[ MDVSA-2010:073-1 ] cups

2010-04-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory   MDVSA-2010:073-1
 http://www.mandriva.com/security/
 ___

 Package : cups
 Date: April 14, 2010
 Affected: 2010.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in cups:
 
 CUPS in does not properly handle (1) HTTP headers and (2) HTML
 templates, which allows remote attackers to conduct cross-site
 scripting (XSS) attacks and HTTP response splitting attacks via vectors
 related to (a) the product's web interface, (b) the configuration of
 the print system, and (c) the titles of printed jobs (CVE-2009-2820).
 
 Use-after-free vulnerability in the abstract file-descriptor handling
 interface in the cupsdDoSelect function in scheduler/select.c in the
 scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers
 to cause a denial of service (daemon crash or hang) via a client
 disconnection during listing of a large number of print jobs, related
 to improperly maintaining a reference count.  NOTE: some of these
 details are obtained from third party information (CVE-2009-3553).
 
 Use-after-free vulnerability in the abstract file-descriptor handling
 interface in the cupsdDoSelect function in scheduler/select.c in the
 scheduler in cupsd in CUPS 1.3.7, 1.3.9, 1.3.10, and 1.4.1, when kqueue
 or epoll is used, allows remote attackers to cause a denial of service
 (daemon crash or hang) via a client disconnection during listing
 of a large number of print jobs, related to improperly maintaining
 a reference count.  NOTE: some of these details are obtained from
 third party information.  NOTE: this vulnerability exists because of
 an incomplete fix for CVE-2009-3553 (CVE-2010-0302).
 
 The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS
 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable
 to determine the file that provides localized message strings, which
 allows local users to gain privileges via a file that contains crafted
 localization data with format string specifiers (CVE-2010-0393).
 
 The updated packages have been patched to correct these issues.

 Update:

 Packages for Mandriva Linux 2010.0 was missing with
 MDVSA-2010:073. This advisory provides packages for 2010.0 as well.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393
 ___

 Updated Packages:

 Mandriva Linux 2010.0:
 ba3d43f654fd15aea9f81eadb57c3022  2010.0/i586/cups-1.4.1-12.1mdv2010.0.i586.rpm
 b1f275796b029190380e40ae23ae8ed0  
2010.0/i586/cups-common-1.4.1-12.1mdv2010.0.i586.rpm
 296b30522aa7c008767c6b285aa4b715  
2010.0/i586/cups-serial-1.4.1-12.1mdv2010.0.i586.rpm
 b3abb3c2299c1cb32848c0ee5954eed8  
2010.0/i586/libcups2-1.4.1-12.1mdv2010.0.i586.rpm
 d91c255a1e42e5988f1d8d2d94ffd369  
2010.0/i586/libcups2-devel-1.4.1-12.1mdv2010.0.i586.rpm
 ba336d918bbe9d03cf4fa823293bfb37  
2010.0/i586/php-cups-1.4.1-12.1mdv2010.0.i586.rpm 
 c3aee001d1629963053f475a49b7cd5d  2010.0/SRPMS/cups-1.4.1-12.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 7c089025f467e5b366e57a15e85857ce  
2010.0/x86_64/cups-1.4.1-12.1mdv2010.0.x86_64.rpm
 0e0e4ad3a4d42022d22a88ee8568f8bf  
2010.0/x86_64/cups-common-1.4.1-12.1mdv2010.0.x86_64.rpm
 cb7b4cadce5a174bbd4027f478b38c26  
2010.0/x86_64/cups-serial-1.4.1-12.1mdv2010.0.x86_64.rpm
 653bd25375281b919c6438e71052359d  
2010.0/x86_64/lib64cups2-1.4.1-12.1mdv2010.0.x86_64.rpm
 7bebd27fa6ce2aa5667d28fd7b06702e  
2010.0/x86_64/lib64cups2-devel-1.4.1-12.1mdv2010.0.x86_64.rpm
 34452fc88d7a16591eb653a32c6daa28  
2010.0/x86_64/php-cups-1.4.1-12.1mdv2010.0.x86_64.rpm 
 c3aee001d1629963053f475a49b7cd5d  2010.0/SRPMS/cups-1.4.1-12.1mdv2010.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security 

Ziggurat CMS Multiple Vulnerabilities

2010-04-15 Thread info
# 

# Securitylab.ir 

# 

# Application Info: 

# Name: Ziggurat CMS

# Vendor: http://www.farsi-cms.com

#

Vulnerability: 



