Re: [Full-Disclosure] Update: Web browsers - a mini-farce (MSIE gives in)

2004-10-24 Thread Daniel Veditz
Michal Zalewski wrote: I have no data on whether any of the vendors bothered to run my scripts to find any further problems that are bound to surface. Yes, thank you. Mozilla testers have found additional crashing testcases and we will add the tool to our regular testing cycle. -Dan Veditz

[Full-Disclosure] RE: Full-Disclosure digest

2004-10-24 Thread digitalchaos
Why are there virus being transmitted through this newsgroup?? OUTPUT FROM MCAFEE: ** McAfee VirusScan *** Alert generated at: Thu, 02 Sep 2004 13:15:00 -0500 * * McAfee

Re: [Full-Disclosure] RE: Full-Disclosure digest

2004-10-24 Thread Cedric Blancher
Le vendredi 03 septembre 2004 à 05:27 -0400, digitalchaos a écrit : Why are there virus being transmitted through this newsgroup?? Because some worm are gathering email address within addressbook, emails or HTML contents, thoses can contain Full Disclosure email address. --

Re: [Full-Disclosure] RE: Full-Disclosure digest

2004-10-24 Thread Honza Vlach
Oh no, not again!!! Honza Why are there virus being transmitted through this newsgroup?? -- () ascii ribbon campaign - against html mail /\- against microsoft attachments pgpZpYGT0NfyH.pgp Description: PGP signature

[Full-Disclosure] xpire.info splitinfinity.info - exploits in the wild

2004-10-24 Thread Elia Florio
Hi list, i'm doing some analysis on a Linux-Mandrake 9.0 web server of a person that was compromised in October. In this host now it's installed a special trojan that insert a malicious IFRAME tag into every served .PHP page. The host is running these services : Porta 21: 220 ProFTPD 1.2.5

Re: [Full-Disclosure] Help, possible rootkit

2004-10-24 Thread Ali Campbell
BillyBob wrote: Any more suggestions ? I have seen something similar to this behaviour caused by a flaky power connector in a Si3112 mirrored RAID array. Ali ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-Disclosure] Undetectable Virus from CANADA ISP 69.197.83.68

2004-10-24 Thread devis
Well its the good old trick string.good known extension[ insert numerous spaces here ].nasty executable extension This relies on MS IExplore or Outlook to not show more than X characters of the file name, but as your screen shots show, its detected as a Screen saver meanijng it has a .scr

[Full-Disclosure] [ GLSA 200410-22 ] MySQL: Multiple vulnerabilities

2004-10-24 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [Full-Disclosure] Q: Linux Command Line Encryption

2004-10-24 Thread Bruno Wolff III
On Fri, Oct 22, 2004 at 17:48:26 +, Ali Campbell [EMAIL PROTECTED] wrote: I need a Linux utility which I can use to encrypt a single gzipped file via the command line. Obviously something open source would be preferable. I'm not really interested in setting up a whole suite of stuff

[Full-Disclosure] confixx e-mail bug

2004-10-24 Thread Igor Buchmueller
Hello, I noticed a bug in confixx. Confixx is a software to administrate websites. nice feautures are to create costumers or reseller costumers and gain them tools to administrate theirself websites. It is possible to catch all e-mails as a normal user which are going from the server to

Re: [Full-Disclosure] xpire.info splitinfinity.info - exploits in the wild

2004-10-24 Thread bowwow
A...checkout too @ http://lists.netsys.com/pipermail/full-disclosure/2004-October/027350.html ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

Re: [Full-Disclosure] xpire.info splitinfinity.info - exploits in the wild

2004-10-24 Thread Kevin
On Sun, 24 Oct 2004 13:47:04 +0200, Elia Florio [EMAIL PROTECTED] wrote: Hi list, i'm doing some analysis on a Linux-Mandrake 9.0 web server of a person that was compromised in October. In this host now it's installed a special trojan that insert a malicious IFRAME tag into every served .PHP

Re: [Full-Disclosure] xpire.info splitinfinity.info - exploits in the wild

2004-10-24 Thread Elia Florio
I'm not sure that qmail-inject isn't a red herring? The actual download looks like 'wget' was used. Good suggestion, my friend :) It was used WGET to retrieve the http://xpire.info/cli.gz connectback shell. After other analysis I've found that another person had the same problem:

[Full-Disclosure] [ GLSA 200410-23 ] Gaim: Multiple vulnerabilities

2004-10-24 Thread Matthias Geerdsen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-23 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] Mozilla Thunderbird 0.8 / Firefox 0.9.3 temporary files (local)

2004-10-24 Thread Martin
Advisory attached. Mozilla Thunderbird 0.8 / Firefox 0.9.3 temporary files (local) Martin ([EMAIL PROTECTED]) --- Program Description --- Thunderbird, our latest email program, includes intelligent spam filters, spell-checking, security, customization, and

RE: [Full-Disclosure] Help, possible rootkit

2004-10-24 Thread RandallM
Billy said: --__--__-- Message: 1 From: BillyBob [EMAIL PROTECTED] To: Full Disclosure [EMAIL PROTECTED] Date: Sat, 23 Oct 2004 13:05:29 -0300 Subject: [Full-Disclosure] Help, possible rootkit I have noticed that my XP system is behaving like I have a rootkit. -- -- -- __ __ Billy, 1. Go

[Full-Disclosure] XSS vulnerabilities in several german communities + aol search

2004-10-24 Thread Habonator _
I've discovered XSS bugs in several big german communities. All these communities use a cookie based authentification so its possible to inject script code to steal users cookies. All vendors have been informed. 1. giga.de - NBC GIGA Community * Affected: Whole Comment-System

[Full-Disclosure] Re: Any update on SSH brute force attempts?

2004-10-24 Thread Jay Libove
Hi Miriam - I have not attempted any type of automated blocking, as the attack profile appears to not present a threat to systems with reasonably good passwords. (I'm being a little lax about this, I realize). What I have seen, in terms of the sources, intensity, and frequency of the attempts,

[Full-Disclosure] FAKE: RedHat: Buffer Overflow in ls and mkdir

2004-10-24 Thread Hugo van der Kooij
-BEGIN PGP SIGNED MESSAGE- Be advised. The message below is currently going around on internet. Being unsinged was the fist obvious issue. Not pointing to RPM updates, being in a different format and such were among the other reasong to suspect it. Message was send from 'University of

Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in ls and mkdir

2004-10-24 Thread Harry Hoffman
haha, that's pretty funny. If they were going to do something like that it should have at least been in a rpm format. I'm hoping that this doesn't need to be said but if neither yum check-update || up2date -l report anything then chances are there are no Official Fedora Updates --Harry Hugo van

Re: [Full-Disclosure] xpire.info splitinfinity.info - exploits in the wild

2004-10-24 Thread Nick FitzGerald
Elia Florio wrote: I'm not sure that qmail-inject isn't a red herring? The actual download looks like 'wget' was used. Good suggestion, my friend :) It was used WGET to retrieve the http://xpire.info/cli.gz connectback shell. More specifically, from the strings in the binary it looks

Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in ls and mkdir

2004-10-24 Thread Andrew Farmer
Hugo van der Kooij wrote: Be advised. The message below is currently going around on internet. Being unsinged was the fist obvious issue. Not pointing to RPM updates, being in a different format and such were among the other reasong to suspect it. Message was send from 'University of Texas at

Re: [Full-Disclosure] Crypto and Primes

2004-10-24 Thread Janusz A. Urbanowicz
On Fri, Oct 22, 2004 at 02:31:28PM -0700, Daniel Sichel wrote: Depending on how rigourous you are being, the large in large numbers is a relative term. I know from talking to someone who has worked in for real government crypto that there is enough storage space to create a lookup db of a good

Re: [Full-Disclosure] Q: Linux Command Line Encryption

2004-10-24 Thread Janusz A. Urbanowicz
On Fri, Oct 22, 2004 at 04:30:36PM -0600, [EMAIL PROTECTED] wrote: openssl encryption and decryption, encrypt openssl enc cipher -e -in filename.txt -out filename.enc openssl enc -aes-256-cfb -e -in filename.txt -out filename.enc decrypt openssl enc cipher -d -in

Re: [Full-Disclosure] Windows Time Synchronization - Best Practices

2004-10-24 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yo Michael! On Fri, 22 Oct 2004, Micheal Espinola Jr wrote: You can certainly have multiple time servers specified with Windows Time Service (SNTP). RTM. It has the ability to failover through a list. Yes you can have multiple time servers,

[Full-Disclosure] STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability

2004-10-24 Thread SSR Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability Revision 1.0 Date Published: 2004-10-22 (KST) Last Update: 2004-10-22 Disclosed by SSR Team ([EMAIL PROTECTED]) Summary MoniWiki is a wiki web application used by many

Re: [Full-Disclosure] python does mangleme (with IE bugs!)

2004-10-24 Thread Berend-Jan Wever
Hi all, here's my analysis of these bugs: 2445.html does nothing on my win2ksp4en/ie6.0sp1. (IE does crash when you load it because the META refresh tag leads to 2446.html.) 2446.html contains an exploitable BoF in the IFRAME tag using the SRC and NAME property. To trigger the BoF you only need

[Full-Disclosure] STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability

2004-10-24 Thread SSR Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability Revision 1.0 Date Published: 2004-10-22 (KST) Last Update: 2004-10-22 Disclosed by SSR Team ([EMAIL PROTECTED]) Summary MoniWiki is a wiki web application used by many

Re: [Full-Disclosure] Possibly a stupid question RPC over HTTP

2004-10-24 Thread Kyle Maxwell
On Fri, 22 Oct 2004 14:50:23 +0100, Airey, John [EMAIL PROTECTED] wrote: -Original Message- From: Kyle Maxwell [mailto:[EMAIL PROTECTED] ] I think you may mean something slightly differently; given any large prime p, I can factor it completely extremely quickly: p = 1 * p