[Full-disclosure] XCon2006 Information Security Conference Change the Open Time

2006-07-06 Thread xundi xfocus
In order not to affect people rest time, XCon2006 was time to change the following: Open Time: 2006-8-22 To 2006-8-24 XCon2006 the Fifth Information Security Conference will be held in Beijing, China, during August 22-24, 2006. China has long been known as a famous cultural country, while

RE: [Full-disclosure] The truth about Rob Levin aka Liloof irc.freenode.net

2006-07-06 Thread Edward Pearson
Yes, shame on you. If Rob took you to court, you'd be in big fucking trouble. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Benjamin Krueger Sent: 05 July 2006 22:42 To: Slotto Corleone Cc: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure]

[Full-disclosure] [SECURITY] [DSA 1104-2] New OpenOffice.org packages fix arbitrary code execution

2006-07-06 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1104-2[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze July 6th, 2006

RE: [Full-disclosure] Re: [WEB SECURITY] Cross Site Scripting inGoogle

2006-07-06 Thread Edward Pearson
For those who didn't read earlier: This isn't a bug, it's a feature. The URL specified is DESIGNED to redirect, e-mailing Google about it is simply going to make you look stupid. Ed -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Javor Ninov Sent: 06

RE: [Full-disclosure] Re: [WEB SECURITY] Cross Site Scripting in Google

2006-07-06 Thread Martin O'Neal
my opinion is that full disclosure is not for vendors .. it's for users. full disclosure is for us to know how to react on certain threads. Which is just fine if you are technically competent to understand the threat, and there is also a valid mitigating strategy you can employ

Re: [Full-disclosure] Re: [WEB SECURITY] Cross Site Scripting in Google

2006-07-06 Thread [EMAIL PROTECTED]
7EF Telephone: +44(0)1483-226000 Email:[EMAIL PROTECTED] ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ __ NOD32 1.1646 (20060706

[Full-disclosure] Format string bug in Sparklet 0.9.4try3

2006-07-06 Thread Luigi Auriemma
### Luigi Auriemma Application: Sparklet http://sparklet.sourceforge.net Versions: = 0.9.4try3 Platforms:Windows, *nix, *BSD and more Bug: format string in client's

[Full-disclosure] Possible code execution in Kaillera 0.86

2006-07-06 Thread Luigi Auriemma
### Luigi Auriemma Application: Kaillera http://www.kaillera.com Versions: = 0.86 Platforms:Windows, Linux and FreeBSD Bug: buffer-overflow Exploitation: remote,

[Full-disclosure] Various heap and stack overflow bugs in AdPlug library 2.0 (CVS 04 Jul 2006)

2006-07-06 Thread Luigi Auriemma
### Luigi Auriemma Application: AdPlug http://adplug.sourceforge.net Versions: = 2.0 and CVS = 04 Jul 2006 Platforms:Windows, DOS, *nix, *BSD and more Bugs: A] heap

Re: [Full-disclosure] Re: [WEB SECURITY] Cross Site Scripting in Google

2006-07-06 Thread n3td3v
On 7/6/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: You can try so [EMAIL PROTECTED] , they should answer very fast at this address... They respond, but I wouldn't go as far to say very fast. You're better having an inside contact, with a private e-mail address, then you really do get a very

Re: [Full-disclosure] Re: [WEB SECURITY] Cross Site Scripting in Google

2006-07-06 Thread n3td3v
On 7/6/06, Martin O'Neal [EMAIL PROTECTED] wrote: my opinion is that full disclosure is not for vendors .. it's for users. full disclosure is for us to know how to react on certain threads. Which is just fine if you are technically competent to understand the threat, and there is also a

[Full-disclosure] Mico crashes when contected with wrong IOR / DoS

2006-07-06 Thread tuergeist
== == == TOC == == == 1. Affected Vendor 2. Affected Product 3. Vulnerability 4. Safety Hazard 5. Disclosure Timeline 6. Vendor Response 7. Patch / Workaround 8. Vulnerability Details - == 1. Affected Vendor == Object Security == 2. Affected Products == MICO - Mico

[Full-disclosure] IBM AIX Security contact?

