RE: [Full-Disclosure] anyone seen this worm/trojan before?

2004-06-04 Thread Jim Becher
I have seen a little of this worm/trojan as well... same IP, Unreal v3.2 IRC server. I am leaning to the same conclusion as Josh. Note: I said leaning, not completely convinced. I have seen in the IRC traffic some references to lsass, including what I think might be the command-line to instruct

RE: [Full-Disclosure] Using Xbox live for covert communication

2004-06-04 Thread Wehner, Paul (wehnerpl)
Then why not find a friend in germany and pretend to plan a biological attack? See how un-monitored and private it is then-:) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Thursday, June 03, 2004 12:25 PM To: [EMAIL PROTECTED] Subject: [Full-Disclosure]

[Full-Disclosure] NYC Security Shindig Version 2 (with punch and pie!)

2004-06-04 Thread Dave Aitel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 New York City Security Shindig 2 Security Shindigs are ways for technical people in the Information Security industry to get together, view an informative technical presentation, and otherwise have a good time. Date/Time: Monday June 14th, 6pm

[Full-Disclosure] [SECURITY] [DSA 514-1] New Linux 2.2.20 packages fix local root exploit (sparc)

2004-06-04 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 514-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze June 4th, 2004

[Full-Disclosure] Integrigy Security Alert - Multiple SQL Injection Vulnerabilities in Oracle E-Business Suite

2004-06-04 Thread Integrigy Security
__ Integrigy Security Alert __ Oracle E-Business Suite - Multiple SQL Injection Vulnerabilities June 3, 2004

[Full-Disclosure] Out of Office

2004-06-04 Thread Derek
I am out of office until 10th of June, please be patient with the email correspondence to catch up. derek holzer ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Colin McRae Rally 04 broadcast clients crash

2004-06-04 Thread Luigi Auriemma
### Luigi Auriemma Application: Colin McRae Rally 04 http://www.codemasters.com/colinmcraerally04/ Versions: 1.0 Platforms:Windows Bug: bad allocation (?) Risk:

[Full-Disclosure] another new worm submission

2004-06-04 Thread Perrymon, Josh L.
http://www.detroit-x.com/analysis.htm This is something we found this morning. I have packet captures that I will post. I have attached the infected files found with FPORT and also registry entries. We found this rebooting machines with the LSASS.exe error similar to Sasser. As of 6/4/2004 we

[Full-Disclosure] [ GLSA 200406-01 ] Ethereal: Multiple security problems

2004-06-04 Thread Thierry Carrez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200406-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-Disclosure] bss-based buffer overflow in l2tpd

2004-06-04 Thread Thomas Walpuski
All versions of l2tpd contain a bss-based buffer overflow. After circumventing some minor obstacles (i.e., faking a L2TP tunnel establishment) the overflow can be triggered by sending a specially crafted packet. The crucial code can be found in write_packet() in control.c: static unsigned

Re: [Full-Disclosure] another new worm submission

2004-06-04 Thread insecure
Perrymon, Josh L. wrote: http://www.detroit-x.com/analysis.htm This is something we found this morning. I have packet captures that I will post. I have attached the infected files found with FPORT and also registry entries. We found this rebooting machines with the LSASS.exe error similar to

Re: [Full-Disclosure] another new worm submission

2004-06-04 Thread Paul Schmehl
--On Friday, June 04, 2004 03:55:05 PM -0500 insecure [EMAIL PROTECTED] wrote: McAfee 7.1.0 with DAT 4364 (6/2/04) detects it as BackDoor-CCT. This is not a worm, it's a trojan. Your systems are being remotely compromised, possibly with an auto-rooter targeting the lsass vulnerability, which

[Full-Disclosure] xabot or sdbot or spybot...

2004-06-04 Thread RandallM
--__--__-- Message: 21 Date: Fri, 04 Jun 2004 00:08:23 +0200 From: Axel Pettinger [EMAIL PROTECTED] Organization: API To: Perrymon, Josh L. [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [Full-Disclosure] anyone seen this worm/trojan before? Perrymon, Josh L. wrote: I found this worm/

[Full-Disclosure] [CYSA-0329] Password recovery vulnerability in FoolProof Security 3.9.x for Windows 95/9

2004-06-04 Thread advisories
~~ Cyrillium Security Advisory CYSA-0329 [EMAIL PROTECTED] http://www.cyrillium.com/Cyrillium Security Solutions and Services April 29th, 2004

Re: [Full-Disclosure] another new worm submission

2004-06-04 Thread Jerry Heidtke
Paul Schmehl wrote: --On Friday, June 04, 2004 03:55:05 PM -0500 insecure [EMAIL PROTECTED] wrote: McAfee 7.1.0 with DAT 4364 (6/2/04) detects it as BackDoor-CCT. This is not a worm, it's a trojan. Your systems are being remotely compromised, possibly with an auto-rooter targeting the lsass

[Full-Disclosure] weather.com contact

2004-06-04 Thread fd
Anyone know anyone at weather.com? ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Using Xbox live for covert communication

2004-06-04 Thread Aditya, ALD [Aditya Lalit Deshmukh]
Then why not find a friend in germany and pretend to plan a biological attack? See how un-monitored and private it is then-:) worth a try for securitys sake ? yes! Delivered using the Free Personal Edition of