Re: [Full-disclosure] DefCon 17 CTF packet captures online

2009-09-08 Thread dreyer
What about the promised CTF stats? :)

Cheers,

2009/9/7 Holt Sorenson h...@nosneros.net

 We have just finished the last bits in getting the DefCon
 17 CTF packet captures online. Snag them from:

 http://ddtek.biz/

 3 ur sheep and mom too,
 ddtek

 --
 Holt Sorenson
 h...@nosneros.net
 www.nosneros.net/hso

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
dre...@pandas.es
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Microsoft Internet Information Server ftpd zeroday

2009-09-08 Thread Thierry Zoller
Hi Kingcope,

Thanks to a hint by Petar on the G-SEC blog [1] it  appears
that the  very same bug was present in IIS3 and IIS4 and discovered
by eeye in 1999 :
http://research.eeye.com/html/advisories/published/AD19990124.html

Microsoft  IIS  (Internet  Information Server) FTP service contains a
buffer overflow in the NLST command. This could be used to DoS a remote
machine and in some cases execute code remotely.

Is this the same bug andwas the bug re-introduced ? Has Microsoft
fixed  LS  but  not NLST?  svn mishap ?

Maybe Mudge and/or Dildog can comment - would certainly be interesting
to know whether and if HOW this bug was reintroduced.

[1] http://blog.g-sec.lu/2009/09/iis-5-iis-6-ftp-vulnerability.html

Regards,
Thierry ZOLLER

--
http://blog.zoller.lu



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [scip_Advisory 4021] IBM Lotus Notes 8.5 RSS Widget Privilege Escalation

2009-09-08 Thread Marc Ruef
IBM Lotus Notes 8.5 RSS Widget Privilege Escalation

scip AG Vulnerability ID 4021 (09/08/2009)
http://www.scip.ch/?vuldb.4021

I. INTRODUCTION

Lotus Notes is a client-server, collaborative application developed and
sold by IBM Software Group.

More information is available on the official product web site at the
following URL:

http://www.ibm.com/software/lotus/products/notes/

II. DESCRIPTION

Marc Ruef at scip AG found a design vulnerability in the current Release
8.5.

The product provides some widgets which can be added and enabled by the
user. One of those widgets provide a simple RSS reader.

This reader downloads the RSS file, extracts the items and saves them
locally as HTML files.

The interpretation and display of the RSS items is handled by the
Internet Explorer regarding the applied security zone.

III. EXPLOITATION

No exploitation is required. A malicious RSS feed may contain script
data or embedded objects.

IV. IMPACT

The RSS items are handled like web documents which introduces the
possibility of running script code or to embed multimedia objects (e.g.
Flash or movies).

Because locally saved files run in the Local Zone of the Internet
Explorer some privilege escalation is possible.

V. DETECTION

It may be possible to identify malicious RSS feeds if they contain
script code or embedded objects.

VI. SOLUTION

IBM has been informed immediately. They are able to address this
vulnerability with a hotfix.

VII. VENDOR RESPONSE

The vendor verified the existence of the issue and addressed it as soon
as possible with a hotfix. Unfortunately most of the communication
bypassed us and were forced to ask for the current status several times.
Our last request of the current status at 08/24/2009 were unanswered.

VIII. SOURCES

scip AG - Security Consulting Information Process (german)
http://www.scip.ch/

scip AG - Vulnerability Database (german)
http://www.scip.ch/?vuldb.4021

computec.ch Document Database (german)
http://www.computec.ch/download.php

IX. DISCLOSURE TIMELINE

2009/04/07 Identification of the vulnerability.
2009/04/23 Notification of IBM via the customer.
2009/04/23 Technical knowhow exchange between scip AG/IBM.
2009/06/05 Asking for current status by scip AG. (no answer)
2009/07/09 Asking for current status by scip AG.
2009/07/09 Reply with current status and assigned PMR.
2009/08/24 Asking for current status by scip AG. (no answer)
2009/09/08 Public disclosure of the advisory.

