Re: [Full-Disclosure] Re: [Mailman-Developers] mailman email harvester

2005-02-11 Thread Valdis . Kletnieks
On Sat, 12 Feb 2005 02:48:56 +0100, Bernhard Kuemel said: > If hashcash (http://www.hashcash.org/) gets integrated in our mail > systems we no longer need to hide or obfuscate our email addresses. And I overlooked the most fatal flaw in hashcash: Hashcash really sucks if you're a mail server adm

Re: [Full-Disclosure] Re: [Mailman-Developers] mailman email harvester

2005-02-11 Thread Valdis . Kletnieks
On Sat, 12 Feb 2005 02:48:56 +0100, Bernhard Kuemel said: > If hashcash (http://www.hashcash.org/) gets integrated in our mail > systems we no longer need to hide or obfuscate our email addresses. On the other hand, widespread distribution of hashcash will probably mean the end of many mailing li

[Full-Disclosure] Re: [Mailman-Developers] mailman email harvester

2005-02-11 Thread Bernhard Kuemel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thomas Hochstein wrote: |> Given the risk, now made worse by Bernhard's very helpfully |> distributing this script for spammers, this is a really urgent |> issue. | | Since it is known for many *years* that spammers are harvesting | addresses from ML-ar

[Full-Disclosure] iDEFENSE Security Advisory 02.11.05: ZoneAlarm 5.1 Invalid Pointer Dereference Vulnerability

2005-02-11 Thread idlabs-advisories
ZoneAlarm 5.1 Invalid Pointer Dereference Vulnerability iDEFENSE Security Advisory 02.11.05 www.idefense.com/application/poi/display?id=199&type=vulnerabilities February 11, 2005 I. BACKGROUND Zone Labs ZoneAlarm provides personal firewall protection. More information is available from: htt

[Full-Disclosure] Zone Labs Security Alert ZL05-01: Zone Labs IPC Instability

2005-02-11 Thread Zone Labs Product Security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Zone Labs Security Alert ZL05-01 Zone Labs IPC Instability Date Published February 11, 2005 Date Last Revised February 11, 2005 SeverityLow Overview - The ZoneAlarm family of products

Re: [Full-Disclosure] GREENAPPLE Release

2005-02-11 Thread Byron L. Sonne
This is a quick announcement that the recent Microsoft patch (MS-05- has fixed a vulnerability I found a while back in SMB. This vuln that you found 'a while back', did you mention anything about it then or have you just conveniently kept it to yourself until now? Doesn't sound like full disclo

[Full-Disclosure] Speaking of UPX...

2005-02-11 Thread KF (Lists)
I really have not been able to find a use for this but since upx is on the brain... Maybe someone knows some antivirus that uses the actual /usr/bin/upx or upx.exe on win32. If ya come up with something let me know. [EMAIL PROTECTED]:~$ upx %x.%x.%x.%x.%x.%x.%x Ultimate

[Full-Disclosure] MDKSA-2005:032-1 - Updated cpio packages fix vulnerability

2005-02-11 Thread Mandrakelinux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandrakelinux Security Update Advisory ___ Package name: cpio Advisory ID:

Re: [SPAM] Re: [SPAM] Re: [Full-Disclosure] Spybot and SQL

2005-02-11 Thread Jacek Barcikowski
Matthew Farrenkopf wrote: > Jacek, > > >>>(The MSDE engine was installed on two machines for an application > > we > >>>use, and the engine is used only locally by the application. The >>>thought never crossed my mind that the engine was misconfigured > > with a > >>>blank sa password, but on anal

Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread Andrew Farmer
Started a day or two after Santy showed up - perhaps a month ago now. Some variants continued to spread using other search engines, though. PGP.sig Description: This is a digitally signed message part ___ Full-Disclosure - We believe in it. Charter: ht

[Full-Disclosure] [ GLSA 200502-13 ] Perl: Vulnerabilities in perl-suid wrapper

2005-02-11 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200502-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-Disclosure] [ GLSA 200502-12 ] Webmin: Information leak in Gentoo binary package

2005-02-11 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200502-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-Disclosure] [sb] [VulnWatch] Secunia Research: Microsoft Internet Explorer MultipleVulnerabilities

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 - Microsoft Internet Explorer Multiple Vulnerabilities - == Table of Contents Affected Software..

[Full-Disclosure] [VulnWatch] Secunia Research: Microsoft Internet Explorer MultipleVulnerabilities

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 - Microsoft Internet Explorer Multiple Vulnerabilities - == Table of Contents Affected Software..

