Re: [Full-Disclosure] I am out of here

2004-11-03 Thread Barry Fitzgerald
Berend-Jan Wever wrote: If you can't stand the heat, get out of the kitchen! And btw: if you're not cooking, get the fuck out too! Yeah - how hard is it to hit delete anyway? (I don't think I've ever joined a mailing list expecting every post to be interesting to me... nor even the

Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-11-02 Thread Barry Fitzgerald
Paul Schmehl wrote: Here's a suggestion for you. Google for Oil for Food. Once you're done reading, come back here and tell us how Germany, France and Russia were *not* in bed with Sadaam, buying oil at great discounts in exchange for weapons sales and other favors - in material violation of

Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-11-02 Thread Barry Fitzgerald
Dean Brooks wrote: The Oil for Food program, however, was truly a scandal. There would never have been ANY situation where Germany or France would have voted to approve the war. No matter how badly Iraq would have been violating sanctions (which they were doing for years), there would have been

Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-11-01 Thread Barry Fitzgerald
Paul Schmehl wrote: Now, PLEASE keep the damn politics off this list, because I assure you, I will not sit idly by and allow this kind of unadulterated crap to be spewed on this list without responding. All replies to /dev/null. That's kind of contradictory, wouldn't you say? First you'll

Re: [Full-Disclosure] Slightly off-topic: www.georgewbush.com

2004-10-29 Thread Barry Fitzgerald
Duncan Hill wrote: On Friday 29 October 2004 11:47, Berend-Jan Wever might have typed: Hi all, Want to view www.georgewbush.com from outside the US? You can't: Access denied. This security measure (!?) can easily be avoided using a proxy in the US or any anonymous surfing website though. So,

Re: [Full-Disclosure] Will a vote for John Kerry be counted by aHartInterCivic eSlate3000 in Honolulu? - OT

2004-10-22 Thread Barry Fitzgerald
Joe Hood wrote: We can only pray that al-quaeda isn't as successful as they were in Spain. Yeah, have you ever wondered why they haven't attacked? Hmmm... maybe it's because they want Bush to win? Or, if an attack occurred, would that bolster Bush in the election? These issues aren't quite

Re: [Full-Disclosure] Will a vote for John Kerry be counted by a HartInterCivic eSlate3000 in Honolulu?

2004-10-22 Thread Barry Fitzgerald
Paul Schmehl wrote: Yes, what we need in an American president is a sycophantic, indecisive appeaser so France, Germany and the UN can continue their graft, bribery and corruption with the Arab world without interference from those meddling idiots in America. And you're advocating that a

Re: [in] Re: [Full-Disclosure] Will a vote for John Kerry be counted by a Hart InterCivic eSlate3000 in Honolulu?

2004-10-22 Thread Barry Fitzgerald
Exibar wrote: Curt, And what was it that Bush lied to you personally about? or lied to the American People about? WMD's in Iraq? Just because we haven't found many of them (YES we have found some, BTW), doesn't mean they didn't exist Like life on Mars, just because we haven't seem little

Re: [Full-Disclosure] Will a vote for John Kerry be counted by a Hart InterCivic eSlate3000 in Honolulu?

2004-10-22 Thread Barry Fitzgerald
Jason Coombs PivX Solutions wrote: If we're going to allow these electronic voting devices in our elections, then we the people must be empowered to become the all volunteer quality assurance army that validates the data output. Hey there Jason, I share similar concerns. If we trace the

Re: [Full-Disclosure] Will a vote for John Kerry be counted by a Hart InterCivic eSlate3000 in Honolulu?

2004-10-22 Thread Barry Fitzgerald
Paul Schmehl wrote: --On Friday, October 22, 2004 10:32:34 AM -0400 Barry Fitzgerald [EMAIL PROTECTED] wrote: I share similar concerns. If we trace the why of this issue back to it's root (and discard conspiracy theories - which, given the attitude of a certain voting machine company

Re: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread Barry Fitzgerald
Harry de Grote wrote: i have to admit... it's pretty old and useless, but i think this may be a nice place for spammers to try out some new adresses... This is *NOT* the major issue that everyone is blowing it out to be. Lists like this are available on many organization/company websites.

