[SECURITY] CVE-2007-5333: Tomcat Cookie handling vulnerabilities

2008-02-09 Thread Mark Thomas

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

CVE-2007-5333: Tomcat Cookie handling vulnerabilities

Severity: low - Session hi-jacking

Vendor:
The Apache Software Foundation

Versions Affected:
Tomcat 4.1.0 to 4.1.36
Tomcat 5.5.0 to 5.5.25
Tomcat 6.0.0 to 6.0.14

Description:
The previous fix for CVE-2007-3385 was incomplete. It did not consider the
use of quotes or %5C within a cookie value.

Mitigation:
6.0.x users should upgrade to Tomcat 6.0.16 or later
5.5.x users should upgrade to Tomcat 5.5.26 or later
4.1.x users should build from the latest svn source

Examples:
+++
GET /myapp/MyCookies HTTP/1.1
Host: localhost
Cookie: name=val  ue
Cookie: name1=moi
+++
http://example:8080/examples/servlets/servlet/CookieExample?cookiename=testcookievalue=test%5c%5c%22%3B+Expires%3DThu%2C+1+Jan+2009+00%3A00%3A01+UTC%3B+Path%3D%2Fservlets-examples%2Fservlet+%3B

Credit:
The quotes issue was reported by John Kew.
The %5C issue was reported by Ishikawa Yoshihiro via JPCERT/CC.

References:
http://tomcat.apache.org/security.html
http://tomcat.apache.org/security-4.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html

The Apache Tomcat Security Team
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHrONyb7IeiTPGAkMRAgKrAJwIX1fbtGT7iualwzRK8BDi+QRAkQCg3cMo
58hTHdwJzeFxLXgkLRQwBKk=
=Dnsp
-END PGP SIGNATURE-


iDefense Security Advisory 02.08.08: Adobe Reader Security Provider Unsafe Libary Path Vulnerability

2008-02-09 Thread iDefense Labs

iDefense Security Advisory 02.08.08
http://labs.idefense.com/intelligence/vulnerabilities/
Feb 08, 2008

I. BACKGROUND

Adobe Reader is a program for viewing Portable Document Format (PDF)
documents. More information is available at the following URLs.

http://www.adobe.com/products/reader/

II. DESCRIPTION

Remote exploitation of an unsafe library path vulnerability in Adobe
Systems Inc.'s Adobe Reader may allow attackers to execute arbitrary
code as the current user.

This vulnerability is due to Adobe Reader using a path for Security
Provider libraries that contains the directory the application was
started in. Security Provider libraries provide encryption and
signature verification routines to applications. If the current
directory contains a file with the same name as a Security Provider
library, the file will be loaded into the application, potentially
allowing code execution.

III. ANALYSIS

Exploitation allows an attacker to execute arbitrary code as the user
that started the application. To exploit this vulnerability, the
attacker must convince the targeted user to open a PDF from a directory
under their control. This directory may be local or network based on
either an SMB or WebDAV server. If Adobe Reader has already been
started, the library will not be loaded.

IV. DETECTION

iDefense has confirmed this vulnerability exists in Adobe Reader 8.1
installed on Windows XP and Windows Vista. Previous versions, as well
as those for other platforms, may also be affected.

V. WORKAROUND

Copying the original library from %WINDIR%\System32 to the same
directory as the AcroRd32.exe binary will make the application find the
correct library before a malicious one is found.

The actual filenames which can be used to exploit this vulnerability
depend on the operating system and version. To determine which
filenames affect your system, consult the following registry key.

 HKLM\System\CurrentControlSet\Control\SecurityProviders\SecurityProviders

This is only a temporary workaround; future software updates will not
update these copies. As such, the copies should be removed once this
vulnerability has been patched.

VI. VENDOR RESPONSE

Adobe has released version 8.1.2 of Adobe Reader that addresses this
vulnerability. Although there is currently no update for version 7.0.9,
Adobe reports it does plan to release one at a later date. For more
information, visit the vendor's advisory at the following URL.

http://www.adobe.com/support/security/advisories/apsa08-01.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-5666 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

09/25/2007  Initial vendor notification
09/25/2007  Initial vendor response
10/26/2007  Request for status
10/26/2007  Status - Est. early January
01/04/2008  Request for status
01/04/2008  Status - Scheduled early February
01/28/2008  Adobe plans patch for 8, but not 7
01/30/2008  Concerns about the plan e-mailed to Adobe
01/31/2008  Telephone call to clarify concerns
02/06/2008  Adobe releases 8.1.2
02/07/2008  Adobe publishes APSA08-01
02/08/2008  Public disclosure

IX. CREDIT

This vulnerability was discovered by Greg MacManus of VeriSign iDefense
Labs.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2008 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.


