[Full-disclosure] [Bkis-05-2009] PowerCHM Stack-based Buffer Overflow

2009-03-25 Thread Bkis
PowerCHM Stack-based Buffer Overflow 1. General Information PowerCHM is a tool that can create CHM files from Html Files, Text Files, Microsoft Word Documents and Adobe Acrobat Document. In March 2009, Bkis has just detected a vulnerability in the software, related to the processing of PowerCH

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Rubén Camarero
_You_ are two dim to imagine that this issue is more like a bug than a vulnerability. If _you_ did try to imagine it, your head would probably explode and xssme would ooze out. On Thu, Mar 26, 2009 at 12:42 AM, Nick FitzGerald wrote: > Rubén Camarero wrote: > > > What great references. Owasp isn'

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Nick FitzGerald
Rubén Camarero wrote: > What great references. Owasp isn't the king of vulnerability information, of > course a website named XSSed is going to count this as super serious, and > while I respect Insecure.. these days, people have exploited web bugs to > their max (and I'm waiting for more), but th

[Full-disclosure] [ GLSA 200903-39 ] pam_krb5: Privilege escalation

2009-03-25 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200903-39 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Re: [Full-disclosure] Fwd: nVidia.com [Url Redirection flaw]

2009-03-25 Thread Pete Licoln
2009/3/25 Lorenzo Vogelsang > Neverthless i think that the open redirect vulnerabilty it's serious, > because "This vulnerability is used in phishing attacks to get users to > visit malicious sites without realizing it." ( > http://www.owasp.org/index.php/Open_redirect) Well that's actually fals

Re: [Full-disclosure] Fwd: nVidia.com [Url Redirection flaw]

2009-03-25 Thread Jeremy Brown
http://en.wikipedia.org/wiki/URL_redirection XSS is often useful when its relevant... Nice try, keep up the research Lorenzo! On Wed, Mar 25, 2009 at 5:54 PM, Lorenzo Vogelsang wrote: > I don't know if this bug it's a "serious one" or not, i only posted a "url > redirection flaw" and i think th

[Full-disclosure] Fwd: nVidia.com [Url Redirection flaw]

2009-03-25 Thread Lorenzo Vogelsang
I don't know if this bug it's a "serious one" or not, i only posted a "url redirection flaw" and i think that its dangerousness and importance should be inferred from the type of vulnerability and the site which is affected... I am still a beginner in the field of security , i still have much to le

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Pete Licoln
There's a difference between an xss and an url redirection .. this post was about an url js based redirection, now it's a Xss, to me that's a lot of talk ( and i do contribute ) for an no persistant xss , now if you wanna have your 2 sec of glory post it on xssed.com ..

[Full-disclosure] [SECURITY] [DSA 1755-1] New systemtap packages fix local privilege escalation

2009-03-25 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1755-1 secur...@debian.org http://www.debian.org/security/ Moritz Muehlenhoff March 25, 2009

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Chris Evans
2009/3/25 Rubén Camarero : > What great references. Owasp isn't the king of vulnerability information, of > course a website named XSSed is going to count this as super serious, and > while I respect Insecure.. these days, people have exploited web bugs to > their max (and I'm waiting for more), bu

[Full-disclosure] phishing attacks against ISPs (also with Google translations)

2009-03-25 Thread Gadi Evron
In this email message I'd like to discuss two subjects: a. Phishing against ISPs. b. Phishing in different languages against ISPs as soon as Google adds a new translation module. [My apologies to those who receive this email more than once. I am approaching several different industries on this mat

[Full-disclosure] [SECURITY] [DSA 1745-2] New lcms packages fix regression

2009-03-25 Thread Steffen Joeris
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1745-2 secur...@debian.org http://www.debian.org/security/ Steffen Joeris March 25, 2009

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread mac . user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 What is this field you brag experience in? Independent Professional Open URL Redirection Vulnerability Reporting? Can you cite any of these statistics you're talking about because to be quite honest we think you're making this up, along with everythi

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Rubén Camarero
What great references. Owasp isn't the king of vulnerability information, of course a website named XSSed is going to count this as super serious, and while I respect Insecure.. these days, people have exploited web bugs to their max (and I'm waiting for more), but they aren't directly serious. DIR

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Valdis . Kletnieks
On Wed, 25 Mar 2009 15:21:42 BST, Lorenzo Vogelsang said: > Despite i've told to nvidia only the "url redirection" flaw i think > that, if "url redirection" will be solved all the xss inherently > vulnerabilites will be solved too. Actual experience in the field has shown that in general, if you

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities

2009-03-25 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities Advisory ID: cisco-sa-20090325-mobileip http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml Revision 1.0 For Public Release 2009 March 25 1600

