unsubscribe

2003-04-25 Thread Andres
unsubscribe - Hot Mobiil - helinad, logod ja piltsõnumid! http://portal.hot.ee

Re: Presentation

2003-04-25 Thread Stefan Neufeind
Seems like again somebody is willing to pay the "donation" to debian? List-admin ... go ahead :-)

Re: Chkrootkit

2003-04-25 Thread Sven . Riedel
Hi, this is not exactly a reply to your question, just a general pointer: whatever you do, don't rely solely on chkrootkit. One woody-box I know of just recently got cracked, and had the viceroy rootkit installed. It was a very poorly done rootkit to boot (ls, ps, netstat etc were all dynamically l

Snort exploit in wild.

2003-04-25 Thread David Ramsden
Hi, Noticed on vil.mcafee.com that a proof of concept exploit for Snort to exploit the vuln. found in v1.8 through to 1.9.1. Packet Storm Security have this proof of concept on their site (local exploit at the moment). It uses a call-back technique to spawn a shell on the attackers machine, via a

Re: Snort exploit in wild.

2003-04-25 Thread Marcel Weber
David Ramsden wrote: Hi, Noticed on vil.mcafee.com that a proof of concept exploit for Snort to exploit the vuln. found in v1.8 through to 1.9.1. Packet Storm Security have this proof of concept on their site (local exploit at the moment). It uses a call-back technique to spawn a shell on the

Re: Snort exploit in wild.

2003-04-25 Thread Gian Piero Carrubba
Il ven, 2003-04-25 alle 11:19, David Ramsden ha scritto: > Noticed on vil.mcafee.com that a proof of concept exploit for Snort to > exploit the vuln. found in v1.8 through to 1.9.1. up to 2.0rc1 as reported by cert > What's the status of a patch from Debian Security? No DSA yet either. > I know

Re: Snort exploit in wild.

2003-04-25 Thread David Ramsden
On Fri, Apr 25, 2003 at 12:13:38PM +0200, Marcel Weber wrote: > David Ramsden wrote: > [snip] > > Following the advice from heise.de [1] it should be enough to comment > out the line: > > preprocessor stream4_reassemble > > in your /etc/snort/snort.conf > > as the vulnerability is in this mod

Re: Snort exploit in wild.

2003-04-25 Thread David Ramsden
- Forwarded message from Marcel Weber <[EMAIL PROTECTED]> - From: Marcel Weber <[EMAIL PROTECTED]> To: David Ramsden <[EMAIL PROTECTED]> Cc: debian-security@lists.debian.org Subject: Re: Snort exploit in wild. X-Virus-Scanned: by AMaViS and OpenAntivirus ScannerDaemon X-Spam-Status: No, hi

Re: SPAMMED ONCE AGIN !!! (Was: Re: Under 10 bucks, cell phone antenna boosters. qmnh coxehywqphhnsg)

2003-04-25 Thread Michelle Konzack
Hello Rich, Am 10:42 2003-04-14 -0500 hat Rich Puhek geschrieben: >Well, no. If you look carefully, you have managed to leak that address >to the list before. On March 17, 2003, for instance (Message-Id: ><[EMAIL PROTECTED]>) you posted a >reply to a question. Although you set your From addre

Woody security updates

2003-04-25 Thread Matthias Faulstich
Hi all! Regularily, security updates for Debian Woody are beeing anounced and recomended for installation. The update packages, as I understand, are available from network for installation with apt under deb http://security.debian.org/ woody/updates main contrib non-free. But what about CD Imag

Re: Secure remote syslogging?