# Arbitrary File Upload

http://site.com/manager/upload.asp



# Remote File Download

http://site.com/manager/backup.asp?bck=./../file.asp



# Cross Site Scripting

http://site.com/index.asp?id=script(xss)/script

#

# 2010-04-10 - Vendor notified

# 2010-04-15 - Public disclosure

# 

# Discoverd By: Pouya Daneshmand 

# Website: http://Pouya.Securitylab.ir 

# Contacts: info[at]securitylab.ir  whh_iran[at]yahoo.com

###


[ MDVSA-2010:073 ] cups

2010-04-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:073
 http://www.mandriva.com/security/
 ___

 Package : cups
 Date: April 14, 2010
 Affected: 2008.0, 2009.0, 2009.1, Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in cups:
 
 CUPS in does not properly handle (1) HTTP headers and (2) HTML
 templates, which allows remote attackers to conduct cross-site
 scripting (XSS) attacks and HTTP response splitting attacks via vectors
 related to (a) the product's web interface, (b) the configuration of
 the print system, and (c) the titles of printed jobs (CVE-2009-2820).
 
 Use-after-free vulnerability in the abstract file-descriptor handling
 interface in the cupsdDoSelect function in scheduler/select.c in the
 scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers
 to cause a denial of service (daemon crash or hang) via a client
 disconnection during listing of a large number of print jobs, related
 to improperly maintaining a reference count.  NOTE: some of these
 details are obtained from third party information (CVE-2009-3553).
 
 Use-after-free vulnerability in the abstract file-descriptor handling
 interface in the cupsdDoSelect function in scheduler/select.c in the
 scheduler in cupsd in CUPS 1.3.7, 1.3.9, 1.3.10, and 1.4.1, when kqueue
 or epoll is used, allows remote attackers to cause a denial of service
 (daemon crash or hang) via a client disconnection during listing
 of a large number of print jobs, related to improperly maintaining
 a reference count.  NOTE: some of these details are obtained from
 third party information.  NOTE: this vulnerability exists because of
 an incomplete fix for CVE-2009-3553 (CVE-2010-0302).
 
 The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS
 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable
 to determine the file that provides localized message strings, which
 allows local users to gain privileges via a file that contains crafted
 localization data with format string specifiers (CVE-2010-0393).
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 a32a4128da2ed9e16c9c32dfc9096808  2008.0/i586/cups-1.3.10-0.2mdv2008.0.i586.rpm
 711dcd4a509abd67bf967ae828370bfe  
2008.0/i586/cups-common-1.3.10-0.2mdv2008.0.i586.rpm
 aff4928b801486fafa9a799dee913245  
2008.0/i586/cups-serial-1.3.10-0.2mdv2008.0.i586.rpm
 b23f0c512bd99b3c36b155a585e14648  
2008.0/i586/libcups2-1.3.10-0.2mdv2008.0.i586.rpm
 4d5a3e7f8cc569b7eeed96a4f1b5d43a  
2008.0/i586/libcups2-devel-1.3.10-0.2mdv2008.0.i586.rpm
 a5222f5bb8861a38b43c7a8151b21954  
2008.0/i586/php-cups-1.3.10-0.2mdv2008.0.i586.rpm 
 d8bdac011d50accff618549a1fb0ea87  2008.0/SRPMS/cups-1.3.10-0.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 bc2c7e3fc59bb883e104018d1b24c7db  
2008.0/x86_64/cups-1.3.10-0.2mdv2008.0.x86_64.rpm
 da1a026eaaa97507103dd99956367e2a  
2008.0/x86_64/cups-common-1.3.10-0.2mdv2008.0.x86_64.rpm
 7315d16e8a97793d40a313a330f1abb7  
2008.0/x86_64/cups-serial-1.3.10-0.2mdv2008.0.x86_64.rpm
 c6d4513b8137ec1bd51932f4f4a234af  
2008.0/x86_64/lib64cups2-1.3.10-0.2mdv2008.0.x86_64.rpm
 e656177d1b558cb1a0514f167d66bb95  
2008.0/x86_64/lib64cups2-devel-1.3.10-0.2mdv2008.0.x86_64.rpm
 30335b899039b4873a7a963367565e95  
2008.0/x86_64/php-cups-1.3.10-0.2mdv2008.0.x86_64.rpm 
 d8bdac011d50accff618549a1fb0ea87  2008.0/SRPMS/cups-1.3.10-0.2mdv2008.0.src.rpm

