Am So, 2004-04-11 um 07.28 schrieb Joel R. Helgeson:
Just a day after Cisco released a security warning about its WLSE
access point management tool, a tool to crack wi-fi networks using
LEAP authentication has been released, reports Wi-Fi Networking News.
The tool, called Asleap and developed
Thomas wrote:
Another interesting tool: THC-LEAPcracker
The THC LEAP Cracker Tool suite contains tools to break the
NTChallengeResponse encryption technique e.g. used by Cisco
Wireless LEAP Authentication. Also tools for spoofing
challenge-packets from Access Points are included, so you are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Topic: DoS Vulnerability in Microsoft Windows SPNEGO Protocol Decoding
Release Date: 2004-04-14
CVE CAN ID: CAN-2004-0119
http://www.nsfocus.com/english/homepage/research/0401.htm
Affected Software and Systems:
===
- - Microsoft
Thanks Bill,
Unfortunately the way that Wingate is set up, it uses a different port for
each conversation (or so it appears from the decode window in Iris on the
Wingate server machine). This makes it difficult to determine which ports
are used and therefore to set Ethereal to decode those ports
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The WorldWide WarDrive (www.worldwidewardrive.org) would like to announce
that the DEF CON 12 WarDriving Contest has been announced.
The Official Rules have been posted at
http://www.worldwidewardrive.org/dc12wd/DC12WD.html
Sign up begins May 15th.
Hi,
when looking recently for vulnerabilities in the Microsoft SSL code we
have found the DoS described in the lastest Microsoft Security Bulletin
MS04-011.
We've only tested this PoC on Windows 2000 running IIS 5.0, but as the
bulletin says, other applications using SSL and other windows
I use Linux, OpenBSD and Windows in my enterprise. Linux and OpenBSD use
the 1 patch for 1 vulnerability rule. Seems to me that MS is bunching
their patches together in order to make it seem on the surface that Windows
has less patches than other Oses, therefore it is more secure. CIOs, take
On Wed, 14 Apr 2004, Dave Howe wrote:
Thomas wrote:
Another interesting tool: THC-LEAPcracker
The THC LEAP Cracker Tool suite contains tools to break the
NTChallengeResponse encryption technique e.g. used by Cisco
Wireless LEAP Authentication. Also tools for spoofing
I use Linux, OpenBSD and Windows in my enterprise. Linux and OpenBSD use
the 1 patch for 1 vulnerability rule. Seems to me that MS is bunching
their patches together in order to make it seem on the surface that Windows
has less patches than other Oses, therefore it is more secure. CIOs,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Red Hat Security Advisory
Synopsis: Updated CVS packages fix security issue
Advisory ID: RHSA-2004:154-01
Issue date:2004-04-14
Updated
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Red Hat Security Advisory
Synopsis: Updated cadaver package fixes security vulnerability in neon
Advisory ID: RHSA-2004:158-01
Issue date:
Curt Purdy wrote:
Agreed. If the packets/hashes can be accessed it can be compromised.
Unbreakable has been touted from the 48-bit Netscape encryption
that took USC's distributed network a week to crack, to Oracle 9i
that took one day to compromise, I believe.
You are preaching to the choir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 479-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
April 14th, 2004
Or maybe it is a conspiracy to make us patch our systems once instead of 14
times. By doing so we would have more free time which probably increases
xbox sales.
Kim
-Original Message-
From: Edward W. Ray [mailto:[EMAIL PROTECTED]
Sent: woensdag 14 april 2004 16:10
To: [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
__
SUSE Security Announcement
Package:cvs
Announcement-ID:SuSE-SA:2004:008
Date: Wed Apr 14
give me a freakin break people you guys complain when Microsoft doesn't
patch something, and now you're complaining when Microsoft patches
something I think that a lot of people just like to bash Microsoft for
any reason they can think of what's next, Microsoft bashing because they're
in
Ron DuFresne wrote:
we are considering
implimenting an EAP encrypted AP directly on the lan, and I
am looking for
reasons to say it should be DMZed.