Re: [Full-Disclosure] EEYE: Windows VDM #UD Local Privilege Escalation

2004-10-13 Thread Barry Fitzgerald
Derek Soeder wrote: Windows VDM #UD Local Privilege Escalation Release Date: October 12, 2004 Date Reported: March 18, 2004 Severity: Medium (Local Privilege Escalation to Kernel) [NOTE: This vulnerability was silently fixed by Microsoft in June, approximately 90 days after it was reported, with

Re: [Full-Disclosure] EEYE: Windows VDM #UD Local Privilege Escalation

2004-10-13 Thread Barry Fitzgerald
KF_lists wrote: ISS would like to have you believe otherwise... when I contacted them about the Local SYSTEM escalation in BlackICE we went in circles over the fact that I feel that taking local SYSTEM on a win32 box IS a problem and they don't. They tryed to say some crap like in all our

Re: [Full-Disclosure] Possibly a stupid question RPC over HTTP

2004-10-13 Thread Barry Fitzgerald
Daniel H. Renner wrote: Daniel, Could you please point out where you read this data? I would like to see this one... I seem to remember that this was one of the caveats with regard to MSBlast and RPC/DCOM vulnerabilities last year. In certain configurations, it was theoretically possible

Re: [Full-Disclosure] Hacking into private files, my credit card purchases, personal correspondence or anything that is mine is trespassing and criminal.

2004-10-12 Thread Barry Fitzgerald
Giselbert Hinkelmann wrote: Am 12.10.2004 um 01:33 schrieb Jesse Valentin: My point is that just because something isnt recognized as incorrect by a legal entity this doesnt necessarily indicate that the conclusion is sound Which means that future generations may see not giving free/cheap

Re: [Full-Disclosure] Hacking into private files, my credit card purchases, personal correspondence or anything that is mine is trespassing and criminal.

2004-10-12 Thread Barry Fitzgerald
Jesse Valentin wrote: My point is that just because something isnt recognized as incorrect by a legal entity this doesnt necessarily indicate that the conclusion is sound I agree with your point here, but you missed one of the nuances of my argument. The definition of theft isn't just a legal

Re: [Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #1933 - 20 msgs

2004-09-28 Thread Barry Fitzgerald
milw0rm Inc. wrote: JPEG GDI problem, Isn't this problem only capable of running if the jpeg was opened via the users actions? Is it possible that webpages could be effected with jpegs with internet explorer viewing them? I wouldn't think so since what I have read from multiple peoples articles

Re: [Full-Disclosure] JPEG GDI

2004-09-28 Thread Barry Fitzgerald
[EMAIL PROTECTED] wrote: Berry, I appreciate the information. I would think newgroup postings would be a little evil aswell. Yep - in fact I was reading this morning on http://isc.sans.org/ that one was just found on an adult newsgroup. -Barry

Re: [Full-Disclosure] Re: Full-Disclosure digest, Vol 1 #1933 - 20

2004-09-28 Thread Barry Fitzgerald
Geo. wrote: far-fetched. Would it be possible to create a jpeg that would copy itself to other drives on a shared network in an auto-executable position? I suppose so... however, it would be noisy and probably wouldn't be amazingly successful. Picture a company full of users and a worm

Re: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread Barry Fitzgerald
joe wrote: Nod. Some knucklehead used GetTickCount or clock() for their app and had no clue about datatypes and overflows and range of possible values and some people go off on Windows. I was helping someone in the public newsgroups with a similar issue. Experienced 10 year c coder who didn't

Re: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread Barry Fitzgerald
Frank Knobbe wrote: On Fri, 2004-09-24 at 09:15, Barry Fitzgerald wrote: The article doesn't make the situation entirely clear. Did the app intentionally restart the system and foul it? Did the restart occur because the app crashed? No, no, the problem was human error because a tech

Re: [Full-Disclosure] Windoze almost managed to 200x repeat 9/11

2004-09-24 Thread Barry Fitzgerald
ASB wrote: ~ Where issues like this relate to the OS is in the fact that the OS itself shouldn't be brought down by a poorly designed app. ~ And where in that article did you read that the OS was brought down by a poorly designed app?

Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-21 Thread Barry Fitzgerald
Larry Seltzer wrote: If you don't really believe that the movie Catch me if you can was based on a true story, check out this site: http://www.abagnale.com/index2.asp I don't want to put words in anyone's mouth, but I hope we're not comparing a genius like Abagnale to vandal like Jaschan,

Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-21 Thread Barry Fitzgerald
ktabic wrote: - Have you ever exceeded 20 mph above the speed limit? If so, does that make you incapable of driving a big rig truck? If so, I think we should probably be very wary of our use of the roads. It's much more difficult to get a commercial license if you've been caught

Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-21 Thread Barry Fitzgerald
ktabic wrote: No, no need to spell it out any clearer. You made my point. Mr. Abagnale is an expert in and on the finacial institusions and fraud, who (in return for a reduced sentence) provided that immense knowledge to the industry and has even worked towards getting the industry to adopt

Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-21 Thread Barry Fitzgerald
Larry Seltzer wrote: He wrote a worm. Big freaking deal. Yeah, very big freaking deal. He loosed an attack he had good reason to believe would do damage to innumerable people all over the world. He belongs in jail and for a long time, if only to send a message that such behavior is

Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-21 Thread Barry Fitzgerald
pingywon MCSE wrote: Barry, are you related to Nick by any chance? Not to my knowledge. -Barry ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] Scandal: IT Security firm hires the author of Sasser worm

2004-09-20 Thread Barry Fitzgerald
ktabic wrote: Well, I vaguely recall laws that state that a convicted criminal isn't allowed to profit from his crime, even after he has served his sentence. This does, however, sound like he is profiting from his crime. Think: would he have been given this job if he hadn't had his named plastered

Re: [Full-Disclosure] Re: [Vmyths.com ALERT] Hysteria predicted for 'JPEG and windows update

2004-09-17 Thread Barry Fitzgerald
Ron DuFresne wrote: scroll down there and do the custom patching, that will get you the GDI+ scanner, and any other patches you are missing, once that installs it will scan for M$ apps needing the jpeg patch. Then you are directed to the windows appplications update page. Of course to get the

Re: [Full-Disclosure] [Vmyths.com ALERT] Hysteria predicted for 'JPEG Processor' vulnerability

2004-09-15 Thread Barry Fitzgerald
Rob Rosenberger wrote: Vmyths.com Virus Hysteria Alert Truth About Computer Security Hysteria {15 September 2004, 01:55 CT} CATEGORIES: (1) Misconceptions about a real computer security threat (2) A historical perspective on recent hysteria Microsoft has issued a critical alert

[Full-Disclosure] Re: Sidney McAfee GroupShield Alert

2004-09-14 Thread Barry Fitzgerald
is security industry gng?? From: [EMAIL PROTECTED] To: Barry Fitzgerald Action taken: Logged Reason: Encrypted/Corrupted Rule Group: Copyright 1993-2003, Networks Associates Technology, Inc. All Rights Reserved. http://www.mcafeesecurity.com http://www.mcafeesecurity.com

Re: [Full-Disclosure] win2kup2date.exe ?

2004-09-13 Thread Barry Fitzgerald
VX Dude wrote: I have a sad feeling that I am alone about this. If I am, then I really pity you guys. Stinny FranCisco, CISSP Internet Sniper eDefense Inc. I tend to agree with you. However, there are a couple of things to consider: 1) Disclosure tends to refer to information. Now,

Re: [Full-Disclosure] Where is security industry gng??

2004-09-13 Thread Barry Fitzgerald
Jan Muenther wrote: Network security - application security - software security - What do u guys think?? job security? or insecurity? POC: #!/bin/sh if [ ! $jobsecurity ]; then export insecurity='high'; else unset insecurity; fi;

Re: [Full-Disclosure] Re: Re: open telnet port

2004-09-10 Thread Barry Fitzgerald
Raj Mathur wrote: Remove low-bandwidth from the list of requirements, since ssh can compress traffic on the fly and reduce bandwidth consumption significantly. I would not remove low-bandwidth from the list. Compressing the connection requires further CPU consumption, and if the requirement

Re: [Full-Disclosure] Does the following...