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software WebVPN and SSLVPN Vulnerabilities

2009-03-25 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco IOS Software WebVPN and SSLVPN Vulnerabilities Advisory ID: cisco-sa-20090325-webvpn http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml Revision 1.0 For Public Release 2009 March 25 1600 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Cisco IOS cTCP Denial of Service Vulnerability

2009-03-25 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco IOS cTCP Denial of Service Vulnerability Advisory ID: cisco-sa-20090325-ctcp http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml Revision 1.0 For Public Release 2009 March 25 1600 UTC (GMT

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread yersinia
2009/3/24 Rubén Camarero > If ATI and nVidia were web content developers, this may be a valid > argument, but they are not. They are graphics vendors, hardware and > software. Not to mention the fact that this isn't a "serious" issue. RFI is > a serious issue, IMHO. > Well, not everyone agreed w

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Jan G.B.
2009/3/24 ascii : > Pete Licoln wrote: >> It's just a browser based Js redirection >> > http://www.nvidia.com/content/DriverDownload/download_confirmation.asp?kw=&url=http://whatismyip.com > > and what makes it worst than an http redirection? > > http://www.nvidia.com/content/DriverDownload/dow

[Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Lorenzo Vogelsang
Yes i've notice that is also vulnerable to Xss.. In fact this link : http://www.nvidia.com/content/DriverDownload/download_confirmation.asp?kw=&url=%22%3E%3Cscript%3Ealert(%22xss%22)%3C/script%3E will succefully popup an "xss" alert message. Moreover i've checked Xssed.com and i saw that a Xss fl

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Anders Klixbull
Helol n3td3v -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of mac.u...@mac.hush.com Sent: 25. marts 2009 15:08 To: full-disclosure@lists.grok.org.uk; mic...@sharescope.co.uk Subject: Re: [Full-disclosure] nV

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread mac . user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Look, this security mailing list is about computer security issues and not meant to be your video gaming blog Also you are confusing the issues of hardware and the drivers and other softwares that interact with them, but that is beside the point!!

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Martin Aberastegue
Well, we have a XSS too, just put whatever you want on the variable "url" closing first the meta refresh tag, i.e: http://www.nvidia.com/content/DriverDownload/download_confirmation.asp?kw=&url=";>http://www.yahoo.com/"; with="100%" height=600>

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Anders Klixbull
Are you smoking crack? -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of mac.u...@mac.hush.com Sent: 25. marts 2009 14:17 To: full-disclosure@lists.grok.org.uk; as...@ush.it Subject: Re: [Full-disclosure] nVi

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread mac . user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Confirmed working with Internet Explorer on Microsoft Windows 7 x64 with all patches. Nice one! On Tue, 24 Mar 2009 15:41:41 -0400 ascii wrote: >Pete Licoln wrote: >> It's just a browser based Js redirection >> >http://www.nvidia.com/content/Dri

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Michal
I'd like to quickly jump on this bandwagon, backing up what someone said about nVidia being a driver company not a website company; nVidia drivers are far FAR better then ATI. Mentioned is the security, yes ok, but in terms of putting ATI and nVidia drivers side by side, nVidia win, hands down. I m

Re: [Full-disclosure] Kaminsky: MS security assessment tool is a 'game changer'

2009-03-25 Thread John Lamb
I don't think he wants credibility as much as he wants inbound links to www.g*ldwatches.com. A site selling gold watches with the domain registered by "John Doe" and a Mailboxes etc mailing address? Niiice! On Mon, Mar 23, 2009 at 03:24:28PM -0400, T Biehn wrote: > I'd like to build up FD credibil

[Full-disclosure] Secunia Research: Adobe Reader JBIG2 Symbol Dictionary Buffer Overflow

2009-03-25 Thread Secunia Research
== Secunia Research 25/03/2009 - Adobe Reader JBIG2 Symbol Dictionary Buffer Overflow - == Table of Contents Affected Software

[Full-disclosure] [IVIZ-09-001] Adobe Acrobat Reader Memory Corruption Vulnerability

2009-03-25 Thread iViZ Security Advisories
-- [ iViZ Security Advisory 09-00125/03/2009 ] -- iViZ Techno Solutions Pvt. Ltd.

Re: [Full-disclosure] nVidia.com [Url Redirection flaw]

2009-03-25 Thread Anders Klixbull
retardo -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of mac.u...@mac.hush.com Sent: 24. marts 2009 18:38 To: full-disclosure@lists.grok.org.uk; vogelsang.lore...@gmail.com Subject: Re: [Full-disclosure] nVi