All wireless traffic should be treated as unsecured, and
pushed through a
DMZ/encryption tunneled setup.
snip
Agreed. If the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 481-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
April 14th, 2004
I use Linux, OpenBSD and Windows in my enterprise. Linux and OpenBSD use
the 1 patch for 1 vulnerability rule. Seems to me that MS is bunching
their patches together in order to make it seem on the surface that Windows
has less patches than other Oses, therefore it is more secure. CIOs,
I would not mind the bunching, except that many of the vulnerabilities were
discovered more than 4-6 months ago. The other Oses release patches much
more quickly. What if someone other than Eeye with an axe to grind
discovered these flaws before Microsoft decided to patch them?
-Original
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 483-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
April 14th, 2004
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: kernel
Advisory ID:
You might have a point there with your box Curt ;-)
But, Windows has a nice little utility that will patch you system for you
and pop up a nice little box near the clock that says system patched too...
Windows Update works quite well actually. Now if it was only turned full on
by default.
Exactly the point of full disclosure. If someone with a serious axe to grind would
have stumbled onto the ASN.1 flaw before the Eeye notice, it could have been an ELE*
for MS and some major corporations.
Let's see, unpatched ASN.1 + Flash Worm = ?
jim burnes
security engineer
great-west,
--On Wednesday, April 14, 2004 09:17:56 AM -0500 Ron DuFresne
[EMAIL PROTECTED] wrote:
All wireless traffic should be treated as unsecured, and pushed through a
DMZ/encryption tunneled setup. Puttiing wireless AP's directly on the LAN
is a major blunder.
Well, that really depends, doesn't it.
Nice try.
On Wed, Apr 14, 2004 at 12:04:46PM -0400, Exibar wrote:
From: Exibar [EMAIL PROTECTED] To:
[EMAIL PROTECTED], [EMAIL PROTECTED] Subject:
[Full-Disclosure] 1 patch for 1 vulnerabiliy for Linux and BSD? gunna try and sell
us a bridge now too?
Date: Wed, 14 Apr 2004
12:04:46 -0400
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: cvs
Advisory ID:
On Wed, Apr 14, 2004 at 11:59:14AM -0400, Exibar wrote:
From: Exibar [EMAIL PROTECTED] To: [EMAIL PROTECTED],
[EMAIL PROTECTED] Subject: Re: [Full-Disclosure]
The new Microsoft math: 1 patch for 14 vulnerabilities, MS04-011
Date: Wed, 14 Apr 2004 11:59:14 -0400
give me a freakin break
-BEGIN PGP SIGNED MESSAGE-
__
SUSE Security Announcement
Package:Linux Kernel
Announcement-ID:SuSE-SA:2004:009
Date:
Well, that depends. For example, if you aren't using some form of
strong authentication (i.e. smart cards, SecureID tokens, etc.) then its
possible for someone to steal a laptop, use something like Cain (from
the package Cain Able) to extract their password from the registry.
With that and a
On Wed, Apr 14, 2004 at 07:10:20AM -0700, Edward W. Ray wrote:
I use Linux, OpenBSD and Windows in my enterprise. Linux and OpenBSD use
the 1 patch for 1 vulnerability rule. Seems to me that MS is bunching
their patches together in order to make it seem on the surface that Windows
has
Depends on what kind of break you want. If you want to break into the
connection (ala add/modify/delete traffic in real time), yes a 10 minute
cycle time makes it difficult. If all you want is the data afterwards (ie:
see the login id and password), then all the 10 minute cycle time does is
On Wed, 2004-04-14 at 08:40 -0700, Edward W. Ray wrote:
I would not mind the bunching, except that many of the vulnerabilities were
discovered more than 4-6 months ago. The other Oses release patches much
more quickly. What if someone other than Eeye with an axe to grind
discovered these
On Wed, Apr 14, 2004 at 04:56:48PM +0200, Kim Oppalfens wrote:
Or maybe it is a conspiracy to make us patch our systems once instead of 14
times. By doing so we would have more free time which probably increases
xbox sales.
