lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 7 Mar 2003 22:26:09 -0000
From: <zero_latency@...hmail.com>
To: bugtraq@...urityfocus.com
Subject: Re: Sendmail exploit released???


In-Reply-To: <20030305194707.15514.qmail@....securityfocus.com>

in reference to the cworld article, i would say some1 is kinda confused 
around here.....:)

The "russian hacker web site" is actually www.security.nnov.ru, a well 
known infosec news and advisory site, not in the business of "producing" 
exploits for the mass.

They actually made public the advisory from LDS (i would try to confuse a 
polish guy with a russian one ;) 
http://www.security.nnov.ru/search/news.asp?binid=2630

On my opinion, all this rumors surondin the famous sendmail exploit, are 
not meant to aware and alert ppl about risk but to actually misinform them 
and produce terror (and the involved "necesary?"investment on trying 
to "fix this")

i also was truly surprised after reading the comments form ppl like 
Ingevaldson from x-force ensuring "analysis of the code shows that it 
works" or Eric Allman saying "...there are other variables that are not 
pointers that have security implications; finding one of them within range 
will be more difficult, but probably not impossible..." (without specify 
what kind of risk he founds behind this).

The kind of comments that provide companies subjective risk indications, 
are just a tool against ppl trying to be serious about risk management 
security investment.


>Received: (qmail 19838 invoked from network); 5 Mar 2003 20:19:16 -0000
>Received: from outgoing3.securityfocus.com (205.206.231.27)
>  by mail.securityfocus.com with SMTP; 5 Mar 2003 20:19:16 -0000
>Received: from lists.securityfocus.com (lists.securityfocus.com 
[205.206.231.19])
>	by outgoing3.securityfocus.com (Postfix) with QMQP
>	id 48EAAA30A4; Wed,  5 Mar 2003 13:17:45 -0700 (MST)
>Mailing-List: contact bugtraq-help@...urityfocus.com; run by ezmlm
>Precedence: bulk
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@...urityfocus.com>
>List-Help: <mailto:bugtraq-help@...urityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-unsubscribe@...urityfocus.com>
>List-Subscribe: <mailto:bugtraq-subscribe@...urityfocus.com>
>Delivered-To: mailing list bugtraq@...urityfocus.com
>Delivered-To: moderator for bugtraq@...urityfocus.com
>Received: (qmail 25559 invoked from network); 5 Mar 2003 19:39:05 -0000
>Date: 5 Mar 2003 19:47:07 -0000
>Message-ID: <20030305194707.15514.qmail@....securityfocus.com>
>Content-Type: text/plain
>Content-Disposition: inline
>Content-Transfer-Encoding: binary
>MIME-Version: 1.0
>X-Mailer: MIME-tools 5.411 (Entity 5.404)
>From: Kryptik Logik <kryptiklogik@...hmail.com>
>To: bugtraq@...urityfocus.com
>Subject: Sendmail exploit released???
>
>
>
>Folks:
>
>Refer to this article in ComputerWorld 
>http://www.computerworld.com/securitytopics/security/holes/story/0,10801,7
9
>021,00.html about some Russian Hacker site releasing Sendmail exploit 
>code. Is it any different than the LSD exploit code or is is a "security-
>guru-security-know-all" reporters mistake?!
>
>The reason this caught my attention is that they say that the exploit has 
>been tested only on Slackware Linux 8.0 dist just like LSD advisory says 
>
>This article claims that the Russian hackers wrote it and released it on 
>the web first... which kinda irks me off :(
>
><quote from the article>
>... "self-proclaimed security experts located in Nizhny Novgorod, Russia, 
>actually produced the exploit and posted it on the Web"
><unquote>
>
>Can anybody confirm/deny this?
>
># klogik
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