COME TO AN END... > > Snip You are teh n00b! thanks for the laugh though - blackcode is great... z __

[Full-Disclosure] Has anyone heard about a new rpc vulnerability

2003-10-28 Thread James . McDermott
Has anyone heard about a new rpc vulnerability Im hearing stories, but none reputable... James P. McDermott Information Security Analyst Federal Reserve Bank of New York

Re: [Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread Eric Bowser
That's what I thought at first, but why the sudden interest in 27374 then? Also, incidents.org is showing 200+ sources... that a whole state's worth of dyslexic people... Incidents.org is now showing 1.1 million hits today alone. Something big just came out, but I can't figure out what... On T

[Full-Disclosure] Wildcard exportfs issue in NFS on IRIX

2003-10-28 Thread SGI Security Coordinator
-BEGIN PGP SIGNED MESSAGE- __ SGI Security Advisory Title: Wildcard exportfs issue in NFS Number: 20031004-01-P Date: October, 28 2003 Reference: SGI BUG 902105 Reference

Re: [Full-Disclosure] strange wordpad.exe behavior!

2003-10-28 Thread John Sage
On Tue, Oct 28, 2003 at 10:20:55AM -0800, Bipin Gautam wrote: /* snip */ > WHAT DO YOU SAY!!! /* snip */ For some reason, "Get a life" comes to mind... - John -- "Most people don't type their own logfiles; but, what do I care?" - John Sage: InfoSec Groupie - ABCD, EFGH, IJKL, EmEnOh, Pplus

[Full-Disclosure] Re: sh-httpd `wildcard character' vulnerability

2003-10-28 Thread Richard Brittain
On Mon, 27 Oct 2003, dong-h0un U wrote: > Vulnerabilty happens '*' because don't filtering. > Through this character, can know existence of files to directory. ... This patch prevents the globbing, but also breaks the proper action of the server because bname() no longer returns the filename. A b

[Full-Disclosure] mod_security 1.7RC1 to 1.7.1 vulnerability

2003-10-28 Thread Adam Dyga
Program:mod_security (www.modsecurity.org) Versions: 1.7RC1 to 1.7.1 (Apache 2 version) Synopsis: malloc based buffer overflow Author: Adam Dyga (adeon(at)o2.pl, ad(at)adsystems.com.pl) URL:http://adsystems.com.pl/adg-

Re: [Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread Will Image
oh no its a dyslexic pereson scannin for Sub7!!! (27374)   bahJoshua Levitsky <[EMAIL PROTECTED]> wrote: http://isc.incidents.org/port_details.html?port=27347I'd say probably something is coming... that's a pretty sharp spike on thegraph.-Josh--Joshua Levitsky, MCSE, CISSPSystem EngineerTime Inc. I

RE: [Full-Disclosure] My new PGP key

2003-10-28 Thread Robert Ahnemann
I'm sorry I was late to work today guys, my car broke down. I'll resume my reading shortly though. > -Original Message- > From: Lorenzo Hernandez Garcia-Hierro [mailto:[EMAIL PROTECTED] > security.com] > Sent: Saturday, October 25, 2003 5:26 AM > To: Full-Disclosure > Subject: [Full-Discl

Re: [Full-Disclosure] Cisco takes it easy

2003-10-28 Thread Kenneth R. van Wyk
On Tuesday 28 October 2003 13:09, Gary E. Miller wrote: > > "Better Security - The PIX operating environment is a single system that > > was designed with functionality and security mind. Because there is > > no separation between the operating system and the firewall application, > > Just do a "st

Re: [Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread Joshua Levitsky
http://isc.incidents.org/port_details.html?port=27347 I'd say probably something is coming... that's a pretty sharp spike on the graph. -Josh -- Joshua Levitsky, MCSE, CISSP System Engineer Time Inc. Information Technology [5957 F27C 9C71 E9A7 274A 0447 C9B9 75A4 9B41 D4D1] - Original Messa

