[Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread Feher Tamas
http://zdnet.com.com/2100-1105-5229707.html IE flaws used to spread pop-up toolbar by Robert Lemos, CNET News, 09 June 2004 An adware purveyor has apparently used two previously unknown security flaws in Microsoft's Internet Explorer browser to install a toolbar on victims' computers that

[Full-Disclosure] [sb] [ GLSA 200406-05 ] Apache: Buffer overflow in mod_ssl

2004-06-10 Thread Thierry Carrez
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200406-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[Full-Disclosure] [0xbadc0ded #04] smtp.proxy = 1.1.3

2004-06-10 Thread Joel Eriksson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 == 0xbadc0ded Advisory #04 - 2004/06/10 - smtp.proxy = 1.1.3 == Reference

[Full-Disclosure] [SECURITY] [DSA 517-1] New CVS packages fix buffer overflow

2004-06-10 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 517-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze June 10th, 2004

Re: [Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread Georgi Guninski
On Thu, Jun 10, 2004 at 10:14:21AM +0200, Feher Tamas wrote: http://zdnet.com.com/2100-1105-5229707.html the early stages of building the case, Toulouse said. The company is considering creating a patch quickly and releasing it as soon as possible, rather than waiting for its usual

Re: [Full-Disclosure] Possible First Crypto Virus Definitely Disc overed!

2004-06-10 Thread John Sage
On Wed, Jun 09, 2004 at 08:59:19AM -0400, [EMAIL PROTECTED] wrote: From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Possible First Crypto Virus Definitely Disc overed! Date: Wed, 9 Jun 2004 08:59:19 -0400 It is a mind Virus. Can't anyone resist posting to

[Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread [EMAIL PROTECTED]
!-- http://zdnet.com.com/2100-1105-5229707.html http://news.com.com/2100-1002_3-5229707.html IE flaws used to spread pop-up toolbar by Robert Lemos, CNET News, 09 June 2004 The possibility that a group or company has apparently used the vulnerabilities as a way to sneak unwanted advertising

RE: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Aditya, ALD [Aditya Lalit Deshmukh]
I've been in IT for many years and I am now IT Director here at the bank... I would think that I would know what ssl would be. I don't think this worm has anything to do with whatever ssl is. Does anybody even still use ssl? That's probably why the hackers chose it. is this flaim bait ?

RE: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Aditya, ALD [Aditya Lalit Deshmukh]
Steve, Sorry to say but it is not! I checked my incoming traffic again this morning and the attack on port 443 is still coming in full steam ahead! I don't know COULDN'T THIS BE A SSL DENIAL OF SERVICE ATTACK? ssl requires quite a lot of resourses and if u have a web server running

RE: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Felipe Angoitia
dont feed the clown! ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Buffer overflow in apache mod_proxy,yet still apache much better than windows

2004-06-10 Thread Georgi Guninski
Georgi Guninski security advisory #69, 2004 Buffer overflow in apache mod_proxy,yet still apache much better than windows Systems affected: modproxy from apache 1.3.31 and earlier Risk: Unknown - at least a crash, exploitability unknown Date: 10 June 2004 Legal Notice: This Advisory is

RE: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Marek Isalski
I've been in IT for many years and I am now IT Director here at the bank... I would think that I would know what ssl would be. I don't think this worm has anything to do with whatever ssl is. Does anybody even still use ssl? That's probably why the hackers chose it. is this flaim bait ?

Re: [Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread Valdis . Kletnieks
On Thu, 10 Jun 2004 14:38:08 +0300, Georgi Guninski said: On Thu, Jun 10, 2004 at 10:14:21AM +0200, Feher Tamas wrote: http://zdnet.com.com/2100-1105-5229707.html the early stages of building the case, Toulouse said. The company is considering creating a patch quickly and releasing it

RE: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Sean Crawford
Does anyone keep track of the record number of bites in a thread to a Trolling run...this would have to be close to a record... A rather successful fishing trip Bilanowhat's the catch weigh in as??... -- Angoitia -- -- dont feed the clown! -- --

Re: [Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread insecure
Feher Tamas wrote: http://zdnet.com.com/2100-1105-5229707.html Microsoft learned of the issue when a security researcher posted an analysis of the problem to the Full Disclosure security mailing list Monday. The software giant has already contacted the FBI and is in the early stages of

Re: [Full-Disclosure] Buffer overflow in apache mod_proxy,yet still apache much better than windows

2004-06-10 Thread Mark J Cox
We have assigned CAN-2004-0492 to this issue. The flaw affects Apache httpd 1.3.26 to 1.3.31 inclusive that have mod_proxy enabled and configured. Apache httpd 2.0 is unaffected. The security issue is a buffer overflow which can be triggered by getting mod_proxy to connect to a remote server

Re: [Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread José María Mateos
El jueves 10 de junio a las 10:42, insecure escribió: You know, just from that paragraph, it could be read to mean that MS is trying to build a case against person who posted on FD Well, if you they don't want to patch their software and don't want new vulnerabilites to be disclosed,

[Full-Disclosure] RE: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

2004-06-10 Thread Drew Copley
-Original Message- From: Gadi Evron [mailto:[EMAIL PROTECTED] Sent: Monday, June 07, 2004 1:47 PM To: Jelmer Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

Re: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Valdis . Kletnieks
On Fri, 11 Jun 2004 00:35:31 +1000, Sean Crawford [EMAIL PROTECTED] said: Does anyone keep track of the record number of bites in a thread to a Trolling run...this would have to be close to a record... Maybe here in the minor leagues. Wander over to Slashdot or Usenet sometime, where the pros

Re: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Billy B. Bilano
Hi Sean! I have given up on this news group for the time being as everybody was sending me hate mail because of my virus report and calling me nasty names (like troll). LOL! And I can run quite fast, thank you very much! I wound up blocking port 443 inbound and outbound on the firewall to stop

Re: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread James Bliss
On Thursday 10 June 2004 2:06 pm, Billy B. Bilano wrote: Since you can't get rid of a virus like this we are going to get rid of the Windows! The CEO told me to get rid of the virus and get the servers back up at whatever the cost! So now that I have a blank check I am going to do what's

Re: [Full-Disclosure] Buffer overflow in apache mod_proxy,yet still apache much better than windows

2004-06-10 Thread Georgi Guninski
On Thu, Jun 10, 2004 at 04:46:45PM +0100, Mark J Cox wrote: An official patch to correct this issue is available. See: http://marc.theaimsgroup.com/?l=apache-httpd-devm=108687304202140 the apache guys and chix produced an official patch in two calendar days after initial report. m$ seems

Re: [Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread Georgi Guninski
On Thu, Jun 10, 2004 at 10:42:47AM -0500, insecure wrote: You know, just from that paragraph, it could be read to mean that MS is trying to build a case against person who posted on FD i doubt m$ will engage themselves in such a losing (cyber)war. -- georgi

[Full-Disclosure] [ GLSA 200406-06 ] CVS: additional DoS and arbitrary code execution vulnerabilities

2004-06-10 Thread Kurt Lieber
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200406-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread [EMAIL PROTECTED]
Thursday, June 10, 2004 The following was presented by 'bitlance winter' of Japan today: a href=http://www.microsoft.com%2F redir=www.e- gold.comtest/a Quite inexplicable from these quarters. Perhaps someone with server 'knowledge' can examine it. It carries over the address into the

[Full-Disclosure] MDKSA-2004:060 - Updated ksymoops packages fix symlink vulnerability

2004-06-10 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandrakelinux Security Update Advisory ___ Package name: ksymoops Advisory ID:

Re: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Shawn Nunley
Hi Bill! Hey, if you've got a blank check and maybe starting from scratch, here's a few tips to make sure everything goes smoothly! Free advice from expert consultant since 2003! 1) When you buy those Sun computers, make sure they all weigh the same. This is because you have to balance the

[Full-Disclosure] EEYE: RealPlayer embd3260.dll Error Response Heap Overflow

2004-06-10 Thread Derek Soeder
RealPlayer embd3260.dll Error Response Heap Overflow Release Date: June 10, 2004 Date Reported: May 14, 2004 Severity: High (Remote Code Execution) Vendor: RealNetworks Systems Affected: RealOne Player RealOne Player v2 RealPlayer 10 RealPlayer 8 RealPlayer Enterprise Description: eEye

RE: [Fwd: [Full-Disclosure] COELACANTH: Phreak Phishing Expedition]

2004-06-10 Thread Drew Copley
Subject: [Full-Disclosure] COELACANTH: Phreak Phishing Expedition From:[EMAIL PROTECTED] [EMAIL PROTECTED] Date:Thu, June 10, 2004 12:35 pm To: [EMAIL PROTECTED] -- Thursday, June 10, 2004 The

[Full-Disclosure] [ GLSA 200406-07 ] Subversion: Remote heap overflow

2004-06-10 Thread Kurt Lieber
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200406-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Mike Simpson
They brought a cave troll! -- Boromir ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] Notes: COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread [EMAIL PROTECTED]
Let me add some notes to this: 1. Placing microsoft.com in the so-called 'trusted zone', will render the site contents of e-gold.com in the 'trusted zone' 2. Opera fails, Mozilla functions 3. While it may appear to be related to the html form, the same can be achieved with a normal href or

[Full-Disclosure] [sb] RE: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

2004-06-10 Thread Drew Copley
-Original Message- From: Gadi Evron [mailto:[EMAIL PROTECTED] Sent: Monday, June 07, 2004 1:47 PM To: Jelmer Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan)

[Full-Disclosure] RE: COELACANTH: Phreak Phishing Expedition]

2004-06-10 Thread Thor Larholm
You can't replicate this with most other servers because the Host header is set to a non-existant site on most servers. Whenever IIS or Apache receives a request it will first locate the proper site based on the IP adress being used, after which it will lookup based on the Host header. In the

[Full-Disclosure] RE: COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread Thor Larholm
You can't replicate this with most other servers because the Host header is set to a non-existant site on most servers. However, you can use this to gain both Trusted Sites and Intranet Sites privileges from arbitrary websites. Whenever IIS or Apache receives a request it will first locate the

[Full-Disclosure] FOUND: COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread [EMAIL PROTECTED]
From the original discover, 'bitlance winter' one big fat coelacanth: a href=http://www.malware.com%2F redir=www.e-gold.comtest/a i guess that this issue is not e-gold's BUG, IE6 and Opera7.51 is vulnerable. Some server's DNS allow magic number subdomainname. the server allow , www.site.tld

RE: [Full-Disclosure] COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread Larry Seltzer
http://www.malware.com/golly.html I see no pattern at all, but this works on some systems for me and not on others. On some I get to Microsoft, some to e-gold.com. And WTF is it with www.e-gold.com? Nothing else seems to work at all. Larry Seltzer eWEEK.com Security Center Editor

[Full-Disclosure] SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread [EMAIL PROTECTED]
We wrap this up with a full-on ssl site spoof. It seems limited how far you can 'shove' the real domain out of the way, but just enough to make it convincing so we adapt the window to 'cover' it up. Interestingly [with apologies to e-gold for playing with their site], they have a secured

RE: [Full-Disclosure] COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread Scott Phelps
Yeah, it seems to be the host header as Thor Larholm [EMAIL PROTECTED] pointed out. I set up a site hard to an IP with no host header defined, and can redirect this way to it. If you keep trying random sites you will probably find another that works, but who can really afford to set up every

RE: [Full-Disclosure] Possible First Crypto Virus Definitely Discovered!

2004-06-10 Thread Aditya, ALD [Aditya Lalit Deshmukh]
2) Make sure you buy the security option with the servers. The XOR isn't protected if you don't, and that's just basically bad. Security starts at the bottom. that's right way down like the bottom of the some thing nasty like deleted by filter 3) Make sure those servers use 3-phase

RE: [Full-Disclosure] FD info prompts M$ to summon the FBI on spy-vertisers

2004-06-10 Thread Aditya, ALD [Aditya Lalit Deshmukh]
Well, if you they don't want to patch their software and don't want new vulnerabilites to be disclosed, they can always sue the hell out of those who dare to analyze their software. it will simply mean that the posters will start posing anon -aditya

Re: [Full-Disclosure] COELACANTH: Phreak Phishing Expedition

2004-06-10 Thread Andrew Clover
Larry Seltzer [EMAIL PROTECTED] wrote: And WTF is it with www.e-gold.com? Nothing else seems to work at all. e-gold has wildcard DNS, so anything.e-gold.com will work. For other domains the hostname lookup stage may fail. (I guess... I can't actually get the exploit to work for me, but still.)