[Full-Disclosure] Cisco IOS 12.2(4)XR

2002-11-25 Thread Behnam Beikzadeh
Hi,

I need to evaluate Cisco IOS X-Release 12.2(4)XR
(exactly S366CK9W5-12204XR,c3660-ik9w5-mz).

Here is the download URL

http://www.cisco.com/pcgi-bin/Software/Iosplanner/Planner-tool/iosplanner.cgi?majorRel=12.2
 

but the link seems broken and Cisco does not wish to support mentioned IOS anymore. I 
thought somebody may have kept a copy.


Thanks,
Behnam


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



[Full-Disclosure] Netscape Problems.

2002-11-25 Thread zen-parse
In a message on Bugtraq, Last Stage of Delirium wrote:
(http://msgs.securepoint.com/cgi-bin/get/bugtraq0211/255.html)

> We can understand why there was no response from Netscape since the
> three[1][3][4] vulnerabilities affecting Netscape web browser were
> submitted to the Netscape Bug Bounty program which entitles 1000 USD for
> a security bug in Netscape Communicator to its founder. Netscape seems
> to be another American company that does not seem to be fulfilling
> public obligations made through company's web pages
> (http://home.netscape.com/security/bugbounty.html). While we were
> waiting for Netscape's reponse to our vulnerability report, Netscape
> changed(!)  Reward Guidelines of the Bug Bounty program so that now only
> bugs in Netscape 7.x are rewarded (previously both latest 6.x and 4.8
> versions were taken into account). Nice move, huh ?

You might want to see the September 13 email reference below, and then
maybe you could still hold some hope out. Maybe. A little. Or something.)



This email was written on Tuesday 26 November, 6.55pm NZDT.

As of this time, I have yet to recieve any confirmation that I would be 
getting any of the offered Bug Bounty. I have been informed I am eligble, 
however, 

bash-2.04$ egrep '^From: [EMAIL PROTECTED]$' mail/Bugz|wc -l
90
bash-2.04$

90 Messages related to the following bugs dated between

List of bugs and bugzilla.mozilla.org bug names:

PNG1   - 155222 - width integer overflow
PNG2   - ?? - alpha size integer overflow
JAR1   - 157646 - Incorrect uncompressed size causes heap corruption
Javascript - 157652 - sort() and size integer overflow
GIF- 157989 - 0 width GIF

Another bug not mentioned.

And I can't remember if I have told them about the integer overflow in the 
pop3 mail handler,

mozilla/mailnews/local/src/nsPop3Protocol.cpp:
...
 PR_CALLOC(sizeof(Pop3MsgInfo) * m_pop3ConData->number_of_messages);
...

where m_pop3ConData->number_of_messages is a server supplied value, and
sizeof(Pop3MsgInfo) is 8.

How would this be exploitable? Well, if someone offered free email with
POP3 access, there would be at least some people who would take advantage
of it. A malicious server could then potentially take over the running
instance of Netscape/Mozilla.

(gdb) print/u 8 * 536870912 
$1 = 0
(gdb) 

If I told them about this, I never saw any email about it afterwards.
(I believe this is similar to:

http://online.securityfocus.com/bid/3164/discussion/

but I haven't looked at that bug, so I may be wrong.)


Netscape story
==

Fixes:

 PNG1 & PNG2 were fixed with one extra check in 1.0.1/1.1

 JAR1 is/will be fixed in Mozilla 1.2(beta?)

 Javascript potentially exploitable problem was fixed, however not shown 
 to be definately exploitable, however that does not mean it definately is. 
 (Look at the source and see if you can work out how to. Need to 'guess' 
 where the sort is going to place things and need to cause the offsets it
 moves to be the places you need them to be.) (fixed 1.0.1/1.1)

 GIF has had exploit method released, fixed in Mozilla 1.0.1 and 1.1, I 
 believe. The shellcode may be helpful. (The shellcode is not optimal, but 
 at least it tends to work in a threaded environment.) (fixed 1.0.1/1.1(?))


Interesting parts of communications regarding these bugs.

[Please note: some dates below may be approximate due to timezone
differences in the headers. Sorry.]

June 29
===
Completed writeup of heap corruption in Netscape and Mozilla, via PNG.

June 30
===
Reported PNG via Netscape Security Bug form.

July 1
==
Bug added to bugzilla.mozilla.org

[Bug 155222] Heap corruption in PNG library
http://bugzilla.mozilla.org/show_bug.cgi?id=155222

July 7
==
Notified Microsoft of potential problem in Javascript sort() method.
(Netscape was notified on the same day, I believe.)

July 9
==
Microsoft replies with regard to Javascript.

July 13 
=== 
Microsoft closes off on JS bug. Patch becomes available eventually, as 
threat was not seen as high by Microsoft.

+++

Netscape informed of second PNG bug/exploit method.

== Sent ==
 Date: Sat, 13 Jul 2002 04:04:56 +1200 (NZST)
 From: zen-parse <[EMAIL PROTECTED]>
 To: Mitchell Stoltz <[EMAIL PROTECTED]>
 Subject: exploitable heap corruption via PNG Alpha data

(Different section of code, however, similar root cause.)

