Re: [Full-Disclosure] Windows Update

2004-08-21 Thread Gregh
- Original Message - From: "Todd Towles" <[EMAIL PROTECTED]> To: "Über GuidoZ" <[EMAIL PROTECTED]> Cc: "Mailing List - Full-Disclosure" <[EMAIL PROTECTED]> Sent: Sunday, August 22, 2004 11:04 AM Subject: RE: [Full-Disclosure] Windows Update I also turn off all updates. I had my Automatic

Re: [Full-Disclosure] Windows Update

2004-08-21 Thread Gregh
- Original Message - From: "Security List" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Saturday, August 21, 2004 1:50 AM Subject: [Full-Disclosure] Windows Update Went to windows update last night w/ XP Pro. Redirected to the v5 version. I was asked to install the new Windows Upda

RE: [Full-Disclosure] Windows Update

2004-08-21 Thread Todd Towles
I also turn off all updates. I had my Automatic updates and BITS set to manual and Windows Update wouldn't work. I never disable it but I do stop the service and leave it on manual. When you disable Automatic updates in the control panel the service keeps running. Stupid, yep..I think so too. H

[Full-Disclosure] [OT] Persecuted Website

2004-08-21 Thread J.A. Terranson
[EMAIL PROTECTED] Please contact me using a service that is not blacklisted, i.e., nothing from Outblaze. Try Yahoo, or Hotmail. -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF "...justice is a duty towards those whom you love and those whom you do not. And people's rights will no

RE: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread Todd Towles
Allan is right. I didn't notice people calling it a worm. It is suppose to be a patch management product that will actually use the expolit hole to patch the box. It is a controlled problem and should be used only on computers control by the corporation that owns the software. But is it still a go

[Full-Disclosure] What A Drag! -revisited-

2004-08-21 Thread mikx
Most people i talked to consider the drag and drop vulnerability found by http-equiv not as a serious problem, because it requires some user interaction and the press pushes this topic way to much as the "first security problem in SP2". In an article on BetaNews even Microsoft claims it's not a

Re: [Full-Disclosure] Windows Update

2004-08-21 Thread Über GuidoZ
Umm, hold on a sec here... (snip from "James Tucker"): > There really should be no reason why you would want to disable the > Automatic Updates service anyway, unless you are rolling out updates > using a centralised distribution system, in which case you would not >need it anyway. I believe you

Re: [Full-Disclosure] Windows Update

2004-08-21 Thread James Tucker
Here I found that I can have BITS and Automatic Updates in "manual", Windows Update works fine here. It may be a good idea to refresh the MMC console page, as you will probably find that at time the service had shut down if and when BITS was stopped prematurely (i.e. when it was in use). There rea

Re: [Full-Disclosure] Unsecure file permission of ZoneAlarm pro.

2004-08-21 Thread James Tucker
> >>Zone Alarm stores its config. files in %windir%\Internet Logs\* . But strangely, > Isn't it supposed to store logs ? My english knowledge is probably too poor. The folder name would suggest that. I raised an eyebrow when I saw that too. > >>EVERYONE: Full This means that anyone / anything wh

Re: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread michael williamson
> Except that the scenario you describe isn't near complete. What will happen > is either it will get attacked by a benign worm (possibly breaking something) > or a malicious worm (definitely breaking something) only a short while later. > Which would you prefer then ? I'd prefer to not have t

Re: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread Maarten
On Saturday 21 August 2004 16:00, michael williamson wrote: > This is a _lot_ more responsible than running exploit code of any sort, > even for a good purpose. I admin one particular windows server that I > must actually wait for vender approval before applying any hotfixes. > I'd be extremely p

[Full-Disclosure] Safari/WebCore Content Sniffing

2004-08-21 Thread fukami
Hi! Not 100% sure if this is a topic for fd so far. So, please, put your flamethrower aside if it's not. A couple of days ago I recognized, that Safari (and other apps using WebCore on MacOS X) do something known as "content sniffing". That means, if Safari gets a file with Content-Type "plain/text

RE: [Full-Disclosure] Possible dialer on 62.4.84.150

2004-08-21 Thread Aditya, ALD [Aditya Lalit Deshmukh]
KERNEL32.DLL LoadLibraryA GetProcAddress ExitProcess advapi32.dll RegCloseKey oleaut32.dll SysFreeString shell32.dll ShellExecuteA user32.dll SetTimer all these exports show point in a direction that it creates a key in the registry for

Re: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread michael williamson
There are much better alternatives to using exploit code to install patches.The security folk at TAMU have come up with an in-line network sniffer automagically blocks infected machines and notifies them via an internal webserver of their infection. After a set time it allows them back on. (c

RE: [Full-Disclosure] cmd.exe bug in win2k sp4 in "for" loop

2004-08-21 Thread Aditya, ALD [Aditya Lalit Deshmukh]
thanks for the link that was what i *really* needed! -aditya -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Maxime Ducharme Sent: Tuesday, August 17, 2004 08:25 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Netsys. Com Subject: Re: [Full-Disclosure] cmd.exe b

Re: [Full-Disclosure] Unsecure file permission of ZoneAlarm pro.

2004-08-21 Thread stephane nasdrovisky
John LaCour wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 There is absolutely no security issue here. ZoneAlarm does not rely on file permissions to protect any configuration files. Configuration files are protected by our TrueVector(r) driver in the kernel. In addition to protecting co

[Full-Disclosure] Opera Crash

2004-08-21 Thread sourvivor
Tested on: Versión 7.23, Compilación 3227, Plataforma Win32, Sistema Windows XP   document.getElementsByTagName("script")[0].text = ""; Sourvivor, www.thesur.com     -BEGIN PGP PUBLIC KEY BLOCK-Version: PGP 8.0.3 - not licensed for commercial use: www.pgp.com   mQGiBEAirpURBADsKduF+gl

RE: [Full-Disclosure] The 'good worm' from HP

2004-08-21 Thread fulldisclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I really don't KNOW what HP is doing, but I would assume that it's just a 'product' and not a worm. Meaning, you can probably setup 1 system on your network that scans a specified range (for example only your workstations if you're worried about your