[Full-disclosure] Real Networks RealPlayer ActiveX Control Heap Corruption

2008-03-09 Thread Elazar Broad
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Who: Real Networks http://www.real.com What: Real Networks Real Player is a popular media player. How: Real Player utilizes an ActiveX control to play content within the users browser. rmoc3260.dll version 6.0.10.45 {2F542A2E-EDC9-4BF7-8CB1-87C9919F

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread Jardel Weyrich
Larry, there is no disk involved on the problem, only memory. So if the disk is encrypted or not, doesn't matter. Regards, Jardel Weyrich On Sun, Mar 9, 2008 at 11:14 PM, Larry Seltzer <[EMAIL PROTECTED]> wrote: > >>WRT the DMA access over FireWire it's but a bad response since it > doesn't get

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread Larry Seltzer
>>You're mistaken in thinking that we're conflating sleep and hibernate modes. >>Microsoft's response of using two factor authentication is silly. It doesn't actually stop our attacks. In certain circumstances, it may shorten the window of attack for a specific type of user but it's mostly irreleva

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread Larry Seltzer
>>WRT the DMA access over FireWire it's but a bad response since it doesn't get the point! >>1. Drive encryption won't help against reading the memory. >>2. The typical user authentication won't help, we're at hardware level >> here, and no OS needs to be involved. >>3. The computer is up (and ru

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread Stefan Kanthak
Larry Seltzer wrote: > I actually do have a response fom Microsoft on the broader issue, but it > doesn't address these issues or even concded that there's necessarily > anything they can do about it. They instead speak of the same > precautions for physical access that they spoke of a couple wee

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread Erik Trulsson
On Fri, Mar 07, 2008 at 02:44:12PM -0500, Larry Seltzer wrote: > Let's say the computer is off. You can turn it on, but that gets you to > a login screen. What can the Firewire device do? Just about anything it wants to. It uses DMA (Direct Memory Access) which can be initiated by any device on t

[Full-disclosure] [ MDVSA-2008:065 ] - Updated pulseaudio packages fix denial of service vulnerabilities

2008-03-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:065 http://www.mandriva.com/security/ ___

[Full-disclosure] [ GLSA 200803-15 ] phpMyAdmin: SQL injection vulnerability

2008-03-09 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200803-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-09 Thread echo6
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Interesting thread, I'll come at it from a different perspective. Computer forensics and incident response also has an application for gaining access to physical memory. Discovering encryption keys from memory and other volatile artifacts may be of u

[Full-disclosure] [SECURITY] [DSA 1514-1] New moin packages fix several vulnerabilities

2008-03-09 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1514-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff March 9, 2008