Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Lee
ok let get some reality here and quit on the sensationalism here All universities and selected folk have copies of the source, so it was bound to find a way out shortly, the leaked copy is 660mb in size, the full source for MS win2k is over 40GIG so we have 1/100 of the code, so some piss ant

[Full-Disclosure] Re: Removing FIred admins

2004-02-12 Thread gadgeteer
On Fri, Feb 13, 2004 at 12:29:25AM -0500, James Patterson Wicks ([EMAIL PROTECTED]) wrote: > "The Button" Impressive. Upperscase letters to start off each word. Quotes to set it apart from the rest of the sentence it appears in. > [mailto:[EMAIL PROTECTED] On Behalf Of Cael Abal > Imagine

RE: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Brad Griffin
Hey all I find these 'visions of doom' quite funny when stated on this list. Wasn't full-disclosure started around the time MS, SF (or is that Symantec) and others started secret squirrelling about exploits and source code etc? > -Original Message- > From: Byron Copeland [mailto:[EMAIL

RE: [Full-Disclosure] Microsoft confirms source code leak

2004-02-12 Thread Byron Copeland
Sorry, but perhaps that link was removed for some reason. Didn't pan out. On Fri, 2004-02-13 at 00:32, Andre Ludwig wrote: > The actual press release can be found here > > http://www.microsoft.com/presspass/press/2004/Feb04/02-12windowssource.asp > > Andre Ludwig CISSP > > -Original Messag

Re: [Full-Disclosure] Removing FIred admins

2004-02-12 Thread Raymond Lillard
Cael Abal wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael T. Harding wrote: | Anybody know of a checklist or guide to removing access across the entire | organization for a "retired" admin? | Mixed environment including Linux, Unix, Windows, Cisco, Nortel Wow. Nightmare. I would exp

RE: [Full-Disclosure] Microsoft confirms source code leak

2004-02-12 Thread Andre Ludwig
The actual press release can be found here http://www.microsoft.com/presspass/press/2004/Feb04/02-12windowssource.asp Andre Ludwig CISSP -Original Message- From: Thor Larholm [mailto:[EMAIL PROTECTED] Sent: Thursday, February 12, 2004 6:49 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EM

[Full-Disclosure] Win2k source code leaked - Puneet

2004-02-12 Thread Puneet
Please proovide working links to the source codethanks ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Removing FIred admins

2004-02-12 Thread James Patterson Wicks
We are working on something called "The Button", which is nothing but small script that activates a series of scripts that change all root, local and domain administrator passwords on our Unix and Windows servers when run. We also have to set up a script that will change the local administrator pa

Re: [Full-Disclosure] RE: W2K source "leaked"?

2004-02-12 Thread wolvie
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Andre Ludwig wrote: | I am still up in the air on if this is legit or not. http://customwire.ap.org/dynamic/stories/M/MICROSOFT_SOURCE_CODE?SITE=WASET&SECTION=HOME&TEMPLATE=DEFAULT http://news.com.com/2100-7349_3-5158496.html?tag=nefd_top sounds qu

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Byron Copeland
Well, in instances like this, however unfortunate, I think this probably is only the beginning of mangled code we'll be seeing. Anyone else have visions of mayhem as well? On Thu, 2004-02-12 at 23:10, Isaac Privett wrote: > There are already exploited versions of NOTEPAD floating around. These >

Re: [Full-Disclosure] Removing FIred admins

2004-02-12 Thread Cael Abal
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael T. Harding wrote: | Anybody know of a checklist or guide to removing access across the entire | organization for a "retired" admin? | Mixed environment including Linux, Unix, Windows, Cisco, Nortel Wow. Nightmare. I would expect this is exact

Re: [Full-Disclosure] Re: W2K source "leaked"?

