Re: Kernel 2.4 ioperm

2003-05-22 Thread xbud

On Thursday 22 May 2003 15:16, Simon Huggins wrote:
> On Thu, May 22, 2003 at 01:50:51PM -0600, xbud wrote:
> > FYI, http://marc.theaimsgroup.com/?|=linux-kernel&m=105271679705571&w=2
>
> You say 2.4 in the subject and it says 2.5 in that report.
>
> Is 2.4 vulnerable too?
>
Yes.
> In a reduced test on 2.4 ioperm succeeds as a user but I'm reluctant to
> actually run the real test program because I don't really want to be
> putting arbitrary values in ports :)
>
Why not?
>
> Simon.
>
> --
> Black Cat Networks-(  "That's why we like you, Mulder;   )-
> UK domain, email and web hosting  -( your ideas are weirder than ours."  )-
> http://www.blackcatnetworks.co.uk -(   - Byers   )-

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
"I only drink to make other people interesting" 
--



Kernel 2.4 ioperm

2003-05-22 Thread xbud
FYI,

http://marc.theaimsgroup.com/?|=linux-kernel&m=105271679705571&w=2

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
"I only drink to make other people interesting" 
--



Re: Logging User Activity

2003-05-14 Thread xbud

On Wednesday 14 May 2003 10:23, Nathan E Norman wrote:
> On Wed, May 14, 2003 at 03:33:36PM +0100, Michael Parkinson wrote:
> > Dear All,
> >
> > Currently implementing a number of modifications to our internal security
> > policies and one addition I am attempting to add is the full logging of
> > user activity.
> >
> > I cannot find any simple way of achieving this within the standard doc's
> > and searching the web for "log user activity linux debian" does throw up
> > some not particularly useful links, including a package for filtering my
> > users output to the FBI, not much good for the UK.
> >
> > Can anyone point me in the right direction?
>
> Are you trying to log activity on machines or on the network?\
particularly good question ;)

My suggestion would be to consider both.
For network logging we can 'argue' about what 
sniffers/stream-assemblers/system-logging utils are the best so I won't get 
into it.  I would simply use syslog-ng and have everything sent over a tunnel 
with a signature to avoid spoofing, this would only work if your 'network 
logging' util is capable of using syslog-ng to save logs.
anyway, consider forcing the users to use a certain shell and have the shell 
log everything the users do a la keystroke granularity.

A solution may be to separate your users using what Sebastian suggested 
grsecurity.

Another solution would be to chroot all your users (but I generally think it's 
more of a pain and would simply piss off most of them). 
http://www.digitaloffense.net/chrsh/chrsh.c
http://www.g0thead.com/chrsh-user-setup.txt

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
"I only drink to make other people interesting" 
--



Re: OpenSSH and debian?

2003-05-06 Thread xbud
Yes,
It's somewhat of a new bug that spawned from the media service advisory on 
user enumeration via a timing issue if OpenSSH is compiled with PAM support.

It's not a remote root per say, but mainly an enumeration weakness.

By applying 'nodelay' option for pam_unix.so, this 'feature' is remedied.

On Tuesday 06 May 2003 09:47, Diederik de Vries wrote:
> Hi there!
>
> Today I was surfing on SecurityFocus, and saw that there was a hole in
> OpenSSH (http://www.securityfocus.com/bid/7482/info/). Debian Potato
> uses OpenSSH 3.1 p1, which seems to be exploitable.
>
> Is this true, am I missing something or what?
>
> Thanks!
>
>
> Diederik de Vries
> Netnation Europe
>
> Heemraadsingel 188
> 3021 DM Rotterdam
> T: +31-10-4776515
> F: +31-10-2440250

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
"I only drink to make other people interesting" 
--



Re: SSL proxy server

2003-05-05 Thread xbud
While that is an option, it's probably unfeasable for his wantings. (Unless 
he's the only one connecting to the server). 

Anyway a simple stunnel portfoward will do the trick.

WebServer listens on port 80 locally.
stunnel -r 127.0.0.1:80 -d 443

*Note: A valid server certificate and private key must be installed before 
issueing that command.

On Monday 05 May 2003 10:27, Douglas Blood wrote:
> Why don't you just ssh with port forwarding and only have the webserver
> listen locally? This will encrypt all the traffic and you wouldn't have to
> worry as much about secureity holes in the web server.
>
> Douglas Blood
>
-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
"I only drink to make other people interesting" 
--



Re: HELP, my Debian Server was hacked!

2003-04-22 Thread xbud
tar up your /proc/ directory 
to save a copy of your kcore - it should have useful information unless he 
managed to zero out all the memory that was being utilized during the break 
in.

turn the box off but make sure it don't delete crap, watch out for logic bombs 
or what not.

remove the disk and mount it on another box -o ro (read only) and do your 
analysis there.


On Tuesday 22 April 2003 13:00, Christian Könning wrote:
> Hello List,
>
> I hope this is not of topic:
>
> My private server has been hacked:
> debian woody 2.4.18bf2.4 kernel, apache-ssl, samba, squid.
>
> now my problem: the intruder used a rootkit, i think, cause he deleted
> /var/log, symlinked /root/.bash_history > /dev/null, etc.
> Is there any way to recover the evidences, e.g. the /var/log/ directory?
> (ext2)
>
> and there three sh processes running as root? Ptrace exploit?
> how can i dump this processes to file, to keep this evidence?
>
>
> Thanks for help

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
--



Re: Network stress testing

2003-04-22 Thread xbud
Hi Dale,

Stress testing networks can be quite tedious depending on what type of 'real 
simulation' you have to abide by.
If you have a budget take a look at an appliance called 'Flame Thrower' I 
forget who the vendor is ATM, but it was complete in regaurds to stress 
testing IDS's.  We used it at my old company about 2 years ago, and I'm sure 
it has been enhanced since.