[Full-Disclosure] [sb] [VulnWatch] Secunia Research: Microsoft Internet Explorer MultipleVulnerabilities

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 - Microsoft Internet Explorer Multiple Vulnerabilities - == Table of Contents Affected Software..

[Full-Disclosure] [sb] [VulnWatch] Secunia Research: Microsoft Internet Explorer"createControlRange()" Memory Corruption

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 Microsoft Internet Explorer "createControlRange()" Memory Corruption == Table of Contents Affected Softwar

RE: [Full-Disclosure] Antivirus listing

2005-02-11 Thread Debasis Mohanty
There are many ways that you can achieve it. I doubt if there is any single API (correct me if I am wrong) which can enumerates all the installed AVs. Most of the cases an AV will prompt you to un-install previously installed AVs before installing. One such classic example is Symantec and McAfee, b

[Full-Disclosure] [sb] [VulnWatch] Secunia Research: Microsoft Internet Explorer"createControlRange()" Memory Corruption

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 Microsoft Internet Explorer "createControlRange()" Memory Corruption == Table of Contents Affected Softwar

[Full-Disclosure] [VulnWatch] Secunia Research: Microsoft Internet Explorer"createControlRange()" Memory Corruption

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 Microsoft Internet Explorer "createControlRange()" Memory Corruption == Table of Contents Affected Softwar

Re: [Full-Disclosure] Antivirus listing

2005-02-11 Thread Paul Schmehl
--On Friday, February 11, 2005 01:43:36 PM +0100 "\"weninson rêgo\"" <[EMAIL PROTECTED]> wrote: Hi, Anyone know if there is an API to list the antivirus that are installed in a windows machine and retrieve if the antivirus is up to date? Or any way to retrieve these informations, i need to do

[Full-Disclosure] New wired from Panda alets - MyDoom-AK

2005-02-11 Thread Geza Papp dr (Axelero)
Madrid, February 11, 2005 - This week's report looks at four vulnerabilities and a worm called Mydoom.AK. First we will take a look at the main characteristics of the four security problems, for which Microsoft has released patches. Users of affected systems are advised to install the patches. -

[Full-Disclosure] [SA14216] F-Secure Multiple Products ARJ Archive Handling Vulnerability

2005-02-11 Thread Geza Papp dr (Axelero)
TITLE: F-Secure Multiple Products ARJ Archive Handling Vulnerability SECUNIA ADVISORY ID: SA14216 VERIFY ADVISORY: http://secunia.com/advisories/14216/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: F-Secure Anti-Virus 2004 http://secunia.com/product/3500/ F-Sec

Re: [Full-Disclosure] Spybot and SQL

2005-02-11 Thread Geza Papp dr (Axelero)
Hello mjcarter, 2005. február 11., 4:33:26, írtad: micn> Hi All, micn> Has anyone seen a spybot variant using the target machines micn> IP address as the password for user SA? micn> We don't have a name for this variant yet. I might be micn> reading my captures wrong but that's what this looks l

[Full-Disclosure] Secunia Research: Microsoft Internet Explorer Multiple Vulnerabilities

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 - Microsoft Internet Explorer Multiple Vulnerabilities - == Table of Contents Affected Software..

Re: [SPAM] Re: [Full-Disclosure] Spybot and SQL

2005-02-11 Thread Matthew Farrenkopf
Jacek, > > (The MSDE engine was installed on two machines for an application we > > use, and the engine is used only locally by the application. The > > thought never crossed my mind that the engine was misconfigured with a > > blank sa password, but on analysis it looks like that's how the > > a

[Full-Disclosure] Secunia Research: Microsoft Internet Explorer "createControlRange()" Memory Corruption

2005-02-11 Thread Andreas Sandblad
== Secunia Research 09/02/2005 Microsoft Internet Explorer "createControlRange()" Memory Corruption == Table of Contents Affected Softwar

Re[2]: [Full-Disclosure] Spybot and SQL

2005-02-11 Thread Geza Papp dr (Axelero)
Hello Matthew, 2005. február 11., 6:34:19, írtad: >>Hi All, >>Has anyone seen a spybot variant using the target machines >>IP address as the password for user SA? >> >>We don't have a name for this variant yet. I might be >>reading my captures wrong but that's what this looks like >>it's doing .