2004-02-12 Thread Byron Copeland
heh, figures. On Thu, 2004-02-12 at 22:22, gabriel rosenkoetter wrote: > On Thu, Feb 12, 2004 at 06:26:39PM -0800, Nick Jacobsen wrote: > > http://smokeherb.com/windows/ > > Both NT4 and 2000. > > > > As a side note, there is actually very little content in these files... > > this is a very much

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Isaac Privett
There are already exploited versions of NOTEPAD floating around. These people work very quickly.[EMAIL PROTECTED] wrote: Friday, 27 October, 2000, 16:23 GMT 17:23 UKProbably not :)>-- Original Message -->Subject: Re: [Full-Disclosure] W2K source "leaked"?>From: Byron Copeland <[EMAIL PROTECTED]>>To

RE: [Full-Disclosure] Partial protection against MyDoom

2004-02-12 Thread ragdelaed
If you look at the source, its not using mx records. Its guessing. It gets the domain name, then prepends mx., mail., smtp., mx1., mxs., mail1., relay., ns., and gate. to the domain name and send itself off. Since most companies call their smtp outbounds relay or smtp or mail, then it gets lucky.

RE: [Full-Disclosure] Partial protection against MyDoom

2004-02-12 Thread ragdelaed
If you look at the source, its not using mx records. Its guessing. It gets the domain name, then prepends mx., mail., smtp., mx1., mxs., mail1., relay., ns., and gate. to the domain name and send itself off. Since most companies call their smtp outbounds relay or smtp or mail, then it gets lucky.

Re: [Full-Disclosure] RE: W2K source "leaked"?

2004-02-12 Thread Byron Copeland
http://slashdot.org/ is also ranting about it. On Thu, 2004-02-12 at 21:40, [EMAIL PROTECTED] wrote: > I know some people have been talking about this as being a false news > story, but now there is confirmation from Redmond. > > http://www.komotv.com/stories/29778.htm > > > > > Regards > >

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread cameronmcansh
Confirmation yes. But not when the date reads Friday, 27 October, 2000, 16:23 GMT 17:23 UK >-- Original Message -- >Subject: Re: [Full-Disclosure] W2K source "leaked"? >From: Byron Copeland <[EMAIL PROTECTED]> >To: "Gregory A. Gilliss" <[EMAIL PROTECTED]> >Cc: [EMAIL PROTECTED] >Date: 12 Feb 2004

Re: [Full-Disclosure] Re: [ GLSA 200402-02 ] XFree86 Font Information File Buffer Overflow

2004-02-12 Thread Roman Drahtmueller
> i copy paste the wrong lines. if logged in on the console > i get a segfault. using ssh i get: > > [EMAIL PROTECTED] evert]$ X :0 -fp $PWD > Authentication failed - cannot start X server. > Perhaps you do not have console ownership? > [EMAIL PROTECTED] evert]$ > > so my real question was... is

[Full-Disclosure] Re: W2K source "leaked"?

2004-02-12 Thread gabriel rosenkoetter
On Thu, Feb 12, 2004 at 06:26:39PM -0800, Nick Jacobsen wrote: > http://smokeherb.com/windows/ > Both NT4 and 2000. > > As a side note, there is actually very little content in these files... > this is a very much "partial" leak... Just so no one coming in to work on Friday wastes those poor peo

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread cameronmcansh
Friday, 27 October, 2000, 16:23 GMT 17:23 UK Probably not :) >-- Original Message -- >Subject: Re: [Full-Disclosure] W2K source "leaked"? >From: Byron Copeland <[EMAIL PROTECTED]> >To: "Gregory A. Gilliss" <[EMAIL PROTECTED]> >Cc: [EMAIL PROTECTED] >Date: 12 Feb 2004 20:16:03 -0500 > > >As an avi

[Full-Disclosure] RE: W2K source "leaked"?

