As stated by the original poster, costs are definitely not the only issue here.
One of the main abuse forms for this is depleting the entire provider GPRS IP
range. Even though IPv6 is now almost 10 years old, mobile carriers still chose
to implement IP over GPRS using IPv4.
This, of course, le
Hi
For some reason this didn't make it out yesterday to all recipients
despite showing up in the mail archives. Thanks to Willem Koenings
for reporting this to me.
(original at
http://lists.netsys.com/pipermail/full-disclosure/2004-December/029904.html)
Incidently, I was contactable at this add
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
KDE Security Advisory: kfax libtiff vulnerabilities
Original Release Date: 2004-12-09
URL: http://www.kde.org/info/security/advisory-20041209-2.txt
0. References
CAN-2004-0803
CAN-2004-0804
CAN-2004-0886
1. Systems affected
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
KDE Security Advisory: plain text password exposure
Original Release Date: 2004-12-09
URL: http://www.kde.org/info/security/advisory-20041209-1.txt
0. References
http://www.sec-consult.com/index.php?id=118
1. Systems affected:
All
Port 42 is WINS.EXE - there are at least 3 exploits circulating for it
that I know of... For more information, check the advisory on our
website which has detailed technical information. Currently, the only
real solution is to disable the service.
(www.immunitysec.com)
thanks,
Dave Aitel
Immuni
I guess full-disclosure doesn't believe in Full-disclosure.
What'zz UUpp!
Hope it wasn't too nasty a down.
Happy Holidays8->
Jan Clairmont
Firewall Administrator/Consultant
On Fri, 10 Dec 2004 09:08:21 EST, you said:
> Valdis:
> Are you getting full-disclosure mail, I haven't for tw
-
|SugarSales Multiple Vulnerabilities|
-
Date: 12-11-2004
Author: Daniel Fabian
Product: SugarSales (formerly SugarCR
Port 42 is the WINS port, and if im not mistaken last week or the week before
that an exploit was released for it, thats probably your culprit for the
increased port 42 traffic levels.
http://support.microsoft.com/default.aspx/kb/890710
On Monday 13 December 2004 07:46, James Lay wrote:
> Her
I dont know if theres any webserver that runs on symbian? but just
wondering did anyone ever tried hosting a webpage on symbian phone
with always on connection. This would be like solar powered torch
lite.
Gautam >__<
On Mon, 13 Dec 2004 09:30:09 +0100 (CET), Marco Davids (Prive)
<[EMAIL PROTEC
Strange, I didn't request a public IP from T-Mobile, perhaps they picked
up my need in a conversation while I was talking to them, the default
gateway is a rfc1918 IP, but I can do IPSec just fine and ssh back in to
the public IP when online via gprs.
On , 2004-12-07 at 14:28 -0600, William Readin
###
Luigi Auriemma
Application: Lithtech engine (new network protocol)
http://www.lithtech.com
Games:Contract Jack <= 1.1
No
Port 42 is WINS -- there is a new exploit for WINS in the wild, so I
would imagine people are scanning for it.
James Lay wrote:
Here they be. ODD. Anyone else seeing this?
Dec 13 06:41:49 gateway kernel: Web netrecall drops:IN=br0 OUT=br0
PHYSIN=eth1 PHYSOUT=eth0 SRC=131.252.116.141 DST=10.1.19
Exaprobe
www.exaprobe.com
Security Advisory
Advisory Name: Multiple vulnerabilities in phpMyAdmin
Release Date: 13 December 2004
Application: phpMyAdmin prior to 2.6.1-rc1
Platform: Any webserver ru
Here they be. ODD. Anyone else seeing this?
Dec 13 06:41:49 gateway kernel: Web netrecall drops:IN=br0 OUT=br0
PHYSIN=eth1 PHYSOUT=eth0 SRC=131.252.116.141 DST=10.1.19.1 LEN=40 TOS=0x00
PREC=0x00 TTL=116 ID=57370 DF PROTO=TCP SPT=6000 DPT=42 WINDOW=65535
RES=0x00 SYN URGP=0
Dec 13 06:41:49 gat
To: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
X-ML-Name: server-users-e
X-Mail-Count: 00039
X-MLServer: fml [fml 4.0 STABLE (20040215/4.0.4_BETA)](fml commands only mode);
post only (only members can post)
X-ML-Info: If you have a question, send e-mail with the body
"help" (without
> It's a trojan-dropper called VBS.Zerolin and it tries to
> download an executable file also belonging to the
> trojan-downloader family. It is called malware
> Win32.Zdesnado.Y
>
> What that exe file tries to download, I don't know.
hi,
> It's a trojan-dropper called VBS.Zerolin and it tries
Hello,
>Is anyone able to decode this malware/exploit script-encoded :
>http://www.antiblock.biz/user256/2DimensionOfExploitsEnc.php
It's a trojan-dropper called VBS.Zerolin and it tries to
download an executable file also belonging to the
trojan-downloader family. It is called malware Win32.Zdes
The session you refer to is called the "PDP context". Invariably the PDP context will stay open between your mobile and the Mobile Operators network until the user ceases traffic. And yes, you will be charged for the traffic requests.
Re: Pinging other mobile phones. You might be able to, but
Vendor: Infopop
URL: http://www.infopop.com/
tested Versions: 6.2.3 & 6.5
remote: yes
vendor notified: 06 Dec 2004 at 01:08 AM
Vendor response: 06/07 Dec 2004 01:33 AM/06:08 PM
Update status: ..in process
Summary:
~~~
UBBThreads
On Tue, 7 Dec 2004, William Reading wrote:
> Howdy,
>
> I think this is part of the reason why some carriers, such as T-Mobile,
> use RFC1918 addresses instead of publically routable IPs.
Not here in the Netherlands :-)
inetnum: 194.229.200.0 - 194.229.207.255
netname: T-MOBILE-NL
desc
20 matches
Mail list logo