2006-07-06 Thread Joxean Koret
Hi to all! Anyone knowns what is the f*ng security contact for IBM AIX? -- Zer gutxi balio duen langileen bizitza signature.asc Description: Esta parte del mensaje está firmada digitalmente ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] IBM AIX Security contact?

2006-07-06 Thread Bart . Lansing
No, but try here: [EMAIL PROTECTED] [EMAIL PROTECTED] wrote on 07/06/2006 04:52:44 PM: Hi to all! Anyone knowns what is the f*ng security contact for IBM AIX? -- Zer gutxi balio duen langileen bizitza [attachment signature.asc deleted by Bart Lansing/Corp/Kohls]

[Full-disclosure] Re: IBM AIX Security contact?

2006-07-06 Thread Troy Bollinger
Quoting Joxean Koret ([EMAIL PROTECTED]): Anyone knowns what is the security contact for IBM AIX? [EMAIL PROTECTED] You can use the following PGP key as well: pub 1024D/1B14F299 2006-04-24 [expires: 2007-04-24] Key fingerprint = ED29 18DB E87C 770D 49DC 07AF A1F3 7F26 1B14

Re: [Full-disclosure] The truth about Rob Levin aka Liloof irc.freenode.net

2006-07-06 Thread Eliah Kagan
On 7/6/06, Edward Pearson wrote: Yes, shame on you. If Rob took you to court, you'd be in big fucking trouble. Wow, feel the hate. evilrabbi pointed it out, but maybe you didn't catch it...court records are public... Benjamin Krueger spoke of, SSN, birthdate, and other personal data, but

[Full-disclosure] ZDI-06-021: WebEx Downloader Plug-in Code Execution Vulnerability

2006-07-06 Thread zdi-disclosures
ZDI-06-021: WebEx Downloader Plug-in Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-021.html July 6, 2006 -- CVE ID: CVE-2006-3423 -- Affected Vendor: WebEx Communications -- Affected Products: WebEx Downloader Plug-in (tested on v2.0.0.7) -- TippingPoint(TM)

Re: [Full-disclosure] IBM AIX Security contact?

2006-07-06 Thread COURTNEY ROGERS
Try IBM Serv listed below... Strengthening AIX Security: A System-Hardening Approach This paper provides a baseline of AIX security for system administrators and offers guiding principles to help you begin securing your system. http://www-03.ibm.com/servers/aix/whitepapers/aix_security.html

[Full-disclosure] Re: The truth about Rob Levin aka Liloofirc.freenode.net

2006-07-06 Thread Dave \No, not that one\ Korn
Eliah Kagan wrote: On 7/6/06, Edward Pearson wrote: Yes, shame on you. If Rob took you to court, you'd be in big fucking trouble. Wow, feel the hate. evilrabbi pointed it out, but maybe you didn't catch it...court records are public... Benjamin Krueger spoke of, SSN, birthdate, and other

[Full-disclosure] Major updates to Excel 0-day Vulnerability FAQ at SecuriTeam Blogs

2006-07-06 Thread Juha-Matti Laurio
Several updates to First Microsoft Excel 0-day Vulnerability FAQ document at http://blogs.securiteam.com/?p=451 has been done. * Several exploits for this vuln and other Excel issues has been released recently * PoC sample file Nanika.xls was posted to Bugtraq on Monday already (NOTE: Several

[Full-disclosure] Re: Two-Factor Authentication on the Web

2006-07-06 Thread mikeiscool
On 7/6/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: http://www.theregister.co.uk/2005/04/04/fingerprint_merc_chop/ Carjackers swipe biometric Merc, plus owner's finger honestly, this guy should sue mercedes. this absoutely had to forsee this possibility and they did not care. something like