July 17
===
Fix checked into 1.0.1 tree for bug 155222. (Initial PNG bug.)
Notified Netscape for GIF zero width bug vuln.

August 5

[An update for 155222]
-- Additional Comments From [EMAIL PROTECTED]  2002-08-05 06:16 ---
Since this bug was discussed publicly in the libpng mailing lists
and is described and fixed publicly in libpng-1.2.4/1.0.14,
perhaps it can be made a "public" Mozilla bug.

August 10
=
Emailed Mitchell Stoltz <[EMAIL PROTECTED]> with regards to resolution
time for other PNG bug and jar bugs.

August 12
=
[Bug 157646] Possible heap corruption in libjar
http://bug

[Full-Disclosure] MDKSA-2002:082 - Updated python packages fix local arbitrary code execution vulnerability

2002-11-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



Mandrake Linux Security Update Advisory


Package name:   python
Advisory ID:MDKSA-2002:082
Date:   November 25th, 2002

Affected versions:  7.2, 8.0, 8.1, 8.2, 9.0,
Single Network Firewall 7.2


Problem Description:

 A vulnerability was discovered in python by Zack Weinberg in the way
 that the execvpe() method from the os.py module uses a temporary file
 name.  The file is created in an unsafe manner and execvpe() tries to
 execute it, which can be used by a local attacker to execute arbitrary
 code with the privilege of the user running the python code that is
 using this method.


References:
  
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1119
  http://mail.python.org/pipermail/python-dev/2002-August/027223.html
  http://python.org/sf/590294


Updated Packages:
  
 Linux-Mandrake 7.2:
 e9e016b6b07fc58997f02b78b299f105  7.2/RPMS/python-1.5.2-12.1mdk.i586.rpm
 f08129c7b43de40eb712b0a7d4a5554e  7.2/RPMS/python-devel-1.5.2-12.1mdk.i586.rpm
 0e59d9f64e6f8be19f4e2dc73a2b2090  7.2/RPMS/python-docs-1.5.2-12.1mdk.i586.rpm
 d969562e109022071cf69515cf9146b9  7.2/RPMS/tkinter-1.5.2-12.1mdk.i586.rpm
 411eb33a72870ba125b7331ab9f077a4  7.2/SRPMS/python-1.5.2-12.1mdk.src.rpm

 Mandrake Linux 8.0:
 9e9c147b6260b731016be16837d2cd09  8.0/RPMS/python-2.0-9.1mdk.i586.rpm
 c3a0d50a5c4ef7fd374c9e7614c9a0c6  8.0/RPMS/python-devel-2.0-9.1mdk.i586.rpm
 c7c31e4986334484d470066b6c2db346  8.0/RPMS/python-docs-2.0-9.1mdk.i586.rpm
 69a2f2e7d10fb885592d7b4943dcac61  8.0/RPMS/tkinter-2.0-9.1mdk.i586.rpm
 c24d21f1d7e7e454c2ce78d2ce84a015  8.0/SRPMS/python-2.0-9.1mdk.src.rpm

 Mandrake Linux 8.0/PPC:
 8c35df120638c62d47f586d4faf702d4  ppc/8.0/RPMS/python-2.0-9.1mdk.ppc.rpm
 4d54961b8e8cdc301719f42855c6e45c  ppc/8.0/RPMS/python-devel-2.0-9.1mdk.ppc.rpm
 d9943638bf6d8ff59950faef4a832c48  ppc/8.0/RPMS/python-docs-2.0-9.1mdk.ppc.rpm
 5f57afb7e9d2042200e8ecd84e83143e  ppc/8.0/RPMS/tkinter-2.0-9.1mdk.ppc.rpm
 c24d21f1d7e7e454c2ce78d2ce84a015  ppc/8.0/SRPMS/python-2.0-9.1mdk.src.rpm