If you have no budget and are just looking for a cheap solution (free 
opensource tools) then 'wget' for ftp / web traffic and tcpdump + tcpreplay 
are your friends with -nl options (this breaks real network traffic 
ofcourse).   I wrote several tools about 2 years ago ( I had just started 
coding then so excuse the poor code heh but they worked for me back then ;)  
SAT Tools on PacketStorm if you want to look at them.  

*Note - These are probably not feasable for dns stressing.

There are several other network appliances available for generating traffic at 
controlled speeds, but from my experience "Flame thrower" did quite well for  
IDS Stress testing as it has an API for integrating new attack simulations 
and has several modules already included in it.

-x
On Tuesday 22 April 2003 09:21, Dale Amon wrote:
> Would anyone have a recommendation for doing a stress
> test of a network? I've got a big show coming up and
> I'd like to set up re-produceable test procedures so
> I know how things respond under expected real life loads.
>
> I'm sure I've run across discussions of such tools
> but I can't remember any names.
>
> In particular I'd like to be able to hit a web server
> (and the local dns) with n requests/min to ensure
> it works, or if not to identify the weak spots.
>
> I'm doing googles in parallel with this query as
> I'm rather under stress testing myself at the
> moment, with a fixed deadline...



CORE - Snort stream4 pre-processor Integer Overflow

2003-04-16 Thread xbud
http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10

This went accross several lists a few days ago, I'm forwarding it in case 
anyone missed it.

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
--



Re: kernel ptrace bug

2003-03-19 Thread xbud
On Wednesday 19 March 2003 09:18, Martynas Domarkas wrote:
> Grsecurity patch can limit ordinary user use ptrace. Can it help avoid
> ptrace exploit?
>
>
> Martynas

yes for the most part limiting access to /proc/self/exe breaks the exploit.

http://www.hardrock.org/kernel/2.4.20/linux-2.4.20-ptrace.patch

The patch seems to remove all access to ptrace calls even for root though, I 
don't see how this _fixes_ anything other than breaking the exploit.

didn't look into that much so correct me if I'm wrong.

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
--



Re: kernel ptrace bug

2003-03-19 Thread xbud
On Wednesday 19 March 2003 09:18, Martynas Domarkas wrote:
> Grsecurity patch can limit ordinary user use ptrace. Can it help avoid
> ptrace exploit?
>
>
> Martynas

yes for the most part limiting access to /proc/self/exe breaks the exploit.

http://www.hardrock.org/kernel/2.4.20/linux-2.4.20-ptrace.patch

The patch seems to remove all access to ptrace calls even for root though, I 
don't see how this _fixes_ anything other than breaking the exploit.

didn't look into that much so correct me if I'm wrong.

-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
--


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: ptrace vulnerability?

2003-03-18 Thread xbud
New one.

The attached module seems to block the currently circulating exploit, I didn't 
write it so don't email me if it breaks your system.

On Tuesday 18 March 2003 17:39, Steve Meyer wrote:
> Correct me if I am wrong but is the ptrace vulnerability not a fairly old
> one.  By old I mean like a couple of years.  Or is this a completely
> different ptrace vulnerability.  I know there was info about a ptrace
> vulnerability at http://packetstormsecurity.com including the working
> exploit code a couple of years ago.
>


-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
"To alcohol! The Cause of AND solution to all of life's problems. Alcohol is a 
way of life. Alcohol is my way of life, and I aim to keep it." -Homer Simpson
--


block_ptrees.tgz
Description: application/tgz


Re: ptrace vulnerability?

2003-03-18 Thread xbud
New one.

The attached module seems to block the currently circulating exploit, I didn't 
write it so don't email me if it breaks your system.

On Tuesday 18 March 2003 17:39, Steve Meyer wrote:
> Correct me if I am wrong but is the ptrace vulnerability not a fairly old
> one.  By old I mean like a couple of years.  Or is this a completely
> different ptrace vulnerability.  I know there was info about a ptrace
> vulnerability at http://packetstormsecurity.com including the working
> exploit code a couple of years ago.
>


-- 
--
Orlando Padilla
http://www.g0thead.com/xbud.asc
"To alcohol! The Cause of AND solution to all of life's problems. Alcohol is a 
way of life. Alcohol is my way of life, and I aim to keep it." -Homer Simpson
--


block_ptrees.tgz
Description: application/tgz


Re: asynchronous socket error 10060

2002-06-06 Thread xbud
Your situation is pretty vague, but my guess would be iptables rule is 
invalid or just not doing what you want it to do .  The reason ftp might 
still be working through it is because it uses a high port to do the actual 
file transfer.

test your rule with something other than ft protocol nc perhaps =).

