--On August 6, 2008 9:14:53 PM -0700 InfoSec DramaReport
[EMAIL PROTECTED] wrote:
8/6/2008
An Information Security Drama Report Exclusive
It was BlackHat Vegas 2008 at the Prestigious Pwnie Awards and
tensions were running high. The audience had been waiting in
anticipation for the
Newly emerging techniques of DNS cache poisoning have caused quite a
stir recently, prompting security researchers to speculate on the nature
of the issue, and naturally inducing press stunts by some individuals,
including accidential information leaks and hasty exploit releases.
Many other, more
Rapid7 Advisory R7-0033
Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting
Discovered: July 25, 2008
Published: August 5, 2008
Revision: 1.1
http://www.rapid7.com/advisories/R7-0033
CVE: CVE-2008-2939
1. Affected system(s):
KNOWN VULNERABLE:
o
File link
http://web292.webbox443.server-home.org/install.exe
77 kb - packed install.exe
analysis link
http://www.virustotal.com/analisis/4ebbd8e0045798cee6e505f79fe88671
___
Full-Disclosure - We believe in it.
Charter:
http://www.kaspersky.com/news?id=20757567
7 days of seeding to impact.
Gadi.
On Wed, 6 Aug 2008, Gadi Evron wrote:
Hi all.
There's a facebook (possibly worm) something malicious sending fake
messages from real users (friends).
The sample also has a remote drop site (verified by
Not just Rouge apps, it's much more widespread: other colors such
as magenta, mauve, fuschia, and even the extremes of pink and
purple can also be impacted.
On Wed, Aug 6, 2008 at 2:56 PM, John C. A. Bambenek, GCIH, CISSP
[EMAIL PROTECTED] wrote:
What's the infection vector? URL Link?
I am constantly updating on this on my twitter account to avoid
list clutter:
http://twitter.com/gadievron
You can watch the infection live on a web counter from the hosting
provider that the worm points to. This thing is fast-spreading.
Gadi.
On Wed, 6 Aug 2008, Gadi Evron wrote:
Hi all.
There's a facebook (possibly worm) something malicious sending fake
messages from real users (friends).
The sample also has a remote drop site (verified by someone who shall
remain nameless).
This is possibly zlob, not verified. Thanks Nick Bilogorskiy for his help.
Infection sites
On Thu, 7 Aug 2008, Juha-Matti Laurio wrote:
It has the following mechanism according to McAfee:
http://vil.nai.com/vil/content/v_148955.htm
They use name W32/Koobface.worm and Kaspersky (Kaspersky Labs originally
discovered this threat) uses name Net-Worm.Win32.Koobface.b.
This is going to
Hello,
Are there any well-known vendors who would like to buy 0day exploits
for their own products?
--
My PGP public key: http://yurichev.com/dennis.yurichev.asc
pgptYdK7aju9F.pgp
Description: PGP signature
___
Full-Disclosure - We believe in
As you will all know I am one never to post, but I had to bring this to a
discussion point.
I received an e-mail today from the Gallup Journal inviting me to join their
LEET management spam list.
Within this inventation, they had provided me with my username (Ahhh how nice)
and my password
On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said:
Are there any well-known vendors who would like to buy 0day exploits
for their own products?
Yes, there are. Next question?
pgper4x7wU2j2.pgp
Description: PGP signature
___
Hello,
I'm sorry, I wrote my question incorrectly.
I meant, who among software companies would like to know about
vulnerabilities in their own products and *also* would like to pay
for this?
It's possible to work with them as independent security researcher?
--
My PGP public key:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:161
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:162
http://www.mandriva.com/security/
Sure there are many sell it to Macfee :)
On Thu, Aug 7, 2008 at 8:56 AM, [EMAIL PROTECTED] wrote:
On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said:
Are there any well-known vendors who would like to buy 0day exploits
for their own products?
Yes, there are. Next question?
It;s the new facebook friend adder
On Wed, Aug 6, 2008 at 3:11 PM, [EMAIL PROTECTED] wrote:
Not just Rouge apps, it's much more widespread: other colors such
as magenta, mauve, fuschia, and even the extremes of pink and
purple can also be impacted.
On Wed, Aug 6, 2008 at 2:56 PM, John C. A.
Use Immunity Debugger and look at the ads section
On Thu, Aug 7, 2008 at 1:22 PM, Dennis Yurichev [EMAIL PROTECTED] wrote:
Hello,
I'm sorry, I wrote my question incorrectly.
I meant, who among software companies would like to know about
vulnerabilities in their own products and *also*
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:163
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:164
http://www.mandriva.com/security/
20 matches
Mail list logo