 Mandrake Linux 8.1:
 47695f02d722a8a7393af449a556fcc7  8.1/RPMS/libpython2.2-2.2-9.1mdk.i586.rpm
 3fcb8dfd92f1dfaa076a95f227fee87c  8.1/RPMS/libpython2.2-devel-2.2-9.1mdk.i586.rpm
 0f2f801268d9348f93c67a96d4d0f9d7  8.1/RPMS/python-2.2-9.1mdk.i586.rpm
 b69396894c2575949718df77d781  8.1/RPMS/python-base-2.2-9.1mdk.i586.rpm
 81ab8ba9cd85b0bea9029aac3ed0d652  8.1/RPMS/python-docs-2.2-9.1mdk.i586.rpm
 339191d1e03b5961cc625d2e4996f15f  8.1/RPMS/tkinter-2.2-9.1mdk.i586.rpm
 d1ac7fa2119ec7c84d408027d44f8525  8.1/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 8.1/IA64:
 f27d9c351d9a74b5ea431956b33796af  ia64/8.1/RPMS/libpython2.2-2.2-9.1mdk.ia64.rpm
 ccc514a11b7906c2ca2a3d32b63cf85b  ia64/8.1/RPMS/libpython2.2-devel-2.2-9.1mdk.ia64.rpm
 b80f7653eb52b8de5bcd1eac9b39a882  ia64/8.1/RPMS/python-2.2-9.1mdk.ia64.rpm
 68e4333b0ab080c7bf441728d1f96544  ia64/8.1/RPMS/python-base-2.2-9.1mdk.ia64.rpm
 6915e488de60562b3728fe7e476fd9a8  ia64/8.1/RPMS/python-docs-2.2-9.1mdk.ia64.rpm
 d1ac7fa2119ec7c84d408027d44f8525  ia64/8.1/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 8.2:
 22771586df09a081fdd8c00b84a01611  8.2/RPMS/libpython2.2-2.2-9.1mdk.i586.rpm
 4649b5d23aeb0a0868c21a0950ef6166  8.2/RPMS/libpython2.2-devel-2.2-9.1mdk.i586.rpm
 1aa805b1f870bcb8e042def0d1011719  8.2/RPMS/python-2.2-9.1mdk.i586.rpm
 3adaec8a682f16962ba52c984fd6270c  8.2/RPMS/python-base-2.2-9.1mdk.i586.rpm
 137abe1f02e02e89bf2b635b76d07892  8.2/RPMS/python-docs-2.2-9.1mdk.i586.rpm
 107a60f5b00f477514038459801d156d  8.2/RPMS/tkinter-2.2-9.1mdk.i586.rpm
 d1ac7fa2119ec7c84d408027d44f8525  8.2/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 abb56b161b156cac0cba992e470d98a9  ppc/8.2/RPMS/libpython2.2-2.2-9.1mdk.ppc.rpm
 c8848d308e18571eb43452ad5e57907f  ppc/8.2/RPMS/libpython2.2-devel-2.2-9.1mdk.ppc.rpm
 5a065c10e341216cb02516166d12cdfa  ppc/8.2/RPMS/python-2.2-9.1mdk.ppc.rpm
 5fb31cc3f167e4f0a1e813ed535ea0a8  ppc/8.2/RPMS/python-base-2.2-9.1mdk.ppc.rpm
 f82636adec1620a226fce4781a771c08  ppc/8.2/RPMS/python-docs-2.2-9.1mdk.ppc.rpm
 fd7d4732704cc5d65d3db31aadc30679  ppc/8.2/RPMS/tkinter-2.2-9.1mdk.ppc.rpm
 d1ac7fa2119ec7c84d408027d44f8525  ppc/8.2/SRPMS/python-2.2-9.1mdk.src.rpm

 Mandrake Linux 9.0:
 68816873ca418b97541ab7b817659f6d  9.0/RPMS/libpython2.2-2.2.1-14.1mdk.i586.rpm
 b563b5a12f11f65463e21e5035b5bff6  9.0/RPMS/libpython2.2-devel-2.2.1-14.1mdk.i586.rpm
 1fd791067dd84dc2f7ed0b9d1d67348d  9.0/RPMS/python-2.2.1-14.1mdk.i586.rpm
 3e011ff7fb03797803b129341ff7f087  9.0/RPMS/python-base-2.2.1-14.1mdk.i58

[Full-Disclosure] MDKSA-2002:081 - Updated samba packages fix potential root compromise

2002-11-25 Thread Mandrake Linux Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



Mandrake Linux Security Update Advisory


Package name:   samba
Advisory ID:MDKSA-2002:081
Date:   November 25th, 2002

Affected versions:  8.1, 8.2, 9.0


Problem Description:

 A vulnerability in samba versions 2.2.2 through 2.2.6 was discovered
 by the Debian samba maintainers.  A bug in the length checking for
 encrypted password change requests from clients could be exploited
 using a buffer overrun attack on the smbd stack.  This attack would
 have to crafted in such a way that converting a DOS codepage string to
 little endian UCS2 unicode would translate into an executable block of
 code.
 
 This vulnerability has been fixed in samba version 2.2.7, and the
 updated packages have had a patch applied to fix the problem.


References:
  
  http://www.samba.org/samba/whatsnew/samba-2.2.7.html


Updated Packages:
  
 Mandrake Linux 8.1:
 b10451e71a1ba27d45956f57fb203118  8.1/RPMS/samba-2.2.2-3.3mdk.i586.rpm
 22a6f9977518bbe2923ec7d2f68a698e  8.1/RPMS/samba-client-2.2.2-3.3mdk.i586.rpm
 74d59e5578aaa0a23e760c828a6d8688  8.1/RPMS/samba-common-2.2.2-3.3mdk.i586.rpm
 6d6a2835fd6e21b4c93dbaa5fe6f2d13  8.1/RPMS/samba-doc-2.2.2-3.3mdk.i586.rpm
 4c7511781a263f633cab5bf1831ad69b  8.1/SRPMS/samba-2.2.2-3.3mdk.src.rpm