On Tuesday 04 June 2002 02:29 pm, Listas wrote:
> Hi guys, I am having this error "asynchronous socket error 10060" when I
> try to get some archives from a socket software who was behind a
> iptables firewall(doing redirection port). FTP is working with this
> redirection. Anyone know what was happened?
>
> I configure iptables to redirect some TCP request port to other machine
> and enables conectiontrack modules.
>
>
> tks

-- 
---
Orlando Padilla
[EMAIL PROTECTED]
"I only drink to make other people interesting"
www.g0thead.com/xbud.asc
---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: the case of a stolen notebook

2002-05-29 Thread xbud
On Wednesday 29 May 2002 04:38 pm, Rauno Linnam?e wrote:
> On Wed, May 29, 2002 at 03:37:50AM -0500, xbud wrote:
> > On Wednesday 29 May 2002 11:16 am, Rauno Linnamäe wrote:
> > > Hello,
> > >
> > > We are running a Debian (potato) box with Samba as PDC for user
> > > authentication and file server for W2k LAN clients. Recently one of our
> > > notebooks was stolen. As I can identify all the users who have ever
> > > logged in via that notebook, and may have their samba password stored
> > > on the machine, I revoked all these passwords.
> > >
> > > Can any of you think of any other steps I should take to minimise the
> > > risk of some black-hat abusing the information stored by W2k against
> > > our server/network?
> >
> > This is no way to think if you're a security geek, but if you want to
> > make yourself feel better the person who stole your notebook is a mere
> > theif and is incapable of using any information other than
> > credit/financial information that can lead again to more theft.
>
> I am quite aware of that. In fact, I was rather thinking about the
> consecutive owner/purchaser of the stolen hardware who might have some
> knowledge about computer security.
>
> > On the other hand, purge the users' login's make a significant change to
> > the username converntion since he/she knows what you currently use and
> > can use this to his/her advantage for later brute force attacks.
>
> The username can also often be guessed from e-mail addresses. Besides, I do
> employ a "strong" password policy, and several IDS-s, thus brute-forcing
> would not be of primary concern.
>
Brute force attacks can be evasive unders circumstances a patient one may try 
one password per day for several months in an automated fashion.  ( what are 
the odds eh?)
IDS's ?  If you have any ssl enabled webservers allowing users to check email 
remotely or login through say 'mindterm' to an internal machine etc...  Will 
the ids catch that too ? ( you willing to monitor after decryption has 
occured at the OS side ? ) 

> > He also knows your internal address space information (ie your Internal
> > ip addresses are now 'public),of course that is a significant network
> > change if your dealing with several thousand hosts.
>
> All internal addresses are in the 192.168.x.x address space, thus this is
> not highly sensitive information, is it?
>
This depends on you, evidently you're paranoid or you wouldn't be posting 
here :), why give out any information regarding your network when it's 
unnecessary ?
But I agree under these circumstances not highly sensitive.

> > ---
> > Orlando Padilla
> > [EMAIL PROTECTED]
> > "I only drink to make other people interesting"
> > www.g0thead.com/xbud.asc
> > ---
>
> Many thanks,
>
> Rauno


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: the case of a stolen notebook

2002-05-29 Thread xbud
On Wednesday 29 May 2002 11:16 am, Rauno Linnamäe wrote:
> Hello,
>
> We are running a Debian (potato) box with Samba as PDC for user
> authentication and file server for W2k LAN clients. Recently one of our
> notebooks was stolen. As I can identify all the users who have ever logged
> in via that notebook, and may have their samba password stored on the
> machine, I revoked all these passwords.
>
> Can any of you think of any other steps I should take to minimise the risk
> of some black-hat abusing the information stored by W2k against our
> server/network?
This is no way to think if you're a security geek, but if you want to make 
yourself feel better the person who stole your notebook is a mere theif and 
is incapable of using any information other than credit/financial information 
that can lead again to more theft.

On the other hand, purge the users' login's make a significant change to the 
username converntion since he/she knows what you currently use and can use 
this to his/her advantage for later brute force attacks.

He also knows your internal address space information (ie your Internal ip 
addresses are now 'public),of course that is a significant network change if 
your dealing with several thousand hosts.

>
> Regards,
>
> Rauno

-- 
---
Orlando Padilla
[EMAIL PROTECTED]
"I only drink to make other people interesting"
www.g0thead.com/xbud.asc
---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: the case of a stolen notebook

2002-05-29 Thread xbud

On Wednesday 29 May 2002 04:38 pm, Rauno Linnam?e wrote:
> On Wed, May 29, 2002 at 03:37:50AM -0500, xbud wrote:
> > On Wednesday 29 May 2002 11:16 am, Rauno Linnamäe wrote:
> > > Hello,
> > >
> > > We are running a Debian (potato) box with Samba as PDC for user
> > > authentication and file server for W2k LAN clients. Recently one of our
> > > notebooks was stolen. As I can identify all the users who have ever
> > > logged in via that notebook, and may have their samba password stored
> > > on the machine, I revoked all these passwords.
> > >
> > > Can any of you think of any other steps I should take to minimise the
> > > risk of some black-hat abusing the information stored by W2k against
> > > our server/network?
> >
> > This is no way to think if you're a security geek, but if you want to
> > make yourself feel better the person who stole your notebook is a mere
> > theif and is incapable of using any information other than
> > credit/financial information that can lead again to more theft.
>
> I am quite aware of that. In fact, I was rather thinking about the
> consecutive owner/purchaser of the stolen hardware who might have some
> knowledge about computer security.
>
> > On the other hand, purge the users' login's make a significant change to
> > the username converntion since he/she knows what you currently use and
> > can use this to his/her advantage for later brute force attacks.
>
> The username can also often be guessed from e-mail addresses. Besides, I do
> employ a "strong" password policy, and several IDS-s, thus brute-forcing
> would not be of primary concern.
>
Brute force attacks can be evasive unders circumstances a patient one may try 
one password per day for several months in an automated fashion.  ( what are 
the odds eh?)
IDS's ?  If you have any ssl enabled webservers allowing users to check email 
remotely or login through say 'mindterm' to an internal machine etc...  Will 
the ids catch that too ? ( you willing to monitor after decryption has 
occured at the OS side ? ) 

> > He also knows your internal address space information (ie your Internal
> > ip addresses are now 'public),of course that is a significant network
> > change if your dealing with several thousand hosts.
>
> All internal addresses are in the 192.168.x.x address space, thus this is
> not highly sensitive information, is it?
>
This depends on you, evidently you're paranoid or you wouldn't be posting 
here :), why give out any information regarding your network when it's 
unnecessary ?
But I agree under these circumstances not highly sensitive.

> > ---
> > Orlando Padilla
> > [EMAIL PROTECTED]
> > "I only drink to make other people interesting"
> > www.g0thead.com/xbud.asc
> > ---
>
> Many thanks,
>
> Rauno


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: ipchains rules for dmz??

2002-05-29 Thread xbud

On Wednesday 29 May 2002 11:30 am, Rishi L Khan wrote:
> I looked into shorewall. It doesn't support ipchains, but seawall does.
> Would you suggest updating to iptables or using seawall?
>
> Do you think that Linux 2.4.x is stable yet? If so, which version?
>

The kernel overall I believe is considered stable, I've been using 2.4.18 for 
sometime now and have had no major problems with it. .17 gave me usb horror 
but was fixed in 18.  The only bug I'd watch for would be the NAT bug found 
by "cartel-securite.fr" using a patch to nmap which reviels internal ip 
information. 
According to their advisory 2.4.4 -> 2.4.19pre6 are vulnerable.

> I believe that ipchains can do the job and that linux 2.2.20 is stable. I
> don't have experience in 2.4.x kernels yet, but am willing to look into
> it if people think that it's as stable as 2.2.20.
>
> Are there any security issues with the currentversion of ipchains that is
> addressed with iptables (I don't mean iptables features like stateful
> packet filtering -- I mean security vulnerabilities)
>
I've stuck with ipchains myself, but for no significant reason other than 
being lazy =).
>   -rishi
>
> On Wed, 29 May 2002, Sami Dalouche wrote:
> > > Howabout installing shorewall? (www.shorewall.net) the best iptables
> >
> > script i have ever seen.
> >
> > It's not only the best iptables script you've ever seen, but it's also a
> > nice high-level configuration tool for everything
> > concerning firewalling.. Traffic Shaping, IPSec...
> >
> > Sam

-- 
---
Orlando Padilla
[EMAIL PROTECTED]
"I only drink to make other people interesting"
www.g0thead.com/xbud.asc
---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: the case of a stolen notebook

2002-05-29 Thread xbud

On Wednesday 29 May 2002 11:16 am, Rauno Linnamäe wrote:
> Hello,
>
> We are running a Debian (potato) box with Samba as PDC for user
> authentication and file server for W2k LAN clients. Recently one of our
> notebooks was stolen. As I can identify all the users who have ever logged
> in via that notebook, and may have their samba password stored on the
> machine, I revoked all these passwords.
>
> Can any of you think of any other steps I should take to minimise the risk
> of some black-hat abusing the information stored by W2k against our
> server/network?
This is no way to think if you're a security geek, but if you want to make 
yourself feel better the person who stole your notebook is a mere theif and 
is incapable of using any information other than credit/financial information 
that can lead again to more theft.

On the other hand, purge the users' login's make a significant change to the 
username converntion since he/she knows what you currently use and can use 
this to his/her advantage for later brute force attacks.

He also knows your internal address space information (ie your Internal ip 
addresses are now 'public),of course that is a significant network change if 
your dealing with several thousand hosts.

>
> Regards,
>
> Rauno

-- 
---
Orlando Padilla
[EMAIL PROTECTED]
"I only drink to make other people interesting"
www.g0thead.com/xbud.asc
---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: ipchains rules for dmz??

2002-05-29 Thread xbud


On Wednesday 29 May 2002 11:30 am, Rishi L Khan wrote:
> I looked into shorewall. It doesn't support ipchains, but seawall does.
> Would you suggest updating to iptables or using seawall?
>
> Do you think that Linux 2.4.x is stable yet? If so, which version?
>

The kernel overall I believe is considered stable, I've been using 2.4.18 for 
sometime now and have had no major problems with it. .17 gave me usb horror 
but was fixed in 18.  The only bug I'd watch for would be the NAT bug found 
by "cartel-securite.fr" using a patch to nmap which reviels internal ip 
information. 
According to their advisory 2.4.4 -> 2.4.19pre6 are vulnerable.

> I believe that ipchains can do the job and that linux 2.2.20 is stable. I
> don't have experience in 2.4.x kernels yet, but am willing to look into
> it if people think that it's as stable as 2.2.20.
>
> Are there any security issues with the currentversion of ipchains that is
> addressed with iptables (I don't mean iptables features like stateful
> packet filtering -- I mean security vulnerabilities)
>
I've stuck with ipchains myself, but for no significant reason other than 
being lazy =).
>   -rishi
>
> On Wed, 29 May 2002, Sami Dalouche wrote:
> > > Howabout installing shorewall? (www.shorewall.net) the best iptables
> >
> > script i have ever seen.
> >
> > It's not only the best iptables script you've ever seen, but it's also a
> > nice high-level configuration tool for everything
> > concerning firewalling.. Traffic Shaping, IPSec...
> >
> > Sam

-- 
---
Orlando Padilla
[EMAIL PROTECTED]
"I only drink to make other people interesting"
www.g0thead.com/xbud.asc
---


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: zlib && ssh

2002-03-13 Thread xbud
at this very moment in time yes.. if your zlib is up to date..

there is currently no working exploit for this bug.. but one will popup 
sooner or later.

-xbud
On Tuesday 12 March 2002 02:19 pm, Martin Hermanowski wrote:
> On bugtraq I read something about openssh being vulnerable to the
> doube-free bug.
>
> On my woody boxes, I installed the updated zlib1g from unstable and
> restarted sshd. Is this enough to be protected?
>
> Yours,
> Martin



Re: zlib && ssh

2002-03-13 Thread xbud

at this very moment in time yes.. if your zlib is up to date..

there is currently no working exploit for this bug.. but one will popup 
sooner or later.

-xbud
On Tuesday 12 March 2002 02:19 pm, Martin Hermanowski wrote:
> On bugtraq I read something about openssh being vulnerable to the
> doube-free bug.
>
> On my woody boxes, I installed the updated zlib1g from unstable and
> restarted sshd. Is this enough to be protected?
>
> Yours,
> Martin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Fwd: Exim 3.34 and lower (fwd)

2002-02-14 Thread xbud
Not sure if this made to this list.

I haven't confirmed the following, but thought it was worth forwarding.

-xbud

--  Forwarded Message  --

Subject: Exim 3.34 and lower (fwd)
Date: Wed, 13 Feb 2002 11:19:49 -0700 (MST)
From: Dave Ahmad <[EMAIL PROTECTED]>
To: bugtraq@securityfocus.com

Moderator note:

I have not had the time to look at the Exim source to verify that these
exist and that the attached fix is not broken.

Dave Ahmad
SecurityFocus
www.securityfocus.com

-- Forwarded message --
Return-Path: <[EMAIL PROTECTED]>
Delivered-To: moderator for bugtraq@securityfocus.com
Received: (qmail 32260 invoked from network); 13 Feb 2002 08:49:23 -
Received: from mail.securityfocus.com (HELO securityfocus.com) (66.38.151.9)
  by lists.securityfocus.com with SMTP; 13 Feb 2002 08:49:23 -
Received: (qmail 20929 invoked by alias); 13 Feb 2002 08:50:32 -
Received: (qmail 20925 invoked from network); 13 Feb 2002 08:50:31 -
Received: from unknown (HELO 2xs.co.il) (212.68.128.50)
  by mail.securityfocus.com with SMTP; 13 Feb 2002 08:50:31 -
Received: from security.2xss.com
([212.68.128.10] helo=2xss.com ident=root)
by 2xs.co.il with esmtp
id 16avBe-0003GM-00
for bugtraq@securityfocus.com; Wed, 13 Feb 2002 10:54:46 +0200
Sender: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
Date: Wed, 13 Feb 2002 10:44:02 +0200
From: Ehud Tenenbaum <[EMAIL PROTECTED]>
Organization: 2xs LTD.
X-Mailer: Mozilla 4.76 [en] (X11; U; Linux 2.4.16-pre1 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Subject: Exim 3.34 and lower
Content-Type: multipart/mixed;
 boundary="C2FFD0A39E3737A0A718E02C"

Hey,

Its a good time to announce that 2xs security LTD. decided to
create a research team in order to focus on finding new bugs,
further more we managed to develop a security tool to discover
bugs/security flaws. In the near future, the tool itself will became
an open source project.

Its looks like there is few insecure/lame programming in exim mail
server up to current version.

first lets take a look at the file:
[2xs:root:~] ls -la /usr/exim/bin/exim
-rws--x--x1 root root  2061186 Oct 23 12:56
/usr/exim/bin/exim*
[2xs:root:~]

Suid goodie.

[2xs:w00p:/root] id
uid=1001(w00p) gid=100(users) groups=100(users)
[2xs:w00p:/root] /usr/exim/bin/exim -F `perl -e' print "A" x 32770'` -C
`perl -e' print "A" x 32768'`
Segmentation fault
[2xs:w00p:/root]

Many other argument should work as well (as long there is -C among them)

[2xs:root:~] gdb /usr/exim/bin/exim
GNU gdb 5.0
Copyright 2000 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you
are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for
details.
This GDB was configured as "i386-slackware-linux"...
(gdb) r -F `perl -e' print "A" x 32770'` -C `perl -e' print "A" x
32768'`
Starting program: /usr/exim/bin/exim -F `perl -e' print "A" x 32770'` -C
`perl -e' print "A" x
32768'`

Program received signal SIGSEGV, Segmentation fault.
strcpy (dest=0x820e208 'A' ..., src=0xbfff7b48 'A'
...)
at ../sysdeps/generic/strcpy.c:40
40  ../sysdeps/generic/strcpy.c: No such file or directory.
(gdb) info registers
eax0x48216641   1210148417
ecx0x482166bf   1210148543
edx0xbfffa941   -1073764031
ebx0xbffef8d4   -1073809196
esp0xbffeeefc   0xbffeeefc
ebp0xbffeef00   0xbffeef00
esi0x820e208136372744
edi0x3  3
eip0x401690e4   0x401690e4
eflags 0x10286  66182
cs 0x23 35
ss 0x2b 43
ds 0x2b 43
es 0x2b 43
fs 0x0  0
gs 0x0  0
fctrl  0x37f895
fstat  0x0  0
ftag   0x   65535
fiseg  0x23 35
fioff  0x4009ca84   1074383492
foseg  0x2b 43
fooff  0x400fa440   1074766912
fop0x49b1179

after short debugging we found that there is no overflow since the
eip register coredumped in the code segment and not in the data segment,
yet we believe that there might be a way to exploit this bug with
log_write(), we are not going to deliver a working exploit until the
vendor
will research and fix this bug.

We provide a patch to version 3.34 that should solve this bug.

In version 3.21 and lower there is another small bug with -t flag
again non exploitable just bad programming.

This bug was found by The Analyzer, Izik and Mixter. 2xs security
research team.

should an

Fwd: Exim 3.34 and lower (fwd)

2002-02-14 Thread xbud

Not sure if this made to this list.

I haven't confirmed the following, but thought it was worth forwarding.

-xbud

--  Forwarded Message  --

Subject: Exim 3.34 and lower (fwd)
Date: Wed, 13 Feb 2002 11:19:49 -0700 (MST)
From: Dave Ahmad <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]

Moderator note:

I have not had the time to look at the Exim source to verify that these
exist and that the attached fix is not broken.

Dave Ahmad
SecurityFocus
www.securityfocus.com

-- Forwarded message --
Return-Path: <[EMAIL PROTECTED]>
Delivered-To: moderator for [EMAIL PROTECTED]
Received: (qmail 32260 invoked from network); 13 Feb 2002 08:49:23 -
Received: from mail.securityfocus.com (HELO securityfocus.com) (66.38.151.9)
  by lists.securityfocus.com with SMTP; 13 Feb 2002 08:49:23 -
Received: (qmail 20929 invoked by alias); 13 Feb 2002 08:50:32 -
Received: (qmail 20925 invoked from network); 13 Feb 2002 08:50:31 -
Received: from unknown (HELO 2xs.co.il) (212.68.128.50)
  by mail.securityfocus.com with SMTP; 13 Feb 2002 08:50:31 -
Received: from security.2xss.com
([212.68.128.10] helo=2xss.com ident=root)
by 2xs.co.il with esmtp
id 16avBe-0003GM-00
for [EMAIL PROTECTED]; Wed, 13 Feb 2002 10:54:46 +0200
Sender: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
Date: Wed, 13 Feb 2002 10:44:02 +0200
From: Ehud Tenenbaum <[EMAIL PROTECTED]>
Organization: 2xs LTD.
X-Mailer: Mozilla 4.76 [en] (X11; U; Linux 2.4.16-pre1 i686)
X-Accept-Language: en
MIME-Version: 1.0
To: [EMAIL PROTECTED]
Subject: Exim 3.34 and lower
Content-Type: multipart/mixed;
 boundary="C2FFD0A39E3737A0A718E02C"

Hey,

Its a good time to announce that 2xs security LTD. decided to
create a research team in order to focus on finding new bugs,
further more we managed to develop a security tool to discover
bugs/security flaws. In the near future, the tool itself will became
an open source project.

Its looks like there is few insecure/lame programming in exim mail
server up to current version.

first lets take a look at the file:
[2xs:root:~] ls -la /usr/exim/bin/exim
-rws--x--x1 root root  2061186 Oct 23 12:56
/usr/exim/bin/exim*
[2xs:root:~]

Suid goodie.

[2xs:w00p:/root] id
uid=1001(w00p) gid=100(users) groups=100(users)
[2xs:w00p:/root] /usr/exim/bin/exim -F `perl -e' print "A" x 32770'` -C
`perl -e' print "A" x 32768'`
Segmentation fault
[2xs:w00p:/root]

Many other argument should work as well (as long there is -C among them)

[2xs:root:~] gdb /usr/exim/bin/exim
GNU gdb 5.0
Copyright 2000 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you
are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for
details.
This GDB was configured as "i386-slackware-linux"...
(gdb) r -F `perl -e' print "A" x 32770'` -C `perl -e' print "A" x
32768'`
Starting program: /usr/exim/bin/exim -F `perl -e' print "A" x 32770'` -C
`perl -e' print "A" x
32768'`

Program received signal SIGSEGV, Segmentation fault.
strcpy (dest=0x820e208 'A' ..., src=0xbfff7b48 'A'
...)
at ../sysdeps/generic/strcpy.c:40
40  ../sysdeps/generic/strcpy.c: No such file or directory.
(gdb) info registers
eax0x48216641   1210148417
ecx0x482166bf   1210148543
edx0xbfffa941   -1073764031
ebx0xbffef8d4   -1073809196
esp0xbffeeefc   0xbffeeefc
ebp0xbffeef00   0xbffeef00
esi0x820e208136372744
edi0x3  3
eip0x401690e4   0x401690e4
eflags 0x10286  66182
cs 0x23 35
ss 0x2b 43
ds 0x2b 43
es 0x2b 43
fs 0x0  0
gs 0x0  0
fctrl  0x37f895
fstat  0x0  0
ftag   0x   65535
fiseg  0x23 35
fioff  0x4009ca84   1074383492
foseg  0x2b 43
fooff  0x400fa440   1074766912
fop0x49b1179

after short debugging we found that there is no overflow since the
eip register coredumped in the code segment and not in the data segment,
yet we believe that there might be a way to exploit this bug with
log_write(), we are not going to deliver a working exploit until the
vendor
will research and fix this bug.

We provide a patch to version 3.34 that should solve this bug.

In version 3.21 and lower there is another small bug with -t flag
again non exploitable just bad programming.

This bug was found by The Analyzer, Izik and Mixter. 2xs security
research team.

should anyone have questions or 

Re: sending password in the command line

2001-12-27 Thread xbud
This will not work I believe ps aux will show the environment variable's 
value instead of the variable.   Which in your case would be the password,  
rendering your idea bad! =/

I would chroot the users' environments (jail them) so that they can only see 
their own processes... of course this might not be the solution you are 
looking for.

-xbud
On Thursday 27 December 2001 09:27 am, Pedro Zorzenon Neto wrote:
> Hi Friends,
>
>   I am developing a software to provide access control to users of a
>   network.
>   The gateway has ipchains rules to DENY packets from all 192.168.0.0/16
>   hosts to the 0.0.0.0/0 world.
>
>   If the user (a regular user, not root) does:
>
>$ myprogram enable username password IP
>
>   the program checks the password in a internal database, and enable
>   packets from the given IP to the 0/0 world. It also logs user/ip/date.
>
>   if the user does:
>
>$ myprogram disable username password IP
>
>   it disables the ipchains rules that were enabled before.
>
>   The program seems to be working well.
>
>   Now, here is my question:
>
> - everybody can capture the passwords with a "ps aux" command, ok?
>
> - what about doing this to prevent simple ps aux "sniff"
>
>   $ PASS="password" myprogram enable username IP
>
> then "myprogram" will read the PASS from the environment.
> is there anyway a regular user could capture passwords?
>
>
>   Thanks in advance,
>
> Pedro



Re: sending password in the command line

2001-12-27 Thread xbud

This will not work I believe ps aux will show the environment variable's 
value instead of the variable.   Which in your case would be the password,  
rendering your idea bad! =/

I would chroot the users' environments (jail them) so that they can only see 
their own processes... of course this might not be the solution you are 
looking for.

-xbud
On Thursday 27 December 2001 09:27 am, Pedro Zorzenon Neto wrote:
> Hi Friends,
>
>   I am developing a software to provide access control to users of a
>   network.
>   The gateway has ipchains rules to DENY packets from all 192.168.0.0/16
>   hosts to the 0.0.0.0/0 world.
>
>   If the user (a regular user, not root) does:
>
>$ myprogram enable username password IP
>
>   the program checks the password in a internal database, and enable
>   packets from the given IP to the 0/0 world. It also logs user/ip/date.
>
>   if the user does:
>
>$ myprogram disable username password IP
>
>   it disables the ipchains rules that were enabled before.
>
>   The program seems to be working well.
>
>   Now, here is my question:
>
> - everybody can capture the passwords with a "ps aux" command, ok?
>
> - what about doing this to prevent simple ps aux "sniff"
>
>   $ PASS="password" myprogram enable username IP
>
> then "myprogram" will read the PASS from the environment.
> is there anyway a regular user could capture passwords?
>
>
>   Thanks in advance,
>
> Pedro


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: NIC losts promisc. mode

2001-10-01 Thread xbud
Are both NIC's the same ?  There's obviously a problem with the second NIC 
card, perhaps the driver is not very well supported or it's just flaky (dieing 
=( ).   If buying a new one isn't an option, switch it out for the third 
'control' card you have since you won't be monitoring a heavy load there.

g'luck
-xbud 



Re: NIC losts promisc. mode

2001-10-01 Thread xbud

Are both NIC's the same ?  There's obviously a problem with the second NIC card, 
perhaps the driver is not very well supported or it's just flaky (dieing =( ).   If 
buying a new one isn't an option, switch it out for the third 'control' card you have 
since you won't be monitoring a heavy load there.

g'luck
-xbud 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




It's speading nicely.

2001-07-19 Thread xbud




'Nicely' probably isn't a prefered word but you 
all know what I mean.
 
Here are some numbers. 
- Snip 
-
[EMAIL PROTECTED]:~$ cat 
/var/log/boa/access_log | grep /default.ida | cut -f1-4 -d ' '
bla.bla.bla.bla 
- - [19/Jul/2001:16:18:23bla.bla.bla.bla - - [19/Jul/2001:16:48:16bla.bla.bla.bla - - [19/Jul/2001:16:48:33bla.bla.bla.bla - - [19/Jul/2001:18:00:43bla.bla.bla.bla - - [19/Jul/2001:19:04:32bla.bla.bla.bla - - [19/Jul/2001:19:04:40bla.bla.bla.bla - - 
[19/Jul/2001:19:34:29bla.bla.bla.bla - - 
[19/Jul/2001:19:40:50bla.bla.bla.bla - - 
[19/Jul/2001:20:24:06bla.bla.bla.bla - - 
[19/Jul/2001:20:42:16bla.bla.bla.bla - - 
[19/Jul/2001:20:44:54bla.bla.bla.bla - - 
[19/Jul/2001:20:48:27bla.bla.bla.bla - - 
[19/Jul/2001:21:26:38bla.bla.bla.bla - - 
[19/Jul/2001:21:52:57bla.bla.bla.bla - - 
[19/Jul/2001:22:02:56bla.bla.bla.bla - - 
[19/Jul/2001:22:58:22bla.bla.bla.bla - - 
[19/Jul/2001:23:16:19bla.bla.bla.bla - - 
[19/Jul/2001:23:30:11bla.bla.bla.bla3 - - 
[19/Jul/2001:23:50:31
[EMAIL PROTECTED]:~$ cat /var/log/boa/access_log | grep /default.ida 
| cut -f1-4 -d ' ' | wc -l
    19
[EMAIL PROTECTED]:~$ 
--- Snip -
I cut the actual attack out cause it gets lengthy  
and the IPs are blocked for obvious reasons, I also noticed none of the IP's 
were duplicates.
 
Note all of them are in one day time span... =)
 
I contacted as many of the Company's I could using their IP 
block.
 
- xbud


It's speading nicely.

2001-07-19 Thread xbud




'Nicely' probably isn't a prefered word but you 
all know what I mean.
 
Here are some numbers. 
- Snip 
-----
xbud@natas:~$ cat 
/var/log/boa/access_log | grep /default.ida | cut -f1-4 -d ' '
bla.bla.bla.bla 
- - [19/Jul/2001:16:18:23bla.bla.bla.bla - - [19/Jul/2001:16:48:16bla.bla.bla.bla - - [19/Jul/2001:16:48:33bla.bla.bla.bla - - [19/Jul/2001:18:00:43bla.bla.bla.bla - - [19/Jul/2001:19:04:32bla.bla.bla.bla - - [19/Jul/2001:19:04:40bla.bla.bla.bla - - 
[19/Jul/2001:19:34:29bla.bla.bla.bla - - 
[19/Jul/2001:19:40:50bla.bla.bla.bla - - 
[19/Jul/2001:20:24:06bla.bla.bla.bla - - 
[19/Jul/2001:20:42:16bla.bla.bla.bla - - 
[19/Jul/2001:20:44:54bla.bla.bla.bla - - 
[19/Jul/2001:20:48:27bla.bla.bla.bla - - 
[19/Jul/2001:21:26:38bla.bla.bla.bla - - 
[19/Jul/2001:21:52:57bla.bla.bla.bla - - 
[19/Jul/2001:22:02:56bla.bla.bla.bla - - 
[19/Jul/2001:22:58:22bla.bla.bla.bla - - 
[19/Jul/2001:23:16:19bla.bla.bla.bla - - 
[19/Jul/2001:23:30:11bla.bla.bla.bla3 - - 
[19/Jul/2001:23:50:31
xbud@natas:~$ cat /var/log/boa/access_log | grep /default.ida 
| cut -f1-4 -d ' ' | wc -l
    19
xbud@natas:~$ 
--- Snip -
I cut the actual attack out cause it gets lengthy  
and the IPs are blocked for obvious reasons, I also noticed none of the IP's 
were duplicates.
 
Note all of them are in one day time span... =)
 
I contacted as many of the Company's I could using their IP 
block.
 
- xbud


Re: DoS prevention techquies.

2001-07-18 Thread xbud
If I remember correctly mc in has something to do with multicast
addresses, it might be to disable forwarding of mc addressed packets.  On my
system 2.4.4 it's already set to 0.
To enable it or even write to it I believe you have to compile the
kernel with a CONFIG_MROUTE flag set somewhere.

If the values on your box are set to 0... let them be.  Unless you are
running a routed daemon and need to route mc addressed frames.

-xbud
-Original Message-
From: Vineet Kumar <[EMAIL PROTECTED]>
To: debian-security@lists.debian.org 
Date: Tuesday, July 17, 2001 12:56 AM
Subject: Re: DoS prevention techquies.


* Stefan Srdic ([EMAIL PROTECTED]) [010716 21:01]:

>
> What exactly do these paramters do, and should I be toying around with
> them?
>

Sorry for the smarmy repsonse, but the answer to the second question
is "at least not until you are able to answer the first question".

Too bad I can't help you answer the first question without doing some
reading myself... we'll see if somebody beats me to it.

Vineet




Re: DoS prevention techquies.

2001-07-18 Thread xbud

If I remember correctly mc in has something to do with multicast
addresses, it might be to disable forwarding of mc addressed packets.  On my
system 2.4.4 it's already set to 0.
To enable it or even write to it I believe you have to compile the
kernel with a CONFIG_MROUTE flag set somewhere.

If the values on your box are set to 0... let them be.  Unless you are
running a routed daemon and need to route mc addressed frames.

-xbud
-Original Message-
From: Vineet Kumar <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
Date: Tuesday, July 17, 2001 12:56 AM
Subject: Re: DoS prevention techquies.


* Stefan Srdic ([EMAIL PROTECTED]) [010716 21:01]:

>
> What exactly do these paramters do, and should I be toying around with
> them?
>

Sorry for the smarmy repsonse, but the answer to the second question
is "at least not until you are able to answer the first question".

Too bad I can't help you answer the first question without doing some
reading myself... we'll see if somebody beats me to it.

Vineet



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]