X. CREDITS

The vulnerabilities were discovered by Marc Ruef.

Marc Ruef, scip AG, Zuerich, Switzerland
maru-at-scip.ch
http://www.scip.ch

A1. LEGAL NOTICES

Copyright (c) 2002-2009 scip AG, Switzerland.

Permission is granted for the re-distribution of this alert. It may not
be edited in any way without permission of scip AG.

The information in the advisory is believed to be accurate at the time
of publishing based on currently available information. There are no
warranties with regard to this information. Neither the author nor the
publisher accepts any liability for any direct, indirect or
consequential loss or damage from use of or reliance on this advisory.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome.

2009-09-08 Thread Central Security District of UK [MI7.5]
I just go off the phone with intelligence


MI7 and the CIB (Upgraded from CIA++, super savage secret) have 
relayed to me in code that n3td3v security is coming back stronger 
than ever.


Over in Langley we know that n3td3v has the finest security 
tactics. Super fortified servers.

Ultra mega ram.

He is truly one of the most experienced blackhats in all the land. 
He is a master criminal.


In other news, Gary McKinnon, elite pentagon hacker is an autistic 
rockstar:

http://www.youtube.com/watch?v=XcOY0kWQaqc

He's milking the success of his crime, instead apologizing, he's 
gloating. I guess that teaches people hacking is OK.


My name is shadowdong007. Roger wilco.

- Gary McKinnon, CISSP, MD.

autistic only when I commit crimes, but really me when I'm on TV

this is not n3td3v - laywyer

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] On the subject of security researcher n3td3v, Gary McKinnon Autistic rockstar felon

2009-09-08 Thread Central Security District of UK [MI7.5]
I just go off the phone with intelligence


MI7 and the CIB (Upgraded from CIA++, super sexy savage secret) 
have relayed to me in code that n3td3v security is coming back 
stronger than ever.


Over in Langley we know that n3td3v has the finest security 
tactics. Super fortified servers.

Ultra mega ram.

He is truly one of the most experienced blackhats in all the land. 
He is a master criminal.


In other news, Gary McKinnon, elite pentagon hacker is an autistic 
rockstar:

http://www.youtube.com/watch?v=XcOY0kWQaqc

He's milking the success of his crime, instead apologizing, he's 
gloating. I guess that teaches people hacking is OK.


My name is shadowdong007. Roger wilco.

- Gary McKinnon, CISSP, MD.

autistic only when I commit crimes, but really me when I'm on TV

this is not n3td3v - laywyer

this was intelligence reprrte

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:225 ] qt4

2009-09-08 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:225
 http://www.mandriva.com/security/
 ___

 Package : qt4
 Date: September 8, 2009
 Affected: 2009.0, 2009.1, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in qt4:
 
 src/network/ssl/qsslcertificate.cpp in Nokia Trolltech Qt 4.x
 does not properly handle a '\0' character in a domain name in the
 Subject Alternative Name field of an X.509 certificate, which allows
 man-in-the-middle attackers to spoof arbitrary SSL servers via a
 crafted certificate issued by a legitimate Certification Authority,
 a related issue to CVE-2009-2408 (CVE-2009-2700).
 
