Re: Reappearance of an old IE security bug

2000-04-19 Thread Elias Levy
All reports so far seems to indicate this IE warning was a false alert. "Jason M. Taylor" <[EMAIL PROTECTED]>: I tested it on a Windows 98 SE box running IE 5.00.2614.3500 and got the following, "Exception while fetching image:com.ms.security.SecurityExceptionEx[example0.action]: cannot connect

AVM's Statement

2000-04-19 Thread eAX [Teelicht]
Here is the staement of the very friendly people from AVM: eAX - Statement german - Das beschriebene Sicherheitsloch beschränkt sich ausschließlich auf das firmeninterne Netzwerk. Gegenüber dem Internet ist das eigene Firmennetzwerk komplett durch KEN! (NAT) abgeschirmt. KEN! ist nicht für groß

Re: More vulnerabilities in FP

2000-04-19 Thread The Cyberiad
Hello, I confirmed the 742-A's caused a page fault in KERNEL32.DLL at 0167:bff87ede under FP 3.0.2.1105, installed with PWS under Windows 98 (PWS.EXE Version 4.02.0690). However, this length did not force A's into the EIP. Instead the stack pointer is corrupted, now pointing to invalid memory (wh

Network Security and Privacy

2000-04-19 Thread JavaMan
Brief Preface: We have found that three major backbone providers are vunerable to this sort of probing. When notified, they locked down their network, and threatened legal action if their names were mentioned in a bugtraq post. Javaman Title: Lack of Network Security and Privacy Implicat

Re: More vulnerabilities in FP

2000-04-19 Thread The Cyberiad
Hello, I apologize for the additional posting but I also tested the buffer overflow on NT 4SP4 with IIS installed from the Option Pack and the 742-A's did not cause a crash. The file disovery bug did work for files on the same volume as the webroot. Same order of path checking. If the files exis

Re: New DOS on Interscan NT/3.32

2000-04-19 Thread Dan Schrader
The DOS exploit outlined in Alain Thivillon's posting has been addressed in Trend Micro's InterScan v. 3.4 for Windows NT - which is currently in beta test. The new beta release can be downloaded from: http://www.antivirus.com/download/beta_programs/ If you do not want to use the beta version,

Re: Announcing: Solaris Fingerprint Database (sfpDB) on SunSolve

2000-04-19 Thread Alec Muffett
>Such a database is all good and fine, but it inheritly has at >least one weakness: an attacker can install an old, but genuine >Sun binary with a security hole in it. > >If you did a post mortem and found such a file, would you say >"I must have forgotten to update that file" or would you say >"T

Re: RUS-CERT Advisory 200004-01: GNU Emacs 20

2000-04-19 Thread Dan Harkless
"RUS-CERT, University of Stuttgart" <[EMAIL PROTECTED]> writes: > > > RUS-CERT Advisory 24-01: GNU Emacs 20 > > RUS-CERT, University of Stuttgart > > 2000-04-18 > > Summary > >Several vulnerabilities were dis

Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability

2000-04-19 Thread psirt
-BEGIN PGP SIGNED MESSAGE- Cisco Catalyst Enable Password Bypass Vulnerability Revision 1.1 Tentatively for release 2000 April 19 08:00 AM US/Pacific (UTC+0700) --- Summary === Cisco Catalyst software perm

Adtran DoS

2000-04-19 Thread Mike Ireton
Hi Gang, While testing some new gear, I found a serious problem with the Adtran MX2800 M13 Multiplexer. This device aggregates up to 28 T1's onto a Channelized DS3 interface and is primarlly used in cases where you've got a lot of T1's. The unit I have has dual redundant controller cards

FreeBSD Security Advisory: FreeBSD-SA-00:13.generic-nqs

2000-04-19 Thread FreeBSD Security Officer
-BEGIN PGP SIGNED MESSAGE- = FreeBSD-SA-00:13 Security Advisory FreeBSD, Inc. Topic: generic-nqs

Re: response to the bugtraq report of buffer overruns in imapd LIST command

2000-04-19 Thread Mark Crispin
On Mon, 17 Apr 2000 23:02:48 -0700, R. C. Dowdeswell wrote: > Using chroot in a lot of situations is rather dangerous, and one > must carefully set up the environment that it runs in. Yes. This is why I would never do it by default; it's something that the site has to turn on explictly (and they

More vulnerabilities in FP

2000-04-19 Thread Narrow
[ Reader(s), please Cc: your comments/etc to [EMAIL PROTECTED] ] ---[ Legion2000 - Russian Security Team (ADV-150400#1) ]--- www.legion2000.cc INFORMATION Program Name : CERN Image Map Dispatcher Discovered By : Narrow ([EMAIL PROTECTED]) ---

Re: response to the bugtraq report of buffer overruns in imapd LIST command

2000-04-19 Thread der Mouse
> Can we please [] discuss the facts rationally? > 1) There is no added vulnerability at all for a UNIX system which >permits shell access. This is not quite true. There is no added vulnerability for a system which permits shell access with the same pair which gives mailbox access. One si

RUS-CERT Advisory 200004-01: GNU Emacs 20

2000-04-19 Thread RUS-CERT, University of Stuttgart
RUS-CERT Advisory 24-01: GNU Emacs 20 RUS-CERT, University of Stuttgart 2000-04-18 Summary Several vulnerabilities were discovered in all Emacs versions up to 20.6, namely: Under certain circumst

Re: response to the bugtraq report of buffer overruns in imapd LIST command

2000-04-19 Thread Warner Losh
In message <[EMAIL PROTECTED]> Mark Crispin writes: : Last but not least, I am very interested in Kris Kennaway's claim : that "It may also be possible to break out of the chroot jail on : some platforms." If true, it represents a huge root-level security : hole on those platforms. I simply do n

pwdump2 for Active Directory

2000-04-19 Thread Todd Sabin
Hi, Just a quick note to let people know that I've updated pwdump2 so that it can now dump password hashes on W2K domain controllers. The previous version was unable to get the hashes from Active Directory. You can get it from the Tools section of the RAZOR website, http://razor.bindview.com/to

Re: response to the bugtraq report of buffer overruns in imapd LIST command

2000-04-19 Thread R. C. Dowdeswell
On 956021099 seconds since the Beginning of the UNIX epoch Mark Crispin wrote: > >The final form of the CHROOT_SERVER code, which will be an option in the next >distributed version, consists of: > if (chroot (home ? home : ANONYMOUSHOME)) return NIL; > home = "/"; >And, yes, this will do the nec

Re: response to the bugtraq report of buffer overruns in imapd LIST command

2000-04-19 Thread Henrik Nordstrom
Mark Crispin wrote: > Last but not least, I am very interested in Kris Kennaway's claim that "It may > also be possible to break out of the chroot jail on some platforms." If true, > it represents a huge root-level security hole on those platforms. I simply do > not believe the claim. I would

IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy)

2000-04-19 Thread Georgi Guninski
Georgi Guninski security advisory #10, 2000 IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy) Disclaimer: The opinions expressed in this advisory and program are my own and not of any company. The usual

Re: response to the bugtraq report of buffer overruns in imapd LIST command

2000-04-19 Thread Darren Moffat - Solaris Sustaining Engineering
>Last but not least, I am very interested in Kris Kennaway's claim that "It may >also be possible to break out of the chroot jail on some platforms." If It is possible, especially if you have /proc mounted. It is made even more likely if you have processes inside and outside of the chroot envir

Novell Netware 5.1 (server 5.00h, Dec 11, 1999)...

2000-04-19 Thread Michal Zalewski
Hi again. Another overflow and TCP/IP stack flaw. Affected: virtually any system running on the top of Netware system with http remote administration (including web caching solutions, BorderManager firewall and so on)... There's an buffer overflow in remote (http, usually on

Re: Announcing: Solaris Fingerprint Database (sfpDB) on SunSolve

2000-04-19 Thread Morten Welinder
Such a database is all good and fine, but it inheritly has at least one weakness: an attacker can install an old, but genuine Sun binary with a security hole in it. If you did a post mortem and found such a file, would you say "I must have forgotten to update that file" or would you say "There is

xfs security issues (fwd)

2000-04-19 Thread Chris Evans
Hi, I notice xfs (the X font server) recently hit the news. It seems I never sent the below message on to Bugtraq (at least a search doesn't show up much). I'm guessing it's still relevant. This message illustrates that the xfs problem recently mentioned by Michal is but one of many minor carele

Last call for extended abstracts - Raid 2000 - Deadline is April 30th

2000-04-19 Thread Herve Debar
I am sending you the final call for extended abstracts for Raid 2000. I would appreciate if you could distribute it as widely as possible. Also, online proceedings of RAID'98 and RAID'99 are now available at http://www.raid-symposium.org/ Thanks for your help. Herve ==

Re: Cooments on the dvwssr.dll vulnerability threads

2000-04-19 Thread David LeBlanc
At 10:25 PM 4/17/00 -0300, Iván Arce wrote: > So these seems to be quite precise WRT possible attackers and impact, > the hype derived from the media coverage does not seem to be part of > RFP's agenda. This is what happens when something is just put out in front of everyone with no notification