Re: seamless bait-and-switch

2011-12-09 Thread Jann Horn
2011/12/8 Michal Zalewski :
> What part? The change of a URL that is not associated with the
> repainting of window contents? I believe that they are very unlikely
> to catch this after initially examining the URL, in absence of other
> indicators (change in URL length, page repainting, throbber activity).

And even if so - someone who's typing in his password will not
notice/react to a page reload for at least a few keystrokes. A
javascript could send those to the server immediately, and if it's a
semanic password, you might be able to guess the rest.


the week of silly PoCs continues: data://www.mybank.com/

2011-12-09 Thread Michal Zalewski
Just another short note... this is a somewhat compelling and entirely
unnecessary phishing opportunity - and a tiny symptom of the mess with
URL handling.

Firefox and Opera allow you to omit MIME type in data: URLs, possibly
put random garbage into that section, and still get a valid HTML
document. This is a natural extension of how the Content-Type header
is handled in HTTP, but probably makes little or no sense here.

With the use of Unicode homographs, you can create fairly believable
URLs especially in Firefox:

http://lcamtuf.coredump.cx/switch/index2.html

The appearance may vary depending on your font selection; see
http://lcamtuf.coredump.cx/switch/reference.jpg for a sample capture.

If you know the special role of "data:", this won't fool you. But most
browser users don't, even if they grasp the basics of URL syntax to
begin with (of course, that part itself is not true in all too many
cases).

PS. It is probably better known that a less convincing variant of this
can be achieved with javascript: URLs in MSIE and some other browsers.

/mz


*CLOSING IN 5 DAYS * Re: AppSec DC 2012 - Call for Trainers

2011-12-09 Thread AppSec DC
ALL,

Just a reminder that the call for trainers closes on December 15th.
We welcome all proposals at varying levels of technical content as
well as non web-specific training.

Submit proposals to http://training.appsecdc.org/

Regards,

The AppSec DC Program Committee


On Mon, Oct 24, 2011 at 2:27 PM, AppSec DC  wrote:
> Colleagues,
>
> OWASP is currently soliciting training providers for the OWASP AppSec DC
> 2012 regional conference that will take place at the Walter E. Washington
> Convention Center (801 Mount Vernon Place NW Washington, DC 20001) on April
> 2nd through 5th of 2012.  The theme for this year's conference is "OWASP -
> Not just webapps anymore" to reflect the new and revised scope of OWASP to
> include all application security issues instead of focusing just on web
> application security.  There will be training courses on April 2nd and 3rd
> followed by plenary sessions on the 4th and 5th. There are a total of six
> classrooms over two days or 12 training days available at the conference.
> Three classrooms hold 30 students and the other three have a capacity of 24
> students.
>
> The following conditions apply for people or organizations that want to
> provide training at the conference:
>
>     * Training provider should provide class syllabus / training materials.
>     * Proceeds will be split 60/40 (OWASP/Trainer) for the training class.
>     * OWASP will provide the Venue, Marketing with Conference materials,
> Registration and basic AV
>     * Trainers will cover travel and accommodations for the instructor(s)
> and all course materials for students
>     * OWASP will reserve up to 2 training slots at no cost and the trainer
> may reserve up to one slot at no cost
>     * Price per attendee: 2-Day Class $1500/ 1-Day Class $750.
>     * Trainers can brand training materials to increase their exposure
>     * Classes are to be focused around Application Security but are in no
> way limited to web application security.
>
> Submit proposals to http://training.appsecdc.org/ before December 15th 2011
> to be considered.  All trainers will be required to submit a Training
> Instructor Agreement
> (https://www.owasp.org/images/0/0f/AppSecDC_2012_Training_Instructor_Agreement.pdf)
> in order to have their classed scheduled.  Additional information can be
> found at http://www.appsecdc.org
>
> Please forward to all interested practitioners and colleagues.
>
> Regards,
>
> The AppSec DC Program Committee


[SignalSEC Labs]: HTC Touch2 T3333 Video Player Memory Corruption

2011-12-09 Thread signaladvisory
Affected Software: HTCVideoPlayer.exe 

Tested on: HTC Touch2 T - Windows Mobile 6.5

Vulnerability: Memory Corruption

Details:

HTCVideoPlayer is the default media player of HTC Windows Mobile devices. This 
media player is prone to a memory corruption vulnerability while parsing stbl 
atom of 3g2 video format.

20:420> r
 r0=2b7ea77c  r1=2b7f15bb  r2=0004  r3=0080  r4=4141413d  r5=2b7ea7d4
 r6=0004  r7=2b7ea77c  r8=  r9= r10=000209f0 r11=2b7efdec
r12=03f9e594  sp=2b7ea74c  lr=01323c7c  pc=03f9e8e4 psr=6010 -ZC-- ARM

20:420> u
coredll_3f4a000+0x548e4:
03f9e8e4 0130d1e4 ldrbr3, [r1], #1 --> memcpy() // like rep movs
03f9e8e8 042042e2 sub r2, r2, #4
03f9e8ec 0140d1e4 ldrbr4, [r1], #1
03f9e8f0 0150d1e4 ldrbr5, [r1], #1
03f9e8f4 01e0d1e4 ldrblr, [r1], #1
03f9e8f8 0130c0e4 strbr3, [r0], #1

vomp4fr+0x3c7c:

.text:10003C6CLDMHIFD SP!, {R4-R7,PC}
.text:10003C70MOV   R2, R6; size_t
.text:10003C74MOV   R0, R7; void *
.text:10003C78BLmemcpy
.text:10003C7CLDR   R3, [R5,#0x14]


Proof of Concept:
www.signalsec.com/publications/htcvideo.3g2

Credits:
Vulnerability was discovered by Celil UNUVER from SignalSEC Labs

About SignalSEC:
SignalSEC is a company located in Turkey which provides vulnerability , cyber 
threat intelligence and penetration testing services.
www.signalsec.com



CA20111208-01: Security Notice for CA SiteMinder

2011-12-09 Thread Williams, James K
CA20111208-01: Security Notice for CA SiteMinder

Issued: December 08, 2011

CA Technologies Support is alerting customers to a potential risk in 
CA SiteMinder. A vulnerability exists that can allow a malicious user 
to execute a reflected cross site scripting (XSS) attack. CA 
Technologies has issued patches to address the vulnerability.

The vulnerability, CVE-2011-4054, occurs due to insufficient 
validation of postpreservationdata parameter input utilized in the 
login.fcc form. A malicious user can submit a specially crafted 
request to effectively hijack a victim’s browser.

Risk Rating

Medium

Platform

All

Affected Products

CA SiteMinder R6 SP6 CR7 and earlier
CA SiteMinder R12 SP3 CR8 and earlier

Non-Affected Products

CA SiteMinder R6 SP6 CR8
CA SiteMinder R12 SP3 CR9

How to determine if the installation is affected

Check the Web Agent log or Installation log to obtain the installed 
release version. Note that the "webagent.log" file name is 
configurable by the SiteMinder administrator.

Solution

CA is issuing patches to address the vulnerability.

CA SiteMinder R6:
Upgrade to R6 SP6 CR8 or later (Expected Availability: January 2012)

CA SiteMinder R12:
Upgrade to R12 SP3 CR9 or later

CR releases can be found on the CA SiteMinder 
Hotfix/Cumulative Release page:
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={5AE61E29-C3DE-405E-9151-9EEA72D965CE}.

Workaround

None

References

CVE-2011-4054 - CA SiteMinder login.fcc XSS

Acknowledgement

CVE-2011-4054 - Jon Passki of Aspect Security, via CERT

Change History

Version 1.0: Initial Release

If additional information is required, please contact CA 
Technologies Support at https://support.ca.com.

If you discover a vulnerability in CA Technologies products, please 
report your findings to the CA Technologies Product Vulnerability 
Response Team.
support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=177782


Thanks and regards,
Ken Williams, Director
CA Technologies Product Vulnerability Response Team
CA Technologies Business Unit Operations
wilj...@ca.com


AST-2011-014: Remote crash possibility with SIP and the “automon” feature enabled

2011-12-09 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2011-014

 ProductAsterisk  
 SummaryRemote crash possibility with SIP and the "automon"   
feature enabled   
Nature of Advisory  Remote crash vulnerability in a feature that is   
disabled by default   
  SusceptibilityRemote unauthenticated sessions   
 Severity   Moderate  
  Exploits KnownYes   
   Reported On  November 2, 2011  
   Reported By  Kristijan Vrban   
Posted On   2011-11-03
 Last Updated OnDecember 7, 2011  
 Advisory Contact   Terry Wilson  
 CVE Name   

Description  When the "automon" feature is enabled in features.conf, it   
 is possible to send a sequence of SIP requests that cause
 Asterisk to dereference a NULL pointer and crash.

Resolution  Applying the referenced patches that check that the pointer   
is not NULL before accessing it will resolve the issue. The   
"automon" feature can be disabled in features.conf as a   
workaround.   

