Re: ssh-1.2.27 exploit

1999-12-14 Thread Iván Arce
macion S.A. ]= Iván Arce Presidente PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836 B25D 207B E78E 2AD1 F65A email : [EMAIL PROTECTED] http://www.core-sdi.com Pte. Juan D. Peron 315 Piso 4 UF 17 1038 Capital Federal Buenos Aires, Argentina. Tel/Fax : +(54-11) 4331-5402 Casilla de C

SSH-1.2.27 RSAREF2 exploit

1999-12-14 Thread Iván Arce
; Common subdirectories: ssh-1.2.27/zlib-1.0.4 and ssh-1.2.27-exploit/zlib-1.0.4 -- "Understanding. A cerebral secretion that enables one having it to know a house from a horse by the roof on the house, It's nature and laws have been exhaustively expounded by Locke, who rode a house, and Kant,

Re: ssh 1.2.27 exploit

1999-12-15 Thread Iván Arce
- Ambrose Bierce ==[ CORE Seguridad de la Informacion S.A. ]= Iván Arce Presidente PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836 B25D 207B E78E 2AD1 F65A email : [EMAIL PROTECTED] http://www.core-sdi.com Pte. Juan D. Peron 315 Piso 4 UF 17 1038 Capital Federal Buenos Aires,

Re: SSH-1.2.27 RSAREF2 exploit

1999-12-15 Thread Iván Arce
Wakko Ellington Warner-Warner III wrote: On Tue, 14 Dec 1999, [iso-8859-1] Iván Arce wrote: Ok, here is the exploit for SSH-1.2.27 compiled with RSAREF2. It was tested against sshd running on Linux (Redhat 6.0) and OpenBSD 2.6, from a Linux Redhat 6.0 box. The exploit is more

Re: SSH 1 Why?

1999-12-16 Thread Iván Arce
unded by Locke, who rode a house, and Kant, who lived in a horse." - Ambrose Bierce ==[ CORE Seguridad de la Informacion S.A. ]= Iván Arce Presidente PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836 B25D 207B E78E 2AD1 F65A email : [EMAIL PROTECTED] http://www.core-sdi.com P

Modifying NT credential and RAZOR's analysis of dvwsrr.dll

2000-04-27 Thread Iván Arce
ho rode a house, and Kant, who lived in a horse." - Ambrose Bierce ==[ CORE Seguridad de la Informacion S.A. ]= Iván Arce Presidente PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836 B25D 207B E78E 2AD1 F65A email : [EMAIL PROTECTED] http://www.core-sdi.com Pte. Juan D. Peron

Re: wuftpd 2.6.1 -- example of bad coding

2001-01-09 Thread Iván Arce
Hello, I fail to understand why these vulnerabilities are NOT exploitable, could you elaborate a bit on that? -ivan - Original Message - From: "Przemyslaw Frasunek" [EMAIL PROTECTED] Newsgroups: core.lists.bugtraq To: [EMAIL PROTECTED] Sent: Monday, January 08, 2001 4:12 PM Subject:

ssh vendors security contacts

2001-01-18 Thread Iván Arce
Hello, I am trying to compile a list of email addresses and PGP keys for reporting security issues to SSH vendors. As i know there are several others than OpenSSH and SSH Communications i would appreciate it if bugtraq readers that already have this info send it to me thanks, -ivan ---

[CORE SDI ADVISORY] Weakl authentication in ATT's VNC

2001-01-23 Thread Iván Arce
CORE SDI http://www.core-sdi.com Vulnerability report for weak authentication in ATT VNC Date Published: 2001-01-23 Advisory ID: CORE-2001011501 Bugtraq ID: 2275 CVE CAN: None currently assigned. Title: Weak

[CORE SDI ADVISORY] WinVNC client buffer overflow

2001-01-30 Thread Iván Arce
CORE SDI http://www.core-sdi.com Vulnerability report for buffer overflow in ATT WinVNC client Date Published: 2001-01-29 Advisory ID: CORE-2001011503 Bugtraq ID: 2305 CVE CAN: None currently assigned. Title; ATT VNC Windows Client

[CORE SDI ADVISORY] WinVNC server buffer overflow

2001-01-30 Thread Iván Arce
CORE SDI http://www.core-sdi.com Vulnerability report for server overflow in ATT VNC for Windows Date Published: 2001-01-29 Advisory ID: CORE-2001011502 Bugtraq ID: 2306 CVE CAN: None currently assigned. Title; ATT VNC Windows Server

