Re: Blue Coat xss

2008-09-23 Thread Hugo van der Kooij
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED] wrote: > There is a security issue in the blue coat. > The problem lies in the "Web Filter", which lets you execute an XSS. > This only affects the Internet Explorer browser. " > > as a result, could jump the antivirus scan or make s

RE: CheckPoint Secure Platform Multiple Buffer Overflows

2007-10-03 Thread Hugo van der Kooij
On Wed, 3 Oct 2007, Tony Reusser wrote: Have you tested this against the more current release R-62? More important. Against which exact version and build did you test this? NGX R60 received 5 patches which might take care of some points. I think however that Check Point consideres everyone

RE: Internet Explorer 0day exploit

2007-07-24 Thread Hugo van der Kooij
On Sat, 21 Jul 2007, Ken Kousky wrote: Zero day is a serious misnomer from vendors that suggest that the counting of time an exposure is known BY THE GOOD GUYS is some kind of trigger date when in reality, many serious exploits are know BY THE BAD GUYS so the day zero is really months or maybe y

Re: Windows Oday release

2007-06-19 Thread Hugo van der Kooij
On Wed, 13 Jun 2007, [EMAIL PROTECTED] wrote: This is not about lost maintainers or non-existent patches, that's been done to death. Reporting vulnerabilities to distributions can be so depressing - and the replies you get (if any) are so annoying, that if it was from Microsoft, they would have

RE: Defeating Citibank Virtual Keyboard protection using screenshot method

2007-05-12 Thread Hugo van der Kooij
Sure, they're a lot more expensive and a lot more "high-tech" but unless they are doing end-to-end client and server authentication and strong crypto _AND_ have their own input and output devices that cannot be interfaced from the host OS _AND_ are required for verifying (virtually) every step o

Re: Re: Solaris telnet vulnberability - how many on your network?

2007-02-17 Thread Hugo van der Kooij
On Fri, 16 Feb 2007, jf wrote: There have also been too many times in the past when they have been proven correct to ignore the possibility any longer. Hi, in what instances has the conjecture that a bug was a deliberate backdoor been proven correct? If Peter is crying WOLF all the time. Th

Re: phpcms <=- 1.1.7 Remote File Inclusion

2006-12-27 Thread Hugo van der Kooij
On Mon, 24 Dec 2006, [EMAIL PROTECTED] wrote: #phpcms <=- 1.1.7 Remote File Inclusion Duh. This one was released in 2002. The latest version is 1.2.2 and was published halfway this year (2006). See also: http://www.phpcms.de/download/index.en.html Hugo. PS: Anyone did a bug report on dino

Re: Checkpoint NG3 ICMP Flood

2006-12-18 Thread Hugo van der Kooij
On Mon, 18 Dec 2006, [EMAIL PROTECTED] wrote: I have one checkpoint NG3 in my company and verifying in Tracking i have tousands of events with ICMP type 8 and type 17. The events has origin in my internal networks, with one problem .. the Source IP is my PAT address for internal hosts to inte

Re: Digipass Go3 Token Dumper (at least for 2006)

2006-11-24 Thread Hugo van der Kooij
On Sun, 12 Nov 2006, [EMAIL PROTECTED] wrote: > The initial reverse engineering of Vasco’s Digipass Go3 algorithm follows in > C++. > I think this implementation is a "rough" approximation, if we take some > limitations about 2006 and the calculations made into account. Or I'm just > joking… :)

Re: Check Point R55W Directory Traversal

2006-07-31 Thread Hugo van der Kooij
On Mon, 24 Jul 2006, Sec-Tec Lists wrote: > Check Point Firewall-1 R55W contains a hard coded web server, which runs on > TCP port 18264. This server is there to deal with PKI requirements for Check > Point's VPN functionality. > > During a routine penetration test of a client, Sec-Tec discovered

Re: LAMP vs Microsoft

2006-07-18 Thread Hugo van der Kooij
On Tue, 11 Jul 2006, Bob Beck wrote: > > > And I think vulnerabilities disclosed are a much better indicator > > of the changes to QA/development of products than any hyperbole > > from those responsible (be it management or developers.) > > No, I think vulnerabilities disclosed is simply a

Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround

2006-07-14 Thread Hugo van der Kooij
On Fri, 14 Jul 2006, Caveo Internet BV - Security wrote: > The most easy way to stop this vulnerability is this by sepcifying the core > dump location > > echo /root/core > /proc/sys/kernel/core_pattern > > This specifies /root as core dump location which makes it unavailable for > the local user.