2003-04-25 Thread Lars Ellenberg
On Thu, Apr 24, 2003 at 08:52:10PM +0200, Jose Luis Domingo Lopez wrote: 8< syslog-ng --> named pipe --> perl script --> ssh tunnel --> SQL DB > destination d_logpipe { pipe("/tmp/pipe" owner("someone") template("\( > '$HOST', '$ISODATE', '$FACILITY', +'$PRIORITY', '$MESSAGE' \)\n") ); }; you

fakechroot

2003-04-25 Thread Drew Scott Daniels
For those that missed it on Debian-devel, there's a patched version of fakeroot that does chroot too. You can read about it and better/worse alternatives in the thread at: http://lists.debian.org/debian-devel/2003/debian-devel-200304/msg00747.html Drew Daniels

Team to patch vulnerabilities

2003-04-25 Thread Drew Scott Daniels
Hi, There are a large number of security issues discussed in the BTS. http://qa.debian.org/bts-security.html lists almost all of them. I'm looking at them and trying to create patches for some and bring them to the attention of the appropriate parties. Any help would be appreciated. The security t

Re: pptpd

2003-04-25 Thread Martin Hermanowski
On Fri, Apr 18, 2003 at 07:54:32PM -0400, Noah Meyerhans wrote: > On Fri, Apr 18, 2003 at 11:09:14PM +0200, Martin Hermanowski wrote: > > am I missing an update of pptpd? Today an exploit has been posted to > > bugtraq. > > The update has not yet been released. What is the problem with this secur

Re: Woody security updates

2003-04-25 Thread Paul Hink
Matthias Faulstich <[EMAIL PROTECTED]> wrote: > Does this jigdo - file load the latest security updates or are there any > other > places to download / create CD-Images? AFAIK no. I think you'll have to apt-get update && apt-get upgrade immediately after the installation because CDs can never b

Re: apt-check-sigs.pl

2003-04-25 Thread Javier Fernández-Sanguino Peña
On Thu, Apr 24, 2003 at 06:46:11PM +0200, Adam ENDRODI wrote: > Comments, corrections and enhancements are always welcome. Please add a proper license in the file. GPL? http://www.gnu.org/licenses/gpl-howto.html Regards Javi pgp7fRNrY2gL1.pgp Description: PGP signature

Information in DSAs on necessary restarts due to library-security-updates

2003-04-25 Thread Markus Amersdorfer
Hi! As I described in a mail to debian-devel [1], it seems that with library updates programs using the libraries are generally not restarted. Nevertheless, for programs/services to use the updated libraries a restart would be necessary. Especially with security-updates for such central libraries

Re: Woody security updates

2003-04-25 Thread Drew Scott Daniels
Woody CD updates afaik are only done when stable releases are done. See http://people.debian.org/~joey/stable.html for details. There are nightly builds of CD's for Sarge and Sid, but I don't think I've seen any such thing for stable or oldstable that includes security updates. The nightly builds c

Re: Snort exploit in wild.

2003-04-25 Thread Nick Boyce
On Fri, 25 Apr 2003 10:19:59 +0100, David Ramsden wrote: >Noticed on vil.mcafee.com that a proof of concept exploit for Snort to >exploit the vuln. found in v1.8 through to 1.9.1. [...] >What's the status of a patch from Debian Security? No DSA yet either. >I know this has been brought up a few ti

Re: Snort exploit in wild.

2003-04-25 Thread Noah Meyerhans
On Fri, Apr 25, 2003 at 10:44:49PM +0100, Nick Boyce wrote: > The general consensus of opinion (including the Debian packager) was > that *nobody* should even consider using the V1.8.4 Snort package in > Woody - it's much too old, and has a number of security issues. It's not really that it has a

Apache http server 2.0

2003-04-25 Thread Kim De Smaele
Hi all, I experienced a very strange apache responce today in our production environment at work. A user in a discussion room a posting containing the following characters: ,,'' This gave the result that several pages could not longer be displayed. I also tried this on search engine http

[OT] Re: unsubscribe - Procmail Rule

2003-04-25 Thread Phillip Hofmeister
Can anynone enlighten me why my rule didn't catch this message? :0 * ^X-Mailing-List:[EMAIL PROTECTED] * ^Subject: .{0,2}sub.{1,5}ibe /dev/null I would appreciate it...Thanks. On Fri, 25 Apr 2003 at 08:20:27AM +0300, Andres wrote: > unsubscribe > > - > H