[Full-disclosure] Help put a stop to incompetent computer forensics - Who the hell cares?

2005-08-11 Thread cranium pain
May I be so rude as to ask who the hell cares about this subject. - This is a full-disclosure list to discuss exploits, techniques. tricks and share the odd ~/ dump, not a play politics about definitions list and quite frankly, I don't want to a) get this crap in my inbox b) read this crap in my

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread ASB
Hey Jason, you really have to make up your mind about whether the old definition is archaic and thus obsolete, or if we should be using the original definition from Homer. You can't keep flopping back and forth like you're running for a major political office. A trojan is well-understood (by

RE: [Full-disclosure] Antivirus

2005-08-11 Thread Randal, Phil
Given the speed at which viruses can spread, daily (or more frequent) pattern updates are a must. As the virus attack vector is still mainly via email, you need to rigorously scan all incoming emails at the perimeter (and block all executables via email). We use MailScanner

[Full-disclosure] ISS vs. Cisco: Chapter 2

2005-08-11 Thread FX
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear list reader, this morning I found to my complete surprise the following email in my inbox, which sheds some light from a different angle on the whole ISS and Cisco story: - -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 FX, I heard you have

[Full-disclosure] Re: iDEFENSE Security Advisory 08.09.05: AWStats ShowInfoURL Remote Command Execution Vulnerability

2005-08-11 Thread Martin Pitt
Hi Laurent, hi iDEFENSE! iDEFENSE Labs [2005-08-09 12:24 -0400]: Shown as follows, the $url parameter contains unfiltered user-supplied data that is used in a call to the Perl routine eval() on lines 4841 and 4842 of awstats.pl (version 6.4): my

[Full-disclosure] Re: Compromising pictures of Microsoft Internet Explorer!

2005-08-11 Thread Michal Zalewski
This experiment resulted in identifying a potential remote code execution path in Microsoft Internet Explorer, plus some other bugs, and should be a good starting point for further testing of other browsers or similar programs. Just for the reference, this is confirmed to be fixed by the

Re: [Full-disclosure] Help put a stop to incompetent computer forensics - Who the hell cares?

2005-08-11 Thread James Tucker
On 8/11/05, cranium pain [EMAIL PROTECTED] wrote: May I be so rude as to ask who the hell cares about this subject. Why ask if you are going to anyway? No, it's not polite to do so, as it's presumtous, and thats worse. This is a full-disclosure list to discuss exploits, techniques. tricks and

Re: [Full-disclosure] Re: Help put a stop to incompetent computer forensics

2005-08-11 Thread Nick FitzGerald
Jason Coombs to Donald J. Ankney: Your definition is just a subset of the standard, broader one. Indeed, that is the case. Had Jason spent a few seconds looking into the real history of the use of the word, its current expert use and its slippery, moving from year to year, common usage he

[Full-disclosure] [USN-164-1] netpbm vulnerability

2005-08-11 Thread Martin Pitt
=== Ubuntu Security Notice USN-164-1August 11, 2005 netpbm-free vulnerability CAN-2005-2471 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Brian Anderson
How many of you are lawyers back to what seemed to be the original point: Data on a drive is just data, unless you can prove how it was created. And generally the data in question can't prove itself, external factors have to be considered. -- * Brian L.

[Full-disclosure] Stop the Trojan War!

2005-08-11 Thread Bart Lansing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Sheesh, it's not rocket science, and some of you seem to think you are historical linguists instead of security professionals. Trojan Horse = Delivery Method Greeks = Malacious Payload The Trojen Horse could have contained plague-infected rats and

[Full-disclosure] [USN-166-1] Evolution vulnerabilities

2005-08-11 Thread Martin Pitt
=== Ubuntu Security Notice USN-166-1August 11, 2005 evolution vulnerabilities http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035922.html CAN-2005-0806 === A

[Full-disclosure] [USN-165-1] heartbeat vulnerability

2005-08-11 Thread Martin Pitt
=== Ubuntu Security Notice USN-165-1August 11, 2005 heartbeat vulnerability CAN-2005-2231 === A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty

Re: [Full-disclosure] Motorist wins case after maths whizzes break speed camera code (fwd)

2005-08-11 Thread James Longstreet
On Wed, 10 Aug 2005, J.A. Terranson wrote: Mr Mirabilis yesterday said he had received more than 100 inquiries from motorists anxious to use the same defence. People have shown it [the algorithm] has been hacked and it's open to viruses. MD5 has viruses?!?! 7122cdcf85cef9500687fb0e5e08faa2

RE: [Full-disclosure] Motorist wins case after maths whizzes breakspeed camera code (fwd)

2005-08-11 Thread Swain, Kenneth
Now we have to worry with collisions and viruses while we speed ; ) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of James Longstreet Sent: Thursday, August 11, 2005 9:32 AM To: J.A. Terranson Cc: Full-Disclosure Subject: Re: [Full-disclosure] Motorist

[Full-disclosure] SUSE Security Announcement: Mozilla various security problems (SUSE-SA:2005:045)

2005-08-11 Thread Marcus Meissner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SUSE Security Announcement Package:mozilla,MozillaFirefox,epiphany,galeon Announcement ID:

[Full-disclosure] Re: ISS vs. Cisco: Chapter 2

2005-08-11 Thread Florian Weimer
FX wrote: I leave the ethical aspects of this request by ISS for the consideration of the inclined reader. They have to collect exploits to write shell code for their IDS products, otherwise they can't create signatures. I recall a similar request and it included this piece of information.

RE: [Full-disclosure] The best 0-day exploit source

2005-08-11 Thread Aditya Deshmukh
[EMAIL PROTECTED]:~$ who runs the site? I want access You need to hack into it, obviously. Wont have to hack just type your password and you are inside - now was that difficult... ? begin 666 smime.p7s M,( 2J2(;W#0$'`J ,( `0$QS )[EMAIL PROTECTED]@,@4`,( 2J2(;W#0$'

RE: [Full-disclosure] Help put a stop to incompetent computer forensics- Who the hell cares?

2005-08-11 Thread Aditya Deshmukh
whitehat* shite ..., so please be so kind as to have a cup of shut the fuck up. I second it please discuss this offlist and don't put me or the list on CC begin 666 smime.p7s M,( 2J2(;W#0$'`J ,( `0$QS )[EMAIL PROTECTED]@,@4`,( 2J2(;W#0$' M`0``H(()?3`P4P@@)NH ,`0(`P]$# [EMAIL

RE: [Full-disclosure] Antivirus

2005-08-11 Thread Aditya Deshmukh
stopped opening any attachments they get that they don't know who they are form and so on. As we all know the end user is the z factor in the whole situation of choosing a good security product. Norton is pretty good enough but I have installed clamav on winxp machines It has a outlook plugin

[Full-disclosure] Re: iDEFENSE Security Advisory 08.09.05: AWStats

2005-08-11 Thread iDFEENSE Labs
Martin, Apologies for the confusion, and thank you for bringing this to our attention. The version information was slightly off in our original advisory. The vulnerability does affect AWStats 6.4 and prior, and the flaw has been addressed in AWStats 6.5. The patch was introduced inadvertantly

Re: [Full-disclosure] responsible disclosure explanation (an example of the fallacy of idealistic thought)

2005-08-11 Thread Florian Weimer
* Matthew Murphy: Let me just define responsible disclosure first of all, so as to dissociate myself from the lunatic lawyers of certain corporations (Cisco, HP, ISS, et al) who define responsible disclosure as non-disclosure. The generally accepted definition of responsible disclosure

Re: [Full-disclosure] responsible disclosure explanation (anexample of the fallacy of idealistic thought)

2005-08-11 Thread Jason Coombs
Florian Weimer wrote: The implicit message that other disclosure processes were irresponsible was invaluable. Invaluable; adjective 'Valuable beyond estimation. Priceless.' http://www.m-w.com/cgi-bin/dictionary?book=Dictionaryva=invaluable You've got that right. It has proved invaluable to

[Full-disclosure] [SECURITY] [DSA 773-1] New amd64 packages fix several bugs

2005-08-11 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 773-1 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 11th, 2005

[Full-disclosure] Privilege escalation in Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3)

2005-08-11 Thread Reed Arvin
Summary: Privilege escalation in Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3) (http://www.nai.com/) Details: The ePolicy Orchestrator Agent web server (which runs on TCP port 8081 by default and serves the McAfee Agent Activity Log) can be used to view files that exist on the

[Full-disclosure] MDKSA-2005:134 - Updated xpdf packages fix vulnerability

2005-08-11 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: xpdf Advisory ID:

[Full-disclosure] MDKSA-2005:135 - Updated kdegraphics packages fix vulnerability

2005-08-11 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: kdegraphics Advisory

[Full-disclosure] MDKSA-2005:136 - Updated gpdf packages fix vulnerability

2005-08-11 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: gpdf Advisory ID:

[Full-disclosure] MDKSA-2005:138 - Updated cups packages fix vulnerability

2005-08-11 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Update Advisory ___ Package name: cups Advisory ID:

[Full-disclosure] Windows 2000 universal exploit for MS05-039

2005-08-11 Thread sl0ppy
/* Windows 2000 universal exploit for MS05-039 -\x6d\x35\x6c\x30\x6e\x6e\x79- */ #define WIN32_LEAN_AND_MEAN #include windows.h #include winnetwk.h #include winsock.h #include Rpc.h #include wchar.h #include stdio.h #include stdlib.h #pragma comment(lib, mpr) #pragma comment(lib, Rpcrt4) BYTE

[Full-disclosure] Bluetooth: Theft of Link Keys for Fun and Profit?

2005-08-11 Thread KF (lists)
Enjoy... Theft of Bluetooth Link Keys for Fun and Profit? kf[at]digitalmunition[dot]com http://www.digitalmunition.com/TheftOfLinkKey.txt In essence two things are required to attack a

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread J.A. Terranson
On Wed, 10 Aug 2005, Jason Coombs wrote: Chuck Fullerton wrote: A Trojan horse is a program that appears to have some useful or benign purpose, but really masks some hidden malicious functionality. A Backdoor is a program that allows attackers to bypass normal security controls on a

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Nick FitzGerald
Jason Coombs to J.A. Terranson: The simple fact of the matter is that what matters *IS* the definition, and you full well know it. What happened here is you slipped and fell, and rather than admitting it you're crying foul - shame on you! I didn't disagree that the broader

[Full-disclosure] WiGA Workaround

2005-08-11 Thread Paul
The line of code detailed at http://www.boingboing.net/2005/07/28/microsoft_genuine_ad.html still works. /rave Catch ya _ one step at a time... Do you Yahoo!? Messenger 7.0 beta: Free worldwide PC to PC

[Full-disclosure] Wine, the implicit Microsoft Windows Genuine Advantage

2005-08-11 Thread Scott Edwards
That's right, you're thinking no way. Wine [http://www.winehq.org] not only runs the validation download, but it also produces a proper validation key. I discovered this weeks ago, but didn't see anyone else mention it yet. Is this an implicit statement of Microsoft for wine? ;) Enjoy. Scott