[Full-Disclosure] MediaSentry false positives?

2005-01-05 Thread Kevin
Has anybody received Notice of claimed infringement from MediaSentry for IP addresses which, while registered to you or your organization, are in a range not actively in use? I recently received two notices from MediaSentry for MPAA material, each listing a single file shared via Kazaa, for two

RE: [Full-Disclosure] IE sp2 and Mozilla Firefox DoS.

2005-01-05 Thread bipin gautam
--- ALD, Aditya, Aditya Lalit Deshmukh [EMAIL PROTECTED] wrote: Both Firefox IE supports decompression method 'gzip' ie. an extended request header named HTTP_ACCEPT_ENCODING like HTTP_ACCEPT_ENCODING=gzip,deflate By this way, the file can be kept around few kilobytes in the

[Full-Disclosure] [ GLSA 200501-03 ] Mozilla, Firefox, Thunderbird: Various vulnerabilities

2005-01-05 Thread Thierry Carrez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200501-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] Tiger Teams

2005-01-05 Thread rienzi
Hi I´m looking for tiger teams around that works with enterprises dedicated to TI research , i´m lookin some way to contact them maybe a web page, email or something like that. Thank's Darkslaker ___ Full-Disclosure - We believe in it. Charter:

[Full-Disclosure] Cheers Quick action by symantec on IE auto compromise

2005-01-05 Thread Michael Evanchik
http://securityresponse.symantec.com/avcenter/venc/data/trojan.phel.a.html mike www.michaelevanchik.com ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

RE: [Full-Disclosure] Example of Legal Ruling involving Internet Issues: Re: Yahoo and inheiriting someone's email

2005-01-05 Thread Myers, Marvin
One of the core issues here is or should be whether or not the defendant specifically targeted the residents of the state where the plaintiff is trying to claim jurisdiction. There are many websites out there that may be advertising products and or services that may be illegal for sale or use in

[Full-Disclosure] MDKSA-2004:165 - Updated koffice packages fix multiple vulnerabilities

2005-01-05 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandrakelinux Security Update Advisory ___ Package name: koffice Advisory ID:

Re: [Full-Disclosure] MediaSentry false positives?

2005-01-05 Thread Florian Weimer
Has anybody received Notice of claimed infringement from MediaSentry for IP addresses which, while registered to you or your organization, are in a range not actively in use? I've independently received another report of this problem. I see two likely possibilities -- either MediaSentry is

RE: [Full-Disclosure] Multiple Backdoors found in eEye Products (IRISand SecureI

2005-01-05 Thread Lance Gusto
Hey Marky Mark and the Funky Bunch, I will make this short and sweet (I know you have some hair dying to perform). If you have no backdoors in your products then I guess you have nothing to worry about... :) I would have a real debate with you, but your clearly UNARMED. :) P.S: I have to say

[Full-Disclosure] DMA[2005-0103a] - 'William LeFebvre top format string vulnerability'

2005-01-05 Thread White Self-Existing World-Bridger
Kevin Finisterre On Wed, 2004-11-24 at 04:38 notifies the vendor! 4 years later! This bug was found alive and kicking in the Solaris 10 Sun freeware package. LOL! Yeah it seems a lot of interesting bugs slip through the cracks. I wonder what other tasty morsels are lurking out there. Thanks

[Full-Disclosure] [ GLSA 200501-04 ] Shoutcast Server: Remote code execution

2005-01-05 Thread Luke Macken
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200501-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-Disclosure] SQL injection worm ?

2005-01-05 Thread Maxime Ducharme
Hi list, we receveid a particular SQL injection attack on one of our site. Attack looks like : 2005-01-05 14:39:20 24.164.202.24 - W3SVCX SRVNAME x.x.x.x 80 GET /Nouvelles.asp id_nouvelle=377';%65%78%65%63%20%4D%41%53%54%45%52..%78%70%5F%63%6D%64%73%68

RE: [Full-Disclosure] Possible DNS compromise/poisoning?

2005-01-05 Thread Madison, Marc
This is the correct information for MS. Perform a search on the address obtained in your dns query to confirm. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Wednesday, January 05, 2005 8:45 AM To:

Re: [Full-Disclosure] Possible DNS compromise/poisoning?

2005-01-05 Thread J.A. Terranson
On Wed, 5 Jan 2005 [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Is anyone else seeing this: - --SNIP-- ;; QUESTION SECTION: ;www.microsoft.com. IN A ;; ANSWER SECTION: www.microsoft.com. 2415IN CNAME

Re: [Full-Disclosure] Possible DNS compromise/poisoning?

2005-01-05 Thread DanBUK
I see the same, but I don't think there is an issue. C:\WINDOWSnslookup Default Server: pmsidc03.pmsi.local Address: 192.168.42.13 set type=cname www.microsoft.com Server: pmsidc03.pmsi.local Address: 192.168.42.13 Non-authoritative answer: www.microsoft.com canonical name =

[Full-Disclosure] Pattern matching search tool

2005-01-05 Thread Paul Schmehl
Is anyone aware of a search tool (not Google or search engine aggregation software) that could be used to search our network for interesting stuff? It needs to be capable of doing pattern matching similar to perl's regular expression stuff. I'm looking for something that, for example, could

[Full-Disclosure] Re: SQL injection worm ?

2005-01-05 Thread bugtraq
Here is some additional information. An irc bot is launched and joins a channel named #!processor on 170.94.206.13 where about 118 hosts are currently idling. ùíù [Users(#!processor:38)] [ [UNC]84356] [ [UNC]85751] [ [UNC]85463] [ [UNC]42287] [ [UNC]29288] [ [UNC]54723] [ h ] [

Re: [Full-Disclosure] Re: Bluetooth: BlueSnarf and BlueBug Full Disclusore

2005-01-05 Thread Dave Bryan
The reason that it is called BlueBug is because you are literally bugging (Voice Calls) an unsuspecting victims pocket. Yes this is a back door of sorts... On Tue, 04 Jan 2005 14:46:19 +0100, Przemyslaw Frasunek [EMAIL PROTECTED] wrote: Adam Laurie napisa(a): Details of the attacks were

RE: [Full-Disclosure] Pattern matching search tool

2005-01-05 Thread ALD, Aditya, Aditya Lalit Deshmukh
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Paul Schmehl Sent: Thursday, January 06, 2005 02:58 AM To: full-disclosure@lists.netsys.com Subject: [Full-Disclosure] Pattern matching search tool Is anyone aware of a search tool (not Google or search

[Full-Disclosure] Securitytrap 2004 Dec Top 20 List - PHP exploit on Top

2005-01-05 Thread vertex
Hello, Securitytrap is a realtime security related mailing list summary site which includes full-disclosure, bugtraq, osvdb, focus-ids, packet storm, incidents, etc. For more information, please visit, http://www.securitytrap.com/ Top 20 list, http://www.securitytrap.com/top20.html