2004-09-10 Thread Barry Fitzgerald
Well, when I first started reading it I thought perhaps I was reading a trasncript of one of George W. Bush's speeches... :) ..and then I realized that unlike Bush, these are actually coherrent chunks of text that look like they may have been taken from disparate web pages. Does it only

Re: [Full-Disclosure] Re: mpg123 buffer overflow vulnerability

2004-09-09 Thread Barry Fitzgerald
Richard Johnson wrote: I have personally already discovered most software vulnerabilities, and just because I have not published information on them, it does mean that I have not already discovered and successfully exploited the bugs in question. snip Finally, I suggest that you apply you

Re: [Full-Disclosure] Re: Re: open telnet port

2004-09-09 Thread Barry Fitzgerald
Dave Ewart wrote: Quite so, as I suggested. Are there even any legitimate uses for running a telnet daemon any more? (That is a genuine question - as far as I can see, SSH is always a perfect replacement). Sure - a situation where a system needs a low-bandwidth/low CPU-use shell-based

Re: [Full-Disclosure] win2kup2date.exe ?

2004-09-08 Thread Barry Fitzgerald
Bugtraq Security Systems wrote: Nick, You're a moron, and a fake moron at that. If you had the clue god gave the average scriptkiddie, you'd kill yourself in shame at your own postings. Cheers, BUGTRAQ Security Systems If Nick FitzGerald had a brain cell for every bug we tracked, he'd be smart and

Re: [OT] Re: [Full-Disclosure] Re: New paper on Security and Obscurity

2004-09-03 Thread Barry Fitzgerald
Stormwalker wrote: Hi, It wasn't the general, massive military build up, but the specific program known as Star Wars under Ronald Raygun. The Soviets believed that the nonsense was true and tried to fund the research to catch up until they hit the wall. Unlike real military weapons, a fake weapon

Re: [Full-Disclosure] [VirusTotal] Scan result (fwd)

2004-09-03 Thread Barry Fitzgerald
Michel Messerschmidt wrote: On Fri, Sep 03, 2004 at 10:43:50AM +0530, Aditya Deshmukh wrote: hey if the binary is infected and does not contain any hardcoded sencitive info what do u care about the owners of the website ? Unless for (a purely theretical) example the website would use

Re: [Full-Disclosure] Response to comments on Security and Obscurity

2004-09-02 Thread Barry Fitzgerald
yaakov yehudi wrote: A firewall is more akin to a specialized filter medium, but filter mediums aren't used as the entrance or exit to a military base. It is probably possible to find analogies between the information security world and physical - but only on a piecemeal basis, and that is

Re: [Full-Disclosure] win2kup2date.exe ?

2004-09-02 Thread Barry Fitzgerald
Do you still have a copy of the file? Have you sent it to the antivirus companies for analysis? Can you repeat the experiment with a patched box and replicate the results? If so, that could be bad. It could just be a reworked exploit, though -- or perhaps there's a bug in the buffer overflow

[OT] Re: [Full-Disclosure] Re: New paper on Security and Obscurity

2004-09-02 Thread Barry Fitzgerald
Choe Sung Cont. PACAF CSS/SCHP wrote: The Great Cold War of the last century was not won through military means. It was not won by US political leaders. It was won by Levi jeans and bottles of Coke. Ahhh, I love it when people try to make this argument. I highly doubt that the denim soft

Re: [Full-Disclosure] New paper on Security and Obscurity

2004-09-01 Thread Barry Fitzgerald
Peter Swire wrote: Greetings: I have been lurking on Full Disclosure for some time, and now would like to share an academic paper that directly addresses the topic of full disclosure and computer security: Hello Peter, There are some glaring flaws in the the basis of this paper. Though I

Re: [Full-Disclosure] Response to comments on Security and Obscurity

2004-09-01 Thread Barry Fitzgerald
James Tucker wrote: This is not dissimilar from the discussion that, for example: Walk into the headquarters of a major business firm, you take the elevator up to the top floor as you don't have a keycard to get you in a lower level. It's lunchtime and the secretary at reception has left her desk.

Re: [Full-Disclosure] Viral infection via Serial Cable

2004-08-31 Thread Barry Fitzgerald
James Tucker wrote: Sure, but you can only move up a stack which exists. Given that there should be no applications on the other end of the RS232 apart from the CAD/CAM control program (one would hope, this would be considered 'normal'), the only hackable device should be that program. It's not

Re: [Full-Disclosure] U.S. National Security Awareness Day (NSAD)

2004-08-27 Thread Barry Fitzgerald
VX Dude wrote: snip You're not illegaly subscribed, but you may have subscribed to an illegal mailing list. Due to the laws in our nation (USA), much of what is discussed here is (or will be) violating some form of DMCA type laws. (please check your state laws for further deatils) It is a shame

Re: !SPAM! [Full-Disclosure] Automated ssh scanning

2004-08-26 Thread Barry Fitzgerald
Ron DuFresne wrote: If your uasers are not trustable, then they should not have access to local systems of yours. Once a person has a shell, then they are 95% to root. I'm not sure I entirely agree with what you're saying. Scratch that - I'm sure I don't agree with what you're actually saying

Re: [Full-Disclosure] Windows Update

2004-08-24 Thread Barry Fitzgerald
joe wrote: The client is required. I have sent a complaint to MS though concerning the idea that the service set to manual but started doesn't allow the updates to occur. That, I agree, is a bad design choice. If the service is set to automatic but not started, it will get started as soon as you

Re: [Full-Disclosure] Windows Update

2004-08-23 Thread Barry Fitzgerald
Michael Schaefer wrote: It looks like windows update requires Automated Updates to be set to automatic startup, but does not require the process to actually be running... So the statement that they are required is obviously false. As a work around, I can manually change the startup status, do

Re: [Full-Disclosure] Unsecure file permission of ZoneAlarm pro.

2004-08-20 Thread Barry Fitzgerald
Todd Towles wrote: Sounds like it about as easy to shutdown as Microsoft's SP2 firewall... Overwrite a file, it fails integrity checks and the firewall will fail closed. There is something to add to a dropper program. This by itself would make an effective short-term DoS of a consumer PC.

Re: [Full-Disclosure] RE: [Full-Disclosure]MS should re-write code with security in mind

2004-08-20 Thread Barry Fitzgerald
Clairmont, Jan M wrote: Glenn: Not to take issue with the performance of encryption, but what good is performance when it's all spent processing spam, malware, trojans, spyware and all the other cr*p that downloads. Even things like spybot, zone alarm etc. do not prevent any of the junk that

Re: [OT] Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-18 Thread Barry Fitzgerald
joe wrote: Since you cut out every piece that had anything to do remotely with this list, I will respond very briefly and then fail to respond to any more list posts on this from you unless you come back to the subject of security and away from OSS vs proprietary code. Hey - you've had at

[OT] Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-18 Thread Barry Fitzgerald
joe wrote: If only a #define statement were copied they wouldn't be obligated to disclose it's source. I did not say that the only use was a #define, what I said was that would be enough to get MS to document it if they didn't otherwise outright own the rights. If you pick up a #define

Re: [OT] Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-18 Thread Barry Fitzgerald
KF_lists wrote: OK - put your money where your mouth is. Pretend I'm a consumer. I have 2000 USD to spend and want a good PC with a good warranty with GNU/Linux on it. Find me a link to a major OEM that will ship me a PC within those specs with decent hardware and a generally recognized

Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-17 Thread Barry Fitzgerald
joe wrote: I didn't say that they didn't use BSD pieces, I said that he wasn't as accurate as he likes to think for the statement where he was naming specific tools and pieces. Use of BSD pieces doesn't mean that it was used in its entirety or even a lot, just that it was used in some manner, it

Re: [Full-Disclosure] (no subject)

2004-08-13 Thread Barry Fitzgerald
Harlan Carvey wrote: Forget the whole naming thing...it's been bandied about before, ad nauseum, and things haven't changed. What *I* would like to see is some real analysis of what they find. Too many times, weeks after something's come out, some A/V company still has modifies/updates some

Re: [Full-Disclosure] (no subject)

2004-08-13 Thread Barry Fitzgerald
Harlan Carvey wrote: Barry, One other thing I'd like to throw into the mix. This whole discussion is being viewed, it seems to me from the wrong perspective. The attitude that the entire A/V industry should have a common naming convention seems to be coming from the open source camp...while

Re: [Full-Disclosure] lame bitching about xpsp2

2004-08-13 Thread Barry Fitzgerald
James Patterson Wicks wrote: James, Don't take this the wrong way, you've got a point in your e-mail here, but I'm going to call you on some FUD in your message. The business world cannot afford to start from zero and retrain tens of millions of workers who use Windows desktops every day.