2004-02-12 Thread tlarholm
I know some people have been talking about this as being a false news story, but now there is confirmation from Redmond. http://www.komotv.com/stories/29778.htm Regards Thor Larholm Senior Security Researcher PivX Solutions 24 Corporate Plaza #180 Newport Beach, CA 92660 http://www.pivx.com [

[Full-Disclosure] Ol' PapaSmurf

2004-02-12 Thread Byron Copeland
Just put up some old code again. Just a simpleton port of an old unix port to WIN32 of PapaSmurf. Not a complex program, but would probably help some with fundamentals of WIN32 based programming at least. And, probably most ineffective these days anyway. http://home.comcast.net/~nodialtone _

[Full-Disclosure] Microsoft confirms source code leak

2004-02-12 Thread Thor Larholm
There has been discussions on this mailing list as well as others about a possible leak of Windows 2000 and Windows NT 4 source code. Microsoft has now confirmed these rumours to be true. http://www.komotv.com/stories/29778.htm Regards Thor Larholm Senior Security Researcher PivX Solutions 2

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Christopher Blume
If's all over the peer-to-peer networks. It's on a number of ftp sites now. I don't know exactly how much more information you need. Christopher Blume System Administrator Byron Copeland wrote: As an avid FULL DISCLOSURE reader, where is this "some of" source code? On Th

RE: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Nick Jacobsen
http://smokeherb.com/windows/ Both NT4 and 2000. As a side note, there is actually very little content in these files... this is a very much "partial" leak... -Original Message- From: Byron Copeland Sent: Thu 2/12/2004 5:16 PM To: Gregory A. Gilliss

[Full-Disclosure] Removing FIred admins

2004-02-12 Thread Michael T. Harding
Anybody know of a checklist or guide to removing access across the entire organization for a "retired" admin? Mixed environment including Linux, Unix, Windows, Cisco, Nortel   Create your own personal Web page with the info you use most, at My MSN. ___

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Byron Copeland
As an avid FULL DISCLOSURE reader, where is this "some of" source code? On Thu, 2004-02-12 at 18:55, Gregory A. Gilliss wrote: > Does this count as confirmation? > > http://news.bbc.co.uk/1/hi/business/993933.stm > > G > > On or about 2004.02.12 23:48:52 +, Gadi Evron ([EMAIL PROTECTED]) sa

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Chris McCulloh
Unfortunately, considering the date on the story is "Friday, 27 October, 2000, 16:23 GMT 17:23 UK" I would have to say no, it doesn't count as confirmation. Please do remember to check story dates before posting them. -chris On Thu, 12 Feb 2004 15:55:17 "Gregory A. Gilliss" <[EMAIL PROTECTED]> s

[Full-Disclosure] RE: W2K source "leaked"?

2004-02-12 Thread Drew Copley
> -Original Message- > From: Gadi Evron [mailto:[EMAIL PROTECTED] > Sent: Thursday, February 12, 2004 1:49 PM > To: [EMAIL PROTECTED] > Cc: [EMAIL PROTECTED]; Thor Larholm > Subject: W2K source "leaked"? > > A couple of days ago a friend of mine drew my attention to the source > making

RE: [Full-Disclosure] Security Watch Essay (was: (no subject))

2004-02-12 Thread Paul Schmehl
--On Thursday, February 12, 2004 09:39:41 AM -0800 Trevor Benson <[EMAIL PROTECTED]> wrote: You know what I love. How a usefull list has 40% of the posts some snotty little comment a child (regardless of chronological age) has to make to insult someone else in the list. Which of course spawns th

RE: [Full-Disclosure] RE: W2K source "leaked"?

2004-02-12 Thread Andre Ludwig
I am still up in the air on if this is legit or not. If it is yes the bar has been lowered for simple exploits. It will also have the effect of empowering those skilled individuals into creative and more advanced attacks and exploits against the windows platform. From the source file listings floa

Re: [Full-Disclosure] RE: Security Watch Essay (was: (no subject))

2004-02-12 Thread James Bliss
Ah, hypocrisy from a journalist, imagine that: On Thursday 12 February 2004 07:09, Keith Ward wrote: > ... I wouldn't have > wasted my keystrokes... If you had not wasted them this email would not have been written. I would definitely trust the veracity of anything this person writes.