But how could an XBox ever compare to the fun of 'install patch,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 482-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
April 14th, 2004
-Original Message-
From: Tim [mailto:[EMAIL PROTECTED]
Sent: Wednesday, April 14, 2004 9:38 AM
To: Edward W. Ray
Cc: [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] The new Microsoft math: 1
patch for 14 vulnerabilities, MS04-011
snip
Yeah, this is pretty disgusting.
Well so into more detail for you. There is a key rotation for WEP keys
maybe (depends
on your setup). But remember there is more than one wepkey to look at.
Let's say there is a broadcasting wepkey and a client specific one.
Most installations
rotate only the client specific one. So any known
At 11:59 AM 4/14/2004 -0400, Exibar wrote:
Microsoft bashing because they're
in Redmond, WA and you feel they should be in Texas somewhere?
NO! Washington is just fine. We have enough pollution problems
down here in Texas already, thank you.
m5x
___
On Wed, 14 Apr 2004 12:41:31 CDT, Paul Schmehl [EMAIL PROTECTED] said:
--On Wednesday, April 14, 2004 09:17:56 AM -0500 Ron DuFresne
All wireless traffic should be treated as unsecured, and pushed through a
DMZ/encryption tunneled setup. Puttiing wireless AP's directly on the LAN
is a
are you kidding me? for years and years all I've heard from *nix people is
how secure the OS is and that there aren't as many patches needed for it and
if a vuln is found a patch is released right away
Ex
- Original Message -
From: John Sage [EMAIL PROTECTED]
To: Exibar [EMAIL
--On Wednesday, April 14, 2004 03:26:16 PM -0500 Ron DuFresne
[EMAIL PROTECTED] wrote:
Yes, as I said, tunneled and encrypted, anything spewing into the 'air'
needs to be kept from someone just reaching out and grabbing your data, be
it wireless network traffic, wireless cameras and keyboards and
On Wed, 14 Apr 2004, Paul Schmehl wrote:
--On Wednesday, April 14, 2004 09:17:56 AM -0500 Ron DuFresne
[EMAIL PROTECTED] wrote:
All wireless traffic should be treated as unsecured, and pushed through a
DMZ/encryption tunneled setup. Puttiing wireless AP's directly on the LAN
is a major
-Original Message-
From: Ron DuFresne [mailto:[EMAIL PROTECTED]
Sent: Wednesday, April 14, 2004 2:41 PM
To: Tremaine Lea
Cc: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] The new Microsoft math: 1
patch for 14 vul nerabilities, MS04-011
[SNIP]
This merely
: Affected Packages:Corrected Packages:
OpenPKG CURRENT = mysql-4.0.18-20040214 = mysql-4.0.18-20040414
OpenPKG 2.0 = mysql-4.0.18-2.0.0 = mysql-4.0.18-2.0.1
OpenPKG 1.3 = mysql-4.0.14-1.3.2 = mysql-4.0.14-1.3.3
Dependent Packages: none
Description
hehehe... sorry 'bout that! We can send them to Massachusetts to be right
along side Kerry when he looses the election :-)
Please let the Kerry comment go, I'm not meaning to start a polical
war
ex
- Original Message -
From: madsaxon [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Greetings,
Am Mittwoch, 14. April 2004 22:18 schrieb Exibar:
are you kidding me? for years and years all I've heard from *nix people is
how secure the OS is and that there aren't as many patches needed for it
and if a vuln is found a patch is released right away
hey, hey. Slow down. The
--On Wednesday, April 14, 2004 11:13:02 AM -0700 John Sage
[EMAIL PROTECTED] wrote:
Well, which is it? 3, 21, 20, over 30, at least 20?
