RE: [Full-Disclosure] Virus scanning site...

2005-02-09 Thread Kane Lightowler
http://virusscan.jotti.org/ > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf > Of Jeff Kell > Sent: Thursday, February 10, 2005 1:04 PM > To: Full-Disclosure (E-mail) > Subject: [Full-Disclosure] Virus scanning site... > > I know I've seen several po

Re: [Full-Disclosure] Virus scanning site...

2005-02-09 Thread Jason Alexander
www.virustotal.com Jeff Kell wrote: I know I've seen several posts referring to a site where you could submit suspected malware and have it scanned by several different A/V products to see if it is identified, but my mind and my google search is turning up a blank. Can someone refresh my memory

[Full-Disclosure] [FLSA-2005:1906] Updated abiword packages fix security issue

2005-02-09 Thread Dominic Hargreaves
--- Fedora Legacy Update Advisory Synopsis: Updated abiword resolves security vulnerabilities Advisory ID: FLSA:1906 Issue date:2005-02-08 Product: Red Hat Linux Keywords: S

[Full-Disclosure] Virus scanning site...

2005-02-09 Thread Jeff Kell
I know I've seen several posts referring to a site where you could submit suspected malware and have it scanned by several different A/V products to see if it is identified, but my mind and my google search is turning up a blank. Can someone refresh my memory? Jeff

[Full-Disclosure] [FLSA-2005:1943] Updated libpng resolves security vulnerabilities

2005-02-09 Thread Dominic Hargreaves
--- Fedora Legacy Update Advisory Synopsis: Updated libpng resolves security vulnerabilities Advisory ID: FLSA:1943 Issue date:2005-02-08 Product: Red Hat Linux Fe

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread Steve Blass
John Cartwright wrote: ... Subscriber addresses and passwords have been compromised. d'0h! ... SLASH = '/' def true_path(path): "Ensure that the path is safe by removing .." parts = [x for x in path.split(SLASH) if x not in ('.', '..')] return SLASH.join(parts)[1:] That's an improvement

[Full-Disclosure] iDEFENSE Security Advisory 02.09.05: CA BrightStor ARCserve Backup v11 Discovery Service Remote Buffer Overflow

2005-02-09 Thread idlabs-advisories
Computer Associates BrightStor ARCserve Backup v11 Discovery Service Remote Buffer Overflow Vulnerability iDEFENSE Security Advisory 02.09.05 www.idefense.com/application/poi/display?id=194&type=vulnerabilities February 09, 2005 I. BACKGROUND BrightStor ARCserve Backup for Windows delivers backu

[Full-Disclosure] yet another DSL modem backdoor - Mentor (Conexant)

2005-02-09 Thread Adam Laurie
Amazingly, despite numerous reports of backdoors in these Conexant DSL routers, they are *still* being shipped with the port 254 backdoor menu enabled... I've just switched ADSL provider, and the new modem they sent me was a "Mentor MR4C/UK". It appears to be another conexant clone, and if you

Re: [Full-Disclosure] Mouseover URL spoof with IE

2005-02-09 Thread Martin Stricker
Danny wrote: > > On Wed, 9 Feb 2005 12:24:29 -0800, Thor Larholm wrote: > > The addressbar can by design be programmatically changed to display > > anything you want at any time, including when you hover over a link > > and the onmouseover event fires. Simply change the window.status > > property

[Full-Disclosure] [USN-78-1] Mailman vulnerability

2005-02-09 Thread Martin Pitt
=== Ubuntu Security Notice USN-78-1 February 09, 2005 mailman vulnerabilities CAN-2005-0202 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Wart

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread Anders Langworthy
[EMAIL PROTECTED] wrote: Unless we have a Schrodinger's Cat John who manifests itself twice, once saying "Yup" and once saying "Oh shit!". :) Hehe. Technically it doesn't work that way. At this very moment, the certificate can be both valid and invalid. However, once we query John about his st

Re: [Full-Disclosure] Mouseover URL spoof with IE

2005-02-09 Thread Danny
On Wed, 9 Feb 2005 12:24:29 -0800, Thor Larholm <[EMAIL PROTECTED]> wrote: > I'm guessing you are refering to the status bar which displays the > address of a link onmouseover. Yes, the status bar which displays the address of a hyperlink onmouseover... can the actual hyperlink (when the user lef

Re: [Full-Disclosure] Mouseover URL spoof with IE

2005-02-09 Thread Valdis . Kletnieks
On Wed, 09 Feb 2005 14:32:13 EST, Danny said: > Can the URL displayed on a mouseover in IE, be spoofed? Umm... use the javascript onMouseOver() handler, or are you asking if that venerable spoofing tool is itself vulnerable to spoofing? pgpfbfs6updwU.pgp Description: PGP signature __

