Re: [Full-Disclosure] The new Microsoft math: 1 patch for 14 vulnerabilities, MS04-011

2004-04-15 Thread Geoincidents
I can see that you don't know anything about finding vulnerabilities or writing exploits. What you just said is Hey d3wd, there's like a vulnerability in windows man, and h3h see if you can find it d00d!. Isn't that exactly the assumption that eeye proceeds under? The original statement to

Re: [Full-Disclosure] The new Microsoft math: 1 patch for 14 vulnerabilities, MS04-011

2004-04-14 Thread Geoincidents
Exactly the point of full disclosure. If someone with a serious axe to grind would have stumbled onto the ASN.1 flaw before the Eeye notice, it could have been an ELE* for MS and some major corporations. Let's see, unpatched ASN.1 + Flash Worm = ? I think you seriously underestimate the

Re: [Full-Disclosure] The new Microsoft math: 1 patch for 14 vulnerabilities, MS04-011

2004-04-14 Thread Geoincidents
That's retarded. Immunity is releasing a universal, repeatable, lsass exploit in about 5 minutes to our CANVAS customers, for example, and we're sure everyone else is done as well. For bonus credit we're including a working ASN.1 exploit that owns IIS, Exchange, and everything else... If

[Full-Disclosure] Re: Addressing Cisco Security Issues

2004-03-29 Thread Geoincidents
- Original Message - From: Burton M. Strauss III [EMAIL PROTECTED] Really, your gripe is with Alltel which refused to provide it to you. My gripe is with all involved. Cisco provided the security alert and in that alert told how to get the patched version. When I followed those

[Full-Disclosure] Re: Addressing Cisco Security Issues

2004-03-29 Thread Geoincidents
- Original Message - From: Clayton Kossmeyer [EMAIL PROTECTED] downloads. The reasons for this are many, but one of the major ones is that SPs/ISPs want to control what versions of software are deployed within their networks. I can certainly understand an ISP's desire to control

Re: [Full-Disclosure] Re: Microsoft Security, baby steps ?

2004-03-17 Thread Geoincidents
Is any other OS any better lately ? When you want to be the leader, you don't ask questions like that. You recognize problems and you solve them and one of the problems today for Windows is that MS is making it very difficult to keep patched if the user doesn't want to put the machine on the

Re: [Full-Disclosure] Re: Microsoft Security, baby steps ?

2004-03-16 Thread Geoincidents
Come on Microsoft. How about putting together a single file that contains all the critical security updates since the last service pack for a given OS? I'm with you, this is nuts: to secure 2000 without using the network and windowsupdate: install 2000 sp4 Windows2000-KB823559-x86-ENU.exe

Re: [Full-Disclosure] Computer IP

2004-03-12 Thread Geoincidents
Can anybody tell me how to change computer IP through DOS ? i am using windowsXP. please tell me its command thanks. http://www.nthelp.com/w2k3/to_add_a_bunch_of_ip_addresses.htm Geo. ___ Full-Disclosure - We believe in it. Charter:

[Full-Disclosure] How much longer?

2004-02-11 Thread Geoincidents
This is a serious security issue imo http://www.eeye.com/html/Research/Upcoming/index.html I just saw this page for the first time today and I find this totally unacceptable behavior from a vendor. Where is the priority for root level exploits? Are you people comfortable knowing that a vendor

Re: [Full-Disclosure] Mydoom

2004-01-27 Thread Geoincidents
And, as I explained earlier, even the size of the .EXE can vary, adding yet another inconstancy to the equation. There is one consistancy that may help people build mail filters. The virus codes the zip attachment as a mime type of application / octet-stream (without the spaces) instead of

Re: [Full-Disclosure] Frontpage Extensions Remote Command Execution

2003-11-12 Thread Geoincidents
Looking at the description of the IWAM_machinename account on my system, it is listed as the Launch Process Account. IWAM has *no* privileges other than those explicitly granted to Guests, Users, or Everyone. Open usermanager go to groups look in your MTS Trusted group, what do you see

Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-11-04 Thread Geoincidents
But IMHO, that *is* the point. If it's on the Internet, it's exposed . . . And if a stored procedure is exposed, then the whole system is exposed . . . Nonsense, you read to many MS papers g. Lots of ISP's run SQL servers on the internet for radius authentication, where the database and

Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-11-03 Thread Geoincidents
Apparently the folks at Microsoft aren't there yet . . . would *you* be willing to expose a stored procedure in a SQL Server database as a Web service? See http://www.theregister.co.uk/content/61/33718.html. The inmates are running the loony bin . . . Of course not, but then isn't that the

Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-11-02 Thread Geoincidents
- Original Message - From: Matthew Murphy [EMAIL PROTECTED] Even though MS, by the time you factor in the large number of components they ship, has had many times fewer patch releases than competing Linux distributions? Microsoft has been playing a game where they hide exploits

Re: [Full-Disclosure] Gates: 'You don't need perfect code' for good security

2003-11-02 Thread Geoincidents
However, the original poster's point was on patch management -- MS has had as many bugs as the competing distributions, not really fewer. I was simply pointing out the fact that MS had many fewer bulletins to counter those who say things like MS releases big patches, etc. I don't disagree

Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents
First, firewalling and patching can not in fact shield networks from all of the impact of worms and viruses. Ask any experienced network admin. There will always be users who bring into a firewalled network a laptop that was, for example, infected at home. Part of the problem here is network

Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents
I think the issue at hand is how Bill has simply given ideas for band aid patches and not ways to ultimate secure systems. Fire walling and virus protection has its place in any environment. But poorly designed software with bugs known and unknown should not be a part of a secure system.

Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents
So what is your solution for the folks that carry those USB keychain memories? People carry those around with virus infected files and plug them in to whatever machine they are sitting in front of. Had people I never seen before try to plug them in to my hosts. Just wanted to read my

Re: [Full-Disclosure] Re: Gates: 'You don't need perfect code' for good security

2003-10-31 Thread Geoincidents
And recent experience shows that the virus is a world-wide issue before the new signatures come out for it. I think that's more a problem for network spreading of a worm like slammer or email virus than it is for a virus that infects files you might store on a memory stick. Typically that type

Re: [Full-Disclosure] Product activation is exploitable

2003-09-07 Thread Geoincidents
Interesting. But, I'm not sure how effective this would be, as everything that I've looked at (XP, 2003) doesn't have the actual WPA keys in the registry In windows XP it's at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductID Geo.

[Full-Disclosure] Product activation is exploitable

2003-09-06 Thread Geoincidents
So I'm reading this story http://www.nccomp.com/sysadmin/dell.html about a company who laid off their admin and he took all their product keys and posted them on the internet. Well to make a long story short, somehow applying a hotfix caused the software to deactivate (it has to have a

Re: [Full-Disclosure] east coast powergrid / SCADA [OT?]

2003-08-16 Thread Geoincidents
The theory that the Blackout event started by power generation loss (downed transmission lines) at a Cleveland plant is a little better then the lightning bolt Canada theory, but still inconsistent with the technical aspects of the Grids automated fault protection and power load balancing

Re: [Full-Disclosure] Vulnerability Disclosure Debate

2003-08-07 Thread Geoincidents
Nice stance, but complete off target. Currently, Microsoft releases the most detailed advisories, in a consistent format, with extensive information about possible workarounds etc. Microsoft's initial notification for the dcom exploit suggested blocking port 135 as a possible workaround even

Re: [Full-Disclosure] RE: DCOM Exploit MS03-026 attack vectors

2003-08-02 Thread Geoincidents
heh... http://www.nthelp.com/dcom.htm ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] interesting?

2003-02-01 Thread Geoincidents
As each instance of the worm infects more hosts they halves their range more and more. For a little resilience, in case some infections are 'killed off', each worm might delegate a particular address range 4 or 5 different times. Or after searching it's range it could unhalf it's range and

Re: [Full-Disclosure] Re: Symantec

2003-01-12 Thread Geoincidents
Smart money suggests that Symantec was probably mentioned in a lawsuit involving the use of system vulnerabilities, and their database played a role in either the legal offense, legal defense, or both. It's not politics; it's law. Now, let's spend another few months arguing about that, lest we

[Full-Disclosure] Gordano Mail Server exploit (NTmail)

2002-12-01 Thread Geoincidents
There is an exploit for NTmail also known as GMS where it is possible to pass a mail containing content that you have chosen to block to the users on the system. From my testing it appears to affect versions 5, 6, and 7 of NTmail and GMS version 8 both with and without the recent base64 patch. (a

[Full-Disclosure] Another NTmail exploit

2002-11-23 Thread Geoincidents
GMS (what used to be called NTmail) has a filtering feature called rwords that allows you to block incoming email based on word or phrase. If you add a phrase to the rwords list then no email with that phrase should be delivered to your users. Likewise if you add a virus signature this feature can