Re: [Full-Disclosure] Re: On Polymorphic Evasion

2004-10-01 Thread PERFECT.MATERIAL
On Sat, 2 Oct 2004 00:02:22 -0500, xbud <[EMAIL PROTECTED]> wrote: > It never ceases to amaze me that some egotistical coward asshole hiding behind > an anonymous hush,hushmail or in this case gmail account will jump on any > opportunity to insult others work with negative criticism. > I didn't m

Re: [Full-Disclosure] Re: On Polymorphic Evasion

2004-10-01 Thread xbud
It never ceases to amaze me that some egotistical coward asshole hiding behind an anonymous hush,hushmail or in this case gmail account will jump on any opportunity to insult others work with negative criticism. Wether this material was worth the read and/or time spent releasing it (I honestl

Re: [Full-Disclosure] All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV]

2004-10-01 Thread bipin gautam
--- GuidoZ <[EMAIL PROTECTED]> wrote: > I've heard of this before (see following link). I > thought it was fixed > in SP1 (maybe it was SP2). I'm probabaly wrong - > call it wishful > thinking. There is an interesting page in German > about it here: > - > http://www.lsg.musin.de/Admin/NT/rechte/

Re: [Full-Disclosure] All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV]

2004-10-01 Thread bipin gautam
--- GuidoZ <[EMAIL PROTECTED]> wrote: > I've heard of this before (see following link). I > thought it was fixed > in SP1 (maybe it was SP2). I'm probabaly wrong - > call it wishful > thinking. There is an interesting page in German > about it here: > - > http://www.lsg.musin.de/Admin/NT/rechte/

[Full-Disclosure] Re: On Polymorphic Evasion

2004-10-01 Thread PERFECT. MATERIAL
It never ceases to amaze me how much uninteresting and unoriginal (not to mention insignificant) material can be crammed into a whitepaper. Then again, I know I couldn't have understood "using a series of jumps it is often possible to evade some IDS that detect one byte NOP equivalents" without th

Re: [Full-Disclosure] All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV]

2004-10-01 Thread GuidoZ
More useful info on calcs/xcalcs: - http://support.microsoft.com/default.aspx?scid=kb;EN-US;135268 - http://www.ss64.com/nt/cacls.html - http://www.jsiinc.com/SUBH/tip3700/rh3729.htm -- Peace. ~G On Fri, 1 Oct 2004 20:29:19 -0700, GuidoZ <[EMAIL PROTECTED]> wrote: > I've heard of this before

Re: [Full-Disclosure] All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV]

2004-10-01 Thread GuidoZ
I've heard of this before (see following link). I thought it was fixed in SP1 (maybe it was SP2). I'm probabaly wrong - call it wishful thinking. There is an interesting page in German about it here: - http://www.lsg.musin.de/Admin/NT/rechte/die_batch_online_mit_vielen_erkl.htm English transation

[Full-Disclosure] All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV]

2004-10-01 Thread bipin gautam
All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV] Risk Level: Medium Affected Product: (Should be) all Antivirus, Trojan, Spy ware scanners for windows. Description: A malicious code can reside in a computer (with users privilage) bypassing "man

[Full-Disclosure] All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV]

2004-10-01 Thread bipin gautam
All Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV] Risk Level: Medium Affected Product: (Should be) all Antivirus, Trojan, Spy ware scanners for windows. Description: A malicious code can reside in a computer (with users privilage) bypassing "man

[Full-Disclosure] On Polymorphic Evasion

2004-10-01 Thread Phantasmal Phantasmagoria
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - On Polymorphic Evasion by Phantasmal Phantasmagoria [EMAIL PROTECTED] - Table of Contents - 1 - Prologue 2 - Introduction 3 - Detection 4 - Testing 5 - E

[Full-Disclosure] Broadcast buffer-overflow in Vypress Messenger 3.5.1

2004-10-01 Thread Luigi Auriemma
### Luigi Auriemma Application: Vypress Messenger http://www.vypress.com/products/messenger/ Versions: <= 3.5.1 Platforms:Windows Bug: buffer overflow Risk: cr

[Full-Disclosure] MDKSA-2004:104 - Updated samba packages fix vulnerability

2004-10-01 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandrakelinux Security Update Advisory ___ Package name: samba Advisory ID:

[Full-Disclosure] EEYE: RealPlayer pnen3260.dll Heap Overflow

2004-10-01 Thread Marc Maiffret
RealPlayer pnen3260.dll Heap Overflow Release Date: October 1, 2004 Date Reported: August 09, 2004 Severity: High (Remote Code Execution) Vendor: RealNetworks Systems Affected: Windows: RealPlayer 10.5 (6.0.12.1040 and earlier) RealPlayer 10 RealPlayer 8 (Local Playback) RealOne Player V2 Real

[Full-Disclosure] dbPowerAmp Buffer Overflow And Dos Vulnerabilities

2004-10-01 Thread GulfTech Security
## # GulfTech Security Research September 27th, 2004 ## # Vendor : Illustrate # URL : http://www.dbpoweramp.com # Version : dbPowerAmp Music Converter 10.0 && Player 2.0 # Ri

[Full-Disclosure] SQL Injection vulnerability in bBlog 0.7.3

2004-10-01 Thread James McGlinn
Servers.co.nz Security Advisory SCN200409-1 Available in HTML format at http://www.servers.co.nz/security/SCN200409-1.php SQL Injection vulnerability in bBlog 0.7.3 Author: James McGlinn, Servers.co.nz Ltd Discovery Date: September 28,

[Full-Disclosure] [ GLSA 200410-01 ] sharutils: Buffer overflows in shar.c and unshar.c

2004-10-01 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -