I can see that you don't know anything about finding vulnerabilities or
writing exploits. What you just said is Hey d3wd, there's like a
vulnerability in windows man, and h3h see if you can find it d00d!.
Isn't that exactly the assumption that eeye proceeds under?
The original statement to
Exactly the point of full disclosure. If someone with a serious axe to
grind would have stumbled onto the ASN.1 flaw before the Eeye notice, it
could have been an ELE* for MS and some major corporations.
Let's see, unpatched ASN.1 + Flash Worm = ?
I think you seriously underestimate the
That's retarded. Immunity is releasing a universal, repeatable, lsass
exploit in about 5 minutes to our CANVAS customers, for example, and
we're sure everyone else is done as well. For bonus credit we're
including a working ASN.1 exploit that owns IIS, Exchange, and
everything else...
If
- Original Message -
From: Burton M. Strauss III [EMAIL PROTECTED]
Really, your gripe is with Alltel which refused to provide it to you.
My gripe is with all involved. Cisco provided the security alert and in that
alert told how to get the patched version. When I followed those
- Original Message -
From: Clayton Kossmeyer [EMAIL PROTECTED]
downloads. The reasons for this are many, but one of the major ones
is that SPs/ISPs want to control what versions of software are
deployed within their networks.
I can certainly understand an ISP's desire to control
Is any other OS any better lately ?
When you want to be the leader, you don't ask questions like that. You
recognize problems and you solve them and one of the problems today for
Windows is that MS is making it very difficult to keep patched if the user
doesn't want to put the machine on the
Come on Microsoft. How about putting together a single file that contains
all the critical security updates since the last service pack for a
given
OS?
I'm with you, this is nuts:
to secure 2000 without using the network and windowsupdate:
install 2000
sp4
Windows2000-KB823559-x86-ENU.exe
Can anybody tell me how to change computer IP through DOS ? i am
using windowsXP. please tell me its command thanks.
http://www.nthelp.com/w2k3/to_add_a_bunch_of_ip_addresses.htm
Geo.
___
Full-Disclosure - We believe in it.
Charter:
This is a serious security issue imo
http://www.eeye.com/html/Research/Upcoming/index.html
I just saw this page for the first time today and I find this totally
unacceptable behavior from a vendor. Where is the priority for root level
exploits? Are you people comfortable knowing that a vendor
And, as I explained earlier, even the size of the .EXE can vary, adding
yet another inconstancy to the equation.
There is one consistancy that may help people build mail filters. The virus
codes the zip attachment as a mime type of application / octet-stream
(without the spaces) instead of
Looking at the description of the IWAM_machinename account on my system,
it
is listed as the Launch Process Account. IWAM has *no* privileges other
than those explicitly granted to Guests, Users, or Everyone.
Open usermanager go to groups look in your MTS Trusted group, what do you
see
But IMHO, that *is* the point. If it's on the Internet, it's exposed .
. . And if a stored procedure is exposed, then the whole system is
exposed . . .
Nonsense, you read to many MS papers g. Lots of ISP's run SQL servers on
the internet for radius authentication, where the database and
Apparently the folks at Microsoft aren't there yet . . . would *you* be
willing to expose a stored procedure in a SQL Server database as a Web
service? See http://www.theregister.co.uk/content/61/33718.html. The
inmates are running the loony bin . . .
Of course not, but then isn't that the
- Original Message -
From: Matthew Murphy [EMAIL PROTECTED]
Even though MS, by the time you factor in the large number of components
they ship, has had many times fewer patch releases than competing Linux
distributions?
Microsoft has been playing a game where they hide exploits
However, the original poster's point was on patch management -- MS has had
as many bugs as the competing distributions, not really fewer. I was
simply
pointing out the fact that MS had many fewer bulletins to counter those
who
say things like MS releases big patches, etc.
I don't disagree
First, firewalling and patching can not in fact shield networks from
all of the impact of worms and viruses. Ask any experienced network
admin. There will always be users who bring into a firewalled network
a laptop that was, for example, infected at home.
Part of the problem here is network
I think the issue at hand is how Bill has simply given ideas for band aid
patches and not ways to ultimate secure systems. Fire walling and virus
protection has its place in any environment. But poorly designed software
with bugs known and unknown should not be a part of a secure system.
So what is your solution for the folks that carry those USB keychain
memories? People carry those around with virus infected files and
plug them in to whatever machine they are sitting in front of. Had
people I never seen before try to plug them in to my hosts. Just
wanted to read my
And recent experience shows that the virus is a world-wide issue before
the new signatures come out for it.
I think that's more a problem for network spreading of a worm like slammer
or email virus than it is for a virus that infects files you might store on
a memory stick. Typically that type
Interesting. But, I'm not sure how effective this would be, as everything
that I've looked at (XP, 2003) doesn't have the actual WPA keys in the
registry
In windows XP it's at
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductID
Geo.
So I'm reading this story http://www.nccomp.com/sysadmin/dell.html about a
company who laid off their admin and he took all their product keys and
posted them on the internet. Well to make a long story short, somehow
applying a hotfix caused the software to deactivate (it has to have a
The theory that the Blackout event started by power generation
loss (downed transmission lines) at a Cleveland plant is a
little better then the lightning bolt Canada theory, but still
inconsistent with the technical aspects of the Grids automated
fault protection and power load balancing
Nice stance, but complete off target. Currently, Microsoft releases
the most detailed advisories, in a consistent format, with extensive
information about possible workarounds etc.
Microsoft's initial notification for the dcom exploit suggested blocking
port 135 as a possible workaround even
heh...
http://www.nthelp.com/dcom.htm
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
As each instance of the worm infects more hosts they
halves their range more and more. For a little resilience, in case some
infections are 'killed off', each worm might delegate a particular
address range 4 or 5 different times.
Or after searching it's range it could unhalf it's range and
Smart money suggests that Symantec was probably mentioned in a lawsuit
involving the use of system vulnerabilities, and their database played a
role in either the legal offense, legal defense, or both.
It's not politics; it's law. Now, let's spend another few months arguing
about that, lest we
There is an exploit for NTmail also known as GMS where it is possible to
pass a mail containing content that you have chosen to block to the users on
the system. From my testing it appears to affect versions 5, 6, and 7 of
NTmail and GMS version 8 both with and without the recent base64 patch. (a
GMS (what used to be called NTmail) has a filtering feature called rwords
that allows you to block incoming email based on word or phrase. If you add
a phrase to the rwords list then no email with that phrase should be
delivered to your users. Likewise if you add a virus signature this feature
can
28 matches
Mail list logo