 This update provides a solution to this vulnerability.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2700
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 8f0b2b07978ce4e9eb86291935b2259c  
2009.0/i586/libqassistant4-4.5.2-1.6mdv2009.0.i586.rpm
 e2403dcda9f123b545188aef00cb2114  
2009.0/i586/libqt3support4-4.5.2-1.6mdv2009.0.i586.rpm
 51288fb907cc947b3cadd9ab2e33b75b  
2009.0/i586/libqt4-devel-4.5.2-1.6mdv2009.0.i586.rpm
 302a8f93453e5d53d7c8a2df82029ffc  
2009.0/i586/libqtclucene4-4.5.2-1.6mdv2009.0.i586.rpm
 616c5e49341e9a09d0e8ebe84e02e1cc  
2009.0/i586/libqtcore4-4.5.2-1.6mdv2009.0.i586.rpm
 3c83783b3bce0ef1d4272fea4b2b8b63  
2009.0/i586/libqtdbus4-4.5.2-1.6mdv2009.0.i586.rpm
 0a5e1e53937d3e283d7a3d4227850e35  
2009.0/i586/libqtdesigner4-4.5.2-1.6mdv2009.0.i586.rpm
 33ce1ee1c1cde616895ecef85072  
2009.0/i586/libqtgui4-4.5.2-1.6mdv2009.0.i586.rpm
 94e8c96fbc41bb125a1e3104f552f267  
2009.0/i586/libqthelp4-4.5.2-1.6mdv2009.0.i586.rpm
 1370e9cbbdffd1763ac8740fb31505bd  
2009.0/i586/libqtnetwork4-4.5.2-1.6mdv2009.0.i586.rpm
 1699327bbe2cf4bef5c9dedb155c3c36  
2009.0/i586/libqtopengl4-4.5.2-1.6mdv2009.0.i586.rpm
 ca924316c1e18ad29bdf37f392883f1c  
2009.0/i586/libqtscript4-4.5.2-1.6mdv2009.0.i586.rpm
 8fd952c8be0760d7918e6e5693ba32a7  
2009.0/i586/libqtscripttools4-4.5.2-1.6mdv2009.0.i586.rpm
 afc2b34155609ac2f390446f7f5bc45b  
2009.0/i586/libqtsql4-4.5.2-1.6mdv2009.0.i586.rpm
 345e293c4771e249679801aa750397ca  
2009.0/i586/libqtsvg4-4.5.2-1.6mdv2009.0.i586.rpm
 b0e143930f2da815b3fcae1c73a1a70c  
2009.0/i586/libqttest4-4.5.2-1.6mdv2009.0.i586.rpm
 2c7474fd309e67fe682e44576b527e0c  
2009.0/i586/libqtwebkit4-4.5.2-1.6mdv2009.0.i586.rpm
 b19c8107575a0818ecbe19dae9028ef0  
2009.0/i586/libqtxml4-4.5.2-1.6mdv2009.0.i586.rpm
 1540b82f62f29d8e9f46df23e5b7f786  
2009.0/i586/libqtxmlpatterns4-4.5.2-1.6mdv2009.0.i586.rpm
 a243614d06b6aa0aec46b6263bdde420  
2009.0/i586/qt4-accessibility-plugin-4.5.2-1.6mdv2009.0.i586.rpm
 11c894ba3a91e7c2e1ebc0c194c9aaae  
2009.0/i586/qt4-assistant-4.5.2-1.6mdv2009.0.i586.rpm
 40a9530b2ed55545036ee30ce5109069  
2009.0/i586/qt4-common-4.5.2-1.6mdv2009.0.i586.rpm
 28fd5f52ebd0f1b47975aaabc6a69ea1  
2009.0/i586/qt4-database-plugin-mysql-4.5.2-1.6mdv2009.0.i586.rpm
 6e315a67b9e061027b7ec252cfb2085b  
2009.0/i586/qt4-database-plugin-odbc-4.5.2-1.6mdv2009.0.i586.rpm
 80e679cde6b34b8ba063cf0d36b198eb  
2009.0/i586/qt4-database-plugin-pgsql-4.5.2-1.6mdv2009.0.i586.rpm
 b613b53004865d81b54f7c11a403a529  
2009.0/i586/qt4-database-plugin-sqlite-4.5.2-1.6mdv2009.0.i586.rpm
 f97d447b97bfd68d59d0eb28064f7213  
2009.0/i586/qt4-database-plugin-tds-4.5.2-1.6mdv2009.0.i586.rpm
 c9c9e0a3230ba751c7eebeacc44d906d  
2009.0/i586/qt4-designer-4.5.2-1.6mdv2009.0.i586.rpm
 cf2435679fa0066b6ae95a4dad6c0fda  
2009.0/i586/qt4-doc-4.5.2-1.6mdv2009.0.i586.rpm
 933137e640637b6fa7ea5b5a6257a9ca  
2009.0/i586/qt4-examples-4.5.2-1.6mdv2009.0.i586.rpm
 6e080be6a767a58323c845521d8eef9a  
2009.0/i586/qt4-graphicssystems-plugin-4.5.2-1.6mdv2009.0.i586.rpm
 70f84dbe081843b0fa9c4b07b517b7a8  
2009.0/i586/qt4-linguist-4.5.2-1.6mdv2009.0.i586.rpm
 8082bc18d3183654f64c0bba0933de93  
2009.0/i586/qt4-qdoc3-4.5.2-1.6mdv2009.0.i586.rpm
 b77fb9a4915ee16eb07a2c7a82069a7a  
2009.0/i586/qt4-qtconfig-4.5.2-1.6mdv2009.0.i586.rpm
 b2b4fb545fcaf96de26ea8618f507eb9  
2009.0/i586/qt4-qtdbus-4.5.2-1.6mdv2009.0.i586.rpm
 ca7d917f2442e9ff1665b224e834d9e2  
2009.0/i586/qt4-qvfb-4.5.2-1.6mdv2009.0.i586.rpm
 840c3cd230194546f0277fb0314fe31b  
2009.0/i586/qt4-xmlpatterns-4.5.2-1.6mdv2009.0.i586.rpm 
 e7d70d53a8a870ba2b938c754dc58379  2009.0/SRPMS/qt4-4.5.2-1.6mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 f9ceffb25a3dd3e2fff7520eb024b413  
2009.0/x86_64/lib64qassistant4-4.5.2-1.6mdv2009.0.x86_64.rpm
 ff62476ae9bc5124c3b77ccd6b8e4dfb  
2009.0/x86_64/lib64qt3support4-4.5.2-1.6mdv2009.0.x86_64.rpm
 e05a185eae6d1155404ebdca47228298  

[Full-disclosure] [USN-828-1] PAM vulnerability

2009-09-08 Thread Kees Cook
===
Ubuntu Security Notice USN-828-1 September 08, 2009
pam vulnerability
https://launchpad.net/bugs/410171
===

A security issue affects the following Ubuntu releases:

Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
  libpam-runtime  1.0.1-4ubuntu5.6

Ubuntu 9.04:
  libpam-runtime  1.0.1-9ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Russell Senior discovered that the system authentication module
selection mechanism for PAM did not safely handle an empty selection.
If an administrator had specifically removed the default list of modules
or failed to chose a module when operating debconf in a very unlikely
non-default configuration, PAM would allow any authentication attempt,
which could lead to remote attackers gaining access to a system with
arbitrary privileges.  This did not affect default Ubuntu installations.


Updated packages for Ubuntu 8.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/pam/pam_1.0.1-4ubuntu5.6.diff.gz
  Size/MD5:   163787 1fe83c5f51260520402bd43e33267d4f
http://security.ubuntu.com/ubuntu/pool/main/p/pam/pam_1.0.1-4ubuntu5.6.dsc
  Size/MD5: 1632 5962a19a022e6eb7af577b88719a64c4
http://security.ubuntu.com/ubuntu/pool/main/p/pam/pam_1.0.1.orig.tar.gz
  Size/MD5:  1597124 bcaa5d9bf84137e0d128b2ff9b63b1d7

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam-doc_1.0.1-4ubuntu5.6_all.deb
  Size/MD5:   292106 89104df9cea238eb924fa7fbb0f80d35

http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam-runtime_1.0.1-4ubuntu5.6_all.deb
  Size/MD5:89482 94993aae326381ddcd4279ed9c61e357

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam-cracklib_1.0.1-4ubuntu5.6_amd64.deb
  Size/MD5:71576 f46ffb12fc109a58b2ebe9d36fd1173e

http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam-modules_1.0.1-4ubuntu5.6_amd64.deb
  Size/MD5:   312240 ccade228ed92c9f524b088617b42ce64

http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam0g-dev_1.0.1-4ubuntu5.6_amd64.deb
  Size/MD5:   169324 8fce97f395a60b4ad7f821827458e7ab

http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam0g_1.0.1-4ubuntu5.6_amd64.deb
  Size/MD5:   113888 5b6fd51cbc3f936e6e11fdb1a9131a52