 Mandriva Linux 2009.0:
 f597fcba45e4fe74d94461a85c95e8e3  2009.0/i586/cups-1.3.10-0.3mdv2009.0.i586.rpm
 feca5a7f5ac3b520d33fee752ab4f8fc  
2009.0/i586/cups-common-1.3.10-0.3mdv2009.0.i586.rpm
 cc460c58ee0684a7fba6e4bf2d3b62e5  
2009.0/i586/cups-serial-1.3.10-0.3mdv2009.0.i586.rpm
 099fa99032ba0ce9b228c58299cd4143  
2009.0/i586/libcups2-1.3.10-0.3mdv2009.0.i586.rpm
 0a6a1219b2a6abe9011deb9de06ad7ad  
2009.0/i586/libcups2-devel-1.3.10-0.3mdv2009.0.i586.rpm
 9fc21c66b8e8d0a88c38f5fbaf5e2218  
2009.0/i586/php-cups-1.3.10-0.3mdv2009.0.i586.rpm 
 977d5d5d741abd078f9c778c9c5f87d4  2009.0/SRPMS/cups-1.3.10-0.3mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 f3caa52b521fe6a2435c909fe3d749e2  
2009.0/x86_64/cups-1.3.10-0.3mdv2009.0.x86_64.rpm
 723d9585ffe96108b3cfb200c66416c0  
2009.0/x86_64/cups-common-1.3.10-0.3mdv2009.0.x86_64.rpm
 

VUPEN Security Research - Adobe Acrobat and Reader PNG Data Buffer Overflow Vulnerability

2010-04-15 Thread VUPEN Web Research
VUPEN Security Research - Adobe Acrobat and Reader PNG Data Buffer Overflow 
Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability in
Adobe Acrobat and Reader.

This vulnerability is caused by a buffer overflow error when processing
malformed PNG data, which could be exploited by attackers to execute
arbitrary code by tricking a user into opening a specially crafted
PDF document.


III. AFFECTED PRODUCTS


Adobe Reader version 9.3.1 and prior
Adobe Reader version 8.2.1 and prior
Adobe Acrobat version 9.3.1 and prior
Adobe Acrobat version 8.2.1 and prior



IV. Binary Analysis  Proof-of-concept
---

In-depth binary analysis of the vulnerability and a code execution
exploit with DEP bypass have been released by VUPEN through the
VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/exploits/


V. SOLUTION


Upgrade to Adobe Acrobat and Reader version 9.3.2 or 8.2.2.


VI. CREDIT
--

The vulnerability was discovered by Nicolas Joly of VUPEN Security


VII. ABOUT VUPEN Security
-

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service:

http://www.vupen.com/english/services/

* VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/exploits/


VIII. REFERENCES
--

http://www.vupen.com/english/advisories/2010/0873
http://www.adobe.com/support/security/bulletins/apsb10-09.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198


IX. DISCLOSURE TIMELINE
--- 


2010-03-16 - Vendor notified
2010-03-16 - Vendor response
2010-04-07 - Status update received
2010-04-13 - Coordinated public Disclosure





VUPEN Web Security Research - WebAsyst Shop-Script Multiple Input Validation Vulnerabilities

2010-04-15 Thread VUPEN Web Research
VUPEN Web Security Research - WebAsyst Shop-Script Multiple Input Validation 
Vulnerabilities


http://www.vupen.com/english/research-web.php


I. BACKGROUND
-

WebAsyst Shop-Script FREE - simple and free PHP shopping cart script.
It provides basic shopping cart functionality and allows to create
a nice looking simple shopping cart add-on for your website.
Or to learn how shopping cart systems are designed.


II. DESCRIPTION
-

VUPEN Web Vulnerability Research Team discovered 27 vulnerabilities
in WebAsyst Shop-Script FREE.

These issues are caused by input validation errors in various scripts
when processing user-supplied data and parameters, which could allow
local file inclusion, sql injection and cross site scripting attacks.


III. AFFECTED PRODUCTS
---

WebAsyst Shop-Script FREE


IV. SOLUTION
---

The vendor does not support the script any longer.

Remove WebAsyst Shop-Script FREE from your web site.


V. CREDIT
--

The vulnerability was discovered by Mohammed Boumediane of VUPEN Security


VI. ABOUT VUPEN Security


VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service:

http://www.vupen.com/english/services/

* VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/exploits/


VII. REFERENCES
--

http://www.vupen.com/english/advisories/2010/0882


VIII. DISCLOSURE TIMELINE
--- 


2010-04-13 - Vendor notified
2010-04-14 - Vendor response (script not supported any longer)
2010-04-14 - Public Disclosure





VUPEN Security Research - Adobe Acrobat and Reader JPEG Data Buffer Overflow Vulnerability

2010-04-15 Thread VUPEN Web Research
VUPEN Security Research - Adobe Acrobat and Reader JPEG Data Buffer Overflow 
Vulnerability


http://www.vupen.com/english/research.php


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability in
Adobe Acrobat and Reader.

This vulnerability is caused by a buffer overflow error when processing
malformed JPEG data, which could be exploited by attackers to execute
arbitrary code by tricking a user into opening a specially crafted
PDF document.


III. AFFECTED PRODUCTS
---

Adobe Reader version 9.3.1 and prior
Adobe Reader version 8.2.1 and prior
Adobe Acrobat version 9.3.1 and prior
Adobe Acrobat version 8.2.1 and prior



IV. Binary Analysis  Proof-of-concept
---

In-depth binary analysis of the vulnerability and a code execution
exploit with DEP bypass have been released by VUPEN through the
VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/exploits/


V. SOLUTION


Upgrade to Adobe Acrobat and Reader version 9.3.2 or 8.2.2.


VI. CREDIT
--

The vulnerability was discovered by Nicolas Joly of VUPEN Security


VII. ABOUT VUPEN Security


VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service:

http://www.vupen.com/english/services/

* VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/exploits/


VIII. REFERENCES
--

http://www.vupen.com/english/advisories/2010/0873
http://www.adobe.com/support/security/bulletins/apsb10-09.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199


IX. DISCLOSURE TIMELINE
--- 


2010-03-16 - Vendor notified
2010-03-16 - Vendor response
2010-04-07 - Status update received
2010-04-13 - Coordinated public Disclosure





VUPEN Security Research - Adobe Acrobat and Reader BMP Data Buffer Overflow Vulnerability

2010-04-15 Thread VUPEN Web Research

VUPEN Security Research - Adobe Acrobat and Reader BMP Data Buffer Overflow
Vulnerability

http://www.vupen.com/english/research.php


I. BACKGROUND
-

Adobe Acrobat and Reader are the global standards for electronic
document sharing. They are used to create, view, search, digitally
sign, verify, print, and collaborate on Adobe PDF files.


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability in
Adobe Acrobat and Reader.

This vulnerability is caused by a buffer overflow error when processing
malformed BitMap (BMP) data, which could be exploited by attackers to
execute arbitrary code by tricking a user into opening a specially crafted
PDF document.


III. AFFECTED PRODUCTS
-

Adobe Reader version 9.3.1 and prior
Adobe Reader version 8.2.1 and prior
Adobe Acrobat version 9.3.1 and prior
Adobe Acrobat version 8.2.1 and prior



IV. Binary Analysis  Proof-of-concept
-

In-depth binary analysis of the vulnerability and a code execution
exploit with DEP bypass have been released by VUPEN through the
VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/exploits/


V. SOLUTION
-

Upgrade to Adobe Acrobat and Reader version 9.3.2 or 8.2.2.


VI. CREDIT
--

The vulnerability was discovered by Nicolas Joly of VUPEN Security


VII. ABOUT VUPEN Security


VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service:

http://www.vupen.com/english/services/

* VUPEN Binary Analysis  Exploits Service :

http://www.vupen.com/exploits/


VIII. REFERENCES
--

http://www.vupen.com/english/advisories/2010/0873
http://www.adobe.com/support/security/bulletins/apsb10-09.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203


IX. DISCLOSURE TIMELINE
--- 


2010-03-16 - Vendor notified
2010-03-16 - Vendor response
2010-04-07 - Status update received
2010-04-13 - Coordinated public Disclosure





ZDI-10-072: Cisco Secure Desktop CSDWebInstaller ActiveX Control Remote Code Execution Vulnerability

2010-04-15 Thread ZDI Disclosures
ZDI-10-072: Cisco Secure Desktop CSDWebInstaller ActiveX Control Remote Code 
Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-072
April 14, 2010

-- Affected Vendors:
Cisco

-- Affected Products:
Cisco Secure Desktop

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 8247. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
systems with vulnerable installations of Cisco Secure Desktop. User
interaction is required to exploit this vulnerability in that the target
must visit a malicious page.

