Vuln Dev Mode:
(Page 16 of 75)  < Prev  11 12 13 14 15 16 17 18 19 20 21  Next >
Outlook Express ; UTF-7 ; References header field problem 2006-04-04
Ruud H.G. van Tol (rvtol isolution nl)
When Outlook Express replies to an UTF-7 encoded message, it erroneously
puts the References header field in UTF-7 format.

By default, OE replies in the format of the message it replies on. With
a specially crafted References header field, this can lead to a very
long References header field.

I ha

[ more ]  [ reply ]
Black Hat Call for Papers and Registration now open 2006-04-03
Jeff Moss (jmoss blackhat com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hey Vuln Dev readers,

This is just a quick note to let you know that Black Hat USA 2006 registration
and Call for Papers is now open.

We expect another outstanding program, and with the addition of more floor
space at Caesars Palace we are able to br

[ more ]  [ reply ]
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-01
Kaveh Razavi (c0d3r ihsteam com) (2 replies)
I saw null byte at the first byte of libc addresses like system execve etc..
I was running 2.6.13 kernel on a x86 32 bit architecture ( slackware 10.2 )
also I saw it when I tried to exploit a tiny application on another 32/x86
running a 2.6.10 kernel ( slackware 10 ) .
I checked again ( after your

[ more ]  [ reply ]
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-04
The Jabberwock (jabberwock tenebrous com) (1 replies)
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-04
Kaveh Razavi (c0d3r ihsteam com) (1 replies)
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-04
The Jabberwock (jabberwock tenebrous com)
Re: Delphi and buffer overflows 2006-04-01
Majid2k SourceForge net
All Programs compiled in Delphi are secure ,Now how to find Overflow in there programs and Exploit them is also my Question !

[ more ]  [ reply ]
mpg123 DoS ... It receives a SIGSEGV. 2006-04-02
"A. Alejandro Hernández" (nitrous conthackto com mx)
Hi !

I was listening a song ( http://www.genexx.org/nitrous/Belanova-Y.mp3 )
and mpg123 died.

I spent 4 hours trying to debug it on gdb, but I cannot really catch
that vulnerability ...

This is a little log, just for see the SIGSEGV:
nitrous@lsd:~/vulndev/mpg123fuck$ file Belanova-Y.mp3
Belanov

[ more ]  [ reply ]
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-03-31
Don Bailey (don bailey gmail com) (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> think deeper , all the distros with randomization I have seen ; also
> have null byte in ret to libc addresses , so that wont work here .
>

Erm, what "distros" are you talking about? I run the latest
Gentoo on sparc64, pa-risc and ppc and none of th

[ more ]  [ reply ]
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-01
sean (infamous41md hotpop com) (1 replies)
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-03
Don Bailey (don bailey gmail com) (1 replies)
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-03
Mike Davis (mdavis imperfectnetworks com)
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-03-31
c0d3r ihsteam com
think deeper , all the distros with randomization I have seen ; also
have null byte in ret to libc addresses , so that wont work here .

c0d3r of IHS
Network Security Researcher

>> As you can see linux-gate.so.1 is linked on stack program and its
>> address isn't randomized.
>>
>> In this range add

[ more ]  [ reply ]
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-03-31
john yahoo com
phrack.org
"pax case study" or something like that. Nergal i think was the author, but i'm too lazy to check.

[ more ]  [ reply ]
Black Hat Call for Papers and Registration now open 2006-03-31
Jeff Moss (jmoss blackhat com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hey Vuln Dev readers,

This is just a quick note to let you know that Black Hat USA 2006 registration
and Call for Papers is now open.

We expect another outstanding program, and with the addition of more floor
space at Caesars Palace we are able to br

[ more ]  [ reply ]
Re: Re: HTTP proxy/redirector to a unique virtual host .... 2006-03-28
info nxsdevelopment com
Have you tried Squid. http://www.squid-cache.org/

You can use squid to proxy outgoing requests and/or incoming requests. I've used it in combination with internal DNS to host multiple websites on multiple webservers with only one external IP address.

[ more ]  [ reply ]
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-03-29
xgc gotfault net (1 replies)
To bypass VA Space Randomization on Linux:

[~/tmp] $ more stack.c
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

int main(int argc, char **argv) {
char buf[256];
strcpy(buf, argv[1]);
return 1;
}
[~/tmp] $ gcc -o stack stack.c
[~/tmp] $ ldd stack
linux-g

[ more ]  [ reply ]
Beating memory address randomization (secuirty) features in Unix/Linux 2006-03-25
hd12787 yahoo com (2 replies)
I've studied how to beat memory adress randomization. Does anyone know how to beat memory address randomization in Unix/Linux? Does anyone know if there are any articles related to this on the web? You can e-mail me directly instead of posting if you would like.

[ more ]  [ reply ]
Re: Beating memory address randomization (secuirty) features in Unix/Linux 2006-04-03
Andrea Purificato - bunker (bunker fastwebnet it)
PasswordSafe 3.0 weak random number generator allows key recovery attack 2006-03-23
info elcomsoft com

Title : PasswordSafe 3.0 weak random number generator allows key recovery attack
Date : March 23, 2006
Product : PasswordSafe 3.0
Discovered by : ElcomSoft Co.Ltd.

Overview
======================================================================

PasswordSafe is a program ori

[ more ]  [ reply ]
Data Entropy Tool 2006-03-23
davidribyrne yahoo com (4 replies)
Can anyone recommend a tool or library for measuring data entropy? Pass it a string, it returns a score.

Thanks,
David Byrne
davidribyrne (at) yahoo (dot) com [email concealed]

[ more ]  [ reply ]
Re: Data Entropy Tool 2006-03-24
Shawn Fitzgerald (sargon97 gmail com)
Re: Data Entropy Tool 2006-03-24
Aaron Turner (synfinatic gmail com)
Re: Data Entropy Tool 2006-03-24
Tom Vier (tmv comcast net) (1 replies)
Re: Data Entropy Tool 2006-03-24
Mike Davis (mdavis imperfectnetworks com)
Re: Data Entropy Tool 2006-03-24
exon (exon home se)
foundstone free tool (ms05-039) 2006-03-23
how2 vuln (how2vuln gmail com)
has anybody used the foundstone free tool for checking ms05-039 vuln?
can you share your experience? i am more curious about the precise
check this tool does in order to determine if a system is vulnerable
or not.

thx.

[ more ]  [ reply ]
(Page 16 of 75)  < Prev  11 12 13 14 15 16 17 18 19 20 21  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus