|
Prev week |
Colapse all |
Post message
Re: Knox Arkeia remote root/system exploit 2005-02-20 H D Moore (sflist digitaloffense net) The metasploit project has released two exploits for this flaw: http://metasploit.com/projects/Framework/exploits.html#arkeia_type77_win 32 http://metasploit.com/projects/Framework/exploits.html#arkeia_type77_mac os The win32 exploit has targets for every version of Arkeia between 4.2 and 5.3.3. T [ more ] [ reply ] [USN-84-1] Squid vulnerabilities 2005-02-21 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-84-1 February 21, 2005 squid vulnerabilities CAN-2005-0194, CAN-2005-0446 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty [ more ] [ reply ] Arkeia Network Backup Client Remote Access 2005-02-20 H D Moore (sflist digitaloffense net) Anyone able to connect to TCP port 617 can gain read/write access to the filesystem of any host running the Arkeia agent software. This appears to be an intentional design decision on the part of the Arkeia developers. A long-winded description of this issue, complete with screen shots, demonstr [ more ] [ reply ] [SECURITY] [DSA 674-3] New mailman packages really fix several vulnerabilities 2005-02-21 joey infodrom org (Martin Schulze) Re: Combining Hashes 2005-02-19 exon (exon home se) Kent Borg wrote: > Concatenating two different hashes, for example SHA-1 and MD5, > apparently does not add as much security as one might hope. > > What about more complicated compositions? For example, a reader > comment posted on Bruce Schneier's blog > (http://www.schneier.com/blog/archives/200 [ more ] [ reply ] Re: Dangers of discarding duplicated messages 2005-02-19 David F. Skoll (dfs roaringpenguin com) On Fri, 18 Feb 2005, Maciej Soltysiak wrote: > Developers: Consider using checksum of the email messages, not only the > Message-ID to distinguish between duplicated messages. We have a product that needs to detect duplicate messages (retransmissions in the face of temporary SMTP failu [ more ] [ reply ] Re: SHA-1 broken 2005-02-19 Michael Cordover (michael cordover gmail com) On this topic, I might actually say that a concatenation of two hashes is very secure if the two hashes are sufficiently different. Although MD5 and SHA1 are reasonably similar, let's suppose for a moment that they use entirely different mechanisms. If this were so and the crack time for MD5 was 2 [ more ] [ reply ] Re: Possible phpBB <=2.0.11 bug or sql injection? 2005-02-18 Giacomo Rizzo (a_l_t_o_s yahoo it) It does not seems to be a SQL injection vulnerability. In fact, it just looks like a wrong replacement, but it's confined into the 'string'. Actually the real problem is that this error, when debug mode is active, make anyone discover the $prefix value, that should be kept secret in case of blind s [ more ] [ reply ] Re: Dangers of discarding duplicated messages 2005-02-18 Gene Rackow (rackow mcs anl gov) There are lots of other things that may need to be done to handle dealing with duplicated message-id's as well. Note that the RFC's mandate that the message-id is unique per message. A number of IMAP packages use the message-id as a way of keeping track of the message in the various folders. Havi [ more ] [ reply ] Re: [Full-Disclosure] Thomson TCW690 Denial Of Service Vulnerability 2005-02-19 Andres Tarasco (atarasco gmail com) Seems to be the same vulnerability published time ago http://www.securityfocus.com/bid/9091 On Sat, 19 Feb 2005 10:43:44 +0100, MurDoK <murdok.lnx (at) gmail (dot) com [email concealed]> wrote: > I found a vulnerability in this cablemodem which a malicious user inside *LAN > can reset it easily. > This cablemodem model is gi [ more ] [ reply ] Re: Combining Hashes 2005-02-19 Felix Cuello (felix qodiga com) On Fri, Feb 18, 2005 at 10:24:19AM -0500, Kent Borg wrote: > Concatenating two different hashes, for example SHA-1 and MD5, > ... SHA and MD5 are weak algorithms [and we do not use it since now]. But what about old digitally signed documents? There is a protocol to re-sign our old digitally signed [ more ] [ reply ] Re: SHA-1 broken 2005-02-19 securityfocus microtechnical co uk In-Reply-To: <011401c51541$fdafedb0$0400a8c0@p14n> I think Thomas has a good point here. We must separate the academic mathematical arguement about collisions from it's application in the real world. It may be that there are collisions in both MD5 and SHA-1 but have they any actual bearing on the u [ more ] [ reply ] Re: SHA-1 broken 2005-02-19 Anatole Shaw (shaw_bugtraq20050218 autoloop com) Sadly, there is no magic bullet for the SHA-1 problem. Let me say, in classic Bugtraq style, that I believe the "temporary workaround for this vulnerability" is to move to SHA-512 as quickly as possible. NIST was going to recommend SHA-256 and SHA-512 by 2010, but for the security-conscious the ti [ more ] [ reply ] Re: SHA-1 broken 2005-02-19 Michael Silk (michaelsilk gmail com) I agree that an anaylsis of their results is nice and important, but also I don't think that it will neccessarily lead to a new "perfect" hashing function we can implement and forget about. A nicer idea is to implement better code that allows us to modify our internal hashing algorithms whenever we [ more ] [ reply ] Re: Joint encryption? 2005-02-19 John Richard Moser (nigelenki comcast net) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 devnull (at) Rodents.Montreal.QC (dot) CA [email concealed] wrote: > [As usual when I write to bugtraq, the from address in the headers > simply discards mail, so I don't have to deal with all the broken > autoresponder mail that would otherwise land on me. To reach me, use > th [ more ] [ reply ] Re: SHA-1 broken 2005-02-19 exon (exon home se) Michael Silk wrote: > Michael, > > But wouldn't it render a login-based hashing system resistant to the > current hashing problems if it is implemented something like: > > -- > result = hashFunc1( input + hashFunc1(input) + salt ) > // > // instead of > // > result = hashFunc1( input + salt [ more ] [ reply ] Re: Joint encryption? 2005-02-19 John Richard Moser (nigelenki comcast net) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Casper.Dik (at) Sun (dot) COM [email concealed] wrote: >>The case where N = 1 is simple authentication; the case where N = M is >>an easily solvable problem in the scope I'm looking at. I'm interested >>in the case where N > M and the data is encrypted. >> >>- Key is fragmented [ more ] [ reply ] Re: [lists] Combining Hashes 2005-02-19 Elliott Bäck (ecb29 cornell edu) Kent Borg wrote: >I admit I don't know why this might be significantly better than >d1+d2, I was hoping someone here would. > > I think there are a couple things going on here. First, since + is concatenation, SHA-1(SHA-1(data)+data+MD5(data)) provides an input to the hash that is three times [ more ] [ reply ] Re: Combining Hashes 2005-02-19 Aaron Mizrachi (unmanarc) (aaron synacksecurity com) El Vie 18 Feb 2005 11:24, Kent Borg escribió: > Concatenating two different hashes, for example SHA-1 and MD5, > apparently does not add as much security as one might hope. > > What about more complicated compositions? For example, a reader > comment posted on Bruce Schneier's blog > (http://www.sc [ more ] [ reply ] Re: Possible phpBB <=2.0.11 bug or sql injection? 2005-02-19 kaosone+[ONE]+ (kaosone gmail com) On 17 Feb 2005 09:54:57 -0000, jtm297 (at) optonline (dot) net [email concealed] <jtm297 (at) optonline (dot) net [email concealed]> wrote: > > It seems it has something to do with the the \'s *'s and length. I am not sure if this is a big bug but I decided to try that after looking at search.php look at function phpbb_clean_username($username) { $use [ more ] [ reply ] Re: Joint encryption? 2005-02-19 devnull Rodents Montreal QC CA [As usual when I write to bugtraq, the from address in the headers simply discards mail, so I don't have to deal with all the broken autoresponder mail that would otherwise land on me. To reach me, use the address in the signature.] > The problem is that I need a guaranteed way to create data for [ more ] [ reply ] Re: Joint encryption? 2005-02-19 Casper Dik Sun COM >The case where N = 1 is simple authentication; the case where N = M is >an easily solvable problem in the scope I'm looking at. I'm interested >in the case where N > M and the data is encrypted. > > - Key is fragmented > - Fragments are indpendently encrypted > - Each user who can authenticate ca [ more ] [ reply ] Re: Dangers of discarding duplicated messages 2005-02-18 Jon Keating (jonkeating gmail com) On Fri, 18 Feb 2005 10:31:50 +0100, Maciej Soltysiak <maciej (at) soltysiak (dot) com [email concealed]> wrote: > Users: Beware of the fact that automatic discarding of duplicated messages > may result in you not getting the original mail in case someone exploits > the effect Adrian depicted. > > Developers: Cons [ more ] [ reply ] exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote exploit 2005-02-19 yan feng (jsk ph4nt0m net) Re: Joint encryption? 2005-02-19 Damian Menscher (menscher uiuc edu) On Fri, 18 Feb 2005, John Richard Moser wrote: > The authentication works as below: > > - N users may authenticate to access the data > - A magnitude M of authenticated users is needed to access the data > - N >= 3 > M >= 2 > > Are there any known ways to do this? Google for secret sharing or secr [ more ] [ reply ] |
|
Privacy Statement |
> Michael Silk wrote:
> > But wouldn't it render a login-based hashing system resistant to the
> >current hashing problems if it is implemented something like:
> >
> > --
> > result = hashFunc1( input + hashFunc1(input) + salt )
> > //
> > // instead of
> >
[ more ] [ reply ]