The specific flaw exists in the Secure Desktop Web Install ActiveX
control (705EC6D4-B138-4079-A307-EF13E4889A82). The control fails to
properly verify the signature of the downloaded executable being
installed. By not verifying the executable a malicious attacker can
force the user to download and run any code of their choosing.
Successful exploitation leads to full system compromise under the
credentials of the currently logged in user.

-- Vendor Response:
Cisco has issued an update to correct this vulnerability. More
details can be found at:

http://www.cisco.com/en/US/products/products_security_advisory09186a0080b25d01.shtml

-- Disclosure Timeline:
2009-02-24 - Vulnerability reported to vendor
2010-04-14 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Anonymous

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

[DSecRG-09-053] VMware Remoute Console - format string

2010-04-15 Thread Alexandr Polyakov

Digital Security Research Group [DSecRG] Advisory   DSECRG-09-053


Application:VMware Remoute Console
Version:e.x.p build-158248
Vendor URL: http://vmware.com
Bugs:   Format String Vulnerabilitys
Exploits:   YES (PoC)
Reported:   07.08.2009
Vendor response:13.08.2009
Date of Public Advisory:09.04.2010
CVE:CVE-2009-3732
VSA:VMSA-2010-0007
Authors:Alexey Sintsov of 
Digital Security Research Group [DSecRG] 
(research [at] dsecrg [dot] com)

Description


VMware Remote Console Plug-in can be installed from WEB
interface of  VMware   vSphere. This software contains of ActiveX
objects and executable files for remote console  of guest OS. 
VMrc vulnerable to format string attacks. Exploitation of this issue 
may lead to arbitrary code execution on the system where VMrc is installed.


Details
***
Details on official advisory  http://dsecrg.com/pages/vul/show.php?id=153

References
**

http://dsecrg.com/pages/vul/show.php?id=153
http://lists.vmware.com/pipermail/security-announce/2010/90.html

About
*

Digital Security is leading IT security company in Russia, 
providing information security consulting, audit and penetration
testing services, risk analysis and ISMS-related services and 
certification for ISO/IEC 27001:2005, PCI DSS and PA-DSS standards.
Digital Security Research Group focuses on web application and database
security problems with vulnerability reports, advisories and whitepapers
posted regularly on our website.


Contact:research [at] dsecrg [dot] com
http://www.dsecrg.com 







Polyakov Alexandr. PCI QSA, PA-QSA.
Head of security audit department
Head of Digital Security Research Group
__
DIGITAL SECURITY
phone:  +7 812 703 1547
+7 812 430 9130
e-mail: a.polya...@dsec.ru  
www.dsec.ru
www.dsecrg.com
www.pcidss.ru


---
This message and any attachment are confidential and may be privileged or 
otherwise protected 
from disclosure. If you are not the intended recipient any use, distribution, 
copying or disclosure 
is strictly prohibited. If you have received this message in error, please 
notify the sender immediately 
either by telephone or by e-mail and delete this message and any attachment 
from your system. Correspondence 
via e-mail is for information purposes only. Digital Security neither makes nor 
accepts legally binding 
statements by e-mail unless otherwise agreed. 
---  



[DSECRG-09-049] IBM BladeCenter Management Module - DoS vulnerability

2010-04-15 Thread Alexandr Polyakov


Digital Security Research Group [DSecRG] Advisory   #DSECRG-09-049


Application: IBM BladeCenter Managmet Module
Versions Affected:   before BPET50G 
Vendor URL:  http://www-03.ibm.com/systems/bladecenter/
Bug: DoS
Exploits:YES
Reported:24.07.2009
Vendor response: 26.07.2009
Date of Public Advisory: 15.04.2010
Solution:YES
Author:  Alexey Sintsov 
 of Digital Security Research Group [DSecRG]


Description
***

The BladeCenter management module is a hot-swappable hardware device plugged 
into the   BladeCenter 
chassis management bay. The management module functions as a system-management 
processor (service processor) 
and keyboard, video, and mouse (KVM)   multiplexor for blade servers. This 
device can be remotely rebooted.

Details
***

Details in official Advisory http://dsecrg.com/pages/vul/show.php?id=149

Solution


The issue has been fixed in AMM firmware version bpet50g and later.