That's easy. All of the above. :-)
So what does this say about accuracy in journalism?
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
On Wed, 14 Apr 2004, Paul Schmehl wrote:
--On Wednesday, April 14, 2004 03:26:16 PM -0500 Ron DuFresne
[EMAIL PROTECTED] wrote:
Yes, as I said, tunneled and encrypted, anything spewing into the 'air'
needs to be kept from someone just reaching out and grabbing your data, be
it wireless
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 479-2 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
April 14th, 2004
also sprach Exibar [EMAIL PROTECTED] [2004.04.14.2218 +0200]:
are you kidding me? for years and years all I've heard from *nix
people is how secure the OS is and that there aren't as many
patches needed for it and if a vuln is found a patch is released
right away
I don't see why Debian
Exactly the point of full disclosure. If someone with a serious axe to
grind would have stumbled onto the ASN.1 flaw before the Eeye notice, it
could have been an ELE* for MS and some major corporations.
Let's see, unpatched ASN.1 + Flash Worm = ?
I think you seriously underestimate the
Are any of your server boxes domain controller? DCPROMO.LOG will only be
created after a Windows Server OS is promoted to a domain controller.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Richard
Maudsley
Sent: Tuesday, April 13, 2004 9:55 PM
To:
= Utility Manager - Failure to drop system privileges
=
= MS Bulletin posted: April 13, 2004
= http://www.microsoft.com/technet/security/Bulletin/MS04-011.mspx
=
= Affected Software:
= Microsoft Windows 2000
=
= Public
Hello.
Can anyone here identify what bot this is?
I keep getting viruses comming from 200.106.25.197 and
it's open to telnet on port 23 asking for a password.
--
Yours Digitally,
CanonBall mailto: [EMAIL PROTECTED]
http://www.centredaffaires.qc.ca
Sender Policy Framework:
7 miles away is stretching it a bit far considering that all 802.11g
wireless transmissions range between 2.4 - 2.4835 Ghz 802.11a/h/j range
between 5.47 - 5.725 Ghz not only are the frequencies prone to scatter...the
radio waves bounce off everything. All wireless routers are limited by FCC
On Wed, 14 Apr 2004, Exibar wrote:
But, Windows has a nice little utility that will patch you system for you
and pop up a nice little box near the clock that says system patched too...
Windows Update works quite well actually. Now if it was only turned full on
by default.
And installing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: tcpdump
Advisory ID:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Geoincidents wrote:
| Exactly the point of full disclosure. If someone with a serious
| axe to
|
| grind would have stumbled onto the ASN.1 flaw before the Eeye
| notice, it could have been an ELE* for MS and some major
| corporations.
|
| Let's see,
On Wed, 14 Apr 2004, Jeff Schreiner wrote:
To get a 2.4 Ghz signal to travel 7 miles you would have to install an
amplifier to boost the output to somewhere between 5 to 10 watts a 5 Ghz
signal would require even more at which point you're in violation of FCC
rules and Uncle Sam might come
Exibar wrote:
You might have a point there with your box Curt ;-)
But, Windows has a nice little utility that will patch you system for you
and pop up a nice little box near the clock that says system patched too...
Windows Update works quite well actually. Now if it was only turned full on
Dave Aitel wrote:
| Exactly the point of full disclosure. If someone with a serious
| axe to
|
| grind would have stumbled onto the ASN.1 flaw before the Eeye
| notice, it could have been an ELE* for MS and some major
| corporations.
|
| Let's see, unpatched ASN.1 + Flash Worm = ?
|
|
| I think
On Wed, 14 Apr 2004, Jeff Schreiner wrote:
7 miles away is stretching it a bit far considering that all 802.11g
wireless transmissions range between 2.4 - 2.4835 Ghz 802.11a/h/j range
between 5.47 - 5.725 Ghz not only are the frequencies prone to scatter...the
radio waves bounce off
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 484-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Matt Zimmerman
April 14th, 2004
That's retarded. Immunity is releasing a universal, repeatable, lsass
exploit in about 5 minutes to our CANVAS customers, for example, and
we're sure everyone else is done as well. For bonus credit we're
including a working ASN.1 exploit that owns IIS, Exchange, and
everything else...
