lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <F49851F6D84A3340B090BD94CFE7391907DF6EAB@blvlex1.adelphia.com>
Date: Thu Sep  8 17:51:24 2005
From: dave.cawley at adelphia.com (Dave Cawley)
Subject: Secuirty Hole Found In Dave's Sock

	The sock came with the factory installed configuration.
This hole is not part of that configuration and there is no
mechanism in the origial configuration to close this one off.

***************************************************************
Dave D. Cawley           |
High Speed Internet      |    The number of Unix installations
Duryea, PA               | has grown to 10, with more expected.
(570)451-4311 x104       |  - The Unix Programmer's Manual,1972
dave.cawley@...lphia.com |
***************************************************************
                  URL => http://www.adelphia.net 

-----Original Message-----
From: Craig, Tobin (OIG) [mailto:tobin.craig@...gov] 
Sent: Thursday, September 08, 2005 12:46 PM
To: Dave Cawley; full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock


It seems that the proprietary and the open source manufacturers agreed
upon a standardized default configuration: all models are designed with
one hole, used for deployment. Are you reporting the existence of a
second hole, or is this an observation of the factory installed default
configuration?

My recommendation is to isolate the sock until a full forensic
examination can be performed.

Just another thought,

Tobin




-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
<full-disclosure-bounces@...ts.grok.org.uk>
To: full-disclosure@...ts.grok.org.uk
<full-disclosure@...ts.grok.org.uk>
Sent: Thu Sep 08 12:10:28 2005
Subject: [Full-disclosure] Secuirty Hole Found In Dave's Sock

Date:		9/8/2005

Vulnerability Found:   	Hole In Dave's Socket

Affected System:		Dave's Right Sock

Severity:			Rating: Moderately Critical
				Impact: System access
				Where:  Foot

Description of Vulnerability:  This morning while putting my socks on I
found a small (1/4 inch) hole by my big toe. This could be exploited by
a virus through the bottom of the foot or under the toe nail. This could
be used to compromise Dave's entire system.

Solution: No permanent solution is currently available. A work around is
to wear the sock on the other foot to have the hole above the small toe
where it will not be furthur enlarged, it will proboably fold over and
partially cover the vulnerability. Permanent solution coming in either a
sock darning or upgrading the unit to a new sock.

Time Table:		Found at 7:48am on Sept 8th, 1005
			Work around figured out at 7:49am on Sept 8th,
2005
			Permanent Solution Pending

Credits:		Found by Dave

References:		No references available.


***************************************************************
Dave D. Cawley           |
High Speed Internet      |    The number of Unix installations
Duryea, PA               | has grown to 10, with more expected.
(570)451-4311 x104       |  - The Unix Programmer's Manual,1972
dave.cawley@...lphia.com |
***************************************************************
                  URL => http://www.adelphia.net 
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