Advisory description text

2008-01-07 Thread Adam Majer
Moritz Muehlenhoff wrote: > CVE-2007-3382 > > It was discovered that single quotes (') in cookies were treated > as a delimiter, which could lead to an information leak. > > CVE-2007-3385 > > It was discovered that the character sequence \" in cookies was > handled incorrectly, w

Re: Kernerl Vulnerability

2003-01-22 Thread Adam Majer
On Sat, Dec 28, 2002 at 12:30:53AM -0500, Phillip Hofmeister wrote: > All, > > In November there was a kernel vulnerability. I don't recall whether a > DSA was released for 2.4.18 (Debian/Stable). If this has not been > released will it be any time soon? Just update the kernel from Sid or somet

Re: Bind9 stopped after 34 days of uptime

2003-01-22 Thread Adam Majer
On Wed, Dec 25, 2002 at 03:03:19PM +0100, InfoEmergencias - Luis Gomez wrote: > Hi all > > I've been running my company's server with Linux in the same computer for > about six months. Tonight, when I arrived home (my company is in my house) at > about 6 a.m., I noticed I could not browse any we

Re: recent OpenSSL vulnerabilities

2003-04-14 Thread Adam Majer
On Tue, Mar 25, 2003 at 09:51:02AM +0100, Pavel Jurus wrote: > Hello, > I have seen two or three questions but no answer on this list. What > is the status of vulnerabilities announced on http://www.openssl.org/ > from 17-Mar-2003 and 19-Mar-2003. Are the debian packages vulnerable? > > I'm not su

Re: Advice Needed On Recent Rootings

2003-06-02 Thread Adam Majer
On Tue, May 27, 2003 at 11:58:21PM -0500, Jayson Vantuyl wrote: > He appears to modify the kernel image in memory via /dev/kmem (a > next-generation LKM attack). I've considered removing /dev/kmem (does > anything use it?) but I don't know about any side effects (and it > doesn't prevent him mknod

Re: Advice Needed On Recent Rootings

2003-07-28 Thread Adam Majer
On Tue, Jun 03, 2003 at 10:02:09AM -0400, Phillip Hofmeister wrote: > On Mon, 02 Jun 2003 at 03:38:21PM -0500, Adam Majer wrote: > > With something like sendmail or apache, it only needs to see a very > > limited part of the file system, so even braking these will not do >

Re: Debian Stable server hacked

2003-08-12 Thread Adam Majer
On Thu, Aug 07, 2003 at 07:03:13PM +0200, Thijs Welman wrote: > Hi, > > Thanks. I forgot to mantion that i am subscribed to > debian-security-announce as well (ofcourse ;)). As far as the kernel > updates are concerned: i use my own kernel. At this moment that's 2.4.21 > with Alan Cox' patches

Re: Debian Stable server hacked

2003-08-30 Thread Adam Majer
On Fri, Aug 22, 2003 at 10:32:27AM -0400, Matt Zimmerman wrote: > On Wed, Aug 20, 2003 at 05:23:30PM +0200, Adam ENDRODI wrote: > > > > You don't need an executable stack to get control of execution, you only > > > need to be able to change the instruction pointer, which is stored on > > > the sta

woody: modlogan breaks with weird log entries

2004-03-04 Thread Adam Majer
Hi, I have attached a sample of a log that will break modlogan in Woody - first run though seems ok, but then modlogan gets screwed up on subsequent runs; the output hit rate is 1 no next run and then seems to increment by one on each subsequent run. I'm not sure if this is some sort of a bu

Re: Kernerl Vulnerability

2003-01-22 Thread Adam Majer
On Sat, Dec 28, 2002 at 12:30:53AM -0500, Phillip Hofmeister wrote: > All, > > In November there was a kernel vulnerability. I don't recall whether a > DSA was released for 2.4.18 (Debian/Stable). If this has not been > released will it be any time soon? Just update the kernel from Sid or somet

Re: Bind9 stopped after 34 days of uptime

2003-01-22 Thread Adam Majer
On Wed, Dec 25, 2002 at 03:03:19PM +0100, InfoEmergencias - Luis Gomez wrote: > Hi all > > I've been running my company's server with Linux in the same computer for > about six months. Tonight, when I arrived home (my company is in my house) at > about 6 a.m., I noticed I could not browse any we

Re: Advice Needed On Recent Rootings

2003-06-03 Thread Adam Majer
On Tue, May 27, 2003 at 11:58:21PM -0500, Jayson Vantuyl wrote: > He appears to modify the kernel image in memory via /dev/kmem (a > next-generation LKM attack). I've considered removing /dev/kmem (does > anything use it?) but I don't know about any side effects (and it > doesn't prevent him mknod

Re: Advice Needed On Recent Rootings

2003-07-28 Thread Adam Majer
On Tue, Jun 03, 2003 at 10:02:09AM -0400, Phillip Hofmeister wrote: > On Mon, 02 Jun 2003 at 03:38:21PM -0500, Adam Majer wrote: > > With something like sendmail or apache, it only needs to see a very > > limited part of the file system, so even braking these will not do >

Re: Debian Stable server hacked

2003-08-14 Thread Adam Majer
On Thu, Aug 07, 2003 at 07:03:13PM +0200, Thijs Welman wrote: > Hi, > > Thanks. I forgot to mantion that i am subscribed to > debian-security-announce as well (ofcourse ;)). As far as the kernel > updates are concerned: i use my own kernel. At this moment that's 2.4.21 > with Alan Cox' patches

Re: Debian Stable server hacked

2003-08-30 Thread Adam Majer
On Fri, Aug 22, 2003 at 10:32:27AM -0400, Matt Zimmerman wrote: > On Wed, Aug 20, 2003 at 05:23:30PM +0200, Adam ENDRODI wrote: > > > > You don't need an executable stack to get control of execution, you only > > > need to be able to change the instruction pointer, which is stored on > > > the sta

woody: modlogan breaks with weird log entries

2004-03-04 Thread Adam Majer
Hi, I have attached a sample of a log that will break modlogan in Woody - first run though seems ok, but then modlogan gets screwed up on subsequent runs; the output hit rate is 1 no next run and then seems to increment by one on each subsequent run. I'm not sure if this is some sort of a buff

Re: telnetd vulnerability from BUGTRAQ

2004-09-28 Thread Adam Majer
Dale Amon wrote: >The question asked was "why is anyone still using telnet >when there is ssh". > > [snip] >So no, I was not replying about Debian fixes, I was replying >to the general question of 'why telnet at all'. > > I know I will open a can of worms here, but telnet might actually be

Re: {Spam?} Re: woody kernel image

2005-02-03 Thread Adam Majer
Michelle Konzack wrote: >Am 2005-01-30 15:32:25, schrieb Sam Morris: > > > >>Wow, I missed that! Should not the kernel-image-2.4.28-* packages be >>removed from the archive, since they are unsupported, and *very* >>dangerous to use? >> >> > >Sorry, that I ask, but where ist 2.4.28 ? > >The

Security problems with wget

2005-05-21 Thread Adam Majer
Hi, I've uploaded a NMU for wget that should fix the problems with /tmp symlink attack. I've looked at the sources and it seems that woody is also affected by this bug #308622: symlink attack (CAN-2004-2014) And then there is the other security bug, #261755. Is wget in woody going to be updated

Re: IPChains and IPtables

2005-06-03 Thread Adam Majer
Martin G.H. Minkler wrote: Oh, and please take this thread to debian-firewall, I think although it certainly is security-related, that newsgroup still is the better choice for firewall questions :-) This is not a newsgroup. - Adam -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subjec

Re: Bad press related to (missing) Debian security

2005-06-27 Thread Adam Majer
Bob Tanner wrote: >How would one go about getting on the security team? > >If the entry into the security team is as convoluted as becoming a debian >developer I understand why the security team does not have enough active >members. > > I would assume you need to be a DD before you can join th

Re: Bad press related to (missing) Debian security

2005-06-27 Thread Adam Majer
Jan Lühr wrote: >Greetings, > >Am Montag, 27. Juni 2005 15:54 schrieb Carl-Eric Menzel: > > >>Does anybody know what the actual problem is, i.e. why there are no >>updates? >> >> > >This is not an "actual" problem, this problem is rather imho structual. In >it's last one to two years Woody

Re: Bad press related to (missing) Debian security

2005-06-27 Thread Adam Majer
Steve Kemp wrote: >On Mon, Jun 27, 2005 at 02:36:12PM -0400, Noah Meyerhans wrote: > > > >>Even allowing uploads from the secretaries could be helpful. >> >> > > Definitely. > > I've got fixed packages available right now for some of the > bugs which have been raised in this thread, bu

Re: Bad press related to (missing) Debian security

2005-06-28 Thread Adam Majer
martin f krafft wrote: >It surprised everyone, even though it was not a real surprise -- if >that makes sense. The security team has been a major weakness of >Debian for a while. It was only a question of time until it all came >down on Joey. > >Anyway, if you like Debian, then you should keep usi

Rails XSS hole

2010-01-30 Thread Adam Majer
- Adam [1] - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558685 -- Adam Majer ad...@zombino.com commit c15a8c2e95c7098d2372e10be0a4381c36d4fd3b Author: Gabe da Silveira Date: Mon Nov 16 21:17:35 2009 -0800 Make sure strip_tags removes tags which start with a non-printable character

Re: Good Day

2002-07-02 Thread Adam Majer
On Mon, Jul 01, 2002 at 09:55:57PM -0700, Rafael wrote: > > Email should never be accepted from poorly (or intensionaly baddly) setup > servers that do not follow RFCs. > > by master.debian.org with smtp (Exim 3.12 1 (Debian)) > id 17Ozil-0003W2-00; Mon, 01 Jul 2002 06:51:58 -0500

Re: Good Day -- RR and rbl

2002-07-02 Thread Adam Majer
On Tue, Jul 02, 2002 at 12:05:25AM -0700, Alvin Oga wrote: > members of a list, should be able to post to the list... > even if they have broken rr and are listed ( incorrectly ) as > spammers... > member's only posting will fix that .. It sure will, but being this the security list, let

Re: Spamassassin [was: Good Day]

2002-07-05 Thread Adam Majer
On Thu, Jul 04, 2002 at 09:28:36PM +0200, Ralf Gerlich wrote: > > > reading message [EMAIL PROTECTED]:7 of 16 (3715 octets) > > > ...procmail: Program failure (-11) of "/usr/bin/spamassassin" > > > procmail: Rescue of unfiltered data succeeded > > > fetchmail: MDA returned nonzero status 62720 > >

Re: Mail relay attempts

2002-09-01 Thread Adam Majer
> Simple. Random IP-address block scans. Having the box live on the 'net > alone guarantees that it will get some random hits. Prepare to see lot more > of them from here-on. > > Script-kiddies, trying to find suitable hosts for their mass exploitation > tools. Worms, eagerly propagating on th