Re: iDefense Security Advisory 07.11.07: Apple QuickTime SMIL File Processing Integer Overflow Vulnerability

2007-07-17 Thread Dan Harkless
that merely visiting a malicious web page won't be enough to expose onself to arbitrary code execution, or uninstall QuickTime and use some third-party player that has partial QuickTime support, like VLC (http://www.videolan.org/vlc/) or MPlayer (http://www.mplayerhq.hu/). -- Dan Harkless http

CALEA electonic wiretapping on unsecured Solaris boxes

2003-07-15 Thread Dan Harkless
companies, spies, and gangsters have hacked CALEA for fun and profit, as have the Russians and probably others, too. The full column is at: http://www.pbs.org/cringely/pulpit/pulpit20030710.html -- Dan Harkless [EMAIL PROTECTED] http://harkless.org/dan/

Re: Bypassing ZoneAlarm (limited)

2003-07-07 Thread Dan Harkless
XP boxes is), there are other ways an attacker could gain control of your machine. Particularly if you're running only ZoneAlarm rather than ZoneAlarm Plus or Pro, since it doesn't notice DLLs getting changed. -- Dan Harkless [EMAIL PROTECTED] http://harkless.org/dan/

Re: sendmail 8.12.9 available

2003-03-29 Thread Dan Harkless
from untrusted sources, which includes DNS. Since this was publically disclosed before a patch was available, I'm sure a lot of people would be interested in knowing whether attempts to exploit this are detectable in the syslog in sendmail's default configuration. -- Dan Harkless

Re: Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be forged

2003-03-27 Thread Dan Harkless
/installing plugins automatically, or, to exploit this would you need to entice a user to manually place your .api file in their plug_ins directory (or run an installer program that would do so, in which case you could run arbitrary code anyway in the installer)? -- Dan Harkless [EMAIL PROTECTED] http

Re: Obfuscating sensitive data? (was: response to tax software not encrypting tax info)

2003-03-14 Thread Dan Harkless
desired just in case a true attacker _is_ out there, but obfuscation will certainly protect against that 99.x% of the population that _could_ download your tax return if they wanted to, but won't (or won't figure out how to get the obfuscated info out of it if they do). -- Dan Harkless [EMAIL

Re: Invisible file extensions on Windows

2001-04-04 Thread Dan Harkless
Nick FitzGerald [EMAIL PROTECTED] writes: Dan Harkless [EMAIL PROTECTED] wrote: Just to clarify, this is only true when using Windows Explorer. Are you sure? My understanding when this last came up a year ago was that email programs (at least the Outlook variants) also obeyed

Re: Invisible file extensions on Windows

2001-03-31 Thread Dan Harkless
veyou.txt.vbs" email worm). Personally I don't feel safe on a new Windows box until I turn off "Hide file extensions for known file types" and then use regedit.exe to find all instances of "NeverShowExt" and rename them to "disabled_NeverShowExt". -------

Re: Microsoft Security Bulletin MS01-019

2001-03-31 Thread Dan Harkless
). They should have just said something like "The password at issue here is distinct from the user's network logon password." ------ Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECT

Re: SurfControl Bypass Vulnerability

2001-03-25 Thread Dan Harkless
st:" header, so multiple distinct servers can be on a single IP. If you restrict based on IP, you'll block access to both http://www.juicysex.com/ and http://www.bible-history.org/, should they both be on the same box. -------

FORW: Re: [ANNOUNCE] Apache 1.3.19 Released

2001-03-13 Thread Dan Harkless
:04PM -0800, Dan Harkless wrote: What versions of Apache are susceptible to that "very long path" directory listing disclosure bug? All previous versions, or...? Yes, unfortunately. This bug probably was already in 1.2.x. Martin - -- [EMAIL PROTECTED] | Fujitsu Siemens F

Re: Microsoft opening its source to selected parties

2001-03-12 Thread Dan Harkless
to the source. If they're already this liberal with the source they ought to just open it to the world. Some bad guys clearly already have access, so you might as well give access to _all_ the good guys. -- Dan Harkless

Microsoft opening its source to selected parties

2001-03-09 Thread Dan Harkless
n the code. ------ Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECTED] | do not mention this private email SpeedGate Communications, Inc. | address in Usenet posts. Thank you.

Re: Loopback and multi-homed routing flaw in TCP/IP stack.

2001-03-06 Thread Dan Harkless
? -- Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECTED] | do not mention this private email SpeedGate Communications, Inc. | address in Usenet posts. Thank you.

Re: [CORE SDI ADVISORY] SSH1 session key recovery vulnerability

2001-02-08 Thread Dan Harkless
key to be generated for each connection if your machine isn't blazing fast, but a side effect is that this attack is prevented. -- Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECTED] | do

Re: SuSe / Debian man package format string vulnerability

2001-02-05 Thread Dan Harkless
years ago. Thus the setuid man solution. Now, one could certainly argue that with today's processor and disk speeds, caching nroff results is no longer a significant savings. ------ Dan Harkless | To prevent SPAM con

Re: [SPSadvisory#41]Apple Quick Time Plug-in Buffer Overflow

2001-02-01 Thread Dan Harkless
rosoft/QuickTime-4.1.2/Sample.mov", but again, no crash. ---------- Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECTED] | do not mention this private email SpeedGate Communications, Inc. | address in Usenet posts. Thank you.

Re: Solaris /usr/bin/cu Vulnerability

2001-01-30 Thread Dan Harkless
nspecified (but presumably different) security problem in cu and uustat. ------ Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECTED] | do not mention this private email SpeedGate Communications, Inc. | address

FORW: Re: Bug in SSH1 secure-RPC support can expose users' private keys

2001-01-18 Thread Dan Harkless
. Below is the response. --- Forwarded Message Message-ID: [EMAIL PROTECTED] Date: Wed, 17 Jan 2001 14:40:49 -0800 From: Stephanie Thomas [EMAIL PROTECTED] Organization: SSH Communications Security Inc. To: Dan Harkless [EMAIL PROTECTED] Subject: Re: Bug in SSH1 secure-RPC support can expose

Re: analysis of auditable port scanning techniques

2001-01-15 Thread Dan Harkless
Dan Harkless [EMAIL PROTECTED] writes: Rainer Weikusat [EMAIL PROTECTED] writes: Dan Harkless [EMAIL PROTECTED] writes: Using this grammar applied to the data we send to an arbitrary host piped to the ident/auth port will reveal the process owner running on a given port, even

Re: analysis of auditable port scanning techniques

2001-01-08 Thread Dan Harkless
Rainer Weikusat [EMAIL PROTECTED] writes: Dan Harkless [EMAIL PROTECTED] writes: Using this grammar applied to the data we send to an arbitrary host piped to the ident/auth port will reveal the process owner running on a given port, even though we initiated the connection. Uh

Re: RUS-CERT Advisory 200004-01: GNU Emacs 20

2000-04-19 Thread Dan Harkless
ties apply to equally to GNU Emacs and XEmacs. ------ Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECTED] | do not mention this private email SpeedGate Communications, Inc. | address in Usenet posts. Thank you.

nmh-1.0.4 released

2000-04-16 Thread Dan Harkless
hshow-charset-iso-8859-1 line does not work with quotes around %s. A detailed description of the changes between 1.0.3 and 1.0.4 is available from: http://www.mhost.com/cgi-bin/cvsweb/nmh/ChangeLog?r1=1.40r2=1.71 For more information on nmh, please visit: http://www.mhost.com/nmh/ Thanks

MH also vulnerable to remote attack (was Re: nmh security update)

2000-03-03 Thread Dan Harkless
(at least those using latter-day versions with MIME capability) are also strongly encouraged to upgrade to nmh 1.0.3. -- Dan Harkless | To prevent SPAM contamination, please [EMAIL PROTECTED] | do not mention