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread Valdis . Kletnieks
On Wed, 09 Feb 2005 14:14:35 CST, Frank Knobbe said: > heh... nah, having John look at the cert and say "Yup, that's mine" is > enough of a trust-level for me. (On the other hand, if he says "Oh > shit!" then the verification step has served its purpose :) Unless we have a Schrodinger's Cat John

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread Frank Knobbe
On Wed, 2005-02-09 at 15:01 -0500, [EMAIL PROTECTED] wrote: > > To prevent getting lulled into a phishing scam, could you please confirm > > the fingerprints of the self-signed SSL certificate that mailman is > > running on? :) > > Bonus points if the fingerprint is in a mail that's digitally sig

Re: [Full-Disclosure] Microsoft to buy Sybari AV company

2005-02-09 Thread bkfsec
Danny wrote: On Tue, 8 Feb 2005 17:51:16 +0100 (CET), Feher Tamas <[EMAIL PROTECTED]> wrote: http://news.zdnet.com/2100-1009_22-5567529.html GeCad RAV, GIANT and now Sybari Antivirus. Microsoft swallows smaller anti-malware firms one by one. When the last one is gone, MS will probably eat the la

RE: [Full-Disclosure] Mouseover URL spoof with IE

2005-02-09 Thread Thor Larholm
I'm guessing you are refering to the status bar which displays the address of a link onmouseover. The addressbar can by design be programmatically changed to display anything you want at any time, including when you hover over a link and the onmouseover event fires. Simply change the window.status

Re: [Full-Disclosure] Administrivia: Goodbye

2005-02-09 Thread Azerail
On Mon, 07 Feb 2005, Len Rose wrote: > > I'm officially retiring from everything and no longer involved > in Full Disclosure or netsys.com as well. I am passing the baton > to John Cartwright my trusted associate and friend of many years > > It has been wonderful to have been a part of Full Dis

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread Valdis . Kletnieks
On Wed, 09 Feb 2005 13:37:57 CST, Frank Knobbe said: > To prevent getting lulled into a phishing scam, could you please confirm > the fingerprints of the self-signed SSL certificate that mailman is > running on? :) Bonus points if the fingerprint is in a mail that's digitally signed, so we know

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread Florian Weimer
* John Cartwright: > Subscriber addresses and passwords have been compromised. All list > members are advised to change their password immediately. There do > not appear to be further signs of intrusion although investigations > continue. Recent Mailman versions from CVS contain a script to rese

[Full-Disclosure] Mouseover URL spoof with IE

2005-02-09 Thread Danny
Can the URL displayed on a mouseover in IE, be spoofed? Thank you, ...D ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread Frank Knobbe
On Wed, 2005-02-09 at 18:15 +, John Cartwright wrote: > Subscriber addresses and passwords have been compromised. All list > members are advised to change their password immediately. There do > not appear to be further signs of intrusion although investigations > continue. To prevent getting

RE: [Full-Disclosure] Question about the latest Microsoft updates

2005-02-09 Thread Allan
Sorry, disregard that message ... Even though update.exe was not running anymore ... After a minute or 2, the prompt to reboot finally appeared... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Wednesday, February 09, 2005 6:07 P

[Full-Disclosure] Administrivia: List Compromised due to Mailman Vulnerability

2005-02-09 Thread John Cartwright
Hi On 7th February 2005 I was notified of a number of potentially - compromised Full-Disclosure subscriber accounts. Following an investigation it appears that the Mailman configuration database was obtained from lists.netsys.com on 2nd January 2005 using a remote directory traversal exploit fo

[Full-Disclosure] Re: Re: mailman email harvester

2005-02-09 Thread Dave Korn
"James Longstreet" wrote in message news:[EMAIL PROTECTED] > On Tue, 8 Feb 2005, Dave Korn wrote: > > > Why? You hoping to sell it to spammers? Obfuscating *works*; if YOU > > break it, that makes YOU a spamming motherfucker. Why don't you go fuck > > yourself instead? > > The name of the list

full-disclosure@lists.netsys.com

2005-02-09 Thread Valdis . Kletnieks
On Wed, 09 Feb 2005 18:01:41 +0100, "the.soylent" said: > i wan`t to use B/tchX (a famous IRC-Client) with the abbility to decrypt > all written with blowfish. > OS is Debian-testing (Sarge) > > I have already loaded the right (?) module, with a: /loaddll blowfish.so > output : > B/tchX blowfish

[Full-Disclosure] Question about the latest Microsoft updates

2005-02-09 Thread postmaster
Hi all ... I approved the patches on a SUS server, and if I look in the windows update.log it looks like the clients installed it , but they we're never prompted to reboot .. When I installed them on my home machine I needed a reboot ? In both situations the machines were up to date untill then

full-disclosure@lists.netsys.com

2005-02-09 Thread the.soylent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 everybody in the channel had updated their (most-win) clients, most of them use http://fish.sekure.us if i post something via ctcp in a channel in quakenet with a L-Bot, i get a desync message and can't write to channel any longer via ctcp.. example: -

full-disclosure@lists.netsys.com

2005-02-09 Thread Oliver Leitner
On Wednesday 09 February 2005 18:01, the.soylent wrote: > B/tchX blowfish encryption module v1.0 do you have a link to that script, so i may give it a try? Greetings Oliver Leitner Technical Staff http://www.shells.at -- By reading this mail you agree to the following: using or giving out the e

[Full-Disclosure] [ GLSA 200502-10 ] pdftohtml: Vulnerabilities in included Xpdf

2005-02-09 Thread Matthias Geerdsen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200502-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-Disclosure] Re: Homograph attack fools (older versions of) Internet Explorer too

2005-02-09 Thread Kevin Connolly
Use of Unicode codes in the href fools older versions of IE when it parses the hostname part. Obviously this has been fixed in a previous patch (my bad for not checking with a fully patched machine first! ) NOT vulnerable IE 6.0.2800.1106.xpsp2.040919-1003C0 vulnerable IE 6.0.2800.1106.xpsp2.

full-disclosure@lists.netsys.com

2005-02-09 Thread the.soylent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 the 1st mail was rejected..so.. B/tchX = B .i .t. c .h .X - --- Hi list, i wan`t to use B/tchX (a famous IRC-Client) with the abbility to decrypt all written with blowfish. OS is Debian-testing (Sa

[Full-Disclosure] Paper: Solution for Red Hat PIE protection

2005-02-09 Thread ZARUL SHAHRIN
Just my little paper.__Do You Yahoo!?Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.comSolution To Red Hat PIE protection (Fr0z3n : [EMAIL PROTECTED])

[Full-Disclosure] Blowfish & BitchX

2005-02-09 Thread the.soylent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi list, i wan`t to use BitchX (a famous IRC-Client) with the abbility to decrypt all written with blowfish. OS is Debian-testing (Sarge) I have already loaded the right (?) module, with a: /loaddll blowfish.so output : BitchX blowfish encryption modul

[Full-Disclosure] Re: mailman email harvester

2005-02-09 Thread Bernhard Kuemel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dana Hudes wrote: | The report is good. Attaching the results in their entirety gives | spammers who don't have your technical capability, not to mention | script kiddies looking for victims for their viruses, a huge leg | up. Irresponsible doesn't beg

[Full-Disclosure] Nice call to ebx found

2005-02-09 Thread class 101
During the build of an exploit , I have found with the help of Dwarf, a nice call to ebx for the win2k platforms, pro AND server, SP4's serie, ALL languages. This might help some people to point out this.   0x7801B008.msvcrt.dll    

Re: [Full-Disclosure] HELP: mailing list

2005-02-09 Thread xyberpix
Hey Majest, Send your replies to full-disclosure@lists.netsys.com xyberpix On Wed, 9 February, 2005 6:34, Majest said: > lol *^_^* How do I reply on a message in this mailing list? *shame-lame* > -.- > ___ > Full-Disclosure - We believe in it. > Charte

[Full-Disclosure] Re: mailman email harvester

2005-02-09 Thread Bernhard Kuemel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dave Korn wrote: |>An improved version that collects addresses that are restricted to |>subscribers, processes more lists and works more parallelized is |>planned. | | | Why? The addresses of mailing list subscribers are top quality to spammers. It's ju

RE: [Full-Disclosure] Homograph attack fools Internet Explorer to o

2005-02-09 Thread Randal, Phil
Simple - using Verign's plugin from http://www.idnnow.com/index.jsp results in: http://www.rebee.clara.net/images/ie-idn.jpg Phil Phil Randal Network Engineer Herefordshire Council Hereford, UK > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf

[Full-Disclosure] Internet Explorer zone spoofing with encoded URLs

2005-02-09 Thread Jouko Pynnonen
OVERVIEW The method used for Windows security zone evaluation fails when characters in the URL are encoded in a certain way. Internet Explorer can be tricked to think that a document belongs in "My Computer" zone when it actually resides on an Internet server. JavaScript in such doc

[Full-Disclosure] Homograph attack fools Internet Explorer too

2005-02-09 Thread Kevin Connolly
I though that I should warn you all that unfortunately Internet Explorer is not safe from this attack. No details until after Microsoft has been contacted and I have introduced some anti-phishing precautions for the domains I manage. Kevin ___ Full-Disclo

[Full-Disclosure] List Charter

2005-02-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright <[EMAIL PROTECTED]> and Len Rose <[EMAIL PROTECTED]> Introduction & Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created on 9th July 2002

Re: [Full-Disclosure] Microsoft to buy Sybari AV company

2005-02-09 Thread Georgi Guninski
On Tue, Feb 08, 2005 at 07:27:54PM -0500, Danny wrote: > Further, if Microsoft thinks acquisitions will solve all of their > problems, why don't they acquire a company with programmers that have > some clue about security and it's place in software that is plugged > into a network. imho: 1. m$ hav