Brad, Can you provide the details and the menu based exploit :) of the two vulnerabilities discovered by you last year.. It would be really helpful in doing the security assessments...
Thnx, Abhilash On Tue, 11 May 2004 [EMAIL PROTECTED] wrote : >Send Full-Disclosure mailing list submissions to > [EMAIL PROTECTED] > >To subscribe or unsubscribe via the World Wide Web, visit > http://lists.netsys.com/mailman/listinfo/full-disclosure >or, via email, send a message with subject or body 'help' to > [EMAIL PROTECTED] > >You can reach the person managing the list at > [EMAIL PROTECTED] > >When replying, please edit your Subject line so it is more specific >than "Re: Contents of Full-Disclosure digest..." > > >Today's Topics: > > 1. Re: Advisory 04/2004: Net(Free)BSD Systrace local root vulnerability ([EMAIL > PROTECTED]) > 2. RE: Learn from history? (Steffen Kluge) > 3. Re: Registry Watcher (Troy Solo) > 4. Vulnerabilites on a network (Daniele Carlucci) > 5. Re: Learn from history? (Calum) > 6. Re: Vulnerabilites on a network (Oliver Kellermann) > 7. RE: Learn from history? (Jos Osborne) > 8. Calcuating Loss (Michael Schaefer) > 9. RE: Calcuating Loss (Jos Osborne) > 10. Re: msxml3.dll Parsing Error Crashes Internet Explorer Remotely Upon Refresh > (3APA3A) > 11. Re: Calcuating Loss (Harlan Carvey) > 12. [SECURITY] [DSA 502-1] New exim-tls packages fix buffer overflows ([EMAIL > PROTECTED]) > 13. Re: iDEFENSE: Security Whitepaper on Trusted Computing Platforms (Nico Golde) > 14. Re: Victory day - Sasser surrenders (Rob Clark) > 15. Re: Calcuating Loss (Clint Bodungen) > 16. RE: Calcuating Loss (Jos Osborne) > 17. Re: Victory day - Sasser surrenders ([EMAIL PROTECTED]) > 18. info on JRE < 1.4.2_04 vulnerability (Mark W. Webb) > 19. RE: Victory day - Sasser surrenders (Alerta Redsegura) > 20. JRE < 1.4.2_04 vulnerability (Dolphsec) > 21. Re: Calcuating Loss (Harlan Carvey) > 22. Re: Victory day - Sasser surrenders (Maxime Ducharme) > 23. PING: Outlook 2003 Spam ([EMAIL PROTECTED]) > 24. JRE < 1.4.2_02 vulnerability (Dolphsec) > >--__--__-- > >Message: 1 >Date: Tue, 11 May 2004 00:26:38 -0400 >To: [EMAIL PROTECTED] > From: [EMAIL PROTECTED] >Subject: [Full-Disclosure] Re: Advisory 04/2004: Net(Free)BSD Systrace local root >vulnerability > >Just to clarify, this advisory does not involve either of the two >vulnerabilities that I discovered over a year ago now that still remain >unpatched. The one bug is a local root on Linux, NetBSD, FreeBSD, >OpenBSD, and Mac OS X, and any other OS systrace is ported to in the >future. The other bug is a complete bypass of systrace's "security" on >Linux. > >Maybe keep looking Stefan ;) >If you can find them, I'll release my fulling working MENU-BASED >exploit. Actually, I was quite upset at first that someone had killed >my bug but then I read the advisory closer and realized it was a >different local root, imagine that ;) It amazes me that Niels has known >a local root vulnerability has existed in his code for over a year and >yet he hasn't even bothered to audit his own code, but instead continues >to promote it. > >http://monkey.org/openbsd/archive/misc/0304/msg01400.html >"I am looking forward to his local root exploit for systrace." >Sorry Niels, no such luck today :( >It was close! > >-Brad > > >--__--__-- > >Message: 2 > From: Steffen Kluge <[EMAIL PROTECTED]> >To: [EMAIL PROTECTED] >Date: Tue, 11 May 2004 17:23:25 +1000 >Subject: RE: [Full-Disclosure] Learn from history? > > >----=_NextPart_ST_17_23_28_Tuesday_May_11_2004_24174 >Content-Type: text/plain >Content-Transfer-Encoding: quoted-printable > >On Tue, 2004-05-11 at 00:50, Michal Zalewski wrote: > > > R =3D E x p > > > > > > R =3D Risk > > > E =3D event > > > p =3D probability of the event happening > >=20 > > If we must toy with bogus marketspeak "equations", shouldn't E - at the > > very least - numerically correspond to the consequences (loss?) caused by > > an event, rather than being an event itself? > >Of course. Prevalent risk management standards put "impact" in the place >of "event" (which isn't quantifiable anyway). And they don't use an >arithmetic product to combine impact