[CORE SDI ADVISORY] SSH1 session key recovery vulnerability

2001-02-07 Thread Iván Arce
CORE SDI http://www.core-sdi.com SSH protocol 1.5 session key recovery vulnerability Date Published: 2001-02-07 Advisory ID: CORE-20010116 Bugtraq ID: 2344 CVE CAN: Not currently assigned. Title: Session Key

Re: [CORE SDI ADVISORY] SSH1 session key recovery vulnerability (errata)

2001-02-08 Thread Iván Arce
Just a small correction to the advisory just released: http://www.core-sdi.com/bid/1949 http://www.core-sdi.com/bid/1426 http://www.core-sdi.com/bid/1323 http://www.core-sdi.com/bid/1006 http://www.core-sdi.com/bid/843 http://www.core-sdi.com/bid/660 should be:

[CORE SDI ADVISORY] SSH1 CRC-32 compensation attack detector vulnerability

2001-02-08 Thread Iván Arce
CORE SDI http://www.core-sdi.com SSH1 CRC-32 compensation attack detector vulnerability Date Published: 2001-02-08 Advisory ID: CORE-20010207 Bugtraq ID: 2347 CVE CAN: CAN-2001-0144 Title: SSH1

Re: [CORE SDI ADVISORY] SSH1 session key recovery vulnerability

2001-02-09 Thread Iván Arce
Hello, Yet another error in the advisory released last Wednesday. - Original Message - From: "Ivn Arce" [EMAIL PROTECTED] Newsgroups: core.lists.bugtraq To: [EMAIL PROTECTED] Sent: Wednesday, February 07, 2001 6:25 PM Subject: [CORE SDI ADVISORY] SSH1 session key recovery vulnerability

SSH1 key recovery patch

2001-02-13 Thread Iván Arce
Hello, In light of the recent posts to bugtraq concerning the CORE SDI advisory that describes the SSH1 session key recovery vulnerability a few things needs to be noted: - CORE SDI does not provide support services to SSH1 and does not maintain its source tree. However, given the

ANNOUNCE; CryptoHack 1.0 for PalmOS

2001-03-23 Thread Iván Arce
Hello everyone, In light of recent discussions on the list regarding the security of the PalmOS password protected data, i believe the following announce is interesting. Movilogic S.A. a company based of Buenos Aires, Argentina has released CryptoHack 1.0 PalmOS 3.1 or later. What is it?

Automating Penetration Tests

2001-07-18 Thread Iván Arce
been exhaustively expounded by Locke, who rode a house, and Kant, who lived in a horse. - Ambrose Bierce CORE SDI Inc. Iván Arce Chief Technology Officer PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836 B25D 207B E78E 2AD1 F65A email : [EMAIL PROTECTED] http://www.core-sdi.com Florida 141 2do cuerpo

CORE-20020409: Multiple vulnerabilities in stack smashing protection technologies

2002-04-24 Thread Iván Arce
CORE SECURITY TECHNOLOGIES Advisory http://www.corest.com Multiple vulnerabilities in stack smashing protection technologies Date Published: 2002-04-23 Last Update: 2002-04-23 Advisory ID: CORE-20020409 Bugtraq ID:

CORE-20020620: Inktomi Traffic Server Buffer Overflow

2002-07-02 Thread Iván Arce
CORE SECURITY TECHNOLOGIES http://www.corest.com Vulnerability Report For Inktomi Traffic Server Date Published: 2002-07-02 Advisory ID: CORE-20020620 Bugtraq ID: 5098 CVE CAN: None currently assigned. Title:

[CORE-20020528] Multiple vulnerabilities in ToolTalk Database server

2002-07-10 Thread Iván Arce
CORE SECURITY TECHNOLOGIES http://www.corest.com Multiple vulnerabilities in Tooltalk database server Date Published: 2002-07-10 Last Update: 2002-07-10 Advisory ID: CORE-20020528 Bugtraq ID: 5082,5083 CVE:

RE: CAIS-ALERT: Vulnerability in the sending requests control of BIND

2002-11-27 Thread Iván Arce
Vagner Sacramento wrote: --- @ Copyright CAIS - Brazilian Research Network CSIRT Security Incidents Response Center (CAIS/RNP) Subject : Vulnerability in the sending requests control of BIND

RE: CAIS-ALERT: Vulnerability in the sending requests control of BIND

2002-11-28 Thread Iván Arce
Hi Vagner, I understand your point but I think the problem remains the same. What I am saying is that the attack you mention is a variation of the something known for years as a result of discussing a fix for the predictable sequence ID problem, which in turn was triggered by the SChuba and