Re: [Full-Disclosure] Exclusive: Windows 2000 & Windows NT 4 Source Code Leaks

2004-02-12 Thread morning_wood
the link to some sources died.. http://web1.v10.server106.fastvirtual.de/windows_2000_source_code.zip but i dont there is going to be much hassle getting a 200mb zip real soon... http://www.eweek.com/article2/0,4149,107786,00.asp wood > need source code comrade? > > http://amo.net/NT/01-20-

[Full-Disclosure] Partial protection against MyDoom

2004-02-12 Thread Tomasz Grabowski
Hello. I have not been able to find simmilar information on the Internet, so I'm posting it here. Maybe someone will find it as a solution to MyDoom e-mails flood. But if it is already known, sorry for wasting your time. * * * It looks that MyDoom is not using the MX flag of particular domain.

Re: [Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Gregory A. Gilliss
Does this count as confirmation? http://news.bbc.co.uk/1/hi/business/993933.stm G On or about 2004.02.12 23:48:52 +, Gadi Evron ([EMAIL PROTECTED]) said: > A couple of days ago a friend of mine drew my attention to the source > making rounds on the encrypted p2p networks, I was hoping it w

Re: [Full-Disclosure] RE: [kinda-but-not-really-Full-Disclosure-so-we-feel-warm-and-fuzzy] Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Paul Schmehl
--On Thursday, February 12, 2004 11:11:51 PM +1300 Brett Moore <[EMAIL PROTECTED]> wrote: Its great... With the MS patching been relegated to monthly, it means we only have to put up with this crap once a month... but man it drags on.. and on... and on Everyone has an opinion, agreed. But it

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread Sebastian Herbst
> Between linguistic differences (the > German language, for example, puts the verb at the end of the sentence, > a la postfix notation) Hi, i just want to correct this. There are some grammatical constructs in the German language. These occur only in subordinate clauses, and can be avoided. Examp

Re: [Full-Disclosure] Important Notice about Security Watch Debate

2004-02-12 Thread James Bliss
>From your email it would appear that the 'battle lines' are already drawn. Anyone submitting 'essays' may get them published and then Roberta Bragg's response to those essays is published. Will the parties submitting the essays then be provided guaranteed space to rebut Roberta's responses?

[Full-Disclosure] RE: W2K source "leaked"?

2004-02-12 Thread tlarholm
This is not the first time that people have reported leaked copies of Windows source code. In 2000, Wired News reported that the source code for Whistler (now Windows XP) had been leaked, though they never confirmed it. http://www.wired.com/news/business/0,1367,35135,00.html WinBeta is also repor

RE: [Full-Disclosure] Re: HelpCtr - allow open any page or run

2004-02-12 Thread Aditya, ALD [Aditya Lalit Deshmukh]
win2k sp4 does not work > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Richard > Maudsley > Sent: Friday, February 10, 2006 10:38 PM > To: [EMAIL PROTECTED] > Subject: Re: [Full-Disclosure] Re: HelpCtr - allow open any page or run > > > Nope, me ne

[Full-Disclosure] RE: [kinda-but-not-really-Full-Disclosure-so-we-feel-warm-and-fuzzy] Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Brett Moore
Its great... With the MS patching been relegated to monthly, it means we only have to put up with this crap once a month... but man it drags on.. and on... and on Everyone has an opinion, agreed. But its not like those same opinions are not shared by others.. Some would like full disclosure,

[Full-Disclosure] RE: Security Watch Essay (was: (no subject))

2004-02-12 Thread Keith Ward
Who are you? You don't even provide your name. I'm frankly surprised that Roberta gave you as detailed a reply as she did; I wouldn't have wasted my keystrokes. Now, if you'd prefer to have a civilized debate, instead of throwing out insults (rank amateur gibberish comes to mind), we can talk. Othe

