[Full-disclosure] Sonexis ConferenceManager Exploit MD5 - 20120131

2012-01-31 Thread Adriel Desautels
MD5 (soNoExis.rb.orig) = 6f0e38ef112f10cc1b1fe5437ef3970d ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] interesting need answer

2012-01-31 Thread RandallM
i was working with cleaning up "any to any" on fw. ran across inside ips doing netbios (NS) , and one using port 4330 to 7.8.0.106, or .107. a who is give .miil DoD Network Information Center. ? we are just a manufacturing company. One ip is from a NAS device for staorage. The other is DNS serve

Re: [Full-disclosure] Exploit Pack - New video - Ultimate 2.1

2012-01-31 Thread Gage Bystrom
Not to mention he was originally accused of stealing code from the metasploit base without atribution. That and multiple risky signs on his first website and such. It truly is a wonder that no one has dropped him in a zine or anything like that. Blackhats read FD just as much as the professionals,

Re: [Full-disclosure] Exploit Pack - New video - Ultimate 2.1

2012-01-31 Thread Nate Theis
He's a security searcher: he searches exploit-db to find PoCs to steal. On Jan 30, 2012 2:25 AM, "Mario Vilas" wrote: > I fear the day when he finally succeeds in making enough people > believe he's a real security researcher. I wish attrition.org did a > piece on him in the "charlatans" section.

Re: [Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-31 Thread joernchen of Phenoelit
Hi, On 01/31/2012 05:14 PM, Todd C. Miller wrote: > > joernchen is correct, it is probably still possible to exploit with > -D_FORTIFY_SOURCE=2, though it is more difficult. On systems with > ASLR and a non-executable stack it should be even harder. nasty thing is: it's a local exploit so you g

Re: [Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-31 Thread Todd C. Miller
On Mon, 30 Jan 2012 20:38:25 +0100, Agostino Sarubbo wrote: > The first says: > adding -D_FORTIFY_SOURCE=2 to the OSDEFS line in src/Makfile and rebuilding > sudo will prevent the bug from being exploited. > > The second says: > he above example shows the result of FORTIFY_SOURCE which makes exp

Re: [Full-disclosure] Fw: honeypots

2012-01-31 Thread Kwik Silent
Check out Artillery from http://www.secmaniac.com/ . It's a very cool project by ReL1K. Very easy to install and configure. On Mon, Jan 30, 2012 at 7:55 AM, Jerry dePriest wrote: > ** > winnie the pooh would know... (had to) > > bma > > > - Original Message - > *From:* lallant...@tva

[Full-disclosure] [SECURITY] [DSA 2399-2] php5 regression fix

2012-01-31 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2399-2 secur...@debian.org http://www.debian.org/security/ Thijs Kinkhorst January 31, 2012

[Full-disclosure] [SECURITY] [DSA 2399-1] php5 security update

2012-01-31 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2399-1 secur...@debian.org http://www.debian.org/security/ Thijs Kinkhorst January 31, 2012

Re: [Full-disclosure] Advisory: sudo 1.8 Format String Vulnerability

2012-01-31 Thread Agostino Sarubbo
On Monday 30 January 2012 20:01:36 Henri Salo wrote: > On Mon, Jan 30, 2012 at 02:56:26PM +0100, joernchen of Phenoelit wrote: > > Hi, > > > > FYI, see attached. > > > > cheers, > > > > joernchen > > This seems to be CVE-2012-0809 and reported to Gentoo as > https://bugs.gentoo.org/show_bug.cgi