Re: [Full-Disclosure] (no subject)

2004-08-13 Thread Barry Fitzgerald
Todd Towles wrote: How is naming a virus with @mm or a W32 in the front slow the process down? Naming has nothing to do with AV venders making money IMO. If it does, McAfee should change its name to Norton before tries to buy it out. =) It doesn't have a direct impact -- however, you're not

Re: [Full-Disclosure] (no subject)

2004-08-13 Thread Barry Fitzgerald
Todd Towles wrote: As my orginial post started, I wouldn't let it up to the AV companies at all. Have a separate entity (group of people like us), gain the backing of big compaines and other entities and come up with some standards. You don't even need big companies to approve or back you --

Re: [Full-Disclosure] fedora.org compromised - http://fedora.redhat.com not compromised

2004-08-12 Thread Barry Fitzgerald
Aditya, ALD [Aditya Lalit Deshmukh] wrote: The whitehouse website was also compromised. Look www.whitehouse.com =) Wasn't fedora.org home to a page of useful fedora information? I am not at home and don't have all my links. guys can we please discuss defaced websites on some other list ?

Re: [Full-Disclosure] waa waa (was Finally the truth slips out)

2004-08-09 Thread Barry Fitzgerald
[EMAIL PROTECTED] wrote: On Fri, 06 Aug 2004 15:39:45 CDT, John Creegan [EMAIL PROTECTED] said: I thought this list was originally meant to focus primarily on computer hardware/software types of security issues. Malware, discovered exploitables, etc OK, you need a tie-in to computers?

Re: [Full-Disclosure] waa waa (was Finally the truth slips out)

2004-08-09 Thread Barry Fitzgerald
Security List wrote: Appointed? If you do not believe in the U.S. constitution and the supreme court then I could see how one might suggest that Mr. Bush was appointed. If you do believe in it then you must know that his appointment was the only legal solution to the issue. Many major papers

Re: [Full-Disclosure] Re: MS04-025 - Ignorance is truly bliss....

2004-08-06 Thread Barry Fitzgerald
[EMAIL PROTECTED] wrote: On Thursday, 5 August 2004, hellNbak wrote: The Internet is no longer a world of hippie hacker idealists, but quite simply a global market. Because of lack of centralized authority overseeing it (wasn't that what you fought for?), it is a wild style economy, often

Re: [Full-Disclosure] waa waa (was Finally the truth slips out)

2004-08-06 Thread Barry Fitzgerald
Paul Schmehl wrote: No, it's not excellent. There are tons of places on the web to spread this crap. This is not one of them. And why does this have anything to do with security? Well a few things come to mind. I has *nothing* to do with security. Take to alt.i.hate.bush. Normally, I'd

[Full-Disclosure] Re: Fwd: New possible scam method : forged websites using XUL (Firefox)

2004-08-03 Thread Barry Fitzgerald
to try to clearify the issue. Nice move, showing your true colors like this. Barry Fitzgerald wrote: Justin Polazzo wrote: 5 Years to fix a vuln? I am not sure if even Microsoft has been that slow to confront a security flaw. Has anyone heard an explanation as to why this was kept confidential

Re: [Full-Disclosure] Re: OpenServer 5.0.6 OpenServer 5.0.7 : Multiple Vulnerabilities in Sendmail

2004-07-30 Thread Barry Fitzgerald
Frank Knobbe wrote: (After all, why fix it if they file Chapter 11 by end of the year anyway?) We can only hope... maybe if we get lucky they'll be forced to file in September. Or, perhaps, just fall off the end of the earth... Yeah, that'd be a good thing. -Barry

Re: [Full-Disclosure] IE

2004-07-22 Thread Barry Fitzgerald
Stephen Taylor wrote: Is this a moderated list or is this a venue for anti-semitic diatribes? Please let me know because I want to drop out if the totally biased, off-topic comments can't be controlled. SteveTaylor Being opposed to Israeli political policies is about as anti-semitic as being