and likelihood, but rather a >matrix, which is not linear but more close to reality. > > > Otherwise, my risk R of getting a bar of chocolate from a stranger is > > 0.001 * getting_chocolate_bar_from_stranger. > >Having avoided carbs for quite a while I can't really comment... > >Cheers >Steffen. > > >----=_NextPart_ST_17_23_28_Tuesday_May_11_2004_24174 >Content-Type: application/pgp-signature; name=signature.asc >Content-Description: This is a digitally signed message part > >-----BEGIN PGP SIGNATURE----- >Version: GnuPG v1.2.2 (GNU/Linux) > >iD8DBQBAoH9tUmpSA4kzHnARAqKXAJ48SuIz+e3Yy/BOQnpAVBed8WHxugCZAT2n >RtME3Nyfdy0FEi/2uBxtlnA= >=h/s6 >-----END PGP SIGNATURE----- > >----=_NextPart_ST_17_23_28_Tuesday_May_11_2004_24174-- > > >--__--__-- > >Message: 3 >Date: Mon, 10 May 2004 23:09:57 -0500 > From: Troy Solo <[EMAIL PROTECTED]> >Organization: DoK Heavy Industries >To: undisclosed-recipients:; >Subject: Re: [Full-Disclosure] Registry Watcher > >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >Pardon if list readers feel this application is 'unworthy' but AdAware >Pro (the pay-for version) has a TSR called AdWatch, that will alert to >ANY changes in the registry, no matter how trivial. Any time a registry >entry is changed or created or deleted, AdWatch will alert you and give >you the option to Accept or Deny. > >The only drawback is that, as far as I know, it is PC-specific. There >is no distributed management of registry changes with AdWatch. > >You can check out AdAware (and AdWatch) at http://www.lavasoft.de > >Sorry if I have mis-read this thread, there has been so much >signal:noise ratio in here that it's hard to keep up. Hope I didn't >waste anyone's time (of course, if you've read this far, I must have >kept your attention for SOME reason.) > >- -- >/**************************/ >/* Troy Solo */ >/* <[EMAIL PROTECTED]> */ >/* Ignotum per Ignotius */ >/**************************/ >-----BEGIN PGP SIGNATURE----- >Version: GnuPG v1.2.4 (MingW32) >Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org > >iD8DBQFAoFIVmaXTPtvAkS0RAgbCAJ4s4rCSMdaZ+Bms9CgQMbyhGXeQlgCffYLN >LbAUWB5YLehteB9S2aobVSQ= >=Gyr/ >-----END PGP SIGNATURE----- > > >--__--__-- > >Message: 4 >Date: Tue, 11 May 2004 10:25:25 +0200 > From: Daniele Carlucci <[EMAIL PROTECTED]> >To: [EMAIL PROTECTED] >Subject: [Full-Disclosure] Vulnerabilites on a network > >Hi, >My name is Daniele. >I'm a student of Informatic Engineering at Politecnico of Torino in Italy. >I make a study about the network's security, can you tell me a link >where I can find an index of the possible lack of a network, for >example, DDOS, worm, congestion, ecc ecc. > >Thanks for your time and for your interest. > >Daniele Carlucci > > >--__--__-- > >Message: 5 > From: Calum <[EMAIL PROTECTED]> >Reply-To: Calum <[EMAIL PROTECTED]> >To: [EMAIL PROTECTED] >Subject: Re: [Full-Disclosure] Learn from history? >Date: Tue, 11 May 2004 10:21:33 +0100 > >On Monday 10 May 2004 22:46, Gwendolynn ferch Elydyr wrote: > > > ... or you may gain glass splinters or razor blades. Do -you- trust > > everything that random strangers give you? > >Maybe we should all stay indoors in case we get hit on the head by a meteor, >or get knocked over by a car. > >It's all about judgement, and evaluating risks. > >-- > >Random russian saying: An indispensable thing never has much value. > >jabber: [EMAIL PROTECTED] >pgp: http://gk.umtstrial.co.uk/~calum/keys.php >Linux 2.6.5-gentoo 10:19:12 up 11 days, 16 min, 1 user, load average: 0.26, >0.31, 0.19 > > >--__--__-- > >Message: 6 > From: "Oliver Kellermann" <[EMAIL PROTECTED]> >To: <[EMAIL PROTECTED]> >Subject: Re: [Full-Disclosure] Vulnerabilites on a network >Date: Tue, 11 May 2004 11:52:36 +0200 > >Hi! > >Try www.google.com. This should usually be the best start for every >informatics engineering student. > >Cheers, >Oliver > > > > > Hi, > > My name is Daniele. > > I'm a student of Informatic Engineering at Politecnico of Torino in Italy. > > I make a study about the network's security, can you tell me a link > > where I can find an index of the possible lack of a network, for > > example, DDOS, worm, congestion, ecc