Re: IGNORING SSH CONNECTION USES ARP CACHE POISSONING

2006-05-10 Thread Hugo van der Kooij
On Tue, 9 May 2006 [EMAIL PROTECTED] wrote: > We know that tcp connection will close by sending RST flag. > I try to connect to my openssh server on > slackware 10 from my computer fedora core 4. Then using an > openbsd 3.7, that had same network with slackware n fedora, > try to overwrite ARP cac

Re: Trend Micro ServerProtect version 5.58 can be easily circumvented via the mechanism that limits how many files to scan.

2006-02-03 Thread Hugo van der Kooij
On Fri, 3 Feb 2006, [ISO-8859-9] Mert Sar?ca wrote: > http://www.packetstormsecurity.org/filedesc/Bypass.pdf.html > > Some people say this method works also on Trend Micro InterScan > Messaging Security Suite and InterScan Web Security Suite. I really > appreciate if you use one of these and can a

RE: Authentication Vulnerability in NetScreen ScreenOS

2003-06-26 Thread Hugo van der Kooij
On Thu, 26 Jun 2003, Brian Soby wrote: > >However, after a user is authenticated, anyone else may also access the > >protected services if they orginate from the same source IP address (NAT'd > >network). The authentication mechanism is designed to authenticate based on > >source-ip address onl

RE: Firewall-1 Information leak

2001-07-23 Thread Hugo van der Kooij
On Fri, 20 Jul 2001, MALIN, ALEX (PB) wrote: > Why might anybody use FWZ (CheckPoint's propriatary encryption scheme), > rather than IKE? It's inherently less secure, as it can't use IPSec tunnel > mode. As I see it, there's a genaral problem with using firewalls for > encryption gateways. You do

Re: Two birds with one worm.

2001-07-19 Thread Hugo van der Kooij
On Thu, 19 Jul 2001, Mike Lewinski wrote: > > It looks like the "Code Red" worm has the added side effect of > crashing > > Cisco (675/678) DSL CPEs running any CBOS prior to 2.4.1. The GET it > sends > > looking for IIS servers hardlocks any modem with the web management > > interface enabled. >

Re: Check Point response to RDP Bypass

2001-07-12 Thread Hugo van der Kooij
On Wed, 11 Jul 2001, Johan Lindqvist wrote: > The original advisory > (http://www.inside-security.de/advisories/fw1_rdp.html) says that a > workaround is to "Deactivate implied rules in the Check Point policy editor > (and build your own rules for management connections).". I've not been able > t

Re: Innfeed Buffer Overflow

2001-04-19 Thread Hugo van der Kooij
is about for some time now. Is it vunerable? If you must mention the distributions then make sure you get them right. Hugo. -- Alle email aan mij verzonden is gebonden aan de regels beschreven op mijn homepage. All email send to me is bound to the rules described on my homepage.

Re: [RHSA-2001:047-03] Linux kernel 2.2.19 now available, provides security fixes, enhancements

2001-04-18 Thread Hugo van der Kooij
a slight mistake. Files check out allright if you compare the MD5 sums and GPG key. Hugo. -- Alle email aan mij verzonden is gebonden aan de regels beschreven op mijn homepage. All email send to me is bound to the rules described on my homepage. Hugo van der Kooij; Oranje Nassaustraat 16;

Re: multiple vulnerabilities in Alcatel Speed Touch DSL modems

2001-04-16 Thread Hugo van der Kooij
t can't be missed. Hugo. -- Alle email aan mij verzonden is gebonden aan de regels beschreven op mijn homepage. All email send to me is bound to the rules described on my homepage. Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://hvd

Re: PIX Firewall 5.1 DoS Vulnerability

2001-04-11 Thread Hugo van der Kooij
ven op mijn homepage. All email send to me is bound to the rules described on my homepage. Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://hvdkooij.xs4all.nl/ Don't meddle in the affairs of sysadmins, for they are

Re: MailSweeper for SMTP Security Problem

2001-03-27 Thread Hugo van der Kooij
sent in v3 of the MailSweeper for SMTP product and can not be fixed in the configuration. Hugo. -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://hvdkooij.xs4all.nl/ Alle email is gebonden aan de regels beschreven op mijn homepage. All email se

Esafe Protect Gateway issue still unresolved!

2000-05-02 Thread Hugo . van . der . Kooij
Hi, The problem reported publicly on 2000-03-21 (March 21, 2000) regarding Esafe Protect Gateway is still not resolved. Hugo. -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://home.kabelfoon.nl/~hvdkooij

Re: Esafe Protect Gateway (CVP) does not scan virus under some

2000-03-27 Thread Hugo . van . der . Kooij
rces on a FireWall-1 v4.0 SP4 installed on a Nokia IP-440 with IPSO v3.2.0 to duplicate the test before claiming to be bugfree. I also suggest you verify things with the Dutch office where I did report the issue some time ago. Hugo. -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasla

Re: Update: Extending the FTP "ALG" vulnerability to any FTP client

2000-03-23 Thread Hugo . van . der . Kooij
ons in the rule base. The behavior of > the inspect code can also be modified to make it as strict or open as > desired. The services list is actually the list of services defined in the objects.C file. The services do NOT need to be defined in any rulebase. Hugo. -- Hugo van der Kooij; Oran

Re: Esafe Protect Gateway (CVP) does not scan virus under some

2000-03-23 Thread Hugo . van . der . Kooij
or at least of workarounds. Unfortunatly there is no usable workaround. My customers don't just expect that they will not be harmed by a virus but that a maximum effort is done to prevent any harmfull activities. At present ESP does not live up to that expectation because someo

Esafe Protect Gateway (CVP) does not scan virus under some conditions

2000-03-22 Thread Hugo . van . der . Kooij
he problem lies with Esafe and not with Check Point by using Trend Micro's CVP server instead which did not suffer from the same problem. Hugo. -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]

Re: Our old friend Firewall-1

2000-03-16 Thread Hugo . van . der . Kooij
We > where able to reproduce the problem on a Nokia IP440 and NT. I've seen > this problem on Solaris 2.6 as well, but do not have the data to back up > the statement. Please provide exact patchlevels. I know the problem occurs in FireWall-1 v4.0 SP4 but should be fixed in SP5 tha

Re: Big problem on 2.0.x?

1999-12-10 Thread Hugo . van . der . Kooij
der wether this is a known issue that's solved as there are changes in the networking code. Hugo. -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://home.kabelfoon.nl/~hvdkooij/ -- U

Re: FTP denial of service attack

1999-12-10 Thread Hugo . van . der . Kooij
e same way as netscape and internet explorer do this. Hugo. -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://home.kabelfoon.nl/~hvdkooij/ -- Use of any of my email addresses for unsollicited (

Re: FireWall-1 weakness

1999-10-01 Thread Hugo . van . der . Kooij
Comparing with HTTP (which is only defined as TCP port 80) is something quite differently here. The winframe definition does a lot more but it requires you to dig into a firewall setup. Hugo -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://home.kabelfoon.

FireWall-1 weakness

1999-09-30 Thread Hugo . van . der . Kooij
y may suffer the same lack of logging/alerting in case incorrect sessions are blocked. Regards, Hugo. -- Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ Maasland [EMAIL PROTECTED]http://home.kabelfoon.nl/~hvdkooij/ -- Use of any