[Full-disclosure] Vista typographical vulnerability

2007-04-15 Thread lsi
Platforms affected: All Distribution: low (lol) It has come to my attention that Macroslut Vista contains at least three spelling errors. These include the Welcome Center, the Security Center and some other center that my poor, addled brain can't recall right now. The Vista in question was

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread chedder1
So... You're going to fight alleged terrorism, with more terrorism... the logic is impecable. And since when does iran have anything to do with terrorism? On Tue, Apr 10, 2007 at 03:45:51AM -0500, United Hackers wrote: _ _ ___ _ __ ___ ___ _ __ | | /| / / _ | /

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Tremaine Lea
Iran has a LOT to do with terrorism. They are the biggest state sponsor of terrorism, followed by Syria. --- Tremaine Lea Network Security Consultant Be in pursuit of equality, but not at the expense of excellence. On 15-Apr-07, at 3:26 AM, [EMAIL PROTECTED] wrote: So... You're going to

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Timo Schoeler
On Sun, 15 Apr 2007 05:40:24 -0600 Tremaine Lea [EMAIL PROTECTED] wrote: Iran has a LOT to do with terrorism. They are the biggest state sponsor of terrorism, followed by Syria. No, biggest state sponsor of terrorism is the USA. --- Tremaine Lea Network Security Consultant Be in

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Dude VanWinkle
Q: What kind of douchebag/douchebagette falls prey to trolls on a security mailing list meant for public disclosures of vulnerabilities? A: More than you would expect, especially considering semi-recent postings -JPan idiot says what? What -Lots of ppl on FD

[Full-disclosure] ZoneAlarm Multiple insufficient argument validation of hooked SSDT function Vulnerability

2007-04-15 Thread Matousec - Transparent security Research
Hello, We would like to inform you about a vulnerability in ZoneAlarm 6. Description: ZoneAlarm hooks many functions in SSDT and in at least two cases it fails to validate arguments that come from the user mode. User calls to NtCreateKey and NtDeleteFile with invalid argument values can

Re: [Full-disclosure] [exploits] RPC vuln in DNS Server (fwd)

2007-04-15 Thread Gadi Evron
-- Forwarded message -- Date: Sat, 14 Apr 2007 18:40:53 +0200 From: Jerome Athias [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: [exploits] RPC vuln in DNS Server Quote from HD Moore: This module has been added to the development version of Metasploit 3, it will be

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread jonnyboi
Looks like the front line have made their first strike. http://www.mod.ir/user.asp?T1=%3Cscript%3Edocument.all%5B5%5D.innerHTML='%3Cp%20align=center%3E%3Cimg%20src=/images/arm.jpg%3E%3Cbr%3Eowned.';%3C/script%3E lol. ___ Full-Disclosure - We believe

[Full-disclosure] URL Encoding/Decoding Flaw Mechanism In ASP.net[1.0-2.0] Based Web Applications.

2007-04-15 Thread Aditya K Sood
Hi all The penetration of web leads to origin of some new artifacts.This in turn helps in understanding the weaknesses and flaws persist in the web applications that lead to origin of exceptions. Asp.net issue have been analyzed. Links: http://zeroknock.metaeye.org/analysis

[Full-disclosure] Windows DNS DnssrvQuery Stack Overflow

2007-04-15 Thread dev code
/* * Copyright (c) 2007 devcode * * * ^^ D E V C O D E ^^ * * Windows DNS DnssrvQuery() Stack Overflow * [CVE-2007-1748] * * * Description: *A vulnerability has been reported in Microsoft Windows, which can *be exploited by malicious people to compromise a vulnerable

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Valdis . Kletnieks
On Sun, 15 Apr 2007 05:40:24 MDT, Tremaine Lea said: Iran has a LOT to do with terrorism. They are the biggest state sponsor of terrorism, followed by Syria. I thought that was Iraq. Or was it Afghanistan? pgpG0ugNtwY2X.pgp Description: PGP signature

[Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Due to security reasons many Web Browsers doesn't allow cross domain XMLHttpRequests. In fact this is only troublesome for web developers and not for virus coders/crackers/etc. Some time ago there was presetened a technic which used cssText property to perform some cross domain requests. After

Re: [Full-disclosure] Vista typographical vulnerability

2007-04-15 Thread John English
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 lsi wrote: In any case if you folks have forgotten, you are speaking English, and in England, centre is spelled C-E-N-T-R-E... OK??? Normally, yes. But actually the OED lists center as legitimate English. It's a secondary usage but not actually

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread ascii
Michal Majchrowicz wrote: Due to security reasons many Web Browsers doesn't allow cross domain XMLHttpRequests. [..] hi Michal, personally i don't get your point (to me it seems just an hybrid implementation using both server side and client side scripting) but i'm sure you can better explain

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Hi. Thanks for showing this vulnerability :) In fact it was not supposed to be safe, but now it shoud be :) You are right this is not a vulnerability by itself but it gives an attacker a very usefull tool for attackers/trojans to perform Real Time Attacks on users browser. Regards Michal. On

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Stefan Esser
Hello, Thanks for showing this vulnerability :) In fact it was not supposed to be safe, but now it shoud be :) You are right this is not a adding if(strstr($_GET['url'],file:)) die; is not safe at all... Regard, Stefan ___

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Hi, Thanks for suggestion. Please try it now :) But as I said before this script WASN'T INTENDED to be safe at all :) I wanted to show that it is posssible to perform some kind of Cross Domain Requests. Thats all :) Regards Michal. On 4/15/07, Stefan Esser [EMAIL PROTECTED] wrote: Hello,

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Zalewski
On Sun, 15 Apr 2007, Michal Majchrowicz wrote: I wanted to show that it is posssible to perform some kind of Cross Domain Requests. As much as I loathe the origin-based security model of modern web browsers, there are semi-valid reasons why XMLHttpRequest is restricted the way it is. A remote

Re: [Full-disclosure] Cross Domain XMLHttpRequest

2007-04-15 Thread Michal Majchrowicz
Hi. I think it is security matter. I don't think that whole XMLHttpRequests should be cross domain. Just a small part of it... Using my script you can create an evil javascript code that will interact with user in real time. You can create (I already did it) a script that will contact some kind of

Re: [Full-disclosure] War against Iran: Update from front lines

2007-04-15 Thread Tremaine Lea
Iraq and Afghanistan participated, but Iran and Syria have long been the source of financing and planning. They are the CC of the terrorist islamist botnet ;) --- Tremaine Lea Network Security Consultant Be in pursuit of equality, but not at the expense of excellence. On 15-Apr-07, at

[Full-disclosure] Microsoft DNS Server Remote Code execution Exploit and analysis

2007-04-15 Thread Andres Tarasco
Hi, im sending you the headers of the new exploit code for microsoft DNS servers. You can download the full source code exploit and analysis at: - http://www.514.es/Microsoft_Dns_Server_Exploit.zip or - http://www.48bits.com/exploits/dnsxpl.rar Microsoft DNS Server Remote Code execution