   Affected Versions
Product  Release Series  
 Asterisk Open Source   1.6.2.x  All versions 
 Asterisk Open Source1.8.x   All versions 

  Corrected In
   Product  Release   
Asterisk Open Source   1.6.2.21, 1.8.7.2  

 Patches  
  Download URLRevision 
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.6.2.diff 1.6.2.20 
   http://downloads.asterisk.org/pub/security/AST-2011-014-1.8.diff   1.8.7.1  

Links  

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2011-014.pdf and 
http://downloads.digium.com/pub/security/AST-2011-014.html

Revision History
   Date Editor Revisions Made 

   Asterisk Project Security Advisory - AST-2011-014
  Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
   original, unaltered form.



AST-2011-013: Possible remote enumeration of SIP endpoints with differing NAT settings

2011-12-09 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2011-013

 ProductAsterisk  
 SummaryPossible remote enumeration of SIP endpoints with 
differing NAT settings
Nature of Advisory  Unauthorized data disclosure  
  SusceptibilityRemote unauthenticated sessions   
 Severity   Minor 
  Exploits KnownYes   
   Reported On  2011-07-18
   Reported By  Ben Williams  
Posted On   
 Last Updated OnDecember 7, 2011  
 Advisory Contact   Terry Wilson  
 CVE Name   

Description  It is possible to enumerate SIP usernames when the general   
 and user/peer NAT settings differ in whether to respond to   
 the port a request is sent from or the port listed for   
 responses in the Via header. In 1.4 and 1.6.2, this would
 mean if one setting was nat=yes or nat=route and the other   
 was either nat=no or nat=never. In 1.8 and 10, this would
 mean when one was nat=force_rport or nat=yes and the other   
 was nat=no or nat=comedia.   

Resolution  Handling NAT for SIP over UDP requires the differing  
behavior introduced by these options. 
  
To lessen the frequency of unintended username disclosure,
the default NAT setting was changed to always respond to the  
port from which we received the request-the most commonly 
used option.  
  
Warnings were added on startup to inform administrators of
the risks of having a SIP peer configured with a different
setting than that of the general setting. The documentation   
now strongly suggests that peers are no longer configured 
for NAT individually, but through the global setting in the   
"general" context.

   Affected Versions
Product  Release Series  
 Asterisk Open Source AllAll versions 

  Corrected In
 As this is more of an issue with SIP over UDP in general, there is no
 fix supplied other than documentation on how to avoid the problem. The   
default NAT setting has been changed to what we believe the most  
  commonly used setting for the respective version in Asterisk 1.4.43,
 1.6.2.21, and 1.8.7.2.   

Links  

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2011-013.pdf and 
http://downloads.digium.com/pub/security/AST-2011-013.html

Revision History
   Date Editor Revisions Made 

   Asterisk Project Security Advisory - AST-2011-013
  Copyright (c) 2011 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
   original, unaltered form.



DC4420 - London DEFCON - 13 December 2011

2011-12-09 Thread Major Malfunction

OMG, it's Christmas again!!

But happily this year we don't have to lurk in the corner of a dingy pub 
trying to look like we're having fun amongst the estate agents, bankers 
and stock borkers annual do's, as we have our very own cosy well stocked 
*private* bar and meeting space as per normal... Yes, our new home has 
not only put up with us for the whole year but have even invited us back 
for Christmas! Sweet!


To celebrate, you are going to come and entertain us. Yes, that means YOU...

This month we are doing lightning talks, so if you've got a 5-10 minute 
presentation, with or without slides/hardware/pyrotechnics/hadron 
colliders/pixies then bring your game face and share it with us...


Also... There will be:

  Beer.
  (Small but cool) prizes for the best talks...
  More beer.
  Your last chance to buy the few remaining original DC4420 t-shirts!
  Even more beer.
  Your last chance (this year) to buy me a beer.

Where:

   *** DOWNSTAIRS ***
   The Phoenix
   37 Cavendish Square
   London
   W1G 0PP

   http://www.phoenixcavendishsquare.co.uk/

   2 minutes walk from Oxford Circus tube.

When:

   Tuesday 13th December 2011

Room is ours from 17:30, talks kick off at 19:30

See you next week!

cheers,
MM
--
"In DEFCON, we have no names..." errr... well, we do... but silly ones...


Re: seamless bait-and-switch

2011-12-09 Thread Michal Zalewski
> And you don't believe that people would think that's suspicious?

What part? The change of a URL that is not associated with the
repainting of window contents? I believe that they are very unlikely
to catch this after initially examining the URL, in absence of other
indicators (change in URL length, page repainting, throbber activity).

/mz