 Mandrake Linux 8.1/IA64:
 2456e2af90d2e71e877a16f2ff034c73  ia64/8.1/RPMS/samba-2.2.2-3.3mdk.ia64.rpm
 66043b111988d82d2800763950ea07e3  ia64/8.1/RPMS/samba-client-2.2.2-3.3mdk.ia64.rpm
 6954d750eae921eece5e1e2ece9c42e5  ia64/8.1/RPMS/samba-common-2.2.2-3.3mdk.ia64.rpm
 cf5545988b8d07299b776a25d6dc2e56  ia64/8.1/RPMS/samba-doc-2.2.2-3.3mdk.ia64.rpm
 4c7511781a263f633cab5bf1831ad69b  ia64/8.1/SRPMS/samba-2.2.2-3.3mdk.src.rpm

 Mandrake Linux 8.2:
 5552fadd8509fc7222099f88dad0f5a9  8.2/RPMS/nss_wins-2.2.3a-10.1mdk.i586.rpm
 58da182a9a84a02010ddaf939e97bc7c  8.2/RPMS/samba-2.2.3a-10.1mdk.i586.rpm
 91dcff33758dca1ca9a4779186a6917d  8.2/RPMS/samba-client-2.2.3a-10.1mdk.i586.rpm
 ce98076728c73ca79b78fc9d69b94b47  8.2/RPMS/samba-common-2.2.3a-10.1mdk.i586.rpm
 983c2de083b240971026bb054b449fde  8.2/RPMS/samba-doc-2.2.3a-10.1mdk.i586.rpm
 fe4c7a8ebedede8ac10ff98eac2b84a5  8.2/RPMS/samba-swat-2.2.3a-10.1mdk.i586.rpm
 ec00eed80e135dd79b56608bbd2c0574  8.2/RPMS/samba-winbind-2.2.3a-10.1mdk.i586.rpm
 5677dee51659f50acee4e55346ca737d  8.2/SRPMS/samba-2.2.3a-10.1mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 32e41a8c06f1b5b24b13de0f65dfa3cc  ppc/8.2/RPMS/nss_wins-2.2.3a-10.1mdk.ppc.rpm
 275bf7b8a2792e11bf94dc24557f8ebc  ppc/8.2/RPMS/samba-2.2.3a-10.1mdk.ppc.rpm
 66232f77afcacc83090e3cf848717962  ppc/8.2/RPMS/samba-client-2.2.3a-10.1mdk.ppc.rpm
 912ccb4cc81f89de6de871aa1c4833c0  ppc/8.2/RPMS/samba-common-2.2.3a-10.1mdk.ppc.rpm
 af73612d4ea52c4a391ca75afd0dae8b  ppc/8.2/RPMS/samba-doc-2.2.3a-10.1mdk.ppc.rpm
 2117cd7af96f6467c867faef73a425b6  ppc/8.2/RPMS/samba-swat-2.2.3a-10.1mdk.ppc.rpm
 ab0402b7173a04be1cbc6c415807b98a  ppc/8.2/RPMS/samba-winbind-2.2.3a-10.1mdk.ppc.rpm
 5677dee51659f50acee4e55346ca737d  ppc/8.2/SRPMS/samba-2.2.3a-10.1mdk.src.rpm

 Mandrake Linux 9.0:
 25b264e1b5ee43b26d861f5b5e07d7d2  9.0/RPMS/nss_wins-2.2.7-2.1mdk.i586.rpm
 619a0506a84d25099ca0653be0f5fd3a  9.0/RPMS/samba-client-2.2.7-2.1mdk.i586.rpm
 d7ed710067f71285cc616fe07efd7753  9.0/RPMS/samba-common-2.2.7-2.1mdk.i586.rpm
 2b5667097a398ef87e9e721c26bb613b  9.0/RPMS/samba-doc-2.2.7-2.1mdk.i586.rpm
 ff124b4103dd84e51f5be82dd9244b1f  9.0/RPMS/samba-server-2.2.7-2.1mdk.i586.rpm
 a7b976a81f59d7ce7111cb5f44d89bcd  9.0/RPMS/samba-swat-2.2.7-2.1mdk.i586.rpm
 0859d8665e9d2ea2f1f96365a7456e3f  9.0/RPMS/samba-winbind-2.2.7-2.1mdk.i586.rpm
 b93cd8ca9319a628ee7015bbd5d2196e  9.0/SRPMS/samba-2.2.7-2.1mdk.src.rpm


Bug IDs fixed (see https://qa.mandrakesoft.com for more information):


To upgrade automatically, use MandrakeUpdate.  The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".  A list of
FTP mirrors can be obtained from:

  http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:

  rpm --checksig 

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team from:

  https://www.mandrakesecure.net/RPM-GPG-KEYS

Plea

RE: [Full-Disclosure] PHC replies to criticism

2002-11-25 Thread Nuno Fernandes
Why don't you PHC freaks get a life.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]] On Behalf Of
[EMAIL PROTECTED]
Sent: Sunday, November 24, 2002 6:16 PM
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] PHC replies to criticism


-BEGIN PGP SIGNED MESSAGE-

Hello,

In response to Len's administrivia...