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread Gregory A. Gilliss
I flamed Mr. rude off list, but there is one point that I would like to respond to on list... The original poster asked whether a development was due to an unofficial government policy. Aside from all the nastier parts of the PATRIOT act (and Magic Lantern and the other stuff that's already been

[Full-Disclosure] iDEFENSE Security Advisory 02.11.04: XFree86 Font Information File Buffer Overflow II

2004-02-12 Thread iDefense Labs
iDEFENSE Security Advisory 02.11.04: XFree86 Font Information File Buffer Overflow II http://www.idefense.com/application/poi/display?id=73 February 12, 2004 I. BACKGROUND In short, XFree86 is an open source X11-based desktop infrastructure. XFree86, provides a client/server interface between d

[Full-Disclosure] W2K source "leaked"?

2004-02-12 Thread Gadi Evron
A couple of days ago a friend of mine drew my attention to the source making rounds on the encrypted p2p networks, I was hoping it would take a bit longer for it to be "out", but that was just day-dreaming. Thor Larholm just gave me this URL, as you can notice, the server is busy: http://www.neo

RE: [Full-Disclosure] Security Watch Essay (was: (no subject))

2004-02-12 Thread Trevor Benson
You know what I love. How a usefull list has 40% of the posts some snotty little comment a child (regardless of chronological age) has to make to insult someone else in the list. Which of course spawns the other 40% rebuttals to the attacks. When in all reality, not one of us cared what the child

[Full-Disclosure] Important Notice about Security Watch Debate

2004-02-12 Thread Keith Ward
Hi all, When I wrote my pitch for articles on Microsoft security, I didn't realize that Monday was President's Day, and a holiday for my company. As such, there will be no Security Watch newsletter going out Monday containing the essay for Roberta Bragg to respond to. It's totally my fault; I hadn

[Full-Disclosure] Buffer overflow in XFree86

2004-02-12 Thread Olaf Hahn
At Feb-10-2004 iDefense has released a Security Advisory regarding to an buffer overflow in XFree86. http://www.idefense.com/application/poi/display?id=72&type=vulnerabilities&flashstatus=false According to this advisory affected versions are 4.1.0 to 4.3.0 and there´s an description how to repr

[Full-Disclosure] RE: bleh

2004-02-12 Thread Drew Copley
> -Original Message- > From: Eric Lauzon [mailto:[EMAIL PROTECTED] > Sent: Thursday, February 12, 2004 1:21 PM > To: Drew Copley > Subject: bleh > > Hehehe why you waste your time replying on mailing list dude. Well, replying to you personally would be a waste of time. > > its been

[Full-Disclosure] getting dupe digest emails?

2004-02-12 Thread R.Geller
Is this happening to anyone else? -Rob ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Absurd Microsoft QA? The Return of the "username@password"...

2004-02-12 Thread Kevin Sullivan
>* Here's the final straw… On February 10, 2004… Microsoft released > a patch that… restores the "[EMAIL PROTECTED]:" functionality in URL >references! > * It seems they are trying to hide this fact as this is not >widely publicized and it is NOT being labeled as an IE patch nor a even >a securi

Re: [Full-Disclosure] Hi

2004-02-12 Thread Andre Timmermannn
On Thu, 2004-02-12 at 02:42, CHS wrote: > On Wed, 11 Feb 2004 [EMAIL PROTECTED] wrote: > > > test > > HAHAHAHAHAHA > > > *points and laughs* Another pont'n'laugh for Cisco advertises the "self-healing-network" which detects and removes a virus automaticly ;) >From the german Cisco-website

Re: [Full-Disclosure] Windows 98 Hidden Pics

2004-02-12 Thread frode
On Wed, Feb 11, 2004 at 15:34:07 -0600, Michael De La Cruz wrote: > I was doing a forensic examination on Microsoft's Virtual PC 2004 software, > and came across some Microsoft pictures I hadn't seen on an installed > version of Windows 98 before. I know this isn't much of an > exploit/vulnerab

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread Sebastian Herbst
On Thu, 2004-02-12 at 04:49, Joshua Levitsky wrote: > - Original Message - > Not to worry... after we invade Germany I'm sure he won't feel that way. > > -- > Joshua Levitsky, MCSE, CISSP > System Engineer > Time Inc. Information Technology > [5957 F27C 9C71 E9A7 274A 0447 C9B9 75A4 9B41

RE: [Full-Disclosure] Re: Re: EEYE: MicrosoftASN.1 ...