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam-cracklib_1.0.1-4ubuntu5.6_i386.deb
  Size/MD5:71552 360601c0c24308561fe7d50a9b9bc5e7

http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam-modules_1.0.1-4ubuntu5.6_i386.deb
  Size/MD5:   299738 020d7196d87df2cdf17c739f9e6bf0f5

http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam0g-dev_1.0.1-4ubuntu5.6_i386.deb
  Size/MD5:   167018 69ed60f901436960e21e0b604ae4b19b

http://security.ubuntu.com/ubuntu/pool/main/p/pam/libpam0g_1.0.1-4ubuntu5.6_i386.deb
  Size/MD5:   32 4afeb993ed5910e108c3fc4f9ba645b5

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/p/pam/libpam-cracklib_1.0.1-4ubuntu5.6_lpia.deb
  Size/MD5:71470 112033e2f1f641fec967e28f3503f88e

http://ports.ubuntu.com/pool/main/p/pam/libpam-modules_1.0.1-4ubuntu5.6_lpia.deb
  Size/MD5:   295984 c8303ffbb776fdce4e20c999150f3549

http://ports.ubuntu.com/pool/main/p/pam/libpam0g-dev_1.0.1-4ubuntu5.6_lpia.deb
  Size/MD5:   165548 a8502044f6c5fac5900559d0e85fc62f
http://ports.ubuntu.com/pool/main/p/pam/libpam0g_1.0.1-4ubuntu5.6_lpia.deb
  Size/MD5:   110474 86c7473158e190237969445a51c49d30

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://ports.ubuntu.com/pool/main/p/pam/libpam-cracklib_1.0.1-4ubuntu5.6_powerpc.deb
  Size/MD5:72010 da7ce309e25fade724ff291120d1866d

http://ports.ubuntu.com/pool/main/p/pam/libpam-modules_1.0.1-4ubuntu5.6_powerpc.deb
  Size/MD5:   329746 19febf8a9d5e3a62c0957dff09dfc8c8

http://ports.ubuntu.com/pool/main/p/pam/libpam0g-dev_1.0.1-4ubuntu5.6_powerpc.deb
  Size/MD5:   167526 40420891673085c3889ebba39b1a92b7

http://ports.ubuntu.com/pool/main/p/pam/libpam0g_1.0.1-4ubuntu5.6_powerpc.deb
  Size/MD5:   114658 06a1523fa01a77ec8eb2f8eec8e7b4bf

  sparc architecture (Sun SPARC/UltraSPARC):


http://ports.ubuntu.com/pool/main/p/pam/libpam-cracklib_1.0.1-4ubuntu5.6_sparc.deb
  Size/MD5:71854 3762836827676a721f744c06067a9ed5

http://ports.ubuntu.com/pool/main/p/pam/libpam-modules_1.0.1-4ubuntu5.6_sparc.deb
  Size/MD5:   307930 5afecfdbe6783dead53c8163987c053e


[Full-disclosure] Web-monitoring software gathers data on kid chats

2009-09-08 Thread Ivan .
Parents who install a leading brand of software to monitor their kids'
online activities may be unwittingly allowing the company to read
their children's chat messages — and sell the marketing data gathered.

Software sold under the Sentry and FamilySafe brands can read private
chats conducted through Yahoo, MSN, AOL and other services, and send
back data on what kids are saying about such things as movies, music
or video games. The information is then offered to businesses seeking
ways to tailor their marketing messages to kids.

http://www.google.com/hostednews/ap/article/ALeqM5i5CjgMEdrwRm3JxeglUykMAHAYmAD9AGNVM00

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Web-monitoring software gathers data on kid chats

2009-09-08 Thread dramacrat
hahahaha oh man, that's grand.

