Re: [Full-disclosure] Kaminsky Quittinq? Coffee Shop Inevitable?

2008-08-07 Thread Paul Schmehl
--On August 6, 2008 9:14:53 PM -0700 InfoSec DramaReport [EMAIL PROTECTED] wrote: 8/6/2008 An Information Security Drama Report Exclusive It was BlackHat Vegas 2008 at the Prestigious Pwnie Awards and tensions were running high. The audience had been waiting in anticipation for the

[Full-disclosure] Whitepaper: DNS zone redelegation

2008-08-07 Thread Bernhard Mueller
Newly emerging techniques of DNS cache poisoning have caused quite a stir recently, prompting security researchers to speculate on the nature of the issue, and naturally inducing press stunts by some individuals, including accidential information leaks and hasty exploit releases. Many other, more

[Full-disclosure] Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting

2008-08-07 Thread Marc Bevand
Rapid7 Advisory R7-0033 Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting Discovered: July 25, 2008 Published: August 5, 2008 Revision: 1.1 http://www.rapid7.com/advisories/R7-0033 CVE: CVE-2008-2939 1. Affected system(s): KNOWN VULNERABLE: o

[Full-disclosure] infected file ( can someone please report and take it down ? )

2008-08-07 Thread Dr. Mark A. Baiter [Chief Scatological Consultant]
File link http://web292.webbox443.server-home.org/install.exe 77 kb - packed install.exe analysis link http://www.virustotal.com/analisis/4ebbd8e0045798cee6e505f79fe88671 ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] [funsec] facebook messages worm

2008-08-07 Thread Gadi Evron
http://www.kaspersky.com/news?id=20757567 7 days of seeding to impact. Gadi. On Wed, 6 Aug 2008, Gadi Evron wrote: Hi all. There's a facebook (possibly worm) something malicious sending fake messages from real users (friends). The sample also has a remote drop site (verified by

[Full-disclosure] No subject

2008-08-07 Thread az-guy
Not just Rouge apps, it's much more widespread: other colors such as magenta, mauve, fuschia, and even the extremes of pink and purple can also be impacted. On Wed, Aug 6, 2008 at 2:56 PM, John C. A. Bambenek, GCIH, CISSP [EMAIL PROTECTED] wrote: What's the infection vector? URL Link?

Re: [Full-disclosure] [funsec] facebook messages worm

2008-08-07 Thread Gadi Evron
I am constantly updating on this on my twitter account to avoid list clutter: http://twitter.com/gadievron You can watch the infection live on a web counter from the hosting provider that the worm points to. This thing is fast-spreading. Gadi. On Wed, 6 Aug 2008, Gadi Evron wrote:

[Full-disclosure] facebook messages worm

2008-08-07 Thread Gadi Evron
Hi all. There's a facebook (possibly worm) something malicious sending fake messages from real users (friends). The sample also has a remote drop site (verified by someone who shall remain nameless). This is possibly zlob, not verified. Thanks Nick Bilogorskiy for his help. Infection sites

Re: [Full-disclosure] [funsec] facebook messages worm

2008-08-07 Thread Gadi Evron
On Thu, 7 Aug 2008, Juha-Matti Laurio wrote: It has the following mechanism according to McAfee: http://vil.nai.com/vil/content/v_148955.htm They use name W32/Koobface.worm and Kaspersky (Kaspersky Labs originally discovered this threat) uses name Net-Worm.Win32.Koobface.b. This is going to

[Full-disclosure] question

2008-08-07 Thread Dennis Yurichev
Hello, Are there any well-known vendors who would like to buy 0day exploits for their own products? -- My PGP public key: http://yurichev.com/dennis.yurichev.asc pgptYdK7aju9F.pgp Description: PGP signature ___ Full-Disclosure - We believe in

[Full-disclosure] When will they ever get it !?!?!?!

2008-08-07 Thread wilder_jeff Wilder
As you will all know I am one never to post, but I had to bring this to a discussion point. I received an e-mail today from the Gallup Journal inviting me to join their LEET management spam list. Within this inventation, they had provided me with my username (Ahhh how nice) and my password

Re: [Full-disclosure] question

2008-08-07 Thread Valdis . Kletnieks
On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said: Are there any well-known vendors who would like to buy 0day exploits for their own products? Yes, there are. Next question? pgper4x7wU2j2.pgp Description: PGP signature ___

[Full-disclosure] question

2008-08-07 Thread Dennis Yurichev
Hello, I'm sorry, I wrote my question incorrectly. I meant, who among software companies would like to know about vulnerabilities in their own products and *also* would like to pay for this? It's possible to work with them as independent security researcher? -- My PGP public key:

[Full-disclosure] [ MDVSA-2008:161 ] rxvt

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:161 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2008:162 ] qemu

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:162 http://www.mandriva.com/security/

Re: [Full-disclosure] question

2008-08-07 Thread James Matthews
Sure there are many sell it to Macfee :) On Thu, Aug 7, 2008 at 8:56 AM, [EMAIL PROTECTED] wrote: On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said: Are there any well-known vendors who would like to buy 0day exploits for their own products? Yes, there are. Next question?

Re: [Full-disclosure] No subject

2008-08-07 Thread James Matthews
It;s the new facebook friend adder On Wed, Aug 6, 2008 at 3:11 PM, [EMAIL PROTECTED] wrote: Not just Rouge apps, it's much more widespread: other colors such as magenta, mauve, fuschia, and even the extremes of pink and purple can also be impacted. On Wed, Aug 6, 2008 at 2:56 PM, John C. A.

Re: [Full-disclosure] question

2008-08-07 Thread James Matthews
Use Immunity Debugger and look at the ads section On Thu, Aug 7, 2008 at 1:22 PM, Dennis Yurichev [EMAIL PROTECTED] wrote: Hello, I'm sorry, I wrote my question incorrectly. I meant, who among software companies would like to know about vulnerabilities in their own products and *also*

[Full-disclosure] [ MDVSA-2008:163 ] python

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:163 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2008:164 ] python

2008-08-07 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:164 http://www.mandriva.com/security/