We have decided to avoid self-defeating personal vendettas on this list
and
focus on those critics of PHC who possess the ability to think clearly
and make
cogent arguments. Such critics include Paul Schmehl and Steve Manzuik,
perhaps
the only critics on this list who have displayed clarity of thought and
the
ability to make logical and relevant arguments against what we have
said.

No names will be mentioned here, but we will be ignoring the following
classes
of people:

1. Those paranoid schizophrenics who make outlandish conspiracy theory
claims
suggesting that PHC is a government project or that PHC has been
influenced by
the government. We're not sure if these people are serious, but anyway.
The
meds aren't meant to taste good.

2. Those weak-minded individuals who, as we have mentioned in a previous
sermon, resort to nothing but ad hominem attacks such as "lamers,"
"scriptkids," "newbies," and so on -- attacks they can't back up with
evidence
when challenged, i.e. they ignore the challenge totally and throw out
further
unsubstantiated, vaporous drivel. This makes them look like stubborn
intellectual midgets who are capable of nothing except baseless
monologues.

3. Those people unable to focus on the points raised, but instead choose
to go
off on a tangent with their self-promotional rants about how they are
reformed
blackhats and such. The transparency of these people in their job
hunting
process is truly laughable. This is a really silly thing to note here,
but one
of these individuals who has been online since 1994 has called PHC
"fresh
bloods," when in actual fact the majority of PHC has been online since
before
then, as is clearly evident to anyone who researches old ezine releases
and
knows enough about PHC to make accurate connections. As if time online
necessarily relates to "skillz" or other irrelevant crap, anyway.

4. People sending in "narc" logs that have been floating around for a
long
time, not realizing that they are actually doing us a favour in
vindicating us
of terrorism motives.

Well, OK, we will mention one name: the fake 'nwonknu' who also appears
to be
the fake 'shiftee'. Do what you may, but you are welcome to email us and
express your grievances against us. Don't read into this as a passive
assimilation tactic, though.

As an exercise to the reader, see if you can classify the expected
replies to
this post based on the classes outlined above. The person who posts the
most
accurate classification attempt will be awarded op status in #phrack
(yay).


PHC



-BEGIN PGP SIGNATURE-
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wlgEARECABgFAj3hX/QRHHBoY0BodXNobWFpbC5jb20ACgkQ0rw64nEc6GLidwCeIdQD
vrHFRPAGR199hHQGOJ6c07cAoJjD4BnslhqHtTdj7GWDykpKI70X
=ohf1
-END PGP SIGNATURE-




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



Re: [Full-Disclosure] [PHC] Sermon #3 (w/ reply to Paul Schmehl & others)

2002-11-25 Thread Euan Briggs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

*yawn*
Is noone capable of posting without making it personal? Ignoring all
the venomous junk:

You state that blackhats advocate non-disclosure, yet you omit the
reasons _why_ they advocate it. These are the reasons I supplied in
my earlier posts.
Let me try and explain this frankly for you:

Situation A - If there is a hole in a system which is deployed on a
huge scale etc, and it is kept secret, the entire user base is at
risk from criminal hackers, and these hackers are the only people
aware of it. I have shown you already that blackhats disclose vulns
among themselves and these things inevitably come into the hands of
the blackhat masses. In case you hadnt noticed, script kiddies
themselves are getting into vuln-dev these days and no doubt will
find holes themselves and distribute them.. If someone gets hacked,
the responsibility is not of the admin, who cannot possibly know the
system he was sold as secure had a vuln. So the responsibility is
moved onto the vendor. Now this may not be a bad thing, computing
technology seems to be the only  product which we _expect_ it to be
broken and there is no such thing as liability of the vendor if they
release something which is broken. However, is it a good idea to take
responsibliity away from the administrator? Will this not make him
lazy, *shrug* and say 'its not my problem, its out of my hands,
nothing I can do". We all know the problems negligent admins cause
for the internet as whole. Also, if you rely on vendors to discover
and fix holes, then you can count on it that they WONT want to
announce it in a timely fashion. How many corporations do you know
that are willing to say "hey, we sold you a flawed and  insecure
product that puts your entire business at risk, and lied when we told
you it was safe to use, sorry about that!".

Summary - Everyone is vulnerable, only blackhats have the tools,
people feel more uncertain about the supposed security of their
systems. Vendors can keep vulns secret to protect their business
image. 
Bottom line - People get hacked and there is nothing they can do
about it.

Situation B - Dealing with that same hole, the entire installed user
base is still at risk until it is discovered and disclosed. Now if it
is disclosed, not only do the criminal blackhats have the
information, but the admins etc become aware of it too. This gives
them the opportunity to patch it up. Any good admin should be keeping
tracking of security issues with the systems he uses, and if someone
fails to patch their machine and gets hacked, that is their problem.
Anyone doing responsible full disclosure will always coordinate with
vendors and allow them to create the fixes needed before releasing
the vulnerability information. My only problem with full-disclosure,
is that I feel it should be in the form of an advisory which
describes the vuln adequately to allow people to be informed about
how it affects them and how best to protect against it. Full
disclosure in the form of ./hack tools is completely un-necessary and
irresponsible, and if you cared to notice, most people doing
full-disclosure in the form of ready to run tools happen to be
blackhats. Look at GOBBLES activity this year for example. How many
reputable security companies have you seen, doing full disclosure in
the form of ./tools ?