2009/9/9 Ivan . ivan...@gmail.com

 Parents who install a leading brand of software to monitor their kids'
 online activities may be unwittingly allowing the company to read
 their children's chat messages — and sell the marketing data gathered.

 Software sold under the Sentry and FamilySafe brands can read private
 chats conducted through Yahoo, MSN, AOL and other services, and send
 back data on what kids are saying about such things as movies, music
 or video games. The information is then offered to businesses seeking
 ways to tailor their marketing messages to kids.


 http://www.google.com/hostednews/ap/article/ALeqM5i5CjgMEdrwRm3JxeglUykMAHAYmAD9AGNVM00

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Web-monitoring software gathers data on kid chats

2009-09-08 Thread Rohit Patnaik
Yeah, I saw that on Slashdot the other day, and I thought it was pretty 
hilarious. Ironic isn't it, that the very company one hires to protect 
their kids from exploitation is the one that is exploiting the kids?

--Rohit Patnaik
dramacrat wrote:
 hahahaha oh man, that's grand.

 2009/9/9 Ivan . ivan...@gmail.com mailto:ivan...@gmail.com

 Parents who install a leading brand of software to monitor their kids'
 online activities may be unwittingly allowing the company to read
 their children's chat messages — and sell the marketing data gathered.

 Software sold under the Sentry and FamilySafe brands can read private
 chats conducted through Yahoo, MSN, AOL and other services, and send
 back data on what kids are saying about such things as movies, music
 or video games. The information is then offered to businesses seeking
 ways to tailor their marketing messages to kids.

 
 http://www.google.com/hostednews/ap/article/ALeqM5i5CjgMEdrwRm3JxeglUykMAHAYmAD9AGNVM00

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Web-monitoring software gathers data on kid chats

2009-09-08 Thread Rafal M. Los
This is either (a) slipped into the EULA or (b) illegal.  If (a) then it's 
another case of people just not reading the EULA, and while I know these 
things are complicated when it comes to something as critical as your 
children... READ THE EULA.  If it's (b) then someone's going to jail, 
because there are enough child-protection statutes and laws on the books to 
make someone's life miserable in the federal pen.

Now I'm going to go read the EULA on them :)

__
Rafal M. Los
Security  IT Risk Strategist

 - Blog:http://preachsecurity.blogspot.com
 - LinkedIn:http://www.linkedin.com/in/rmlos
 - Twitter: http://twitter.com/RafalLos

--
From: Ivan . ivan...@gmail.com
Sent: Tuesday, September 08, 2009 7:47 PM
To: full-disclosure full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Web-monitoring software gathers data on kid chats

Parents who install a leading brand of software to monitor their kids'
online activities may be unwittingly allowing the company to read
their children's chat messages — and sell the marketing data gathered.

Software sold under the Sentry and FamilySafe brands can read private
chats conducted through Yahoo, MSN, AOL and other services, and send
back data on what kids are saying about such things as movies, music
or video games. The information is then offered to businesses seeking
ways to tailor their marketing messages to kids.

http://www.google.com/hostednews/ap/article/ALeqM5i5CjgMEdrwRm3JxeglUykMAHAYmAD9AGNVM00

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] 4f: The File Format Fuzzing Framework

2009-09-08 Thread Krakow Labs
Krakow Labs Development

4f: The File Format Fuzzing Framework

4f is a file format fuzzing framework. 4f uses modules which are
specifications of the targeted binary or text file format that tell it
how to fuzz the target application.

If 4f detects a crash, it will log crucial information important for
allowing the 4f user to reproduce the problem and also debugging
information important to deciding the severity of the bug and its
exploitability.

4f uses specialized modules for fuzzing code that interprets file
formats. Several modules are included and more can be written to follow
other file formats.

Full source code, binary, package, demonstration photo and video @
http://www.krakowlabs.com

You can also check out the video that shows 4f discovering 0day (not
worth much but it shows 4f works!) @ SecurityTube too --
http://www.securitytube.net/The-File-Format-Fuzzing-Framework-(4f)-video.aspx

~KL

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/