[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <F49851F6D84A3340B090BD94CFE7391907DF6EAB@blvlex1.adelphia.com>
Date: Thu Sep 8 17:51:24 2005
From: dave.cawley at adelphia.com (Dave Cawley)
Subject: Secuirty Hole Found In Dave's Sock
The sock came with the factory installed configuration.
This hole is not part of that configuration and there is no
mechanism in the origial configuration to close this one off.
***************************************************************
Dave D. Cawley |
High Speed Internet | The number of Unix installations
Duryea, PA | has grown to 10, with more expected.
(570)451-4311 x104 | - The Unix Programmer's Manual,1972
dave.cawley@...lphia.com |
***************************************************************
URL => http://www.adelphia.net
-----Original Message-----
From: Craig, Tobin (OIG) [mailto:tobin.craig@...gov]
Sent: Thursday, September 08, 2005 12:46 PM
To: Dave Cawley; full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Secuirty Hole Found In Dave's Sock
It seems that the proprietary and the open source manufacturers agreed
upon a standardized default configuration: all models are designed with
one hole, used for deployment. Are you reporting the existence of a
second hole, or is this an observation of the factory installed default
configuration?
My recommendation is to isolate the sock until a full forensic
examination can be performed.
Just another thought,
Tobin
-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
<full-disclosure-bounces@...ts.grok.org.uk>
To: full-disclosure@...ts.grok.org.uk
<full-disclosure@...ts.grok.org.uk>
Sent: Thu Sep 08 12:10:28 2005
Subject: [Full-disclosure] Secuirty Hole Found In Dave's Sock
Date: 9/8/2005
Vulnerability Found: Hole In Dave's Socket
Affected System: Dave's Right Sock
Severity: Rating: Moderately Critical
Impact: System access
Where: Foot
Description of Vulnerability: This morning while putting my socks on I
found a small (1/4 inch) hole by my big toe. This could be exploited by
a virus through the bottom of the foot or under the toe nail. This could
be used to compromise Dave's entire system.
Solution: No permanent solution is currently available. A work around is
to wear the sock on the other foot to have the hole above the small toe
where it will not be furthur enlarged, it will proboably fold over and
partially cover the vulnerability. Permanent solution coming in either a
sock darning or upgrading the unit to a new sock.
Time Table: Found at 7:48am on Sept 8th, 1005
Work around figured out at 7:49am on Sept 8th,
2005
Permanent Solution Pending
Credits: Found by Dave
References: No references available.
***************************************************************
Dave D. Cawley |
High Speed Internet | The number of Unix installations
Duryea, PA | has grown to 10, with more expected.
(570)451-4311 x104 | - The Unix Programmer's Manual,1972
dave.cawley@...lphia.com |
***************************************************************
URL => http://www.adelphia.net
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists