Re: [SPAM] Re: [Full-Disclosure] Full-Disclosure Posts

2004-10-18 Thread Hugo van der Kooij
On Sun, 17 Oct 2004, [EMAIL PROTECTED] wrote: On Sat, 16 Oct 2004 19:13:18 -0700, Etaoin Shrdlu [EMAIL PROTECTED] wrote: Of course, anyone still using the term hax0r as though it were meaningful might want to think further about what a security professional might be A security

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread Ron DuFresne
Frank, Question back at you sir; Does OS fingerprinting rely soley upon ICMP leakage? I'd thought I saw a number of papers that related to OS detection from the incentricities of TCP/IP stacks of the various OS', like papers by Fydor, documented in phrack, etc. Thanks, Ron DuFresne On

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread Cedric Blancher
Le lun 18/10/2004 à 00:35, James Edwards a écrit : That is great till you want to run a server behind that firewall. I don't see the reason why it would cause a problem, as firewall is able to spot ICMP related to server's IP connections as well... The bigger picture, to me, is you gain little

Re: [Full-Disclosure] Full-Disclosure Posts

2004-10-18 Thread xploitable
On Mon, 18 Oct 2004 01:09:09 +0200, yossarian [EMAIL PROTECTED] wrote: But Dear Backyard - have you applied for a job at yahoo as a security pro? Apparantly you know what they should know and you are willing to tell them If not - give it a try. No sorry, i'm one of these underground nerd /

[Full-Disclosure] [SECURITY] [DSA 569-1] New netkit-telnet-ssl packages fix denial of service

2004-10-18 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 569-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze October 18th, 2004

Re: [SPAM] Re: [Full-Disclosure] Full-Disclosure Posts

2004-10-18 Thread xploitable
On Mon, 18 Oct 2004 07:23:56 +0200 (CEST), Hugo van der Kooij [EMAIL PROTECTED] wrote: Companies do not care about security. The CEO only works with numbers. If bad security losses 100k per month but tightening things up loses 105k per month on productivity they take the 5k per month profit

[Full-Disclosure] libkmp in Cisco vpn and Oracle pki ?

2004-10-18 Thread BoneMachine
In August, ISS reported a vulnerability in the Entrust LibKmp ISAKMP library. http://xforce.iss.net/xforce/alerts/id/181 SANS reports the 30th of August that Cisco and Oracle may also be vulnerable to this flaw. http://www.sans.org/newsletters/risk/vol3_34.php Now, I don't know about you but I

[Full-Disclosure] Patch Integration Engine (PIE) alpha release

2004-10-18 Thread Ben Hawkes
The Patch Integration Engine (PIE) is a system for the insertion of patches into a runtime process, allowing for the immediate correction of security vulnerabilities. This is an announcement of the public alpha release of PIE, version 0.2, which currently supports i386 Linux. PIE was created from

[Full-Disclosure] Re: Any update on SSH brute force attempts?

2004-10-18 Thread Dave Ewart
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Friday, 15.10.2004 at 17:53 -0400, Jay Libove wrote: What are you doing/changing about your SSH configurations to reduce the possibility of these attacks finding any kind of hole in the OpenSSH software (that's what I run, so that's the only

Re: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread Harry de Grote
Op Sunday 17 October 2004 16:17, Adam Jones sgreifde: The majority of the list had nothing more than alias $name $email Only small parts had any more specific contact information. The emails and you based that on absolutely nothing at all?: [EMAIL PROTECTED] nasanames]$ for i in *; do echo

[Full-Disclosure] [SECURITY] [DSA 556-2] New netkit-telnet packages really fix denial of service

2004-10-18 Thread debian-security-announce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 556-2 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze X 8th, 2004

Re: [Full-Disclosure] Microsoft Windows Huge Text Processing Instability

2004-10-18 Thread James Tucker
I am sorry, maybe I just don't get it, but the two forms you are talking about could not happen in the scenario described. Besides this fact, user data space still has to be violated and this still requires either privileges (which means you have access anyway) or requires an exploit to elevate

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread Barrie Dempster
On Sun, 2004-10-17 at 16:35 -0600, James Edwards wrote: That is great till you want to run a server behind that firewall. snip If the server is behind the firewall the firewall will be aware of the connection passing through and will therefore regard the packets as legitimate. I agree with

[Full-Disclosure] cPanel symlink chmod issue

2004-10-18 Thread Karol Wisek
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Name: cPanel Vendor URL: http://www.cpanel.net Author: Karol Wisek [EMAIL PROTECTED] Date: September 30, 2004 Issue: cPanel allows logged in users to change permission of any file to 755.

[Full-Disclosure] [FLSA-2004:1804] Updated kernel resolves security vulnerabilities

2004-10-18 Thread Dominic Hargreaves
--- Fedora Legacy Update Advisory Synopsis: Updated kernel resolves security vulnerabilities Advisory ID: FLSA:1804 Issue date:2004-10-18 Product: Red Hat Linux Keywords:

[Full-Disclosure] 3COM 3crwe754g72-a Information Disclosure, Logs manipulation ...

2004-10-18 Thread Cyrille Barthelemy
Title: 3com 3crwe754g72-a Information Disclosure Class: Design Error Affects: 3com 3crwe754g72-a v 1.11 v 1.13 v 1.24 Id: cbsa- Release Date: 2004 10 18 Author : Cyrille Barthelemy [EMAIL PROTECTED] -- 1. Introduction -- 3Com 3crwe754g72-a is a bundle

[Full-Disclosure] cPanel hardlink backup issue

2004-10-18 Thread Karol Wisek
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Name: cPanel Vendor URL: http://www.cpanel.net Author: Karol Wisek [EMAIL PROTECTED] Date: July 19, 2004 Issue: cPanel backup feature allows logged in users to read any file, including

Re: [Full-Disclosure] Re: Any update on SSH brute force attempts?

2004-10-18 Thread Ron DuFresne
On Mon, 18 Oct 2004, Dave Ewart wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Friday, 15.10.2004 at 17:53 -0400, Jay Libove wrote: What are you doing/changing about your SSH configurations to reduce the possibility of these attacks finding any kind of hole in the OpenSSH

[Full-Disclosure] [ GLSA 200410-14 ] phpMyAdmin: Vulnerability in MIME-based transformation system

2004-10-18 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

RE: [Full-Disclosure] Full-Disclosure Posts

2004-10-18 Thread Todd Towles
Well, I didn't take offense...alot of compaines are very lazy with security...just wanted to throw in my 2 cents. Just look at all the pen-testing compaines..that throw you a nessus report with a logo on top of it. They have never tested the reported hole with another method or even tried any

[Full-Disclosure] cPanel hardlink chown issue

2004-10-18 Thread Karol Wisek
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Name: cPanel Vendor URL: http://www.cpanel.net Author: Karol Wisek [EMAIL PROTECTED] Date: July 31, 2004 Issue: cPanel allows logged in users to change ownership of any file to their

Re: [Full-Disclosure] Re: Any update on SSH brute force attempts?

2004-10-18 Thread Barrie Dempster
On Mon, 2004-10-18 at 06:41 -0500, Ron DuFresne wrote: Why not just disallow root logins directly, and force someone with a valid user account to su after getting a shell? It was my impression that was more standard, and if one has to allow remote root directly, at least restrict it to

[Full-Disclosure] Mutiple AntiVirus Reserved Device Name Handling Vulnerability

2004-10-18 Thread Sowhat .
Mutiple AntiVirus Reserved Device Name Handling Vulnerability Author:Sowhat Date:October,9th,2004 http://secway.org/Advisory/Ad20041009.txt Vendor: AntiVir www.hbedv.com Twister www.filseclab.com Protector plus 2000 www.pspl.com Overview: As many popular AV's Reserved Device Name Handling

RE: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-18 Thread joe
I think Mr. Hensing was trying to tell people how to be more secure with what they currently have. While I agree that added length doesn't necessarily make a password theoretically stronger, a passphrase will tend to be longer than 14 characters and push you past the storage of the lm hash which

[Full-Disclosure] 3COM 3crwe754g72-a Administration interface code injection (DHCP)

2004-10-18 Thread Cyrille Barthelemy
Title: 3COM 3crwe754g72-a Administration interface code injection Class: Design error Affects: 3com 3crwe754g72-a v 1.11 v 1.13 v 1.24 Id: cbsa-0001 Release Date: 2004-10-18 Author : Cyrille Barthelemy [EMAIL PROTECTED] -- 1. Introduction -- 3Com 3crwe754g72-a

[Full-Disclosure] Re: Re: Any update on SSH brute force attempts?

2004-10-18 Thread Dave Ewart
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Monday, 18.10.2004 at 06:41 -0500, Ron DuFresne wrote: What are you doing/changing about your SSH configurations to reduce the possibility of these attacks finding any kind of hole in the OpenSSH software (that's what I run, so that's the

[Full-Disclosure] Multiple vulnerabilities in Sage Saleslogix

2004-10-18 Thread Carl
Agenda Security Services Security Vulnerability Advisory

RE: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread Sean Crawford
After looking through some of the dirs on this ftp site I'm wondering what use it is at all. Just about everything I could look at hailed from 1996 or earlier. Either way I'll bet the logs on that server would make an interesting read for someone now. Sean. --- --- Harry de Grote wrote: --- ---

Re: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread Barry Fitzgerald
Harry de Grote wrote: i have to admit... it's pretty old and useless, but i think this may be a nice place for spammers to try out some new adresses... This is *NOT* the major issue that everyone is blowing it out to be. Lists like this are available on many organization/company websites.

Re: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread KF_lists
Forget about the spammers, how about social engineers. This is quite the gold mine for that. Hi this is Joe Schmoe from building 69 I need to have my password reset. -KF i have to admit... it's pretty old and useless, but i think this may be a nice place for spammers to try out some new

Re: [Full-Disclosure] Re: Any update on SSH brute force attempts?

2004-10-18 Thread Raj Mathur
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Barrie == Barrie Dempster [EMAIL PROTECTED] writes: Barrie On Mon, 2004-10-18 at 06:41 -0500, Ron DuFresne wrote: Why not just disallow root logins directly, and force someone with a valid user account to su after getting a shell? It

Re: [Full-Disclosure] Re: Re: Any update on SSH brute force attempts?

2004-10-18 Thread Barrie Dempster
On Mon, 2004-10-18 at 14:01 +0100, Dave Ewart wrote: Well yes, that's fair enough - however, allowing direct root access does make certain things more straightforward, automated use of 'scp' etc. Yeh, but theres only a select few people crazy enough to scp files into places that require root

[Full-Disclosure] RE: [Full-Disclosure]Open the doors to hell hire a hicker Full-Disclosure Posts

2004-10-18 Thread Clairmont, Jan M
Oh yeah and we can trust you bozos not to put in backdoors, sploits and other great modes of entry yeah right. 8-, Hire the burgler to secure your home, yeah right? Doh! Sheessh what a stupid idea? The whole point of hiring people who don't know much is that they follow a policy procedure and

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread Cedric Blancher
Le lun 18/10/2004 à 17:12, james edwards a écrit : I don't see the reason why it would cause a problem, as firewall is able to spot ICMP related to server's IP connections as well... New connections to the server must be implecitally allowed, as there is no established state to refer to. I

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread james edwards
Le lun 18/10/2004 à 00:35, James Edwards a écrit : That is great till you want to run a server behind that firewall. I don't see the reason why it would cause a problem, as firewall is able to spot ICMP related to server's IP connections as well... New connections to the server must be

[Full-Disclosure] iDEFENSE Security Advisory 10.18.04: Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability

2004-10-18 Thread idlabs-advisories
Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability iDEFENSE Security Advisory 10.18.04 www.idefense.com/application/poi/display?id=153type=vulnerabilities October 18, 2004 I. BACKGROUND This vulnerability affects multiple anti-virus vendors including McAfee, Computer

[Full-Disclosure] Full-disclosure newsgroup?

2004-10-18 Thread Mark Young
Hi, I was wondering whether there's a newsgroup version of the mails sent to this group? Cheers, Mark

RE: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread Todd Towles
Exactly as I stated eariler...this is just information leakage...old as it might be, it helps...the people on the list are just doing their jobs...getting paid and giving information to a employee that knows their name (and is higher in the company) seems harmless. Spam isn't the issue with this

Re: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread Eric Paynter
On Thursday, October 14, 2004 3:13 PM, Deigo Dude wrote: ftp://ftp.hq.nasa.gov/pub/nickname/ The list contains the full name, email, phone, fax, position, building, room, and employer. When will they learn. OMG OMG OMG!! I just opened up the phone book and it lists the names, addresses,

Re: [Full-Disclosure] ICMP (was: daily internet traffic report)

2004-10-18 Thread Frank de Wit
please don't call me sir, that makes me old ;-) the answer is 'no' do I win a price now? Ron DuFresne wrote: Frank, Question back at you sir; Does OS fingerprinting rely soley upon ICMP leakage? I'd thought I saw a number of papers that related to OS detection from the incentricities of TCP/IP

Re: [Full-Disclosure] Senior M$ member says stop using passwords completely!

