Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in ls and mkdir

2004-10-25 Thread Vincent Archer
On Sun, Oct 24, 2004 at 07:51:09PM -0400, Harry Hoffman wrote: haha, that's pretty funny. If they were going to do something like that it should have at least been in a rpm format. Considering you can put an executable script inside, if I remember right. I'm hoping that this doesn't need to

Re: [Full-Disclosure] Help, possible rootkit

2004-10-25 Thread Harry de Grote
Op Sunday 24 October 2004 15:59, Ali Campbell sgreifde: BillyBob wrote: Any more suggestions ? I have seen something similar to this behaviour caused by a flaky power connector in a Si3112 mirrored RAID array. or it's highly possible that your windows is just unstable :) (which is true in

RE: [Full-Disclosure] Help, possible rootkit

2004-10-25 Thread Alan Melia \(Melmac\)
Sorry but something MUST show up. Enable 'Context Switch Delta' and I/O stuff. Then inspect the process/thread with the highest Context Switch. The most probable cause if it shows up against system is some faulty hardware generating high hardware interrupts. You do not have any evidence that a

[Full-Disclosure] FAKE: RedHat: Buffer Overflow in ls and mkdir

2004-10-25 Thread Feher Tamas
Hello, Read these: http://www.redhat.com/security/ http://www.f-secure.com/weblog/#0323 The message below is currently going around on internet. Being unsinged was the fist obvious issue. Do you really expect a singing security alert from RedHat? I think the all singing, all dancing

Re: [Full-Disclosure] Mozilla Thunderbird 0.8 / Firefox 0.9.3 temporary files (local)

2004-10-25 Thread Daniel Veditz
This was fixed Friday (bug 251297) and the fix will be in next versions of Mozilla products. It looks like the bug was introduced last March which would make Mozilla 1.7 and Firefox 0.9 and later vulnerable, Mozilla 1.6 and Firefox 0.8 and earlier OK. Thunderbird has been vulnerable from version

[Full-Disclosure] [ GLSA 200410-24 ] MIT krb5: Insecure temporary file use in send-pr.sh

2004-10-25 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-24 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

RE: [Full-Disclosure] RE: Full-Disclosure digest

2004-10-25 Thread Todd Towles
Maybe because they are e-mail borne and if you haven't noticed, you post on here via e-mail? This list is open, therefore as long as people don't fix their computers, you will get viruses. Welcome to FD =) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf

Re: [Full-Disclosure] RE: Full-Disclosure digest

2004-10-25 Thread steve menard
Todd Towles wrote: Maybe because they are e-mail borne and if you haven't noticed, you post on here via e-mail? This list is open, therefore as long as people don't fix their computers, you will get viruses. Welcome to FD =) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL

[Full-Disclosure] [ GLSA 200410-25 ] Netatalk: Insecure tempfile handling in etc2ps.sh

2004-10-25 Thread Luke Macken
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-25 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] [ GLSA 200410-26 ] socat: Format string vulnerability

2004-10-25 Thread Luke Macken
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200410-26 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] Re: [lists] python does mangleme (with IE bugs!)

2004-10-25 Thread Elliott Bäck
The URL you give for the crash_IE files simply refresh until they get to http://felinemenace.org/~nd/crash_ie/2447.html and show a 404 error... Thanks, Elliott C. Bäck 607-229-0623 119 Blair St. #2 -- www.spreadIE.com www.elliottback.com ned wrote: i've

[Full-Disclosure] Rendering binary file as HTML makes Mozilla Firefox stop responding or crash

2004-10-25 Thread Peter Kruse
CSIS Security Advisory [CSIS2004-5): Rendering binary file as HTML makes Mozilla Firefox stop responding or crash Date Published: 10.25.2004 Summary Mozilla Firefox, Web-browser built for 2004, advanced e-mail and newsgroup client, IRC chat client, and HTML editing made simple. The Mozilla

Re: [Full-Disclosure] Windows Time Synchronization - Best Practices

2004-10-25 Thread Andrew Farmer
On 24 Oct 2004, at 18:48, Gary E. Miller wrote: On Fri, 22 Oct 2004, Micheal Espinola Jr wrote: You can certainly have multiple time servers specified with Windows Time Service (SNTP). RTM. It has the ability to failover through a list. Yes you can have multiple time servers, but only one active

Re: [Full-Disclosure] Q: Linux Command Line Encryption

2004-10-25 Thread Mike Hoye
On Mon, Oct 25, 2004 at 08:33:41AM -0700, Denis Dimick wrote: Use GPG and keychain to store the key. I've written a little widget that lets you encrypt a file using another file as the key; I put those things in quotes because it's a dumb little thing that does a quick-and-simple xor of the

[Full-Disclosure] RE: Full-Disclosure digest, Vol 1 #2001 - 32 msgs

2004-10-25 Thread Daniel Sichel
In that case, I assume you are using IPSEC with shared secrets instead of certificates, no? You got that right. A cerificate is only as good as the server that issued it, and the directory it's in. Which in the case of Winblows is not good enough. Therefore my shared secrets are kept in a

Re: [Full-Disclosure] Q: Linux Command Line Encryption

2004-10-25 Thread Aaron Horst
Decoding a file with repetitive XOR encryption is pretty easy. The only way that this will be even remotely secure is if the encrypted file is the same length or less then the length of the key file. The danger then becomes transmitting the key file securely. This is called a one-time pad. It is

[Full-Disclosure] Posting w/o checking facts

2004-10-25 Thread Harry Hoffman
Hi, Ok, I didn't think this needed to be said but why the hell are ppl posting exploits without doing any actual testing? WTF is up with that. Umm, ok I can say that XYZ is a problem cause it looks like it may be one. NO, YOU CAN'T Or rather you can but then when everyone says your name