2004-02-12 Thread Drew Copley
> -Original Message- > From: Kenton Smith [mailto:[EMAIL PROTECTED] > Sent: Thursday, February 12, 2004 11:55 AM > To: Drew Copley > Cc: Paul Tinsley; [EMAIL PROTECTED] > Subject: RE: [Full-Disclosure] Re: Re: comments>EEYE: MicrosoftASN.1 ... > > Mr. Copley, > > I'm not an Eeye cust

RE: [Full-Disclosure] Exclusive: Windows 2000 & Windows NT 4 Source Code Leaks

2004-02-12 Thread 3WMail Guest
need source code comrade? http://amo.net/NT/01-20-03MSFT.html *grin* -KF -Original Message- Date: Thu 02/12/04 2:29 PM From: jB <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] CC: Subject: [Full-Disclosure] Exclusive: Windows 2000 & Windows NT 4 Source Code Leaks Yes, it's not an exploi

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread cptnug
On Thu, Feb 12, 2004 at 11:29:22AM -0600, Clint Bodungen wrote: > From: "Gregory A. Gilliss" <[EMAIL PROTECTED]> > > And just to make you *really* cringe, I can't prove it, but I believe > > he's correct. 'nuf said. > > Ok put down the tabloids and comic books. I've written commercial software >

RE: [Full-Disclosure] Re: Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Kenton Smith
Mr. Copley, I'm not an Eeye customer nor do I necessarily share the views of the original poster. However, if I were you I'd quit while you're ahead. This sort of tone from a representative of the company doesn't reflect well on the company in general. Whether the poster is knowledgeable or not, a

[Full-Disclosure] RE: [kinda-but-not-really-Full-Disclosure-so-we-feel-warm-and-fuzzy] Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Drew Copley
> -Original Message- > From: Brett Moore [mailto:[EMAIL PROTECTED] Oh no, not the OTHER kiwi... ;) > Sent: Thursday, February 12, 2004 2:12 AM > To: Drew Copley > Cc: [EMAIL PROTECTED] > Subject: RE: > [kinda-but-not-really-Full-Disclosure-so-we-feel-warm-and-fuzz > y] Re: EEYE: Mic

[Full-Disclosure] Symlink vulnerabilities in mailmgr

2004-02-12 Thread Marco van Berkum
- Title : Symlink vulnerabilities in mailmgr Bug finder : Marco van Berkum ([EMAIL PROTECTED]) Website: http://ws.obit.nl URL to mailmgr : http://web.onda.com.br/orso/mailmgr.html Tested version : Mailmgr-1.2.3 Date

[Full-Disclosure] RE: Another Low Blow From Microsoft: MBSA Failure!

2004-02-12 Thread Evans, Arian
Drew, > I apologize for alienating these users. Clarification appreciated. As someone who has used Retina for years, and performs vulnerability assessment and incident response for a living, I share your concerns about the quality of MBSA (and appreciate the things that Retina does well in this

[Full-Disclosure] Exclusive: Windows 2000 & Windows NT 4 Source Code Leaks

2004-02-12 Thread jB
Yes, it's not an exploit, but close... Seems MS just joined the open source alliance: http://neowin.net/comments.php?id=17509&category=main JB - Original Message - From: "mescsa" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Monday, February 09, 2004 9:14 PM Subject: Re: [Full-Disclos

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread Clint Bodungen
> My own opinion is that most software is so bad security-wise there's just > no need for explicit backdoors. The US government TLAs can trust software > developers (and if not them, the users) to make enough mistakes that they > don't need to force or ask them to put in backdoors on purpose. > >

