RE: [Full-Disclosure] GPRS/IP-session from Nokia/Symbian mobilephonestays up

2004-12-13 Thread Juliao Duartenn (Oblog-Direccao)
As stated by the original poster, costs are definitely not the only issue here. One of the main abuse forms for this is depleting the entire provider GPRS IP range. Even though IPv6 is now almost 10 years old, mobile carriers still chose to implement IP over GPRS using IPv4. This, of course, le

[Full-Disclosure] [johnc@grok.org.uk: Administrivia: Hardware Failure]

2004-12-13 Thread John Cartwright
Hi For some reason this didn't make it out yesterday to all recipients despite showing up in the mail archives. Thanks to Willem Koenings for reporting this to me. (original at http://lists.netsys.com/pipermail/full-disclosure/2004-December/029904.html) Incidently, I was contactable at this add

[Full-Disclosure] KDE Security Advisory: kfax libtiff vulnerabilities

2004-12-13 Thread Dirk Mueller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 KDE Security Advisory: kfax libtiff vulnerabilities Original Release Date: 2004-12-09 URL: http://www.kde.org/info/security/advisory-20041209-2.txt 0. References CAN-2004-0803 CAN-2004-0804 CAN-2004-0886 1. Systems affected

[Full-Disclosure] KDE Security Advisory: plain text password exposure

2004-12-13 Thread Dirk Mueller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 KDE Security Advisory: plain text password exposure Original Release Date: 2004-12-09 URL: http://www.kde.org/info/security/advisory-20041209-1.txt 0. References http://www.sec-consult.com/index.php?id=118 1. Systems affected: All

Re: [Full-Disclosure] TCP Port 42 port scans? What the heck over...

2004-12-13 Thread Dave Aitel
Port 42 is WINS.EXE - there are at least 3 exploits circulating for it that I know of... For more information, check the advisory on our website which has detailed technical information. Currently, the only real solution is to disable the service. (www.immunitysec.com) thanks, Dave Aitel Immuni

RE: [Full-Disclosure] no full-disclosure for FULL-Disclosure down ?8-(

2004-12-13 Thread Clairmont, Jan M
I guess full-disclosure doesn't believe in Full-disclosure. What'zz UUpp! Hope it wasn't too nasty a down. Happy Holidays8-> Jan Clairmont Firewall Administrator/Consultant On Fri, 10 Dec 2004 09:08:21 EST, you said: > Valdis: > Are you getting full-disclosure mail, I haven't for tw

[Full-Disclosure] SugarSales Multiple Vulnerabilities

2004-12-13 Thread Daniel Fabian
- |SugarSales Multiple Vulnerabilities| - Date: 12-11-2004 Author: Daniel Fabian Product: SugarSales (formerly SugarCR

Re: [Full-Disclosure] TCP Port 42 port scans? What the heck over...

2004-12-13 Thread Daniel F. Chief Security Engineer -
Port 42 is the WINS port, and if im not mistaken last week or the week before that an exploit was released for it, thats probably your culprit for the increased port 42 traffic levels. http://support.microsoft.com/default.aspx/kb/890710 On Monday 13 December 2004 07:46, James Lay wrote: > Her

Re: [Full-Disclosure] GPRS/IP-session from Nokia/Symbian mobile phone stays up

2004-12-13 Thread Gautam R. Singh
I dont know if theres any webserver that runs on symbian? but just wondering did anyone ever tried hosting a webpage on symbian phone with always on connection. This would be like solar powered torch lite. Gautam >__< On Mon, 13 Dec 2004 09:30:09 +0100 (CET), Marco Davids (Prive) <[EMAIL PROTEC

Re: [Full-Disclosure] GPRS/IP-session from Nokia/Symbian mobile phone stays up

2004-12-13 Thread Todd T. Fries
Strange, I didn't request a public IP from T-Mobile, perhaps they picked up my need in a conversation while I was talking to them, the default gateway is a rfc1918 IP, but I can do IPSec just fine and ssh back in to the public IP when online via gprs. On , 2004-12-07 at 14:28 -0600, William Readin

[Full-Disclosure] Socket unreacheable in the Lithtech engine (new protocol)

2004-12-13 Thread Luigi Auriemma
### Luigi Auriemma Application: Lithtech engine (new network protocol) http://www.lithtech.com Games:Contract Jack <= 1.1 No

Re: [Full-Disclosure] TCP Port 42 port scans? What the heck over...

