[Full-Disclosure] PHP escapeshellarg Windows Vulnerability

2004-06-06 Thread Daniel Fabian
SEC-CONSULT Security Advisory - PHP: Hypertext Preprocessor Vendor: PHP (http://www.php.net) Product: PHP 4.3.6 and below (verified in 4.3.5 which was current when the bug was discovered) Vendor status: vendor contacted (04-04-2004) Patch status: Problem fixed in 4.3.7 === DESCRIPTION

RE: [Full-Disclosure] Re: Netgear WG602 Accesspoint vulnerability

2004-06-06 Thread Jan-Peter Koopmann
On Sunday, June 06, 2004 2:35 AM James Garrison wrote: CORRECTION - Firmware is 3.1RC5 not 2.0RC5 as I first stated My WG602v2 with firmware 3.1RC5 does not appear to be vulnerable. ^^ I cannot login with the super/5777364 combination. Firmware 3.2RC3 seems

Re: [Full-Disclosure] Netgear WG602 Accesspoint vulnerability

2004-06-06 Thread Rip Toren
Folks; I found a new firware update on the Netgear product support page that removes this account, along with a couple of other fixes. I upgraded, and the login is no longer available. Good, quick response. Quoting Tom Knienieder [EMAIL PROTECTED]: KHAMSIN Security News KSN

RE: [Full-Disclosure] Using Xbox live for covert communication

2004-06-06 Thread michael s williamson
-- snip -- worth a try for securitys sake ? yes! -- snip -- Before anybody does something stupid, remember that in the USA we really no longer have the bill of rights. We also no longer have checks and balances. We can be jailed indefinitely without even knowing what we're charged with. As

RE: [Full-Disclosure] Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

2004-06-06 Thread Jelmer
I haven't installed SP2 yet since I heard a lot of complaints from people who claimed it caused instability, it had memory management issues, some drivers didn't work, security measures a bit too much in your face etc But I reviewed the list of changes sometime back and I concur, it looks very

RE: [Full-Disclosure] Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

2004-06-06 Thread Chris Carlson
When run remotely: Line: 1 Char: 1 Error: Access is denied. Code: 0 URL: http://62.131.86.111/security/idiots/repro/installer.htm When run locally, software installation is blocked. Using IE 6.0.2900.2096 SP2, WinXP SP2 I've gotta say that SP2 has some VERY nice protection builtin. On the

RE: [Full-Disclosure] Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

2004-06-06 Thread Larry Seltzer
Finally I also attached the source files to this message My McAfee-based gateway scanner blocks the attachment and labels it as VBS/Psyme, which has this description (http://us.mcafee.com/virusInfo/default.asp?id=descriptionvirus_k=100749): This trojan exploits an unpatched (at the time of this

RE: [Full-Disclosure] Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

2004-06-06 Thread Jelmer
Most recent exploits are like vehicles, they are assembled piece by piece, you can make a virus scanner detect the wheels, but a car, a bus and a bike are most certainly entirely different things! Yet none of them are any good without wheels, oh and in this case painting the wheel another color

RE: [Full-Disclosure] another new worm submission

2004-06-06 Thread Perrymon, Josh L.
I agree. Anyone that would have those ports open has a *lot more to worry about that cleaning a few worm infections. That's not the case here. This infection was caused by a remote user not a Lan user. With several hundred laptops it's hard have 0 exposure. As with any growing security practice

[Full-Disclosure] WinXP SP2 comments (was: Internet explorer 6 execution of arbitrary code)

2004-06-06 Thread Chris Carlson
No complaints from me. While the new security center complains about how I don't have a firewall or antivirus installed (it doesn't detect either), the better security more than makes up for this minor annoyance - I no longer need to worry about where I go because the simple yet absolute 'no

[Full-Disclosure] [SECURITY] [DSA 516-1] New odbc-postgresql packages fix denial of service

2004-06-06 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 516-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze June 7th, 2004

RE: [Full-Disclosure] WinXP SP2 comments (was: Internet explorer 6 execution of arbitrary code)

2004-06-06 Thread Poof
While the new security center complains about how I don't have a firewall or antivirus installed (it doesn't detect either), the better security more than makes up for this minor annoyance - I no longer need to worry about where I go because the simple yet absolute 'no popups' and 'no