[SECURITY] [DSA 1488-1] New phpbb2 packages fix several vulnerabilities

2008-02-09 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1488-1  [EMAIL PROTECTED]
http://www.debian.org/security/  Thijs Kinkhorst
February 09, 2008 http://www.debian.org/security/faq
- 

Package: phpbb2
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2006-4758 CVE-2006-6839 CVE-2006-6840 CVE-2006-6508 
CVE-2006-6841 CVE-2008-0471
Debian Bug : 388120 405980 463589

Several remote vulnerabilities have been discovered in phpBB, a web
based bulletin board.

The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2008-0471

Private messaging allowed cross site request forgery, making
it possible to delete all private messages of a user by sending
them to a crafted web page.

CVE-2006-6841 / CVE-2006-6508

Cross site request forgery enabled an attacker to perform various
actions on behalf of a logged in user. (Applies to sarge only)

CVE-2006-6840

A negative start parameter could allow an attacker to create
invalid output. (Applies to sarge only)

CVE-2006-6839

Redirection targets were not fully checked, leaving room for
unauthorised external redirections via a phpBB forum.
(Applies to sarge only)

CVE-2006-4758

An authenticated forum administrator may upload files of any
type by using specially crafted filenames. (Applies to sarge only)


For the stable distribution (etch), these problems have been fixed
in version 2.0.21-7.

For the old stable distribution (sarge), these problems have been
fixed in version 2.0.13+1-6sarge4.

For the unstable distribution (sid) these problems have been fixed
in version 2.0.22-3.

We recommend that you upgrade your phpbb2 package.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

Source archives:

  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.13+1-6sarge4.diff.gz
Size/MD5 checksum:67912 c403597d08f4c5af0f62b84c5ee72a7e
  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.13+1.orig.tar.gz
Size/MD5 checksum:  3340445 678d0cb0372e46402a472c510fb90d78
  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.13+1-6sarge4.dsc
Size/MD5 checksum: 1011 d5ca94a7a4c2b3468428a993a1dbc5cc

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2-conf-mysql_2.0.13-6sarge4_all.deb
Size/MD5 checksum:37766 f0df2114bd60d9b84fbda1d241294fdd
  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.13-6sarge4_all.deb
Size/MD5 checksum:   526154 944e55e056fc34d970e95b78201589fe
  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2-languages_2.0.13-6sarge4_all.deb
Size/MD5 checksum:  2868920 f10c4962035ede6e02417b8098efeda0

Debian GNU/Linux 4.0 alias etch
- ---

Source archives:

  http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.21-7.dsc
Size/MD5 checksum: 1051 88ad3a4f2ee714cce779873b53ebd323
  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.21.orig.tar.gz
Size/MD5 checksum:  3203456 30383a9bf6c5d21736e4bdf9ec7852d5
  http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.21-7.diff.gz
Size/MD5 checksum:90580 896f80500e90867741c516e57fc8bfcc

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2-languages_2.0.21-7_all.deb
Size/MD5 checksum:  2791410 afd8a0fe8138c8a5cf00a3e4ac10ac59
  http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2_2.0.21-7_all.deb
Size/MD5 checksum:   554842 e8825ef3431bfe7ccf72f9f59f13a119
  
http://security.debian.org/pool/updates/main/p/phpbb2/phpbb2-conf-mysql_2.0.21-7_all.deb
Size/MD5 checksum:53706 49baf96bcc1c273a93e8bb5169dca722


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
-BEGIN PGP SIGNATURE-
Version: 

[SECURITY] CVE-2007-6286: Tomcat duplicate request processing vulnerability

2008-02-09 Thread Mark Thomas

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

CVE-2007-6286: Tomcat duplicate request processing vulnerability

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Tomcat 5.5.11 to 5.5.25
Tomcat 6.0.0 to 6.0.15

Description:
When using the native (APR based) connector, connecting to the SSL port
using netcat and then disconnecting without sending any data will cause
tomcat to handle a duplicate copy of one of the recent requests.