If
On Wed, 2004-04-14 at 21:38, Rick Updegrove wrote:
Exibar wrote:
On 2 recent occasions that I can recall a windows update broke windows.
Once it disabled the NIC altogether and on another occasion it caused IE
to run slower than a one legged cat, trying to bury a turd, on a frozen
pond.
If it weren't for the vulnerabilities being around for MORE THAN SIX MONTHS,
I would not have an issue. Personally I prefer to know ASAP of any
vulnerability and have a possible workaround if a patch cannot be
immediately released. I would think MS with its $53 billion in the bank
($51 billion
This is true but from my experience with amateur radio an HF rig running at
14 MHz (wavelength of 20 meters) at 1.5 watts will travel to Europe. A 2
meter (144 - 150 Mhz) mobile rig with 1/2 wave omni directional antenna
running at 50 watt output on a good day when the conditions are right will
That's retarded. Immunity is releasing a universal, repeatable, lsass
exploit in about 5 minutes to our CANVAS customers, for example, and
we're sure everyone else is done as well. For bonus credit we're
including a working ASN.1 exploit that owns IIS, Exchange, and
everything else...
Face
You obviously do not care that these vulnerabilities were discovered by Eeye
4-6 months ago. The nix community is far more immediate in identify and
patching vulnerabilities. If you are confident that no one else will
discover those vulnerabilities the next time that MS waits to provide a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear Dave and what was it ... jeff, Curt and exhibar, your in here too,
and I'll throw Fitzgerled on just for fun
Neither one of you know what the fuck your talking about. I suggest you
http://www.graphicupstart.com/clients/misc/stfu.jpg
Well, that really depends, doesn't it. We're doing IPSEC using AES for
wireless on a test network. It's a good deal more secure than our wired
network, which is still plain text.
this sure is plain text but when combined with switches ( yes i know they can be
degraded to act like hubs )
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 485-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Matt Zimmerman
April 14th, 2004
http://classes.weber.edu/wireless/
-KF
Jeff Schreiner wrote:
7 miles away is stretching it a bit far considering that all 802.11g
wireless transmissions range between 2.4 - 2.4835 Ghz 802.11a/h/j range
between 5.47 - 5.725 Ghz not only are the frequencies prone to scatter...the
radio waves
On Wed, 2004-04-14 at 22:38, Jeff Schreiner wrote:
This is true but from my experience with amateur radio an HF rig running at
[...]
Even directional tracking devices used by zoologists will only pick up the
[...]
Sorry about the extended discussion on RF broadcasts, the main point wanted
to
Products: Postnuke v 0.726 (http://www.postnuke.com)
Date: 15 April 2004
Author: pokleyzz pokleyzz_at_scan-associates.net
Contributors:sk_at_scan-associates.net
shaharil_at_scan-associates.net
munir_at_scan-associates.net
URL: http://www.scan-associates.net
Summary: Postnuke v 0.726 and below SQL
On Wed, 2004-04-14 at 23:38, Jeff Schreiner wrote:
Sorry about the extended discussion on RF broadcasts, the main point wanted
to point out was detecting a 802.11 2.4 GHz transmission from 7 miles away
would be almost impossible.
hmm. A yagi the size of a cannon mounted on a pick 'em up
I thought some people here might be interested:
I've patched RainbowCrack (http://www.antsight.com/zsl/rainbowcrack/)
to compile and run on OS X, and have made the diff's available here:
http://chroot.ath.cx/bgt/rainbowcrack_mac.html.
--bgt
___
77 matches
Mail list logo