Summary - Everyone is made aware they have a vuln in their system,
they are given the means to fix it as they are informed of it. Sure
the information allows people to write their own attack for the vuln,
but the fix is available at the same time, and is no doubt easier to
install the patch than it is for a kiddie to write the exploit from
an abstract advisory, so that risk is effectively mitigated.
Bottom line - People still get hacked, but there is a fix available
so they have the means to protect themselves. Responsibility for
security breach after disclosure remains in the hands of the network
administrator which is where it should be. Full-disclosure also
reveals the tricks and techniques of the exploit coder, which in turn
assists the people making vulnerable systems to clean up their act.

I stand by everything I said in the posts where I spoke about the
blackhats selfish criminal motivations, and if you dont like that,
tough luck. I stand by full-disclosure as long as it isn't in the
form of ready to use "Proof of concept" code.

Responsible full-disclosure is working, before the security industry
matured EVERYONE was insecure. Now MANY are secure. That has to be
considered a positive improvement no?


Euan



PS, ever heard the story of the bug in the rug who spends his whole
life wandering around in circles, and never gets to see the whole
pattern of the rug he lives in?
Also, various quotes such as "if crypto is outlawed, only criminals
will have crypto" seem appropriate. 



- - Original Message - 
From: "sockz loves you" <[EMAIL PROTECTED]>
To: "Euan Briggs" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROT

Re: [Full-Disclosure] [PHC] Sermon #3 (w/ reply to Paul Schmehl & others)

2002-11-25 Thread sockz loves you
- Original Message -
From: "Euan Briggs" <[EMAIL PROTECTED]>
Date: Sat, 23 Nov 2002 00:52:30 -0500 
To: <[EMAIL PROTECTED]>
Subject: Re: [Full-Disclosure] [PHC] Sermon #3 (w/ reply to Paul Schmehl & others)

> Sorry to tell you this PHC, but I know who the majority of you are
> and where you originate from. 

OMG NO!!!
does this mean that my real identity as a transvestite cross-gendered ex-felon
stripper who never originated from boston but really comes from a shell that was
hatched in the ocean deep has been made public?!  oh the embarassment!!!  how 
will the hacker world ever take me seriously again!?!

mr euan briggs, PHC isn't just the #phrack@EFnet ops.  there are members of PHC
who aren't opped on #phrack, some who don't even visit the channel.  some who
dont even bother with irc like you and i do.

but seriously, i'd like to know what you know about me, and where i "originate
from".  i'm comfortable with you revealing this to the list or anywhere else for
that matter.  my identity is hardly something of a secret these days, but i'm
fairly certain you remain without any clue.
 
> My work with Snosoft does not mark my entry into the field. To be
> frank, the reason I entered the whitehat arena, is because I am
> appalled at what has happened to the blackhat scene. I am appalled by
> the motives and attitudes of people such as PHC. I am appalled by the
> behaviour of people like you. I have a conscience and a sense of
> responsibility, towards my fellow human beings and our society. I
> want the world to be a better place. I don't see working for the
> security industry as some sort of "betrayal" of my blackhat roots, I
> see it as making a -positive- contribution to society. I see it as
> paying my debt to society, for the years I spent as a blackhat.
> Entering the industry was a natural progression. I dont get a kick
> out of crime, it only brings guilt and it is a rejection of the
> society that nurtured you,  human society which you owe your life to.

if this is the case then what have you actually done about it?  you
constantly whine and gripe about how #phrack is so "bad and evil and omg stop
them!!"  but so far your actions to stop #phrack have amounted to zilch, nada,
nothing.  if you are so eager to talk about how great you are and how right you
are, then why not give us some evidence as to why we should believe you.  if
you're not prepared to show evidence of malicious activities against #phrack or
anyone else then shut up about your "blackhat roots" and your "debt to society".

i doubt you ever were a blackhat, as you have consistantly shown a lack of skill
to back up the lies you tell.
 
> You claim to "hate" the security industry, because you believe they
> are exploiting hackers and their world. Unless you yourselfs are
> genuinely being exploited, I would say this part of your rather
> contradictory manifesto its nothing more than a thin veneer of
> justification for your delinquent attitudes. As I said in my last
> post, I think you are just pissed off that you have a motivated and
> well funded competitor (the industry), and people like you helped
> create it.
*snip*

i cant speak for everyone who's against the security industry, just myself.
so far my ideology in this whole mess has evolved.  as i expanded my
investigation into what the problem actually is, i realised that the term
"anti-security industry" didn't really fit me, as i was more about changing
the current system for the better... not the worse.  like you and just about
everyone else on this list i feel a degree of social responsibility when it
comes to the matter.  but unlike yourself i am not so resistant to change, and
the cost of that change.

we're learning as we go along here, just like anyone else.  plz dont take words
that were uttered in the heat of spirited patriotism to be the basis of our
arguments.

