[Full-Disclosure] Re: iDEFENSE Labs Website Launch (iDEFENSE Labs)

2005-02-18 Thread Edge, Ronald D
> Date: Thu, 17 Feb 2005 12:20:30 -0500 > From: "iDEFENSE Labs" <[EMAIL PROTECTED]> > Subject: [Full-Disclosure] iDEFENSE Labs Website Launch > To: , > <[EMAIL PROTECTED]>, > > Message-ID: > <[EMAIL PROTECTED]> > Content-Type: text/plain; charset="us-ascii" > > iDEFENSE Labs i

[Full-Disclosure] Secunia Research: Yahoo! Messenger Audio Setup Wizard Privilege Escalation

2005-02-18 Thread Carsten H. Eiram
== Secunia Research 18/02/2005 - Yahoo! Messenger Audio Setup Wizard Privilege Escalation - == Table of Contents Affected Software.

[Full-Disclosure] Secunia Research: Yahoo! Messenger File Transfer Filename Spoofing

2005-02-18 Thread Andreas Sandblad
== Secunia Research 18/02/2005 - Yahoo! Messenger File Transfer Filename Spoofing - == Table of Contents Affected Software

[Full-Disclosure] Sandblad's IE vulnerabilities

2005-02-18 Thread Lise Moorveld
Hi there, Did you guys spot this? Three vulnerabilities in IE that lead to remote code execution when combined. Discovered by Andreas Sandblad, apparently fixed by the latest cumulative IE patch (MS05-014), but not confirmed by MS. http://secunia.com/secunia_research/2004-8/advisory/ I do miss h

Re: [Full-Disclosure] Re: iDEFENSE Labs Website Launch (iDEFENSE Labs)

2005-02-18 Thread Joachim Schipper
On Fri, Feb 18, 2005 at 07:53:29AM -0500, Edge, Ronald D wrote: > > Date: Thu, 17 Feb 2005 12:20:30 -0500 > > From: "iDEFENSE Labs" <[EMAIL PROTECTED]> > > Subject: [Full-Disclosure] iDEFENSE Labs Website Launch > > To: , > > <[EMAIL PROTECTED]>, > > > > Message-ID: > > <[EMAIL PROTECT

[Full-Disclosure] [ GLSA 200502-26 ] GProFTPD: gprostats format string vulnerability

2005-02-18 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200502-26 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-Disclosure] [HAT-SQUAD] 3com 3CDaemon FTP Unauthorized "USER" Remote BOverflow

2005-02-18 Thread class 101
Hat-Squad.com set a proper on that 5years old hole. Clean code class101.org, class101.hat-squad.com Here it is for a quick view on the list:   /*3com 3CDaemon FTP Unauthorized "USER" Remote BOverflow   The particularity of this exploit is to exploits a FTP serverwithout the need of any auth

[Full-Disclosure] [VulnWatch] Secunia Research: Yahoo! Messenger File Transfer Filename Spoofing

2005-02-18 Thread Andreas Sandblad
== Secunia Research 18/02/2005 - Yahoo! Messenger File Transfer Filename Spoofing - == Table of Contents Affected Software

[Full-Disclosure] [ GLSA 200502-25 ] Squid: Denial of Service through DNS responses

2005-02-18 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200502-25 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-Disclosure] [VulnWatch] Secunia Research: Yahoo! Messenger Audio Setup Wizard PrivilegeEscalation

2005-02-18 Thread Carsten H. Eiram
== Secunia Research 18/02/2005 - Yahoo! Messenger Audio Setup Wizard Privilege Escalation - == Table of Contents Affected Software.

[Full-Disclosure] the art of locksmithing

2005-02-18 Thread George Georgalis
Can someone provide me a link to the classic (short) essay, of 1400s I think; that explains full disclosure in the art of lock making? // George -- George Georgalis, systems architect, administrator Linux BSD IXOYE http://galis.org/george/ cell:646-331-2027 mailto:[EMAIL PROTECTED] _

[Full-Disclosure] Multiple vulnerabilities in TrackerCam 5.12

2005-02-18 Thread Luigi Auriemma
### Luigi Auriemma Application: TrackerCam http://www.trackercam.com Versions: <= 5.12 Platforms:Windows Bugs: A] User-Agent buffer-overflow B] PHP argume

Re: [Full-Disclosure] the art of locksmithing

2005-02-18 Thread James Longstreet
Rudimentary Treatise on the Construction of Locks, Charles Tomlinson, 1853. http://www.deter.com/unix/papers/treatise_locks.html My favorite line is as follows: "Rogues are very keen in their profession, and already know much more than we can teach them respecting their several kinds of roguery."

Re: [Full-Disclosure] Multiple vulnerabilities in TrackerCam 5.12

2005-02-18 Thread morning_wood
great job... this had been discovered by myself over a year ago, but was only released as a internal to a project i was under an NDA when i discovered it cheers, Donnie ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclos

Re: [Full-Disclosure] the art of locksmithing

2005-02-18 Thread George Georgalis
On Fri, Feb 18, 2005 at 01:17:49PM -0600, James Longstreet wrote: >Rudimentary Treatise on the Construction of Locks, Charles Tomlinson, >1853. > >http://www.deter.com/unix/papers/treatise_locks.html > >My favorite line is as follows: >"Rogues are very keen in their profession, and already know muc

[Full-Disclosure] [SA14304] Internet Explorer/Outlook Express Status Bar Spoofing -- A joke ? (Modifié par ZATAZ)

2005-02-18 Thread Secunia Security Advisories
Hello, Is this adviso or all other adviso related to the status bar spoofing a joke If not then Mozilla, Firefox and some other's browsers are vulnerable to this kind off spoofing . Take a look : http://www.zataz.net/dev/lol-browser-spoofing.html Vulnerable : Mozilla (all versions) I

Re: [Full-Disclosure] Re: iDEFENSE Labs Website Launch (iDEFENSE Labs)

2005-02-18 Thread Nick FitzGerald
Edge, Ronald D wrote: > Funny. All I get is a blank white page. Could it be you are expecting me > to trust your site, turn off all my defenses, turn on scripting, to view > the page? You're kidding right, this is just a joke to test participants > gullibility, right? Sarcasm noted, but that _is_

Re: [Full-Disclosure] Re: iDEFENSE Labs Website Launch (iDEFENSE Labs)

2005-02-18 Thread Nick FitzGerald
Joachim Schipper to "Edge, Ronald D": > > Funny. All I get is a blank white page. Could it be you are expecting me > > to trust your site, turn off all my defenses, turn on scripting, to view > > the page? You're kidding right, this is just a joke to test participants > > gullibility, right? > >

[SPAM] [Full-Disclosure] [VulnWatch] Secunia Research: Yahoo! Messenger Audio Setup Wizard PrivilegeEscalation

2005-02-18 Thread Luke Lussier
[EMAIL PROTECTED] Secunia Research 18/02/2005 - Yahoo! Messenger Audio Setup Wizard Privilege Escalation - == Table of Contents Affected Software.

Re: [Full-Disclosure] Re: iDEFENSE Labs Website Launch (iDEFENSE Labs)

2005-02-18 Thread bkfsec
Nick FitzGerald wrote: Seems you need to upgrade to Wetware/1.01. With that Wetware will quickly note that the "trick" to navigating iDEFENSE's site is to add "&flashstatus=true" or "&flashstatus=false" (the latter is probably more generally preferable) to the end of its internal links, and tha

Re: [Full-Disclosure] How T-Mobil's network was compromised

2005-02-18 Thread bkfsec
Ill will wrote: just like just about every other webserver gets hacked, they use third party server software that hasnt gone through enough rigorous testing to make sure its not vulnerable to any flaws.. simple search on google will give you the answer I don't doubt the concept of what you're sa

[Full-Disclosure] Knox Arkeia remote root/system exploit

2005-02-18 Thread John Doe
0day cuz i'm bored /* * Knox Arkeia Server Backup * arkeiad local/remote root exploit * Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE * Works up to current version 5.3.x * * --- * * Linux x86: * ./arksink2 * * Exports an xterm to the box of your choosing. Mak

Re: [Full-Disclosure] How T-Mobil's network was compromised

2005-02-18 Thread Valdis . Kletnieks
On Fri, 18 Feb 2005 16:04:52 EST, bkfsec said: > Are you aware of any server software that has been so rigorously tested > that it has no flaws at all? > > That would be one hell of a find... "Testing can reveal the presence of flaws, but not their absence" -- E. Dijkstra So yeah, it *would*

[Full-Disclosure] looking for agood book

2005-02-18 Thread Pierre Jackson
Hi!everyone I'm looking for a book capable of helping someone inovate in the art of hacking my hint is book titled Shellcode of shell word.I'm pretty sure it begins with the word shell.plse send more info and location of possible buy. Thanks Jack

Re: [Full-Disclosure] looking for agood book

2005-02-18 Thread Rick
> Hi!everyone > I'm looking for a book capable of helping someone > inovate in the art of hacking my hint is book titled > Shellcode of shell word.I'm pretty sure it begins with > the word shell.plse send more info and location of > possible buy. perhaps your referring to the shellcoders handbook?

[Full-Disclosure] RE: [SA14304] Internet Explorer/Outlook Express Status Bar Spoofing -- A joke ?

2005-02-18 Thread bitlance winter
A joke ? ;-) Secunia says, "It is by default possible for script code to manipulate information displayed in the status bar. However, an error allows manipulation of the status bar without using any script code (e.g. in the "Restricted sites" zone)." It is important that Outlook Express users m

Re: [Full-Disclosure] Multiple vulnerabilities in TrackerCam 5.12

2005-02-18 Thread 404
On Fri, 2005-02-18 at 14:57, morning_wood wrote: > great job... > this had been discovered by myself over a year ago, > but was only released as a internal to a project > i was under an NDA when i discovered it And they did nothing about it for a full year? -- 404 <[EMAIL PROTECTED]> Textbox Net