Refernces
*

http://dsecrg.com/pages/vul/show.php?id=149
http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR-5083945brandind=520

About
*

Digital Security is leading IT security company in Russia,
providing information security consulting, audit and penetration
testing services, risk analysis and ISMS-related services and
certification for ISO/IEC 27001:2005 and PCI DSS and PA DSS standards.
Digital Security Research Group focuses on web application and database
security problems with vulnerability reports, advisories and whitepapers
posted regularly on our website.


Contact: research [at] dsecrg [dot] com
http://www.dsecrg.com 





Vulnerability in CB Captcha for Joomla and Mambo

2010-04-15 Thread MustLive

Hello Bugtraq!

I want to warn you about security vulnerability in plugin CB Captcha
(plug_cbcaptcha) for component Community Builder (com_comprofiler) for
Joomla and Mambo. The posting of this advisory to mailing lists was delayed,
because I found that there are two different vulnerable versions of plugin
developed by different authors, so I needed to inform all authors.

-
Advisory: Vulnerability in CB Captcha for Joomla and Mambo
-
URL: http://websecurity.com.ua/4087/
-
Affected products: CB Captcha 1.0.2 and previous versions (developed by
Kotofeich), CB Captcha 2.2 and previous versions (developed by Beat).
-
Timeline:
17.03.2010 - found vulnerability.
31.03.2010 - disclosed at my site.
01.04.2010 - informed developer of CB Captcha 1.x. And because I found other
version of the plugin by another author, and after checking it later I
informed author of CB Captcha 2.x.
13.04.2010 - additionally informed developers of Community Builder (both
joomlapolis.com and communitybuilder.ru).
-
Details:

This is Insufficient Anti-automation vulnerability.

This plugin is based on captcha script CaptchaSecurityImages.php and I
already reported about vulnerabilities in CaptchaSecurityImages
(http://websecurity.com.ua/4043/). And in plugin plug_cbcaptcha were fixed
all Insufficient Anti-automation and Denial of Service vulnerabilities from
original script, except one.

Insufficient Anti-automation:

In the plugin it's possible to bypass captcha with using of session reusing
with constant captcha bypass method (http://websecurity.com.ua/1551/), which
was described in project Month of Bugs in Captchas. With using of this
method it's possible to bypass protection by sending the same code of
captcha.

It can be done at all pages where this plugin is used. In CB Captcha 1.x
it's using at registration page, lost password form and lost email form. In
CB Captcha 2.x, in addition to before-mentioned forms, it's using at contact
form (in the presence of component CB Contact 1.1) and login form (in the
presence of login module of CB 1.2).

PoC:

The PoC for this Insufficient Anti-automation vulnerability was provided to
developers. Everyone who want can create such PoC from exploit provided in
above-mentioned article from MoBiC project.

Best wishes  regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua



Cisco Security Advisory: Cisco Secure Desktop ActiveX Control Code Execution Vulnerability

2010-04-15 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory: Cisco Secure Desktop ActiveX Control Code
Execution Vulnerability

Advisory ID: cisco-sa-20100414-csd

Revision 1.0

+-

Summary
===

Cisco Secure Desktop contains a vulnerable ActiveX control that could
allow an attacker to execute arbitrary code with the privileges of
the user who is currently logged into the affected system. Cisco has
released a free software update that addresses this vulnerability.
There is a workaround that mitigates this vulnerability.

This advisory is posted at:

http://www.cisco.com/warp/public/707/cisco-sa-20100414-csd.shtml

Affected Products
=

Vulnerable Products
+--

Cisco Secure Desktop versions prior to 3.5.841 are affected.

Products Confirmed Not Vulnerable
+

No other Cisco products are currently known to be affected by this
vulnerability.

Details
===

A Cisco-signed ActiveX control that is used by Cisco Secure Desktop
fails to properly verify the integrity of an executable file that is
used by the Cisco Secure Desktop installation process. If an attacker
can entice a user to visit an attacker controlled web page, the
vulnerable ActiveX control could be invoked to download an
attacker-modified package. The package could contain a malicious
executable file that executes with the privileges of the affected
user. A successful exploit could result in a complete compromise of a
vulnerable system. This vulnerability is documented in Cisco Bug ID 
CSCta25876 and has been assigned the Common Vulnerabilities and
Exposures (CVE) ID CVE-2010-0589.

Vulnerability Scoring Details
=

Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.

CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.

Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.