*snap*
> You claim to be advocating non-disclosure because you believe it will
> increase security, yet at the same time you claim to be blackhat
> (implication = criminal) hackers. It doesnt add up.

*sigh*
i've tried to explain this so many times before.  yet again i attempt to 
simplify everything without making too broad an assumption... yet again do i 
explain this:

blackhat ~= person who advocates non-disclosure.  hacks computers.  doesn't brag
security ~= the likelihood of a system withstanding an attack.

at the moment many many ppl have ready access to information on how to
compromise security.  but a person can only secure their own system.  this
means that many ppl pose a security risk that few ppl can actually manage.
(strong offence versus weak defence)

non-disclosure solves this problem.

if fewer ppl know about hacks (because blackhats dont talk about them) then
fewer systems are threatened because the ratio of "attackers:admins" is
reduced.

PLEASE, try and think about it for yourself instead of trying to find all the
faults in what i've said.  just take a good look with an open and rat

[Full-Disclosure] [RHSA-2002:264-05] New kernel 2.2 packages fix local denial of service issue

2002-11-25 Thread bugzilla
-
   Red Hat, Inc. Red Hat Security Advisory

Synopsis:  New kernel 2.2 packages fix local denial of service issue
Advisory ID:   RHSA-2002:264-05
Issue date:2002-09-23
Updated on:2002-11-25
Product:   Red Hat Linux
Keywords:  bugtraq DoS
Cross references:  
Obsoletes: RHSA-2002:210
-

1. Topic:

The kernel in Red Hat Linux 6.2 and 7 is vulnerable to
a local denial of service attack.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - i386, i586, i686
Red Hat Linux 7.0 - i386, i586, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating system.
A vulnerability in the Linux kernel has been discovered in which a non-root
user can cause the machine to freeze. This kernel addresses the
vulnerability.  

Note: This bug is specific to the x86 architecture kernels only, and does
not affect other architectures.

All users of Red Hat Linux 6.2 and 7 should upgrade to
these errata packages, which are not vulnerable to this issue.

Thanks go to Christopher Devine for reporting the vulnerability on bugtraq,
and Petr Vandrovec for being the first to supply a fix to the community.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied. 

The procedure for upgrading the kernel is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network.  Many
people find this to be an easier way to apply updates.  To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/kernel-2.2.22-6.2.3.src.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/kernel-smp-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-BOOT-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-ibcs-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-utils-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-pcmcia-cs-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-doc-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-headers-2.2.22-6.2.3.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/kernel-source-2.2.22-6.2.3.i386.rpm

i586:
ftp://updates.redhat.com/6.2/en/os/i586/kernel-smp-2.2.22-6.2.3.i586.rpm
ftp://updates.redhat.com/6.2/en/os/i586/kernel-2.2.22-6.2.3.i586.rpm

i686:
ftp://updates.redhat.com/6.2/en/os/i686/kernel-enterprise-2.2.22-6.2.3.i686.rpm
ftp://updates.redhat.com/6.2/en/os/i686/kernel-smp-2.2.22-6.2.3.i686.rpm
ftp://updates.redhat.com/6.2/en/os/i686/kernel-2.2.22-6.2.3.i686.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/kernel-2.2.22-7.0.3.src.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/kernel-smp-2.2.22-7.0.3.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-2.2.22-7.0.3.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-BOOT-2.2.22-7.0.3.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-ibcs-2.2.22-7.0.3.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-utils-2.2.22-7.0.3.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-pcmcia-cs-2.2.22-7.0.3.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-doc-2.2.22-7.0.3.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/kernel-source-2.2.22-7.0.3.i386.rpm

i586:
ftp://updates.redhat.com/7.0/en/os/i586/kernel-smp-2.2.22-7.0.3.i586.rpm
ftp://updates.redhat.com/7.0/en/os/i586/kernel-2.2.22-7.0.3.i586.rpm

i686:
ftp://updates.redhat.com/7.0/en/os/i686/kernel-enterprise-2.2.22-7.0.3.i686.rpm
ftp://updates.redhat.com/7.0/en/os/i686/kernel-smp-2.2.22-7.0.3.i686.rpm
ftp://updates.redhat.com/7.0/en/os/i686/kernel-2.2.22-7.0.3.i686.rpm



6. Verification:

MD5 sum  Package Name
--
8c93dac15cbb3162f4cde7c0c0de5643 6.2/en/os/SRPMS/kernel-2.2.22-6.2.3.src.rpm
a9b510b4ffca3e7bf643a46f99ee749f 6.2/en/os/i386/kernel-2.2.22-6.2.3.i386.rpm
5c08d5ac6ffebde931cc924914bf4f10 6.2/en/os/i386/kernel-BOOT-2.2.22-6.2.3.i386.rpm
d417601fb70f93e159a10cf5a9e6e21b 6.2/en/os/i386/kernel-doc-2.2.22-6.2.3.i386.rpm
436d4c050116d0feb910bd93307797f2 6.2/en/os/i386/kernel-headers-2.2.22-6.2.3.i386.rpm
9c55348902c8a8f307be174c4602f59d 6.2/en/os/i386/kernel-ibcs-2.2.22-6.2.3.i386.rpm
6d3