Re: [Full-Disclosure] SNMP Broadcasts

2004-07-19 Thread Barry Fitzgerald
J.A. Terranson wrote: We are just going to have to agree to disagree, since neither of our camps seems willing to move, and really, this is getting pointless: to make further [rehash] arguments likely wont help. We have divergent world views, and likely different foundational indoctrination which

Re: [Full-Disclosure] SNMP Broadcasts

2004-07-16 Thread Barry Fitzgerald
J.A. Terranson wrote: Oh, I get it. So if root executes sshd -p 45522 --this is not *technically* ssh, right? If sshd is running on 45522 it's a back door Marty :-) And no, in this case, pedantic or not, it's not ssh as is commonly accepted. (Responding to essentially the only on-topic

Re: [Full-Disclosure] SNMP Broadcasts

2004-07-16 Thread Barry Fitzgerald
J.A. Terranson wrote: Agreed. It is the SSH protocol, but it is not the SSH *service*. It violates the standard (as you note). If I write a trojan that uses HTTP to process requests, then park it on 31337, I do not have an HTTP serv(er|ice). I have a trojan which happens to use the HTTP

Re: [Full-Disclosure] Exploits in websites due to buggy input validation where mozilla is at fault as well as the website.

2004-07-15 Thread Barry Fitzgerald
Seth Alan Woolley wrote: Is it just me or is that behavior idiotic? I've seen this bug in _multiple_ scripts I've audited. For that reason, I feel much less safe signing up for cookies on websites that I haven't audited myself for this problem. Since it is a script tag, that could open many a

Re: [Full-Disclosure] Exploits in websites due to buggy input validation where mozilla is at fault as well as the website.

2004-07-15 Thread Barry Fitzgerald
Nick FitzGerald wrote: Nope -- _VERY_ bad idea. I'm not sure I'd call it a *very* bad idea... it's better than silently finishing incomplete tags. Idiot users want to blow both their feet off. Asking them do you want a chance to blow your feet off? only slows the inevitable slightly, never

Re: [Full-Disclosure] Re: shell:windows

2004-07-12 Thread Barry Fitzgerald
Nick Eoannidis wrote: Larry Seltzer eWEEK.com Security Center Editor -- buddy, the shell:windows URI handler was disabled in IE ages ago! The fact it can be crafted into an exploit for Mozilla! is the issue here. Of course it wont work on your IE your probably patched to the max! Mozilla just

Re: [Full-Disclosure] Re: shell:windows

2004-07-12 Thread Barry Fitzgerald
Larry Seltzer wrote: meaningful problem either, then we can agree to disagree on the scope. I'll agree that getting this issue to run code of the choosing of the attacker is more difficult than some other unpatched IE holes, but it is not impossible. I disagree completely. The Mozilla problem,

Re: [Full-Disclosure] MOZILLA: SHELL can execute remote EXE program

2004-07-09 Thread Barry Fitzgerald
Interesting... I was trying to determine if the shell: exploit could be used to execute remote code on a known web server but hadn't approached it from the SMB angle. The obvious mitigating factor for this exploit is that someone would need to have prior knowledge of which SMB shares had been

Re: [Full-Disclosure] No shell = secure?

2004-07-09 Thread Barry Fitzgerald
Ron DuFresne wrote: [snip] This is not security through obscurity. This is security through incompatibility. The point of the idea is to make it necessary for an attacker to rewrite an exploit for my system specifically. This is something that over 99% of the potential attackers would

Re: [Full-Disclosure] shell:windows command question

2004-07-08 Thread Barry Fitzgerald
Darren Reed wrote: A simple solution would be to add the shell protocol to this list. Personally I think a secure blacklist is hard to maintain as new dangerous external protocols could be invented by third-parties leaving Mozilla vulnerable again. Completely agreed. There should be a

Re: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-07 Thread Barry Fitzgerald
joe wrote: It is a core component of the current Windows UI, this is not the same as being a core component of Windows. Explorer is simply a UI shell that sits on the operating system known as Windows. The entire shell is replaceable and has been for a long time, since at least Win3.1. I

