Re: [Full-Disclosure] Registry Watcher

2004-05-09 Thread Robert Kok
On Sat, 8 May 2004 18:00:57 -0500 RandallM [EMAIL PROTECTED] wrote: Any programs out there that watches changes to registry and can give an alert? Registry Prot and Autostart Viewer from DiamondCS Freeware http://www.diamondcs.com.au/index.php?page=products RegRun 3 Security Suite

Re: [Full-Disclosure] Registry Watcher

2004-05-09 Thread Steve Menard
Aditya, ALD [Aditya Lalit Deshmukh] wrote: the common installation inserts and all programs have values that must be inserted. If a watcher would have a data base to follow and any odd or uncommon entries could be flagged. As far as I know all newly found viruses insert registry entries and these

RE: [Full-Disclosure] Registry Watcher

2004-05-09 Thread Alan Melia \(Melmac\)
Greetings, Personally if you are running with least privilege then simply make the registry read-only ACL's can be applied to the registry too you know. I've worked with a couple of companies where we have made everything but the necessary HKCU keys read-only. This stops rogue installs and even

[Full-Disclosure] Icecast 2.0.0 preauth overflow

2004-05-09 Thread ned
There exists a remotely exploitable heap overflow in Icecast 2.0.0. The bug exists in the handling of base64 Authorization request. This bug was found in about 40 seconds during a HTTP audit of the web component of Icecast with the fuzzer SMUDGE (http://felinemenace.org/~nd/SMUDGE/) People

Re: [Full-Disclosure] Victory day - Sasser surrenders

2004-05-09 Thread Lan Guy
Microsoft Reward Program Helps Lead to Information Resulting in Arrest Related to Sasser Internet Worm http://www.microsoft.com/presspass/press/2004/may04/05-08SasserTelePR.asp - Original Message - From: Aditya, ALD [Aditya Lalit Deshmukh] [EMAIL PROTECTED] To: Poof [EMAIL

RE: [Full-Disclosure] Victory day - Sasser surrenders

2004-05-09 Thread Jelmer
-2 doublepost -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Geoff Shively Sent: zaterdag 8 mei 2004 20:28 To: Feher Tamas; [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Victory day - Sasser surrenders HANOVER, Germany (Reuters) - A tip from

[Full-Disclosure] List Charter

2004-05-09 Thread John Cartwright
[Full-Disclosure] Mailing List Charter John Cartwright [EMAIL PROTECTED] and Len Rose [EMAIL PROTECTED] Introduction Purpose -- This document serves as a charter for the [Full-Disclosure] mailing list hosted at lists.netsys.com. The list was created on 9th July 2002 by

[Full-Disclosure] [ GLSA 200405-01 ] Multiple format string vulnerabilities in neon 0.24.4 and earlier

2004-05-09 Thread Kurt Lieber
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200405-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] [ GLSA 200405-02 ] Multiple vulnerabilities in LHa

2004-05-09 Thread Thierry Carrez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200405-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: [Full-Disclosure] Registry Watcher

2004-05-09 Thread James Riden
RandallM [EMAIL PROTECTED] writes: Hi, Any programs out there that watches changes to registry and can give an alert? RegMon from sysinternals.com. There are a whole load of useful Windows tools at that site. cheers, Jamie -- James Riden / [EMAIL PROTECTED] / Systems Security Engineer

[Full-Disclosure] Policy measurement and compliance tools

2004-05-09 Thread n30
Fellows Looking for tools that measure security policy in an organizations The only one I know is symentec enterprise security manager (ESM) Any others?? Thanks in advance!! -n ___ Full-Disclosure - We believe in it. Charter:

[Full-Disclosure] Monit 4.1 remote shell exploit (HTTP)

2004-05-09 Thread Michel Blomgren
Here's an oldie for a simple buffer overflow vuln. Read more here: http://www.securityfocus.com/bid/9099/discussion/ If I've been correctly informed, the public exploit out there only DoSes (I haven't tested it, so I really can't say). Anyway, this one's an over-hacked reverse shellcode

[Full-Disclosure] PaX DoS proof-of-concept

2004-05-09 Thread Michel Blomgren
/* PaX w/ CONFIG_PAX_RANDMMAP for Linux 2.6.x DoS proof-of-concept by Shadowinteger [EMAIL PROTECTED] 2004-05-04 Written after reading the security advisory posted by borg (ChrisR-) on Bugtraq 2004-05-03 (my time). ChrisR - www.cr-secure.net Acknowledgments: sabu (www.sabu.net)

[Full-Disclosure] OUTLOOK 2003: OuchLook

2004-05-09 Thread [EMAIL PROTECTED]
Sunday, May 09, 2004 Outlook 2003 the premier mail client from the company called 'Microsoft' certainly appears to have a lot of security features built into it. Curosry examination shows excellent thought into 'spam' containment, 'security' consideration and many other little 'things'.

[Full-Disclosure] CSA-200402-1: Previous Open Webmail vulnerability is exploitable

2004-05-09 Thread Michel Blomgren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cycom AB Security Advisory CSA-200402-1 www.cycom.se Advisory: Previous Open Webmail vulnerability is exploitable Date: Sat Feb 21 15:18:21 CET 2004, updated: Thu May 6

Re: [Full-Disclosure] KDE was hacked

2004-05-09 Thread Richard Johnson
If you had been subscribed to our iAlert services, you would have known about this specific hacker threat months in advance, and known that only the binary releases of KDE are safe to use. As an agent of an commercial intelligence agency, I cannot stress how important it is for all commercial

[Full-Disclosure] Windows IPS personal use

2004-05-09 Thread n30
Guys, Looking for a intrusion prevention system for personal use on my win xp box Thanks in advance -Kartik ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] KDE was hacked

2004-05-09 Thread Jason Coombs
Aloha, Richard. I'm comfortable with I told you so. and have used it at times myself. There may be something wrong with I could have told you so, if you had paid me. Secrets for dollars will always exist, but shouldn't we just do it and shut up about it rather than try to make it seem like a

Re: [Full-Disclosure] KDE was hacked

2004-05-09 Thread Kurt Seifried
Please note that this is yet another troll: Received: from securityfocus.bugtraq.org ([199.173.12.66]) by netsys.com (8.11.6p2-2003-09-16/8.11.6) with SMTP id i4A0od422402 for [EMAIL PROTECTED]; Sun, 9 May 2004 20:50:46 -0400 (EDT) A hint: email from iDEFENSE employees typically comes from

RE: [Full-Disclosure] Victory day - Sasser surrenders

2004-05-09 Thread Aditya, ALD [Aditya Lalit Deshmukh]
You're kidding there, right? no the person who made the statement below actually oversaw all the details of the transfer! . ~ And a few months ago, a large amount of money was transfered to his account from a couple of popular antivirus vendors :)

[Full-Disclosure] Administrivreality: Please register email addresses

2004-05-09 Thread Len Rose
I'd like to ask everyone who continues to post without registering or posting from an unregistered addresses to please register. You are causing needless work for John and I and you are introducing delays in your messages obviously since we have to manually approve the message. We are forced