[Full-Disclosure] SuSE Security Announcement: pine (SuSE-SA:2002:046)

2002-11-25 Thread Thomas Biege
-BEGIN PGP SIGNED MESSAGE-

__

SuSE Security Announcement

Package:pine
Announcement-ID:SuSE-SA:2002:046
Date:   Monday, Nov 25th 2002 10:30 MEST
Affected products:  7.1, 7.2, 7.3, 8.0, 8.1
SuSE Linux Database Server
SuSE eMail Server 3.1
SuSE eMail Server III
SuSE Firewall Adminhost VPN
SuSE Linux Admin-CD for Firewall
SuSE Firewall on CD 2 - VPN
SuSE Firewall on CD 2
SuSE Linux Enterprise Server for S/390
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Office Server
Vulnerability Type: remote denial-of-service
Severity (1-10):4
SuSE default package:   yes (7.1 - 8.0)
no  (8.1)
Cross References:   none

Content of this advisory:
1) security vulnerability resolved:
 - heap buffer overflow while parsing mail address
   problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
 - sparc distribution
 - WindowMaker
3) standard appendix (further information)

__

1)  problem description, brief discussion, solution, upgrade information

Pine, Program for Internet News and Email, is a well known and widely
used eMail client.
While parsing and escaping characters of eMail addresses pine does not
allocate enough memory for storing the escaped mailbox part of an
address. This results in a buffer overflow on the heap that will make
pine crash. The offending eMail can just be deleted manually or by using
another mail user agent.

A possible temporary workaround is to filter the respective header
lines by a mail delivery agent (such as procmail).

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.



Intel i386 Platform:

SuSE-8.1:
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-224.i586.rpm
  8c32d5571d7488e31f693a884dedb81e
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/pine-4.44-224.i586.patch.rpm
  467b8b318958b0ead3f30fa7b1f5a9a0
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/pine-4.44-224.src.rpm
  9b1ff436719cf9752cda3ddd711e80a7

SuSE-8.0:
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-222.i386.rpm
  01d9e82164a5ce4037b84be1b2ed4228
patch rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/pine-4.44-222.i386.patch.rpm
  162c4265909af7805f7aeaf3e12e8763
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/pine-4.44-222.src.rpm
  d724e02b1ea3783e5bfb01ae9728d7cf

SuSE-7.3:
ftp://ftp.suse.com/pub/suse/i386/update/7.3/n1/pine-4.33-266.i386.rpm
  140c58adf7d0b2113d5b20de67e2
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/pine-4.33-266.src.rpm
  100c86e88ce357b0efacf7dfe2ab592c

SuSE-7.2:
ftp://ftp.suse.com/pub/suse/i386/update/7.2/n1/pine-4.33-266.i386.rpm
  bd44232250b3def07cab81064dad11f2
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/pine-4.33-266.src.rpm
  e28daa1f2d66135fcf5951c9b2dc19be

SuSE-7.1:
ftp://ftp.suse.com/pub/suse/i386/update/7.1/n1/pine-4.33-263.i386.rpm
  9bdd3394336a786b0711b8e98ab4a268
source rpm(s):
ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/pine-4.33-263.src.rpm
  630478b751a24e86c52fe645be9365c4



Sparc Platform:

SuSE-7.3:
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n1/pine-4.33-97.sparc.rpm
  5187b311c27f043178a12ae186d228a6
source rpm(s):
ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/pine-4.33-97.src.rpm
  9616303edadfd899785f3ac12d2dc02a



AXP Alpha Platform:

SuSE-7.1:
ftp://ftp.suse.com/pub/suse/axp/update/7.1/n1/pine-4.33-85.alpha.rpm
  f5155d79236e3ec15c463f586f731c17
source rpm(s):
ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/pine-4.33-85.src.rpm
  75365b21b97c8a2f722d95491f62d305




PPC Power PC Platform:

SuSE-7.3:
ftp://ftp.suse.com/pub/suse/ppc/u

Re: [Full-Disclosure] PHC replies to criticism

2002-11-25 Thread anakata
On Sun, 24 Nov 2002, Ian Eyberg wrote:

[...]
> bullshit from kids whose only positive sign, so far as shown forth on
> this list, that they can speak eloquently (oohh.. fancy word, maybe
> that'll show em that I can 0wn their box).  Everyone knows your point of
> view on things so shut up and hop back on irc and go root some boxen.  
Why do you resort to argumentum ad hominem? You lack any valid arguments?

--- anakata <[EMAIL PROTECTED]>, Corpus Hypercubus
http://www.anakata.hack.se, IRC: {ef,irc,dal,slash}net, regular of #hack.se/efnet
Cogito, ergo infestus sum. [I think, therefore I am dangerous.]



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html