RE: [Full-Disclosure] Re: Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Drew Copley
> -Original Message- > From: Brian Eckman [mailto:[EMAIL PROTECTED] > Sent: Thursday, February 12, 2004 11:46 AM > To: Drew Copley > Cc: Paul Tinsley; [EMAIL PROTECTED] > Subject: Re: [Full-Disclosure] Re: Re: comments>EEYE: Microsoft ASN.1 ... > > Drew Copley wrote: > > > But, it tu

Re: [Full-Disclosure] Re: Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Jason Stout
On Thu, Feb 12, 2004 at 12:56:59AM -0600, Paul Tinsley wrote: > Show me one competitor that releases such detail at day 0 of patch release. > It took me less than 5 minutes to find an advisory from one of eeye's major competitors who released an advisory WITHOUT a vendor patch being available.

Re: [Full-Disclosure] Re: Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Brian Eckman
Drew Copley wrote: But, it turns out, that the guys who can write exploit code also can reverse engineer patches... You said it all in that sentence. No other commentary was necesary to make your point. Besides reading exploit code (if such code were released, which it was not), I'd imagine (

RE: [Full-Disclosure] Re: Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Drew Copley
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > Paul Tinsley > Sent: Wednesday, February 11, 2004 10:57 PM > To: Drew Copley > Cc: [EMAIL PROTECTED] > Subject: Re: [Full-Disclosure] Re: Re: comments>EEYE: Microsoft ASN.1 ... > > Drew Copley w

Re: [Full-Disclosure] Re: [ GLSA 200402-02 ] XFree86 Font Information File Buffer Overflow

2004-02-12 Thread Evert Daman
> > Fatal server error: > > Caught signal 11. Server aborting > > > > no segfault or something... > > hahahaha...give me a shell i'll check it out!! people can't make mistakes without anybody making fun off them :P i copy paste the wrong lines. if logged in on the console i get a segfault. usi

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread Clint Bodungen
I really despise contributing to off-topic threads but I just have to say my peace on this one (because it has gotten *so* ridiculous) then I'll drop it. First of all, my apologies to Thorolf. I didn't mean for that to sound as harsh as it looked and like everyone is, so ridiculously, making it o

Re: [Full-Disclosure] HELLO

2004-02-12 Thread Dave Howe
Martin wrote: > It was somehow funny. The most annoying thing about it is that you > get about 30 bounce mails from the people who use automatic virus > scanners. You should switch the bounce-mails off for mailing lists, > IMO. sender notification is no bloody use anyhow. What was the last virus th

[Full-Disclosure] Re: Funny, I thought I mailed FULL DISCLOSURE

2004-02-12 Thread gabriel rosenkoetter
Um. You did. But you also mailed Bugtraq and patchmanagement, one of which (I really can't be bothered to decipher which for you; those headers are a mess) is what rejected your post: On Wed, Feb 11, 2004 at 06:39:31PM -0800, morning_wood wrote: > >Subject: Message rejected [...] > > List-Id: > >

[Full-Disclosure] Re: HELLO

2004-02-12 Thread gabriel rosenkoetter
On Thu, Feb 12, 2004 at 12:28:13AM -0800, CHS wrote: > wow, has ALL of cisco been 0wned? Yeah, you know, because only Cisco employes would have @cisco.com address in their Outlook addressbooks or inboxes. > am I the only one who sees just how absolutely fscking hilarious this is?? Yep. The rest

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread Valdis . Kletnieks
On Wed, 11 Feb 2004 18:39:18 PST, "Gregory A. Gilliss" said: > receive of the United States in their news and other media, it should > be no surprise to you that someone from another country might suppose > that America has an unofficial government policy in place to facilitate > this kind of beh

Re: [Full-Disclosure] HELLO

2004-02-12 Thread Martin
Am Thu, den 12.02.2004 schrieb CHS um 09:28: > wow, has ALL of cisco been 0wned? Calm down, it's just a faked "From:"-header. Someone posted an email with my address, too. Look here: http://lists.netsys.com/pipermail/full-disclosure/2004-February/016738.html And he even tried to fake a bounce-mai