Cisco has provided an FAQ to answer additional questions regarding
CVSS at:

http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html

Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:

http://intellishield.cisco.com/security/alertmanager/cvss

CSCta25876

CVSS Base Score - 9.3

Access Vector   - Network
Access Complexity   - Medium
Authentication  - None
Confidentiality Impact  - Complete
Integrity Impact- Complete
Availability Impact - Complete

CVSS Temporal Score - 7.7

Exploitability  - Functional
Remediation Level   - Official-Fix
Report Confidence   - Confirmed

Impact
==

Successful exploitation of this vulnerability could result in a
complete compromise of the affected system.

Software Versions and Fixes
===

When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.

In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.

Cisco Secure Desktop version 3.5.841 can be downloaded at the
following link:

http://tools.cisco.com/support/downloads/go/ImageList.x?relVer=3.5.841mdfid=280277835sftType=CSD+package-+ASA+DistributionoptPlat=nodecount=2edesignator=nullmodelName=Cisco+Secure+DesktoptreeMdfId=268438162treeName=Securitymodifmdfid=nullimname=hybrid=imst=lr=Y

Note: Cisco Secure Desktop versions 3.0 and 3.1 are only supported
for operation with certain versions of Cisco IOS software and Cisco
Adaptive Security Appliance (ASA) software version 7.x. Cisco Secure
Desktop versions 3.2 through 3.5 are only supported for operation
with Cisco ASA software version 8.x. Customers running Cisco Secure
Desktop versions 3.2 through 3.5 with a supported Cisco ASA software
version are encouraged to upgrade to Cisco Secure Desktop version
3.5.841.

Customers with active software licenses for Cisco Secure Desktop
versions 3.0 and 3.1 should send email to the following address for
instructions on migrating to non-vulnerable software:

csd-activex-inqu...@cisco.com

Workarounds
===

Administrators can mitigate this vulnerability by using the kill bit
feature of Microsoft Windows to prevent the loading and execution of
the vulnerable ActiveX control. Administrators must use the Class
identifier 

[CVE-2010-0432] Apache OFBiz Multiple XSS Vulnerabilities

2010-04-15 Thread Jacopo Cappellato
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

   Bonsai Information Security - Advisory
 http://www.bonsai-sec.com/research/

   Multiple XSS in Apache OFBiz

1. *Advisory Information*

Title: Multiple XSS in Apache OFBiz
Advisory ID: BONSAI-2010-0103
Advisory URL: 
http://www.bonsai-sec.com/research/vulnerabilities/apacheofbiz-multiple-xss-0103.php
Date published: 2010-04-14
Vendors contacted: Apache Software Foundation
Release mode: Coordinated release


2. *Vulnerability Information*

Class: Multiple Cross Site Scripting (XSS)
Remotely Exploitable: Yes
Locally Exploitable: Yes
CVE Name: CVE-2010-0432


3. *Software Description*

Apache Open For Business (Apache OFBiz) is a community-driven 
Open Source Enterprise Resource Planning (ERP) system. 
It provides a suite of enterprise applications that integrate 
and automate many of the business processes of an enterprise. 
Apache OFBiz is a foundation and starting point for reliable, 
secure and scalable enterprise solutions.
OFBiz is an Apache Software Foundation top level project. 


4. *Vulnerability Description*

Cross-Site Scripting attacks are a type of injection problem, in which 
malicious scripts are injected into the otherwise benign and trusted web sites.
Cross-site scripting (XSS) attacks occur when an attacker uses a web 
application to send malicious code, generally in the form of a browser side 
script, to a different end user. Flaws that allow these attacks to succeed are
quite widespread and occur anywhere a web application uses input from a user
in the output it generates without validating or encoding it. 

This vulnerability can be exploited to force a logged in Administrator
to run arbitrary SQL commands [3] or create a new user with Full Privileges [4].
You can find customized XSS PoC payloads here.

For additional information and a demostrative video, please read [1] and [2].


5. *Vulnerable packages*

Apache OFBiz:
- Stable Version = 9.04
- SVN Revision =  920371
- Release Branch Candidate 4.0 Revision = 920381

Products based on Apache OFBiz:
- Opentaps Version = 1.4
- Neogia Version =  1.0
- Entente Oya Version = 1.6

Since there are more products based on Apache OFBiz, these vulnerabilities 
resides
in some of them but unconfirmed. Check [2] for updates.