Mitigation:
6.0.x users should upgrade to 6.0.16 which includes version 1.1.12 of the
native connector.
5.5.x users should upgrade to 5.5.26 which includes version 1.1.12 of the
native connector.

Example:
See description.

Credit:
This issue was discovered by System Core (http://www.systemcore.ca/).

References:
http://tomcat.apache.org/security.html
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html

The Apache Tomcat Security Team
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHrOcwb7IeiTPGAkMRAq+NAJ45EswKdmWWGfG8r1pr+8TMXzBHCgCePkK0
SYpXhEieSJHQcsO/rxN0ylY=
=JK4t
-END PGP SIGNATURE-


rPSA-2008-0051-1 firefox

2008-02-09 Thread rPath Update Announcements
rPath Security Advisory: 2008-0051-1
Published: 2008-02-08
Products:
rPath Linux 1

Rating: Major
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
[EMAIL PROTECTED]:1/2.0.0.12-0.1-1

rPath Issue Tracking System:
https://issues.rpath.com/browse/RPL-2233

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412

http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.12

Description:
Previous versions of the firefox package are vulnerable to several
types of attacks, some of which are understood to allow compromised
or malicious sites to run arbitrary code as the user running firefox.

http://wiki.rpath.com/Advisories:rPSA-2008-0051

Copyright 2008 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html


Some interesting hashes

2008-02-09 Thread Open Phugu
OpenBSD 4.1 sshd remote root exploit (on the default install!):

SHA1(screwtheo.tar)=ad1bc1f05afa2cc3ccadb18fabb985394c02ce8d
MD5(screwtheo.tar)= cee67df76eaa0706e666cd5c0b8b711c

OpenSSH exploit for linux
SHA1(screwtheo_linux.tar)=cb6816de43df87193050a497a83cd8f7ab721fbd
MD5(screwtheo_linux.tar)=8d65c90d40975556b199a3e1028a5a51


iDefense Security Advisory 02.08.08: Adobe Reader and Acrobat JavaScript Insecure Method Exposure Vulnerability

2008-02-09 Thread iDefense Labs

iDefense Security Advisory 02.08.08
http://labs.idefense.com/intelligence/vulnerabilities/
Feb 08, 2008

I. BACKGROUND

Adobe Reader is a program for viewing Portable Document Format (PDF)
documents. Acrobat is the program used to create such documents. More
information is available at the following URLs.

http://www.adobe.com/products/acrobat/
http://www.adobe.com/products/reader/

II. DESCRIPTION

Remote exploitation of an insecure method exposed by the JavaScript
library in Adobe Reader and Acrobat could allow an attacker to execute
arbitrary code as the current user.

Adobe Reader and Acrobat implement a version of JavaScript in the
EScript.api plug-in which is based on the reference implementation used
in Mozilla products. One of the methods exposed allows direct control
over low level features of the object, which in turn allows execution
of arbitrary code.

III. ANALYSIS

Exploitation of this vulnerability would allow an attacker to execute
arbitrary code as the current user. In order to exploit this
vulnerability, an attacker would have to convince the targeted user to
open a maliciously constructed file. This file could be sent directly
to the targeted user or linked from a website.

Insufficient error checking is performed on the input which allows,
among other things, attacker-supplied data to be written to arbitrary
offsets in memory, potentially resulting in arbitrary code execution.

IV. DETECTION

iDefense has confirmed this vulnerability exists in Adobe Reader 8.1 on
Windows XP SP2. It is likely that other Adobe products that handle PDF
files, including previous versions of Adobe Reader, are also affected.

V. WORKAROUND

Disabling JavaScript in Adobe Reader or Acrobat will limit exposure to
this vulnerability. When JavaScript is disabled, Adobe Reader will
prompt the user that some components of the document may not function,
and provide an opportunity to enable it.

