> > I just wanted to inform users of Ximian Evolution 2.0
> > software that there exists a way to temporarily DoS the local
> > application and/or machine by attaching an absurd amount of
> > .ezm files to a normal email.
>
>
> It seems to me that it would take an attacker more time to create
[...]
> How much of a percentage of discussion and disclosure on this list is
> actually counter acting script kiddie hood and how much is actually
> aiding them to carry out further malicious activities across the
> internet on a global scale?
[...]
nearly 100%, because if it is not this forum, i
-BEGIN PGP SIGNED MESSAGE-
__
SUSE Security Announcement
Package:kernel
Announcement-ID:SUSE-SA:2004:020
Date: Tuesday, Ju
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:Live CD 9.1
Announcement-ID:SuSE-SA:2004:011
Date: Thursd
-BEGIN PGP SIGNED MESSAGE-
__
SUSE Security Announcement
Package:Linux Kernel
Announcement-ID:SuSE-SA:2004:010
Date: Tuesd
>
> I use Linux, OpenBSD and Windows in my enterprise. Linux and OpenBSD use
> the "1 patch for 1 vulnerability" rule. Seems to me that MS is bunching
> their patches together in order to make it seem on the surface that Windows
> has less patches than other Oses, therefore it is more secure.
> i copy paste the wrong lines. if logged in on the console
> i get a segfault. using ssh i get:
>
> [EMAIL PROTECTED] evert]$ X :0 -fp $PWD
> Authentication failed - cannot start X server.
> Perhaps you do not have console ownership?
> [EMAIL PROTECTED] evert]$
>
> so my real question was... is
YFAjseYcMACgkQnkDjEAAKq6ROVACgjhDM
/3KM+iFjs5QXsnd4oFPOnbkAnjYGa1J3em+bmV2aiCdYXdOuGn4ZiQCVAwUQN7c7
whaQN/7O/JIVAQEB+QP/cYblSAmPXxSFiaHWB+MiUNw8B6ozBLK0QcMQ2YcL6+Vl
D+nSZP20+Ja2nfiKjnibCv5ss83yXoHkYk2Rsa8foz6Y7tHwuPiccvqnIC/c9Cvz
dbIsdxpfsi0qWPfvX/jLMpXqqnPjdIZErgxpwujas1n9016PuXA8K3MJwVjCqSKI
Rg
Hello Florian,
>
> > Recently multiple servers of the Debian project were compromised using a
> > Debian developers account and an unknown root exploit. Forensics
> > revealed a burneye encrypted exploit. Robert van der Meulen managed to
> > decrypt the binary which revealed a kernel exploit. Stu
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:sendmail, sendmail-tls
Announcement-ID:SuSE-SA:2003:040
Date:
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:openssh (second release)
Announcement-ID:SuSE-SA:2003:039
Date:
SMZLh8yv/QReG9heyGDPyaIyWmdd/YDkytNhNfZBwat+9um3h2C1J5wvy/Fy+8
Brhx2isXTacKTwW7jMc7SKFzNKpZOHq8E9kFnuxx4SnVOzMtzjvKV6H/Olt8qD/m
fesjbYvBUNst7yjuG/SaNLf2rGrfDq7o8NbeVzsyiZVTuFU0MqE7qA==
=/eES
-END PGP SIGNATURE-
Roman Drahtmueller,
SuSE Security.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:wuftpd
Announcement-ID:SuSE-SA:2003:032
Date: Thursday, J
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:sendmail, sendmail-tls
Announcement-ID:SuSE-SA:2003:023
Date:
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:kernel
Announcement-ID:SuSE-SA:2003:021
Date: Tuesday, Ma
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:sendmail, sendmail-tls
Announcement-ID:SuSE-SA:2003:013
Date:
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:openssl
Announcement-ID:SuSE-SA:2003:011
Date: Wednesday,
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:samba
Announcement-ID:SuSE-SA:2002:045
Date: Wednesday, N
How Warmongers Exploit 9/11
by Norm Dixon
In the week before the first anniversary of the devastating September 11, 2001,
terrorist attacks in New York and Washington, TV networks aired a seemingly
never-ending string of ``special events'' featuring ``exclusive'' or ``never before
seen'' foot
>
> Let's see if this makes it through to the list.
>
> I can confirm that at least one post to the list has been deleted
> (mine), so, so much for full disclosure. It was a nice thought while it
> lasted
...not so fast.
There are many reasons why a posting didn't make it to the list.
Len R
20 matches
Mail list logo