2004-12-13 Thread Ron
Port 42 is WINS -- there is a new exploit for WINS in the wild, so I would imagine people are scanning for it. James Lay wrote: Here they be. ODD. Anyone else seeing this? Dec 13 06:41:49 gateway kernel: Web netrecall drops:IN=br0 OUT=br0 PHYSIN=eth1 PHYSOUT=eth0 SRC=131.252.116.141 DST=10.1.19

[Full-Disclosure] Multiple vulnerabilities in phpMyAdmin

2004-12-13 Thread Nicolas Gregoire
Exaprobe www.exaprobe.com Security Advisory Advisory Name: Multiple vulnerabilities in phpMyAdmin Release Date: 13 December 2004 Application: phpMyAdmin prior to 2.6.1-rc1 Platform: Any webserver ru

[Full-Disclosure] TCP Port 42 port scans? What the heck over...

2004-12-13 Thread James Lay
Here they be. ODD. Anyone else seeing this? Dec 13 06:41:49 gateway kernel: Web netrecall drops:IN=br0 OUT=br0 PHYSIN=eth1 PHYSOUT=eth0 SRC=131.252.116.141 DST=10.1.19.1 LEN=40 TOS=0x00 PREC=0x00 TTL=116 ID=57370 DF PROTO=TCP SPT=6000 DPT=42 WINDOW=65535 RES=0x00 SYN URGP=0 Dec 13 06:41:49 gat

[Full-Disclosure] [TURBOLINUX SECURITY INFO] 13/Dec/2004

2004-12-13 Thread Turbolinux
To: [EMAIL PROTECTED] Message-Id: <[EMAIL PROTECTED]> X-ML-Name: server-users-e X-Mail-Count: 00039 X-MLServer: fml [fml 4.0 STABLE (20040215/4.0.4_BETA)](fml commands only mode); post only (only members can post) X-ML-Info: If you have a question, send e-mail with the body "help" (without

Re: [Full-Disclosure] Re: Online Script Decoder

2004-12-13 Thread Willem Koenings
> It's a trojan-dropper called VBS.Zerolin and it tries to > download an executable file also belonging to the > trojan-downloader family. It is called malware > Win32.Zdesnado.Y > > What that exe file tries to download, I don't know. hi, > It's a trojan-dropper called VBS.Zerolin and it tries

[Full-Disclosure] Re: Online Script Decoder

2004-12-13 Thread Feher Tamas
Hello, >Is anyone able to decode this malware/exploit script-encoded : >http://www.antiblock.biz/user256/2DimensionOfExploitsEnc.php It's a trojan-dropper called VBS.Zerolin and it tries to download an executable file also belonging to the trojan-downloader family. It is called malware Win32.Zdes

Re: [Full-Disclosure] GPRS/IP-session from Nokia/Symbian mobile phone stays up

2004-12-13 Thread jamie fisher
The session you refer to is called the "PDP context".  Invariably the PDP context will stay open between your mobile and the Mobile Operators network until the user ceases traffic.  And yes, you will be charged for the traffic requests. Re: Pinging other mobile phones.  You might be able to, but

[Full-Disclosure] Multiple XSS Vulnerabilities in several UBB.Thread Versions

2004-12-13 Thread gp
Vendor: Infopop URL: http://www.infopop.com/ tested Versions: 6.2.3 & 6.5 remote: yes vendor notified: 06 Dec 2004 at 01:08 AM Vendor response: 06/07 Dec 2004 01:33 AM/06:08 PM Update status: ..in process Summary: ~~~ UBBThreads

Re: [Full-Disclosure] GPRS/IP-session from Nokia/Symbian mobile phone stays up

2004-12-13 Thread Marco Davids (Prive)
On Tue, 7 Dec 2004, William Reading wrote: > Howdy, > > I think this is part of the reason why some carriers, such as T-Mobile, > use RFC1918 addresses instead of publically routable IPs. Not here in the Netherlands :-) inetnum: 194.229.200.0 - 194.229.207.255 netname: T-MOBILE-NL desc