VI. VENDOR RESPONSE

Adobe released version 8.1.2 of Adobe Reader and Acrobat to address this
vulnerability. Although there is currently no update for version 7.0.9,
Adobe reports it does plan to release one at a later date. For more
information, visit the vendor's advisory at the following URL.

http://www.adobe.com/support/security/advisories/apsa08-01.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-5663 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

10/03/2007  Initial vendor notification
10/03/2007  Initial vendor response
10/26/2007  Request for status
10/26/2007  Status - Est. early January
01/04/2008  Request for status
01/04/2008  Status - Scheduled early February
01/28/2008  Adobe plans patch for 8, but not 7
01/30/2008  Concerns about the plan e-mailed to Adobe
01/31/2008  Telephone call to clarify concerns
02/06/2008  Adobe releases 8.1.2
02/07/2008  Adobe publishes APSA08-01
02/08/2008  Public disclosure

IX. CREDIT

This vulnerability was discovered by Greg MacManus of VeriSign iDefense
Labs.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2008 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.


iDefense Security Advisory 02.08.08: Adobe Reader and Acrobat Multiple Stack-based Buffer Overflow Vulnerabilities

2008-02-09 Thread iDefense Labs

iDefense Security Advisory 02.08.08
http://labs.idefense.com/intelligence/vulnerabilities/
Feb 08, 2008

I. BACKGROUND

Adobe Reader is a program for viewing Portable Document Format (PDF)
documents. Acrobat is the program used to create such documents. More
information is available at the following URLs.

http://www.adobe.com/products/acrobat/
http://www.adobe.com/products/reader/

II. DESCRIPTION

Remote exploitation of multiple stack-based buffer overflows in
JavaScript methods in Adobe Reader and Acrobat could allow an attacker
to execute arbitrary code as the current user.

These issues exist due to insufficient input validation in several
JavaScript methods. Inadequate checking is performed on the string
length before it is copied into a fixed sized buffer on the stack. If
an attacker supplies a long string, control structures on the stack may
be modified, allowing the execution of arbitrary code.

III. ANALYSIS

Exploitation of these vulnerabilities would allow an attacker to execute
arbitrary code as the current user. In order to exploit these
vulnerabilities, an attacker would have to convince a targeted user to
open a maliciously constructed file. This file could be sent directly
to the targeted user or linked from a website.

IV. DETECTION

iDefense has confirmed these vulnerabilities exist in Adobe Reader 8.1
on Windows XP SP2. It is likely that other Adobe products that handle
PDF files, including previous versions of Adobe Reader, are also
affected.

V. WORKAROUND

Disabling JavaScript in Adobe Reader or Acrobat will limit exposure to
these vulnerabilities. When JavaScript is disabled, Adobe Reader will
prompt the user that some components of the document may not function,
and provide an opportunity to enable it.

VI. VENDOR RESPONSE

Adobe released version 8.1.2 of Adobe Reader and Acrobat to address
these vulnerabilities. Although there is currently no update for
version 7.0.9, Adobe reports it does plan to release one at a later
date. For more information, visit the vendor's advisory at the
following URL.

http://www.adobe.com/support/security/advisories/apsa08-01.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-5659 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

10/10/2007  Initial vendor notification
10/10/2007  Initial vendor response
10/26/2007  Request for status
10/26/2007  Status - Est. early January
01/04/2008  Request for status
01/04/2008  Status - Scheduled early February
01/28/2008  Adobe plans patch for 8, but not 7
01/30/2008  Concerns about the plan e-mailed to Adobe
01/31/2008  Telephone call to clarify concerns
02/06/2008  Adobe releases 8.1.2
02/06/2008  Immunity makes PoC available to partners
02/07/2008  Adobe publishes APSA08-01
02/08/2008  Exploit discovered in the wild
02/08/2008  Public disclosure


IX. CREDIT

These vulnerabilities were discovered by Greg MacManus of VeriSign
iDefense Labs.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2008 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.


PKs Movie Database version 3.0.3 (SQL/XSS)

2008-02-09 Thread houssamix
-

 

 H-T Team [ HouSSaMix + ToXiC350 ] from MoroCCo 

 

-

 

 

= Author : HouSSaMix From H-T Team  

 

= Script : PKs Movie Database version 3.0.3 

 

   

 

= BUG 1 :  Remote SQL Injection Vulnerability  

 

 

exploit = www.target.com/path/index.php?num=[SQL]

 

 

= BUG 2 : XSS

 

 

exploit = www.target.com/path/index.php?category=[XSS]

 

   www.target.com/path/index.php?num=99category=[XSS]

 

 

example : 
www.target.com/path/index.php?category=%22%3E%3Cscript%3Ealert(1);%3C/script%3E

 

   
www.target.com/path/index.php?num=99category=%22%3E%3Cscript%3Ealert(1);%3C/script%3E

 

 

= Dork : PKs Movie Database