Re: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread Damian Gerow
Thus spake Jon Hart ([EMAIL PROTECTED]) [28/10/03 14:05]: > I've also seen issues where posts that are 100% legitimate and on-topic > are returned to the original poster because, according to the list > daemon, the moderator failed to act on the post. > > Its bad enough when posts are delayed, but

[Full-Disclosure] sharp increase on 27347/TCP

2003-10-28 Thread Eric Bowser
I've noticed a sharp increase in probes of port 27347/TCP against our equipment over the past couple of days. Zero hits for weeks, 58 yesterday, and 224 so far today. Incidents.org seems to confirm this, very light activity for weeks, and suddenly 781,000 yesterday and 938,000 so far today. Has

RE: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread bipin gautam
sorry! if that. b0thered you see... i was just asking a question about...! http://www.blackcode.com/forums/viewtopic.php?t=10577 he was just flaming me with shit* [KINDA... HARASH> --- Brent Colflesh <[EMAIL PROTECTED]> wrote: > -Original Message- > From: [EMAIL PROTECTED] > [ma

[Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #1232 - 32 msgs

2003-10-28 Thread Darren Bounds
Verified. I was successful in changing the password of current user (myself) with an open terminal in focus on the desktop. Darren Bounds Intrusense LLC. http://www.intrusense.com -- Intrusense - Securing Business As Usual Date: Tue, 28 Oct 2003 17:46:41 +0100 From: kang <[EMAIL PROTECTED]> To

Re: [Full-Disclosure] strange wordpad.exe behavior!

2003-10-28 Thread Dennis Freise
> Moroons... 'KILL YOURSELF'.. LET'S SWITCH TO THE TOPIC ANYWAY! > --- > i am using windowsxp at the moment!!! > > the most surprising thing is... SOMETIMES! wordpad.exe crashes after executing the 'test.rtf' and sometimes... t

RE: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Brent Colflesh
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Bipin Gautam Sent: Tuesday, October 28, 2003 1:18 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] when will IE exploits COME TO AN END... does that really matter... they are moro

RE: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread David Vincent
> -Original Message- > From: Michael Sierchio [mailto:[EMAIL PROTECTED] > Sent: Tuesday October 28, 2003 9:32 AM > To: [EMAIL PROTECTED] > Subject: Re: [Full-Disclosure] Is bugtraq even worth it anymore? > > > > I consider Symantec's control of bugtraq to be analogous to > Scientology's

[Full-Disclosure] Local root vuln in kpopup

2003-10-28 Thread b0f
A local root vuln exists in Kpopup version 0.9.1(latest) and proberly all other versions. It is avaliable from http://www.henschelsoft.de/kpopup_en.html (main site) http://www.freebsd.org/ports/net.html and many other places if you search kpopup on google. I. BACKGROUND Kpopup is a KDE program f

RE: [Full-Disclosure] Local root vuln in kpopup

2003-10-28 Thread Brown, Rodrick
This is just shocking we still see stuff like this in 2003.   From: b0fSent: Tue 10/28/2003 1:13 PMTo: [EMAIL PROTECTED]Subject: [Full-Disclosure] Local root vuln in kpopup A local root vuln exists in Kpopup version 0.9.1(latest) and proberly all other versions. It is avaliable from http://w

Re: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread David M
From: Michael Sierchio <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] Is bugtraq even worth it anymore? Date: Tue, 28 Oct 2003 09:31:56 -0800 I consider Symantec's control of bugtraq to be analogous to Scientology's control of the Cult Awareness Network. -- "Well," Brahma

Re: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread Jon Hart
On Mon, Oct 27, 2003 at 12:44:50PM -0600, David M wrote: > It would seem that the bugtraq folks think that security issues cease to > exist on weekends, or even after "normal business hours" these days. > It's a shame really. > Once upon a time, pre-symantec it seems, it used to be a viable and >

Re: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Bipin Gautam
does that really matter... they are moroons and you are a ASS* h*o*le. WELL, STICK BEHIND MY ASS! thanks for saving my toilet-paper dooD. - anyone willing to explain.. http://www.blackcode.com/forums/viewtopic.php?t=10577 ---

Re: [Full-Disclosure] Cisco takes it easy

2003-10-28 Thread Gary E. Miller
On Tue, 28 Oct 2003, Davide Del Vecchio wrote: > "Searched the web for Cisco PIX vulnerability. > Results 1 - 10 of about 20,600. Search took 0.09 seconds." Google. Hehehehe... > "Better Security - The PIX operating environment is a single system that > was designed with functionality and securi

[Full-Disclosure] strange wordpad.exe behavior!

2003-10-28 Thread Bipin Gautam
Moroons... 'KILL YOURSELF'.. LET'S SWITCH TO THE TOPIC ANYWAY! --- i am using windowsxp at the moment!!! the most surprising thing is... SOMETIMES! wordpad.exe crashes after executing the 'test.rtf' and sometimes... test.rtf

Re: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Cael Abal
it's a off-topic! anyway... INDEED A BUG BUT i got lot of flamings ... while trying to explain one of my advisory to some 31337's. out here! http://www.blackcode.com/forums/viewtopic.php?t=10577 ANYONE WILLING TO EXPLAIN THE STRANGE PHENOMENON! (o; Thanks for posting the link to that forum, Bipin

Re: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread Michael Sierchio
I consider Symantec's control of bugtraq to be analogous to Scientology's control of the Cult Awareness Network. -- "Well," Brahma said, "even after ten thousand explanations, a fool is no wiser, but an intelligent man requires only two thousand five hundred." - The Mahabharata __

Re: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread S G Masood
--- Cael Abal <[EMAIL PROTECTED]> wrote: > New exploit just discovered: > > My toilet won't flush reliably when it rains! Both > the vendor and major > news outlets has been notified. Screen captures are > available here!!! > > http://www.geocities.com/visitbipin/ > > BIpin > > PS: NASA m

[Full-Disclosure] [securemac] Local vulnerability: MacOSX Screensaver locking bypass.

2003-10-28 Thread kang
Mac OS X 10.3 Panther Screen Lock Bypass *Advisory Title*: Keys Getting Past Panther Screen Lock *Release Date*: 2003 October 28 *Affected Product*: Mac OS X 10.3 Build 7B85 *Severity*: Low *Impact*: Security Bypass *Where*: Local System *Author*: CodeSamurai ([EMAIL PROTECTED]) *VULNERABILIT

Re: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread Frank Knobbe
On Tue, 2003-10-28 at 07:27, Rob Lewis wrote: > I unsubscribed to BUGTRAQ months ago and then subscribed to the respective > company's security advisories that I want to recieve and it appears that > over the last 6 months or so I am getting the same info the company is > putting out, only I get it

Re: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Bipin Gautam
well, ITS MY FAULT! thanks for that enlightment! it's a off-topic! anyway... INDEED A BUG BUT i got lot of flamings ... while trying to explain one of my advisory to some 31337's. out here! http://www.blackcode.com/forums/

[Full-Disclosure] [OpenPKG-SA-2003.046] OpenPKG Security Advisory (apache)

2003-10-28 Thread OpenPKG
: Affected Packages:Corrected Packages: OpenPKG CURRENT <= apache-1.3.28-20031009 >= apache-1.3.29-20031028 OpenPKG 1.3 <= apache-1.3.28-1.3.0>= apache-1.3.28-1.3.1 OpenPKG 1.2 <= apache-1.3.27-1.2.2>= apache-1.3.27-1.2.3 Dependent Packages: none De

RE: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Dan Brown
http://support.microsoft.com/default.aspx?scid=kb;en-us;208427 "INFO: Maximum URL Length Is 2,083 Characters in Internet Explorer" -Original Message- From: Bipin Gautam [mailto:[EMAIL PROTECTED] Sent: Tuesday, October 28, 2003 9:18 AM To: Subject: [Full-Disclosure] when will IE exploits

RE: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread Chris Peden
I feel exactly that same way, been debating unsubscribing as wellSymantec has always been on the "in" with Microsoft, thus with MS wanting to stop everyone from 0-day exploit posting, I can see where BugTraq is going to going down the tubes. Thanks, -Chris- IT Director Sundowner Interiors

Re: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread jelmer
and what would the security implications of this be in your *cough* expert opinion http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/support/kb/articles/Q208/4/27.asp&NoWebContent=1 - Original Message - From: "Bipin Gautam" <[EMAIL PROTECTED]> To: <[EMAIL PRO

Re: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Cael Abal
Internet explorer can't click and properly open long URL's! in the browser... http://www.geocities.com/visitbipin/index9.htm see... IT'S A URL but ... you can't click at the link!!! I don't see the point. How it is a security flaw? Or even a bug (is a browser supposed to support very lon

Re: [Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Jedi/Sector One
On Tue, Oct 28, 2003 at 06:17:40AM -0800, Bipin Gautam wrote: > Internet explorer can't click and properly open long URL's! in the browser... > http://www.geocities.com/visitbipin/index9.htm > see... IT'S A URL but ... you can't click at the link!!! I don't see the point. How it is a se

[Full-Disclosure] when will IE exploits COME TO AN END...

2003-10-28 Thread Bipin Gautam
another harmless! IE BUG... I GUESS Internet explorer can't click and properly open long URL's! in the browser... http://www.geocities.com/visitbipin/index9.htm see... IT'S A URL but ... you can't click at the link!!! I HAVE TRIED IT IN OTHER BROWSER INCLUDING OPERA AND THE LINK OPENS WITHO

[Full-Disclosure] STG Security Advisory: [SSA-20031025-05] InfronTech WebTide 7.04 Directory and File Disclosure Vulnerability

2003-10-28 Thread SSR Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 STG Security Advisory: [SSA-20031025-05] InfronTech WebTide 7.04 Directory and File Disclosure Vulnerability Revision 1.0 Date Published: 2003-10-25 (KST) Last Update: 2003-10-25 Disclosed by SSR Team ([EMAIL PROTECTED]) Abstract InfronTech'

Re: [Full-Disclosure] Is bugtraq even worth it anymore?

2003-10-28 Thread Rob Lewis
I unsubscribed to BUGTRAQ months ago and then subscribed to the respective company's security advisories that I want to recieve and it appears that over the last 6 months or so I am getting the same info the company is putting out, only I get it 3-5 days sooner than BUGTRAQ. Other than that the onl

[Full-Disclosure] New variant of Nachi ?

2003-10-28 Thread Awan, Farrukh (OCTO)
Title: Message Has any body detected a new variant of the Nachi worm infecting machines not patched with MS03-039. I couldn't find any details on it propagation except once a host is infected, it attempts to propagate via SMB over TCP (port 445). Any details on exploit code /payload...   B

[Full-Disclosure] Cisco takes it easy

2003-10-28 Thread Davide Del Vecchio
"Better Security - The PIX operating environment is a single system that was designed with functionality and security mind. Because there is no separation between the operating system and the firewall application, there are no known vulnerabilities to exploit." - Cisco Secure PIX Firewall Advanced

[Full-Disclosure] Week 43 Security Vulnerabiliites

2003-10-28 Thread Sintelli SINTRAQ
A summary of vulnerabilities identified in Week 43, 2003 are available here in PDF Format: http://www.sintelli.com/sinweek/week43-2003.pdf Sintelli Limited 1 Berkeley Street London W1J 8DJ www.sintelli.com ___ Full-Disclosure - We believe in it. Charte

[Full-Disclosure] Re: Java 1.4.2_02 InsecurityManager JVM crash

2003-10-28 Thread Torsten Lodderstedt
Hi Marc, > either they (Sun) remove the deprecated functions completely or they > introduce permissions which explicitly allow to call deprecated stuff. > An adversary does not care whether the function he uses to interfere > correct operation is deprecated. Deprecation is not a security feature,