Re: [Full-Disclosure] Re: [ GLSA 200402-02 ] XFree86 Font Information File Buffer Overflow

2004-02-12 Thread qobaiashi
Am Donnerstag, 12. Februar 2004 08:45 schrieb Evert Daman: > > {Some output removed}... Server aborting... Segmentation fault (core > > dumped) > > mandrake gives me a: > > Fatal server error: > Caught signal 11. Server aborting > > no segfault or something... hahahaha...give me a shell i'll che

Re: [Full-Disclosure] Re: Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Gregory A. Gilliss
I do not work for eEye, although I have a favorable impression of the work that I see them produce. My personal prejudice is that I subscribe to the school of "security by embarrassment". Vendors (and examples of this are legion) fix holes in their code much more quickly when the hole is widely pu

RE: [Full-Disclosure] Security Watch Essay (was: (no subject))

2004-02-12 Thread Schmehl, Paul L
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > roberta bragg > Sent: Thursday, February 12, 2004 1:06 AM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Cc: [EMAIL PROTECTED] > Subject: RE: [Full-Disclosure] Security Watch Essay (was: (no > subject

Re: [Full-Disclosure] HELLO

2004-02-12 Thread Nexus
- Original Message - From: "CHS" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Thursday, February 12, 2004 8:28 AM Subject: Re: [Full-Disclosure] HELLO > > wow, has ALL of cisco been 0wned? > > am I the only one who sees just how absolutely fscking hilarious th

Re: [Full-Disclosure] HELLO

2004-02-12 Thread CHS
wow, has ALL of cisco been 0wned? am I the only one who sees just how absolutely fscking hilarious this is?? -- http://www.23.org/~chs/ -- AIM/AOL: bdsmchs - "Among the many misdeeds of the British rule in India, hi

Re: [Full-Disclosure] How much longer?

2004-02-12 Thread Thorolf
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello List, Clint, Gregory, thx for OFF TOPIC comment, by the way I'm from Poland. It was ironic, for fun or not, we can't say 'it's impossible'. I said "US located", cause M$ is located in US. This is possible in Poland/Germany and other countries

[Full-Disclosure] Re: [ GLSA 200402-02 ] XFree86 Font Information File Buffer Overflow

2004-02-12 Thread Evert Daman
> To reproduce the overflow on the command line, you can run: > > # cat > fonts.dir < ~ 1 > ~ word.bdf \ > ~ -misc-fixed-medium-r-semicondensed--13-120-75-75-c-60-iso8859-1 > ~ EOF > # perl -e 'print "0" x 1024 . "A" x 96 . "\n"' > fonts.alias > # X :0 -fp $PWD > > {Some output removed}... Ser

[Full-Disclosure] MDKSA-2004:010 - Updated mutt packages fix remote crash

2004-02-12 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandrake Linux Security Update Advisory ___ Package name: mutt Advisory ID:

Re: [Full-Disclosure] Re: Re: EEYE: Microsoft ASN.1 ...

2004-02-12 Thread Paul Tinsley
Drew Copley wrote: Without replying to each troll, individually, I thought maybe some people would like to see some answers to some notes. Most of these are from me, so I will personally respond to those that apply. And believe it or not, this is not a troll, I really wanted to see people's

[Full-Disclosure] Funny, I thought I mailed FULL DISCLOSURE

2004-02-12 Thread morning_wood
>- Original Message - >From: "Lyris ListManager" <[EMAIL PROTECTED]> >To: <[EMAIL PROTECTED]> >Sent: Wednesday, February 11, 2004 5:49 PM >Subject: Message rejected > Return-Path: <[EMAIL PROTECTED]> > Received: from smarthost3.mail.uk.easynet.net ([212.135.6.13]) by listserv.patchmanageme