[Full-disclosure] SUSE Security Announcement: subversion (SUSE-SA:2009:044)

2009-08-14 Thread Thomas Biege
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SUSE Security Announcement Package:subversion Announcement ID:SUSE-SA:2009:044 Date:

[Full-disclosure] Authentication Bypass of Snom Phone Web Interface

2009-08-14 Thread Walter Sprenger
# # # COMPASS SECURITY ADVISORY # http://www.csnc.ch/en/downloads/advisories.html # # # # Product: Snom VoIP/SIP Phones (Snom300, Snom320, Snom360, #Snom370,

[Full-disclosure] http://secreview.blogspot.com -- end of life

2009-08-14 Thread secreview
Hi Everyone, We received a lot of emails from different people asking us what happened to our blog at http://secreview.blogspot.com. What happened is we decided to shut down operations because we don't have time to keep doing reviews. We also don't have time to redo reviews which is needed

[Full-disclosure] [SECURITY] [DSA 1861-1] New libxml packages fix several issues

2009-08-14 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA-1861-1secur...@debian.org http://www.debian.org/security/ Nico Golde August 13th, 2009

[Full-disclosure] ICQ 6.5 HTML-injection vulnerability

2009-08-14 Thread Shine Shadow
ShineShadow Security Report 14082009-08 TITLE ICQ 6.5 HTML-injection vulnerability BACKGROUND With more than 700 million instant messages sent and received every day, ICQ has been known to the online community as a messaging service. Today, a little more than a decade after the first ICQ

Re: [Full-disclosure] Linux NULL pointer dereference due to incorrect proto_ops initializations

2009-08-14 Thread Przemyslaw Frasunek
Tavis Ormandy pisze: Linux NULL pointer dereference due to incorrect proto_ops initializations - Quick and dirty exploit for this one: http://www.frasunek.com/proto_ops.tgz -- * Fido: 2:480/124 ** WWW:

Re: [Full-disclosure] http://secreview.blogspot.com -- end of life

2009-08-14 Thread Gichuki John Chuksjonia
Please bring it back. It was a nice blog, or send me an archive of the ut. Thankx ./Chuks On 8/13/09, secrev...@hushmail.me secrev...@hushmail.me wrote: Hi Everyone, We received a lot of emails from different people asking us what happened to our blog at http://secreview.blogspot.com.

[Full-disclosure] ByPass a BlueCoat Proxy 8100 Serie authentification

2009-08-14 Thread anto...@santo.fr
Title : ByPass a BlueCoat Proxy 8100 Serie (authentification request AND eventually the 3rd party url filtering solution) Date : 14/08/2009 Author : Antoine Santo ** Test one : Try to browse http://www.fcnantes.com/ Result : I

Re: [Full-disclosure] ByPass a BlueCoat Proxy 8100 Serie authentification

2009-08-14 Thread Sebastien gioria
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Is it working on all versions ? Le 14 août 09 à 15:10, anto...@santo.fr a écrit : Title : ByPass a BlueCoat Proxy 8100 Serie (authentification request AND eventually the 3rd party url filtering solution) Date : 14/08/2009 Author : Antoine

Re: [Full-disclosure] ByPass a BlueCoat Proxy 8100 Serie authentification

2009-08-14 Thread Guy
** Test two : i just add a spoofed http header REFERER to a whitelisted (localdatabase) site Result : W00t !! **

[Full-disclosure] nullpointer fix question

2009-08-14 Thread maxigas
hi! Should this fix work against the nullpointer linux kernel vulnerability? Should it break any services on a usual LAMP machine? thx, ps: sorry i lost the header for original message maxigas So, here's the contents of disabled-protocols .

Re: [Full-disclosure] nullpointer fix question

2009-08-14 Thread Tavis Ormandy
maxigas maxi...@anargeek.net wrote: hi! Should this fix work against the nullpointer linux kernel vulnerability? It looks incomplete, I don't see PF_ISDN or PF_IUCV, for example. But this general approach looks fine, and is actually what Red Hat have reccommended to their customers.

Re: [Full-disclosure] ByPass a BlueCoat Proxy 8100 Serie authentification

2009-08-14 Thread anto...@santo.fr
From: Sebastien gioria s...@gioria.org Is it working on all versions ? Tested version : - Software version: SGOS 5.2.4.14 Proxy Edition ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html

[Full-disclosure] [ MDVSA-2009:202 ] memcached

2009-08-14 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:202 http://www.mandriva.com/security/

Re: [Full-disclosure] ByPass a BlueCoat Proxy 8100 Serie authentification

2009-08-14 Thread Guy
** Test two : i just add a spoofed http header REFERER to a whitelisted (localdatabase) site Result   : W00t !! **

[Full-disclosure] Mr. Magorium's Wunderbar Emporium

2009-08-14 Thread Brad Spengler
For those who have been living under a rock for the past two days, an exploit exists for Julien Tinnes/Tavis Ormandy's sendpage vulnerability in all Linux kernels since 2001. My exploit works on 2.4, 2.6, x86, x64, 4k stacks, 8k stacks, with/without cred framework, bypasses mmap_min_addr in

Re: [Full-disclosure] Linux NULL pointer dereference due to incorrect proto_ops initializations

2009-08-14 Thread Soo-Hyun Choi
Excellent catch! This bug report has been sited from many places now. Thanks to Tavis Ormandy and Julien Tinnes. -- Soo-Hyun (s.c...@hackers.org.uk) On Thu, Aug 13, 2009 at 19:57, Tavis Ormandytav...@sdf.lonestar.org wrote: Linux NULL pointer dereference due to incorrect proto_ops

Re: [Full-disclosure] Mr. Magorium's Wunderbar Emporium

2009-08-14 Thread Valdis . Kletnieks
On Fri, 14 Aug 2009 14:53:06 EDT, Brad Spengler said: Congrats Linus on screwing over all the vendors and every Linux user by forcing disclosure of the bug before vendors could ship out updated kernels. Your patch applies well to their binary packages. Poor Linus can't catch a break. Just

Re: [Full-disclosure] BART

2009-08-14 Thread Jacob Appelbaum
Hello auto793...@hushmail.com, As I've previously mentioned, I did not write the first (very boring, uninteresting, technically incorrect) email. It is certainly the case that BART uses stored value cards. BART admits this if you ask them. However, basically everything else in that email is

Re: [Full-disclosure] ByPass a BlueCoat Proxy 8100 Serie authentification

2009-08-14 Thread Alan Buxey
Hi, ** Test two : i just add a spoofed http header REFERER to a whitelisted (localdatabase) site Result : W00t !!

Re: [Full-disclosure] ByPass a BlueCoat Proxy 8100 Serie authentification

2009-08-14 Thread Guy
i think it basically means 'to a site thats been configured as allowed in the configuration of the BC' -   allowed = whitelisted, int he configuration = localdatabase alan Alan, The Bluecoat 8100-C I'm going through has 27 policies in the Web Access Layer. The first policy is configured to

[Full-disclosure] (USA) Fighting the tyranny of fusion centers / JTTF harassment and profiling

2009-08-14 Thread ask . fd
Was wondering what FD's opinions were on fusion centers. www.aclu.org/fusion They are essentially COINTELPRO survellience techniques employed by the FBI-State-Local police to gather intelligence on people. And yeah, you guys fall into the scope. I was wondering what your opinions were on this