2004-10-18 Thread Eric Paynter
On Sat, October 16, 2004 5:25 pm, Tim said: The reason for my post was to point out that Mr. Hensing doesn't appear to be a reliable source of information on the topic of passwords and hash security. I think that much became apparent when Mr. Hensing took sarcastic shots at Linux security

Re: [Full-Disclosure] Full-Disclosure Posts

2004-10-18 Thread yossarian
You actually CAN criticize bad decisions, but for that you have to be: A) an expensive consultant from a major firm (e.g. good avice = expensive, i.e. expensive advice = good!) B) adressing the right audience in the organisation. Rule of thumb: the higher your audience is in the hierarchy, the

Re: [Full-Disclosure] ICMP - Today India, Samoa, and Iran are in the tank - back to orginal thread DDoS, or No DDoS?

2004-10-18 Thread vigilaro
Today Iran (Terhan), India (Bangalore) and Samoa are dragging the Asian index down. how you determine if its' DoS on these routers, or not? Is there a Public Darknet Monitoring Site out there tracking backscatter, or other such focused traffic? Andreas- Cedric Blancher wrote: Le lun

Re: [Full-Disclosure] Re: Any update on SSH brute force attempts?

2004-10-18 Thread Barrie Dempster
On Mon, 2004-10-18 at 20:43 +0530, Raj Mathur wrote: Using su forces the use of passwords, which are difficult to manage in a multi-admin scenario. For instance, you may have to give the root password to 3 different people (1 in each 8-hour shift). I didn't say su, I said _sudo_, theres a

Re[2]: [Full-Disclosure] why o why did NASA do this.

2004-10-18 Thread Geza Papp dr (Axelero)
Hello Eric, 2004. október 18., 19:02:37, wrote: On Thursday, October 14, 2004 3:13 PM, Deigo Dude wrote: ftp://ftp.hq.nasa.gov/pub/nickname/ The list contains the full name, email, phone, fax, position, building, room, and employer. When will they learn. EP OMG OMG OMG!! I just opened up

[Full-Disclosure] [ GLSA 200410-15 ] Squid: Remote DoS vulnerability

2004-10-18 Thread Luke Macken
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] HOSEIX

2004-10-18 Thread xploitable
hoseix is [EMAIL PROTECTED] * I hack hoseix on #HBX #skopesix #rosecurity #hackphreak hoseix using *.undernet.org The Undernet Underworld Don't tell me what to post on full-disclosure, k thanx. ___ Full-Disclosure - We believe in it. Charter:

[Full-Disclosure] [ GLSA 200410-16 ] PostgreSQL: Insecure temporary file use in make_oidjoins_check

2004-10-18 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [Full-Disclosure] HOSEIX

2004-10-18 Thread xploitable
On Mon, 18 Oct 2004 15:43:39 -0500, Todd Towles [EMAIL PROTECTED] wrote: Hey xploitable, who was telling you what to post and not to post? Some dude who came on an IRC channel telling me not to speak out against Yahoo! He told me not to disclosure vulnerabilities/ exploits/ bugs on

Re: [Full-Disclosure] RE: [Full-Disclosure]Open the doors to hell hire a hicker Full-Disclosure Posts

2004-10-18 Thread Kevin
On Mon, 18 Oct 2004 10:28:39 -0400, Clairmont, Jan M [EMAIL PROTECTED] wrote: Oh yeah and we can trust you bozos not to put in backdoors, sploits and other great modes of entry yeah right. 8-, Hire the burgler to secure your home, yeah right? Doh! Just because J.Random Hacker starts out as an

Re: [Full-Disclosure] RE: [Full-Disclosure]Open the doors to hell hire a hicker Full-Disclosure Posts

2004-10-18 Thread Micheal Espinola Jr
Yea, but the l0pht was never an exploit group. They were the most true hackers I have ever personally known. But it should also be considered that way back then, the youngest member was in his teens, while the rest were significantly older than him. Now, that youngest member (Kingpin) should be

Re: [Full-Disclosure] RE: [Full-Disclosure]Open the doors to hell hire a hicker Full-Disclosure Posts

2004-10-18 Thread Kevin
On Mon, 18 Oct 2004 19:25:16 -0400, Micheal Espinola Jr [EMAIL PROTECTED] wrote: Yea, but the l0pht was never an exploit group. They were the most true hackers I have ever personally known. But it should also be considered that way back then, the youngest member was in his teens, while the