Re: [Full-Disclosure] Multiple AV Vendors ignoring tar.gz archives

2005-02-11 Thread James Eaton-Lee
Thanks for your reply! It isn't really in the interest of the mailing list to pursue this any further, but this was addressed in another fork of this topic :) - James. On Thu, 2005-02-10 at 18:49 -0200, Rodrigo Barbosa wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >On Sun, Feb 06, 200

Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread phased
and why were you googling that? -Original Message- From: Gaurav Kumar <[EMAIL PROTECTED]> To: full-disclosure@lists.netsys.com Date: Fri, 11 Feb 2005 15:20:52 +0530 Subject: [Full-Disclosure] google getting attacks;anybody got this? --i got it. > > google is detecting if search contains

[Full-Disclosure] Re: Nice call to ebx found

2005-02-11 Thread class 101
Yes this if for win2k's OS of course , XP and 2k3 anyway uses stack protection wich decrease the use of such offsets.   -class101Jr. ResearcherHat-Squad.com-

Re: [Full-Disclosure] Nice call to ebx found

2005-02-11 Thread Thierry Haven
Nice one indeed... However this is not the case for Windows XP because the code was recompiled and/or modified with the introduction of the SP2. I guess you noticed it before I did, anyway ... ;) Windows XP SP1 (French) - call @ 0x77BFD24C - msvcrt.dll Windows XP SP2 (French) - call @ 0x77BFE89C

Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread Polarizer
This is nothing new. Was mentioned here already 06/01/2005. Read on here http://lists.netsys.com/pipermail/full-disclosure/2005-January/030610.html The Polarizer polarizers at its best http://www.codixx.de/polarizer.html ___ Full-Disclosure - We believe i

Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread Gilles Demarty
Gaurav Kumar a écrit : google is detecting if search contains "inurl:member.php?action=viewpro&member=" -- myphp forum attack. and it gives the error... We're sorry... ... but we can't process your request right now. A com

[Full-Disclosure] Antivirus listing

2005-02-11 Thread "weninson rêgo"
Hi, Anyone know if there is an API to list the antivirus that are installed in a windows machine and retrieve if the antivirus is up to date? Or any way to retrieve these informations, i need to do a program to acomplish these tasks. I've searched all sites but got none yet. Only OPSWAT SDK

Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread Gilles Demarty
Gaurav Kumar a écrit : google is detecting if search contains "inurl:member.php?action=viewpro&member=" -- myphp forum attack. and it gives the error... We're sorry... ... but we can't process your request right now. A com

Re: [Full-Disclosure] google getting attacks; anybody got this? --igot it.

2005-02-11 Thread morning_wood
yes... too bad he cant read... m.w - Original Message - From: "Polarizer" <[EMAIL PROTECTED]> To: Sent: Friday, February 11, 2005 3:05 AM Subject: Re: [Full-Disclosure] google getting attacks; anybody got this? --igot it. > This is nothing new. Was mentioned here already 06/01/2005. Re

Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread morning_wood
>From: "Gaurav Kumar" <[EMAIL PROTECTED]> >To: >Sent: Friday, February 11, 2005 1:50 AM >Subject: [Full-Disclosure] google getting attacks;anybody got this? --i got it. > google is detecting if search contains > "inurl:member.php?action=viewpro&member=" -- myphp forum attack. > kiddies are as

Re: [Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread Polarizer
This is nothing new. Was mentioned here already 06/01/2005. Read on here http://lists.netsys.com/pipermail/full-disclosure/2005-January/030610.html The Polarizer polarizers at its best http://www.codixx.de/polarizer.html ___ Full-Disclosure - We believe i

[Full-Disclosure] [USN-81-1] iptables vulnerability

2005-02-11 Thread Martin Pitt
=== Ubuntu Security Notice USN-81-1 February 11, 2005 iptables vulnerability CAN-2004-0986 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warth

[Full-Disclosure] google getting attacks; anybody got this? --i got it.

2005-02-11 Thread Gaurav Kumar
google is detecting if search contains "inurl:member.php?action=viewpro&member=" -- myphp forum attack. and it gives the error... We're sorry... ... but we can't process your request right now. A computer virus or spywa

[Full-Disclosure] [USN-80-1] mod_python vulnerability

2005-02-11 Thread Martin Pitt
=== Ubuntu Security Notice USN-80-1 February 11, 2005 libapache2-mod-python vulnerabilities CAN-2005-0088 === A security issue affects the following Ubuntu releases: Ubuntu 4.

Re: [SPAM] Re: [Full-Disclosure] Spybot and SQL

2005-02-11 Thread Jacek Barcikowski
Matthew Farrenkopf wrote: (The MSDE engine was installed on two machines for an application we use, and the engine is used only locally by the application. The thought never crossed my mind that the engine was misconfigured with a blank sa password, but on analysis it looks like that's how the app