Re: [Full-disclosure] We're now paying up to $20, 000 for web vulns in our services

2012-04-24 Thread Ramon de C Valle
me a weapon for the dishonest > > "researcher" through secondary discovery > > I'm not sure I follow. Are you saying that the dishonest researcher > will not try to find vulnerabilities if there is no reward program > for > the honest ones? He made a good example of a Slip

[Full-disclosure] More on exploiting glibc __tzfile_read integer overflow to buffer overflow and vsftpd

2011-12-15 Thread Ramon de C Valle
More on exploiting glibc __tzfile_read integer overflow to buffer overflow and vsftpd http://rcvalle.com/post/14261796328/more-on-exploiting-glibc-tzfile-read-integer-overflow -- Ramon de C Valle / Red Hat Security Response Team ___ Full-Disclosure

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-13 Thread Ramon de C Valle
nt findings about vsftpd. -- Ramon de C Valle / Red Hat Security Response Team ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] vsFTPd remote code execution

2011-12-13 Thread Ramon de C Valle
tzh_charcnt, evil2); p = (char *)&evil; @@ -68,6 +68,6 @@ printf("%c", p[i]); /* data we overflow with */ -for (i = 0; i < 5; i++) + for (i = 0; i < 50; i++) printf("A"); } -- Ramon de

[Full-disclosure] Exploiting glibc __tzfile_read integer overflow to buffer overflow and vsftpd

2011-12-13 Thread Ramon de C Valle
Exploiting glibc __tzfile_read integer overflow to buffer overflow and vsftpd http://rcvalle.com/post/14169476482/exploiting-glibc-tzfile-read-integer-overflow-to -- Ramon de C Valle / Red Hat Security Response Team ___ Full-Disclosure - We believe in

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
if this will be possible. A different file context for /home/(.*)/usr/share/zoneinfo(/.*) in vsftpd policy module would be a feasible solution? Will ftpd_t honour this when creating new files? -- Ramon de C Valle / Red Hat Security Response Team _

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
es. Transitions are defined per domain in SELinux policy. For additional information, refer to: http://danwalsh.livejournal.com/23944.html > > We're lucky nobody has looked into what should happen on an > MLS-enabled system :) I don't think sensitivity levels would make any

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
lease nuke the request". Exactly. Thanks for putting this into more concise wording. > > -- Ramon de C Valle / Red Hat Security Response Team ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
> But how can I state that ftp has access to the users homedir and not > allow access to user_home_t? This is a good question. Actually, we shouldn't allow ftpd_t read the locale files from within user_home_t directories. But now I'm not sure if this will be possible. --

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
"usr_t" directories with "locale_t" type should have completely mitigated this. -- Ramon de C Valle / Red Hat Security Response Team ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
t type (i.e. user_home_t, in this case), which if don't allow would have completely mitigated this issue. Dan, could you fix this in SELinux policy? Thanks, -- Ramon de C Valle / Red Hat Security Response Team ___ Full-Disclosure - We believe in i

Re: [Full-disclosure] VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
tOS, Fedora, or RHEL? I'm copying Dan Walsh so he can comment on this. > > Regards, Thanks for forwarding my message to the list. It seems that my Red Hat email address has not yet been approved. John, can you approve this email address please? -- Ramon de C Valle / Red Hat Securit

Re: [Full-disclosure] VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
from __tzfile_read frees our controlled previously allocated chunk. Do you or anyone know a way to potentially exploit this vulnerability? > > Cheers! Thanks, > >[1] http://dividead.wordpress.com/tag/heap-overflow/ >[2] https://security.appspot.com/vsftpd.html >[3] For exam