RE: [Dailydave] Re: [Full-Disclosure] Public Review of OIS Security Vulnerability Reporting and Response Guidelines

2004-07-04 Thread Steve W. Manzuik
Interesting they skipped VulnWatch in this mailing. > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of dave > Sent: Sunday, July 04, 2004 11:19 AM > To: OIS > Cc: [EMAIL PROTECTED]; > [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: [Dailydav

Re: [Full-Disclosure] Gmail Information Disclosure Vulnerability

2004-07-04 Thread D.J. Capelis
The notion that this list is only for reporting bugs in software that isn't in beta is absurd. If there's a major vulnerablity in gaim or firefox I'd expect to hear about them on this list. (Both are in beta (firefox is alpha I think they like to say these days?)) If there is a large userbase us

RE: [Full-Disclosure] IE Web Browser: "Sitting Duck"

2004-07-04 Thread joe
The fun thing with you is that irregardless of what I say, it isn't, in your esteemed opinion, correct. Why? Because you once took to understand something I said as defending Microsoft which is against your very narrow viewpoint so automatically I can't possibly have any valid viewpoint. So, fo

[Full-Disclosure] Re:Bugtraq Security Systems

2004-07-04 Thread Boggles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 So Boggles was just settling down to a lunch of pan fried Big Bird and suddenly all hell broke out. Unlike normal, there were no email's in Boggles inbox to aid decision making process. After careful inspection of Body hair the following was reveale

Re: [Full-Disclosure] Re:Bugtraq Security Systems

2004-07-04 Thread System Outage
A name like "Bugtraq Security Systems" Sounds like a typical name a script kiddie group or scene whore group would use to try and gain an easy name within the scene.  They (Bugtraq Security Systems) obviously thought... Hey.. "if we whore a high profile name and make our website look professional,

Re: [Full-Disclosure] Gmail Information Disclosure Vulnerability

2004-07-04 Thread System Outage
Gmail service is in Beta. You have no credibility posting this advisory. The correct channel to post such "bugs" is the Gmail contact link for "bug reports".   If you weren't a script kiddie or scene whore, you would have known to hold information until such a time that Gmail became a public servi

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-04 Thread Jason Coombs
frank, this is not a kindergarden list. this not a housewife support list. this is a security list, this a full disclousure list. period. It also is not a list for the benefit exclusively of people who are fortunate enough to have simple security problems. The security issues surrounding the ques

[Full-Disclosure] [ GLSA 200407-04 ] Pure-FTPd: Potential DoS when maximum connections is reached

2004-07-04 Thread Thierry Carrez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200407-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-Disclosure] [ GLSA 200407-03 ] Apache 2: Remote denial of service attack

2004-07-04 Thread Thierry Carrez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200407-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-Disclosure] Gmail Information Disclosure Vulnerability

2004-07-04 Thread amforward
Brief -- While I was playing with Gmail, I found a bug that may disclose information about the users currently attempting to register a new Gmail account. This seems to be a vulnerability with low severity (at least until now). CheckAvailability Script -- In the registratio

[Full-Disclosure] Re: Public Review of OIS Security Vulnerability Reporting and ResponseGuidelines

2004-07-04 Thread Fred Mobach
OIS wrote: > > The Organization for Internet Safety (OIS) extends an invitation to > the readers of the BugTraq, NTBugtraq, and Full-Disclosure mailing > lists to participate in the ongoing public review of the OIS Security > Vulnerability Reporting and Response Guidelines. I have problems with t

RE: [Full-Disclosure] The "Drew Copley is a prick" Poll update [Time to Grow Up]

2004-07-04 Thread Mortis
I told you that would be more fun than fishing with dynamite. Plenty of fresh worms for a hungry turkey. Sort your mail box and go to town. -- Libel-libel, Dan eel http://full-disclosure.50megs.com/ ___ Full-Disclosure - We believe in it. Charter: http://

Re: [Full-Disclosure] Public Review of OIS Security Vulnerability Reporting and Response Guidelines

2004-07-04 Thread dave
Nobody trusts the OIS or its motives. I imagine this is similar to the feedback you've gotten from everyone else as well, but Immunity has no plans to subscribe to your guidelines, and is going to oppose any efforts you make to legislate those guidelines as law. In section 1.1 the draft propose

[Full-Disclosure] Re:Bugtraq Security Systems

2004-07-04 Thread bitlance winter
Who are YOU,Bugtraq Security Systems? Are YOU foo,bar.foobar? ;) YOU say LOVE,OK. [blockquote] "With burning brain and heart of hate, I sought my wronger, early, late, And all the wretched night and day My dream and thought was slay, and slay. My better self rose uppermost, The beast within my boso

[Full-Disclosure] The "Drew Copley is a prick" Poll update (vote++)

2004-07-04 Thread Boggles
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Tom, Happy 4th July. >The lack of professionalism from Team Bugtraq Security is getting to be >annoying, We'll start there. we do love the summer holidays, each year more pre-pubescents emerge, watch the various uber films (Shrek for example) a

RE: [Full-Disclosure] The "Drew Copley is a prick" Poll update [Time to Grow Up]

2004-07-04 Thread Bugtraq Security Systems
Hi Thomas! Nice! We're glad to see all those lonely nights watching Matlock were time well spent. The fact that you'd even consider legal action over being called a prick tells us alot. So let us go out on a limb here and state that you too are indeed a fucking prick. There. We said it. Is that th

Re: [Full-Disclosure] IE Web Browser: "Sitting Duck"

2004-07-04 Thread bills.bitch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ha ha ha ha ha the dog bites his master he he he he Couple of things Judge: What is this Internet Explorer thing Gates? Bll Gates: Its a core component of the operating sytem ma'am Judge: BULLSHIT GATES! JOE SAYS IT ISN'T Judge: YOUR GUILTY! Bill G

[Full-Disclosure] [ADVISORY] Fastream NETFile FTP/Web Server

2004-07-04 Thread aT4r ins4n3
Fastream NETFile FTP/Web Server Input validation Errors Release Date: 4 July 2004 Severity: High Systems Affected: Fastream NETFile FTP/Web Server <=v.6.7.2.1085 Systems Not Affected: Fastream NETFile FTP/Web Server v6.7.3 Vendor URL: ht

[Full-Disclosure] RE: Registry Fix For Variant of Scob

2004-07-04 Thread Thor Larholm
Setting the kill bit on the "Shell.Application" ActiveX object, or any other ActiveX, is a system wide configuration change. This is also the reason for the incompatibility issues you are mentioning, but there is no reason to kill the bird to secure the nest. The problem here is not the ADODB.Stre

[Full-Disclosure] oracle 10g installer race condition

2004-07-04 Thread Knud Erik Højgaard
http://kokanins.homepage.dk/or0rcle.txt Unbreakable oracle people not informed, this bug is stupid and next to useless, hence the disclosure. One can only wonder what the coders are thinking when they chmod 777 stuff. -- kokanin ___ Full-Disclosure - W

Re: [Full-Disclosure] VERY HIGH VULNERABILITY DISCLOSURE !!! MASS ROOT POSSIBLE !!! PLEASE BE ATTENTIVE !!!

2004-07-04 Thread nicolas vigier
On Sat, 03 Jul 2004, Frog [EMAIL PROTECTED] wrote: > WE ARE LOOKING FOR A JOB IN THE SECURITY RESEARCH Thanks, that was funny. ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Linux Virtual Server/Secure Context procfs shared permissions flaw

2004-07-04 Thread Veit Wahlich
Linux Virtual Server/Secure Context procfs shared permissions flaw == 2004-07-02, Veit Wahlich <[EMAIL PROTECTED]> Official location of this document: http://ircnet.de/article.shtml?vsproc Product| ---+ Linux Virtual Server ex

Re: [Full-Disclosure] (IE/SCOB) Switching Software Because of Bugs: Some Facts About Software and Security bugs

2004-07-04 Thread Georgi Guninski
drew, one should be carefull when quoting product usage numbers. our SED (Social Engineering Department) advised us you may get a monetary analogy. our NAND (Numeric Analyziz and Numerology Department) was kind enough to do unbreakable research and came with the following: [1] http://www.faculty

Re: Re: [Full-Disclosure] The "Drew Copley is a prick" Poll update [Time to Grow Up]

2004-07-04 Thread Merkur John Maclang
On Sat, 03 Jul 2004 22:33:15 -0700, Syke <[EMAIL PROTECTED]> wrote: > > > Thomas Ryan wrote: > > >The lack of professionalism from Team Bugtraq Security is getting to be > >annoying, openly showing their ignorance with defamatory remarks towards > >Drew Copley and eEye. It's quite obvious you do