Re: [Full-Disclosure] shell:windows command question

2004-07-07 Thread Barry Fitzgerald
I just verified this in Mozilla 1.7 on Windows XP pro. (I know -- no reason why it shouldn't work on 1.7 if it worked on firefox) In any case, it does appear to be an issue with MS Windows and not Mozilla, but the Mozilla project should still, IMO, filter out the shell: scheme type and other

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-06 Thread Barry Fitzgerald
Maarten wrote: On Friday 02 July 2004 23:33, Barry Fitzgerald wrote: No, I'm not wrong. The discussion is about who's responsible for support of said software. There's no obligation through the GNU GPL that support is required if money changes hands, however the point of the discussion is who's

Re: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-06 Thread Barry Fitzgerald
joe wrote: Couple of things. 1. The conversation you are referring to was a conversation about issues with core base components that necessitated a complete redesign. You kept bringing up items that were NOT core base components - they were UI components. IE being one of them. The very fact that

Re: [Full-Disclosure] IE Web Browser: Sitting Duck

2004-07-06 Thread Barry Fitzgerald
Frank Knobbe wrote: On Tue, 2004-07-06 at 09:27, Barry Fitzgerald wrote: Is it impossible to remove easily and difficult to remove cleanly? Yes... Heh... I just noticed (by chance) that there is an option in |Control Panel - Add/Remove Programs - Windows Components| to remove Internet

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-02 Thread Barry Fitzgerald
Denis Dimick wrote: Barry, I have to agree with you one once a company changes the code then they own it. However wrapping the same old software in an RPM to me does not change it enough to have someone else own the code. Per the Free Software model it does. The key point here is that Red

Re: [Full-Disclosure] HP urges users to erase Netscape to avoid security problems

2004-07-02 Thread Barry Fitzgerald
Alerta Redsegura wrote: The story is available at: http://www.computerweekly.com/articles/article.asp?liArticleID=131708liArticleTypeID=1liCategoryID=2liChannelID=22liFlavourID=1sSearch=nPage=1 Heh. The article has the following quote: On other platforms, such as Linux, Unix and the Mac,

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-02 Thread Barry Fitzgerald
Denis Dimick wrote: Per the Free Software model it does. The key point here is that Red Hat is redistributing the code and making a profit off of it. It's Red Hat's choice regarding whether to redistribute said code. Since they're making the money off of it, they have to support it.

Re: [Full-Disclosure] (IE/SCOB) Switching Software Because of Bugs: Some Facts About Software and Security bugs

2004-07-01 Thread Barry Fitzgerald
Matthew Murphy wrote: Actually, you're both wrong, in my opinion. :-) Overall market share has some to do with the success of worm propagation, but the real problem is market share diversity at all levels. IIS is plagued by worms because one piece of code targeting whatever version of IIS is

Re: [Full-Disclosure] Web sites compromised by IIS attack

2004-07-01 Thread Barry Fitzgerald
Denis Dimick wrote: Did M$ write ftp.exe? If so then they own it, they own the sources and all rights to the code. Redhat owns very little of the code you get on there CD. Denis I think that the demarcation line for this is where money changed hands. First of all, ftp.exe is a common example

Re: [Full-Disclosure] Presidential Candidates' Websites Vulnerable

2004-07-01 Thread Barry Fitzgerald
Harlan Carvey wrote: Problems with electronic voting; FYI I'm familiar with some of the issues regarding electronic voting...what I'm not seeing is the connection between that and this draft issue you raised. From what I recall, the reason that the draft bill was put forth in congress

Re: [Full-Disclosure] Presidential Candidates' Websites Vulnerable

2004-07-01 Thread Barry Fitzgerald
Frank Knobbe wrote: On Thu, 2004-07-01 at 10:48, Jordan Klein wrote: Oh yes, and there should be a checksum of the unique number assigned to each vote to ensure that someone couldn't just reverse engineer the barcode and make up a bunch of bogus votes. I'm not sure exactly how that part would

Re: [Full-Disclosure] (IE/SCOB) Switching Software Because of Bugs: Some Facts About Software and Security bugs

2004-06-30 Thread Barry Fitzgerald
Drew Copley wrote: Conclusion: Mozilla may be better. I think there is some strong chance of that. But only marginally. It has had bugs. It has a lot of features, which means a lot of potential for security issues. They have kept their browser more conservative then Microsoft has kept Internet