6. *Mitigation*

SVN Trunk users should update to at least revision 920372 
from svn or apply the following patches [5].
Release Branch Candidate 09.04 should update to at least revision 920382 
from svn or applythe following patches [6].
Apache Software Foundation developers informed us that all users should 
upgrade to the latest version of Apache OFBiz, which fixes this vulnerability. 
More information to be found here:

http://ofbiz.apache.org


7. *Credits*

These vulnerabilities were discovered by Lucas Apa ( lucas -at- bonsai-sec.com 
).


8. *Technical Description*

8.1 A Reflected Cross Site Scripting vulnerability was found in the 
productStoreId variable within the 'Export Product Listing' section.
When rendering menu widget item links of type hidden-form, the hidden
input value attributes were not being html encoded. In many cases these 
hidden input values are derived from request parameters and could be used 
in a Reflected Cross-Site Scripting attack.

For a page that contains a menu widget with the following menu item definition:
menu-item name=ebayExportAllCategoryToEbayStore 
title=${uiLabelMap.EbayExportAllCategoryToEbayStore}
  link target=exportCategoryEbayStore
parameter param-name=productStoreId 
value=${parameters.productStoreId}/
  /link
/menu-item

The vulnerability can be triggered by clicking on the 
following URL:

https://www.ofbiz-example.com/ebaystore/control/exportProductListing?productStoreId=90100;
style=width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px
onMouseOver=alert(document.cookie)


8.2 A Reflected Cross Site Scripting vulnerability was found in the 
partyId variable within the 'View Profile' section.
This is because the application does not properly sanitise
the users input. The vulnerability can be triggered by clicking on the 
following URL:

https://www.ofbiz-example.com/partymgr/control/viewprofile?partyId=aa;
style=width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px
onMouseOver=alert(document.cookie)

https://www.neogia-example.com/partymgr/control/login;partyId=aa;
style=width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px
onMouseOver=alert(document.cookie)

https://www.opentaps-example.com/partymgr/control/viewprofile?partyId=aa;
style=width:100%25;height:100%25;display:block;position:absolute;top:0px;left:0px
onMouseOver=alert(document.cookie)


8.3 A Reflected Cross Site Scripting vulnerability was found in the 
start variable within the 'Show Portal Page' section.
During page rendering, if a FreeMarker TemplateException is thrown 
then the stack trace is printed directly into the 

Nucleus CMS v.3.51 (DIR_LIBS) Multiple Vulnerability

2010-04-15 Thread eidelweiss
Vulnerability: Nucleus v3.51 ( other or lower version may also be affected)

Vendor: http://nucleuscms.org/

Category: Input Validation Error

Impact: (rfi/lfi) Multiple Vulnerability



Details:



Multiple Vulnerability has been found in Nucleus v3.51 because it fails to 
sufficiently sanitize user-supplied data.

Exploiting these issues may allow an attacker to compromise the application and 
the computer; other attacks are also possible.



Nucleus v3.51 and prior versions are vulnerable.



P0C:

The following example URIs are available:



Http://127.0.0.1/[path_to_nucleus]/action.php?DIR_LIBS=[inj3ct0r sh3ll]



Http://127.0.0.1/[path_to_nucleus]/nucleus/xmlrpc/server.php?DIR_LIBS=[inj3ct0r 
sh3ll]



Http://127.0.0.1/[path_to_nucleus]/nucleus/plugins/skinfiles/index.php?DIR_LIBS=../../../var/log/httpd/access_log%00





ZDI-10-076: Apple Preview libFontParser SpecialEncoding Remote Code Execution Vulnerability

2010-04-15 Thread ZDI Disclosures
ZDI-10-076: Apple Preview libFontParser SpecialEncoding Remote Code Execution 
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-076
April 14, 2010

-- CVE ID:
CVE-2010-1120

-- Affected Vendors:
Apple

-- Affected Products:
Apple Preview

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 9686. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Apple Preview. User interaction is required
in that a target must open a malicious file or visit a malicious page.

The specific flaw exists within the routine
TType1ParsingContext::SpecialEncoding() defined in libFontParser.dylib.
While parsing glyphs from a PDF document, a malformed offset greater
than 0x400 can result in a heap corruption which can be leveraged by an
attacker to execute arbitrary code under the context of the current
user.

-- Vendor Response:
Apple has issued an update to correct this vulnerability. More
details can be found at:

http://support.apple.com/kb/HT4131

-- Disclosure Timeline:
2010-03-26 - Vulnerability reported to vendor
2010-04-14 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Charlie Miller

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi