[Full-disclosure] Hackers are having a positive influence on the world

2008-03-07 Thread Jared DeMott
http://www.hackersforcharity.org/ Join the fun! Jared ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerability in Linux Kiss Server v1.2

2008-03-07 Thread David Judais
Sorry, my response became detached from the original thread somehow. On Wed, Mar 5, 2008 at 4:29 PM, David Judais [EMAIL PROTECTED] wrote: Why isn't there a patch? From: [EMAIL PROTECTED] Site: http://www.vashnukad.com Application: Linux Kiss Server v1.2 Type: Format strings

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Thor (Hammer of God)
I made a short reply to this yesterday, but it probably came off as flippant and thus didn't get posted. However, if one insists on leaving their machine unattended in a public place, but have at least locked it, but are still worried that someone will use a hardware-based firewire attack, then

[Full-disclosure] IE8 beta is available - Challenge

2008-03-07 Thread Jay
Who can be the one to find and publish the first exploit? http://www.microsoft.com/windows/products/winfamily/ie/ie8/readiness/Install.htm Jay ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Re: [Full-disclosure] IE8 beta is available - Challenge

2008-03-07 Thread Larry Seltzer
Who can be the one to find and publish the first exploit? I hear you can completely compromise an IE8 system through the Firewire port. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL

Re: [Full-disclosure] IE8 beta is available - Challenge

2008-03-07 Thread Kurt Dillard
Breaking pre-release software doesn't sound all that impressive but I'm sure Microsoft would appreciate more people helping them to find bugs;) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jay Sent: Friday, March 07, 2008 3:39 PM To:

Re: [Full-disclosure] IE8 beta is available - Challenge

2008-03-07 Thread Oliver Starke
LOL :) On Fri, 7 Mar 2008 13:00:55 -0500 Larry Seltzer [EMAIL PROTECTED] wrote: Who can be the one to find and publish the first exploit? I hear you can completely compromise an IE8 system through the Firewire port. Larry Seltzer eWEEK.com Security Center Editor

[Full-disclosure] Multiple vulnerabilities in MailEnable Professional/Enterprise 3.13

2008-03-07 Thread Luigi Auriemma
### Luigi Auriemma Application: MailEnable Professional and Enterprise http://www.mailenable.com Versions: = 3.13 Platforms:Windows Bugs: A] multiple post-auth

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Thor (Hammer of God)
key, then don't have autorun (which is default) automatically enabled for the device. Thanks to Blue Boar for pointing out that autorun doesn't have anything to do with it if the attack device can have the drivers automatically installed (and, of course, that the host controller is enabled).

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Larry Seltzer
Let's say the computer is off. You can turn it on, but that gets you to a login screen. What can the Firewire device do? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blogs.pcmag.com/securitywatch/ Contributing Editor, PC Magazine [EMAIL PROTECTED]

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Larry Seltzer
Let's say the computer is off. You can turn it on, but that gets you to a login screen. What can the Firewire device do? OK, I guess I misunderstood the original paper (http://www.sec-consult.com/fileadmin/Whitepapers/Vista_Physical_Attacks .pdf). It now looks to me like they are claiming they

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Thor (Hammer of God)
The main point is to grab encryption keys from memory where the drive is encrypted - but that has to be while the device is on. I mean, it doesn't really matter if you disable password auth when you have physical access as you can just take the drive out, boot from CD, etc... t -Original

Re: [Full-disclosure] Vulnerability in Linux Kiss Server v1.2

2008-03-07 Thread vashnukad vashnukad
I have not yet notified the vendors. -- Name: Vashnukad e-mail: [EMAIL PROTECTED] Site: http://www.vashnukad.com On 3/5/08, David Judais [EMAIL PROTECTED] wrote: Why isn't there a patch? From: [EMAIL PROTECTED] Site: http://www.vashnukad.com Application: Linux Kiss Server v1.2

[Full-disclosure] [ MDVSA-2008:064 ] - Updated tomboy packages fix improper LD_LIBRARY_PATH handling

2008-03-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:064 http://www.mandriva.com/security/

[Full-disclosure] [ GLSA 200803-13 ] VLC: Multiple vulnerabilities

2008-03-07 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200803-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-07 Thread Bryon Roche
On Fri, 07 Mar 2008 14:51:07 -0500, Larry Seltzer wrote: Let's say the computer is off. You can turn it on, but that gets you to a login screen. What can the Firewire device do? OK, I guess I misunderstood the original paper