ecc. > > > > Thanks for your time and for your interest. > > > > Daniele Carlucci > > > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.netsys.com/full-disclosure-charter.html > > >--__--__-- > >Message: 7 >Subject: RE: [Full-Disclosure] Learn from history? >Date: Tue, 11 May 2004 11:11:33 +0100 > From: "Jos Osborne" <[EMAIL PROTECTED]> >To: "Full-Disclosure" <[EMAIL PROTECTED]> > >Michal Zalewski wrote: > > > If we must toy with bogus marketspeak "equations", shouldn't E - at the > > very least - numerically correspond to the consequences (loss?) caused by > > an event, rather than being an event itself? > > > > Otherwise, my risk R of getting a bar of chocolate from a stranger is > > 0.001 * getting_chocolate_bar_from_stranger. > > > >Or ten times that if you're prepared to give them your administrator password... > > >--__--__-- > >Message: 8 >Date: Tue, 11 May 2004 08:57:48 -0400 > From: Michael Schaefer <[EMAIL PROTECTED]> >Reply-To: [EMAIL PROTECTED] >To: Full-Disclosure <[EMAIL PROTECTED]> >Subject: [Full-Disclosure] Calcuating Loss > >Loss? > >One of my biggest complaints is the way the industry "loses billions" >whenever a virus or worm breaks out. > >I mean, securing and maintain your server is not a loss. Installing and >updating your anti virus or IDS package is not a loss. All of these >things should have been done anyway. > >If a server goes off line, I guess you could measure the revenue it may >have produced as a loss, but technically, that is lack of income, not >true loss. > >If you see someone complaining about all the money they lost doing what >they should have been doing all along, I just see spin. And politics. > >M > > > > > >Michal Zalewski wrote: > > > > > > > >>If we must toy with bogus marketspeak "equations", shouldn't E - at the > >>very least - numerically correspond to the consequences (loss?) caused by > >>an event, rather than being an event itself? > >> > >> > > >--__--__-- > >Message: 9 >Subject: RE: [Full-Disclosure] Calcuating Loss >Date: Tue, 11 May 2004 14:24:31 +0100 > From: "Jos Osborne" <[EMAIL PROTECTED]> >To: "Full-Disclosure" <[EMAIL PROTECTED]> > > > > >If you see someone complaining about all the money they lost doing what > >they should have been doing all along, I just see spin. And politics. > > > >M > >Especially when it's an AV vendor saying "Look, the IT business lost $2.8 gazillion >due to their being hit by this worm. If only they'd protected their systems with a >reliable anti-virus product we'd all be that much richer. Oh, by the way, wanna buy a >reliable anti-virus package...?" > >90% Self-serving hype >9% Overblown fear >0.9% "Statistical maths" >0.1% Reality > > >--__--__-- > >Message: 10 >Date: Tue, 11 May 2004 17:29:44 +0400 > From: 3APA3A <[EMAIL PROTECTED]> >Reply-To: 3APA3A <[EMAIL PROTECTED]> >Organization: http://www.security.nnov.ru >To: "Rafel Ivgi, The-Insider" <[EMAIL PROTECTED]> >Cc: "bugtraq" <[EMAIL PROTECTED]>, [EMAIL PROTECTED] >Subject: Re: [Full-Disclosure] msxml3.dll Parsing Error Crashes Internet Explorer >Remotely Upon Refresh > >Dear Rafel Ivgi, The-Insider, > >No crash on 6.0.2800. > >--Monday, May 10, 2004, 10:27:40 PM, you wrote to [EMAIL PROTECTED]: > >RITI> msxml3.dll crashes after refreshing a page which contains & inside a >RITI> link/value >RITI> For Example : <Ref href = "&"/> >RITI> This is due to a parsing error in msxml3.dll. > >RITI> Version Details: >RITI> --------------------- >RITI> I.E Version: 6.0.2600.0 >RITI> ModVer: 8.10.8308.0 >RITI> Module name: msxml3.dll >RITI> Offset: 000b8c10 > >RITI> Stack Dump: >RITI> ----------------- >RITI> EAX=01CEE800 >RITI> EDI=01D02580 >RITI> EBX=00000000 >RITI> EBP=02C3F3E4 >RITI> ECX=00000000 >RITI> ESP=02C3FC74 >RITI> EDX=02D91364 >RITI> EIP=02E18C10 >RITI> ESI=00000000 >RITI> DS:00000004 GS:0000 ES:0023 SS:0023 CS:001B > >RITI> Live Example: >RITI> http://theinsider.deep-ice.com/xmlcrash.xml >RITI> AND REFRESH... > >RITI> _______________________________________________ >RITI> Full-Disclosure - We believe in it. >RITI> Charter: http://lists.netsys.com/full-disclosure-charter.html > > >-- >~/ZARAZA >Особую проблему составл