Re: [Full-disclosure] NUL Character Evasion

2005-09-14 Thread Williams, James K

> List:   full-disclosure
> Subject:[Full-disclosure] NUL Character Evasion
> From:   ju () heisec ! de
> Date:   2005-09-13 21:24:42
>
> The Problem:
> 
> Internet Explorer ignores NUL characters
> -- i.e. ascii characters with the value 0x00 -- most
> security software does not. This behaviour of IE
> does not depend on the charset in the Content-Type-Header.

[...]

> eTrust-VETHTML.MHTMLRedir!exploit

[...]

> -- 
> Juergen Schmidt   editor in chiefheise Security www.heisec.de
> Heise Zeitschriften Verlag,Helstorferstr. 7,   D-30625
Hannover
> Tel. +49 511 5352 300  FAX +49 511 5352 417   EMail
[EMAIL PROTECTED]
> GPG-Key: 0x38EA4970,  5D7B 476D 84D5 94FF E7C5  67BE F895 0A18 38EA
4970
  

Juergen,

Thank you for the report.  Computer Associates is currently 
investigating the issue (as it relates to CA products).

Regards,
kw
 
Ken Williams ; Dir. Vuln Research 
Computer Associates ; 0xE2941985

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 812-1] New turqstat packages fix buffer overflow

2005-09-14 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 812-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
September 15th, 2005http://www.debian.org/security/faq
- --

Package: turqstat
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID : CAN-2005-2658

Peter Karlsson discovered a buffer overflow in Turquoise SuperStat, a
program for gathering statistics from Fidonet and Usenet, that can be
exploited by a specially crafted NNTP server.

For the old stable distribution (woody) this problem has been fixed in
version 2.2.1woody1.

For the stable distribution (sarge) this problem has been fixed in
version 2.2.2sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.2.4-1.

We recommend that you upgrade your turqstat package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1.dsc
  Size/MD5 checksum:  544 d928fdfa27a159fdab8a5a8884fe5f89

http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1.tar.gz
  Size/MD5 checksum:   270910 42d8a8a0a918f170de995d486c23b653

  Alpha architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_alpha.deb
  Size/MD5 checksum:   132096 906f3128869e6d7b0afd07cec132c72a

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_alpha.deb
  Size/MD5 checksum:   176418 3109d357b362669a322ec7f5d3a95d7f

  ARM architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_arm.deb
  Size/MD5 checksum:   124080 f0fd9cedb36db2636a823aa8ade7c916

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_arm.deb
  Size/MD5 checksum:   165586 15456da1a258074d87ce7732b3382498

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_i386.deb
  Size/MD5 checksum:   113180 6eee07bf2fe43335b19c9b1629b6057f

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_i386.deb
  Size/MD5 checksum:   153308 8d8a680ee6838382d749936fd5e2a6f1

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_ia64.deb
  Size/MD5 checksum:   137222 789b31dcb961a9f4db2114f86b543bb2

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_ia64.deb
  Size/MD5 checksum:   187992 5699afd846374683fa0d8a5713966a71

  HP Precision architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_hppa.deb
  Size/MD5 checksum:   151334 01917983921193be6871f8d7f88ada9a

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_hppa.deb
  Size/MD5 checksum:   189768 15400f31cf5cc357fe2b848fe833a334

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_m68k.deb
  Size/MD5 checksum:   110610 41a66acf6252b48d8df4e4697eb77b11

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_m68k.deb
  Size/MD5 checksum:   149208 aae5619b44e2ceac583d0b1e88763812

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_mips.deb
  Size/MD5 checksum:   111064 34b913e65e80b6911af2a02894d816bf

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_mips.deb
  Size/MD5 checksum:   146630 376ba9b7bff126d556e1fe31594e4728

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_mipsel.deb
  Size/MD5 checksum:   107550 87be688734db30761800c310f1c8c1c1

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_mipsel.deb
  Size/MD5 checksum:   142122 1bca8324176ebc4ae870e1c3d3beb398

  PowerPC architecture:


http://security.debian.org/pool/updates/main/t/turqstat/turqstat_2.2.1woody1_powerpc.deb
  Size/MD5 checksum:   112282 bc6797f83d4c9a7ae1840abbe00db82f

http://security.debian.org/pool/updates/main/t/turqstat/xturqstat_2.2.1woody1_powerpc.deb
  Siz

RE: [Full-disclosure] Exploiting an online store

2005-09-14 Thread lyal.collins
I would have thought that obtaining value by deception is just simple fraud.

The detection of the incident and prosecution of the guilty is usually more
challenging than committing the offence, I understand.

Lyal

> I know that bad programming habits exist on some of the sites out there and
still use Hidden fields to pass prices over.. Although not very common   
I found one this morning after sending the email...
>  
> My question is more on the theory I suppose...  What laws are out there to
protect against this after-the-fact? Is it true that if the seller closes the
deal by sending you the merchandise then they have no case and can't go back
and charge you?
>  
> Seems there should be something out there providing protection is the system
is automated... Even though there should be checks in place people do have
small budgets and rush a lot of the smaller E-com stores out.
>  
> JP
> 
>   -Original Message- 
>   From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
>   Sent: Wed 9/14/2005 7:35 PM 
>   To: Gadi Evron 
>   Cc: Josh Perrymon; full-disclosure@lists.grok.org.uk 
>   Subject: Re: [Full-disclosure] Exploiting an online store



-- 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Exploiting an online store

2005-09-14 Thread Josh Perrymon
I know that bad programming habits exist on some of the sites out there and 
still use Hidden fields to pass prices over.. Although not very commonI 
found one this morning after sending the email...
 
My question is more on the theory I suppose...  What laws are out there to 
protect against this after-the-fact? Is it true that if the seller closes the 
deal by sending you the merchandise then they have no case and can't go back 
and charge you?
 
Seems there should be something out there providing protection is the system is 
automated... Even though there should be checks in place people do have small 
budgets and rush a lot of the smaller E-com stores out.
 
JP

-Original Message- 
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Wed 9/14/2005 7:35 PM 
To: Gadi Evron 
Cc: Josh Perrymon; full-disclosure@lists.grok.org.uk 
Subject: Re: [Full-disclosure] Exploiting an online store 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [FLSA-2005:160202] Updated mozilla packages fix security issues

2005-09-14 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated mozilla packages fix security issues
Advisory ID:   FLSA:160202
Issue date:2005-09-14
Product:   Red Hat Linux, Fedora Core
Keywords:  Bugfix
CVE Names: CAN-2005-2260 CAN-2005-2261 CAN-2005-2263
   CAN-2005-2265 CAN-2005-1937 CAN-2005-2266
   CAN-2005-2267 CAN-2005-2268 CAN-2005-2269
   CAN-2005-2270
-


-
1. Topic:

Updated mozilla packages that fix various security issues are now
available.

Mozilla is an open source Web browser, advanced email and newsgroup
client, IRC chat client, and HTML editor.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386
Fedora Core 2 - i386

3. Problem description:

A bug was found in the way Mozilla handled synthetic events. It is
possible that Web content could generate events such as keystrokes or
mouse clicks that could be used to steal data or execute malicious
Javascript code. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-2260 to this issue.

A bug was found in the way Mozilla executed Javascript in XBL controls.
It is possible for a malicious webpage to leverage this vulnerability to
execute other JavaScript based attacks even when JavaScript is disabled.
(CAN-2005-2261)

A bug was found in the way Mozilla installed its extensions. If a user
can be tricked into visiting a malicious webpage, it may be possible to
obtain sensitive information such as cookies or passwords.
(CAN-2005-2263)

A bug was found in the way Mozilla handled certain Javascript functions.
It is possible for a malicious webpage to crash the browser by executing
malformed Javascript code. (CAN-2005-2265)

A bug was found in the way Mozilla handled multiple frame domains. It is
possible for a frame as part of a malicious website to inject content
into a frame that belongs to another domain. This issue was previously
fixed as CAN-2004-0718 but was accidentally disabled. (CAN-2005-1937)

A bug was found in the way Mozilla handled child frames. It is possible
for a malicious framed page to steal sensitive information from its
parent page. (CAN-2005-2266)

A bug was found in the way Mozilla opened URLs from media players. If a
media player opens a URL which is Javascript, the Javascript executes
with access to the currently open webpage. (CAN-2005-2267)

A design flaw was found in the way Mozilla displayed alerts and prompts.
Alerts and prompts were given the generic title [JavaScript Application]
which prevented a user from knowing which site created them.
(CAN-2005-2268)

A bug was found in the way Mozilla handled DOM node names. It is
possible for a malicious site to overwrite a DOM node name, allowing
certain privileged chrome actions to execute the malicious Javascript.
(CAN-2005-2269)

A bug was found in the way Mozilla cloned base objects. It is possible
for Web content to traverse the prototype chain to gain access to
privileged chrome objects. (CAN-2005-2270)

Users of Mozilla are advised to upgrade to these updated packages, which
contain Mozilla version 1.7.10 and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=160202

6. RPMs required:

Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/mozilla-1.7.10-0.73.1.legacy.src.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/galeon-1.2.14-0.73.4.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/mozilla-1.7.10-0.73.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/mozilla-chat-1.7.10-0.73.1.legacy.i386.rpm
http://download.fedoraleg

[Full-disclosure] [FLSA-2005:162680] Updated Zlib packagea fix security issues

2005-09-14 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated Zlib packagea fix security issues
Advisory ID:   FLSA:162680
Issue date:2005-09-14
Product:   Fedora Core
Keywords:  Bugfix
CVE Names: CAN-2005-1849 CAN-2005-2096
-


-
1. Topic:

Updated Zlib packages that fix buffer overflows are now available.

Zlib is a general-purpose lossless data compression library which is
used by many different programs.

2. Relevant releases/architectures:

Fedora Core 1 - i386
Fedora Core 2 - i386

3. Problem description:

Tavis Ormandy discovered a buffer overflow affecting Zlib version 1.2
and above. An attacker could create a carefully crafted compressed
stream that would cause an application to crash if the stream is opened
by a user. As an example, an attacker could create a malicious PNG image
file which would cause a web browser or mail viewer to crash if the
image is viewed. The Common Vulnerabilities and Exposures project
assigned the name CAN-2005-2096 to this issue.

Markus Oberhumer discovered additional ways a stream could trigger an
overflow. An attacker could create a carefully crafted compressed stream
that would cause an application to crash if the stream is opened by a
user. As an example, an attacker could create a malicious PNG image file
that would cause a Web browser or mail viewer to crash if the image is
viewed. The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CAN-2005-1849 to this issue.

All users should update to these erratum packages which contain a patch
from Mark Adler which corrects this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680

6. RPMs required:

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/zlib-1.2.0.7-2.3.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/zlib-1.2.0.7-2.3.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/zlib-devel-1.2.0.7-2.3.legacy.i386.rpm

Fedora Core 2:

SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/zlib-1.2.1.2-0.fc2.2.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/zlib-1.2.1.2-0.fc2.2.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/2/updates/i386/zlib-devel-1.2.1.2-0.fc2.2.legacy.i386.rpm


7. Verification:

SHA1 sum Package Name
-

f242225e07d39648b0d7d6558150285ddf7f62d8
fedora/1/updates/i386/zlib-1.2.0.7-2.3.legacy.i386.rpm
618d744e5a8f9a895b40f952a8593985c93fd6d6
fedora/1/updates/i386/zlib-devel-1.2.0.7-2.3.legacy.i386.rpm
c812abcd0c5bcfccc86573e81d68ebff5b615ded
fedora/1/updates/SRPMS/zlib-1.2.0.7-2.3.legacy.src.rpm
d07c43de860f476302fcd1fc82d18db1835e1ba1
fedora/2/updates/i386/zlib-1.2.1.2-0.fc2.2.legacy.i386.rpm
f3326c134c6346ca8f120d86d28908ad45907bf9
fedora/2/updates/i386/zlib-devel-1.2.1.2-0.fc2.2.legacy.i386.rpm
2d288f7b2dd848a4c3f36d3ff7c200b9b629c868
fedora/2/updates/SRPMS/zlib-1.2.1.2-0.fc2.2.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum 

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1849
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2096

9. Contact:

The Fedora Legacy security contact is <[EMAIL PROTECTED]>. More
project details at http://www.fedoralegacy.org

-

[Full-disclosure] [FLSA-2005:163047] Updated squirrelmail package fixes security issues

2005-09-14 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated squirrelmail package fixes security issues
Advisory ID:   FLSA:163047
Issue date:2005-09-14
Product:   Red Hat Linux, Fedora Core
Keywords:  Bugfix
CVE Names: CAN-2005-1769 CAN-2005-2095
-


-
1. Topic:

An updated squirrelmail package that fixes two security issues is now
available.

SquirrelMail is a standards-based webmail package written in PHP4.

2. Relevant releases/architectures:

Red Hat Linux 9 - i386
Fedora Core 1 - i386
Fedora Core 2 - i386

3. Problem description:

A bug was found in the way SquirrelMail handled the $_POST variable. If
a user is tricked into visiting a malicious URL, the user's SquirrelMail
preferences could be read or modified. The Common Vulnerabilities and
Exposures project assigned the name CAN-2005-2095 to this issue.

Several cross-site scripting bugs were discovered in SquirrelMail. An
attacker could inject arbitrary Javascript or HTML content into
SquirrelMail pages by tricking a user into visiting a carefully crafted
URL, or by sending them a carefully constructed HTML email message. The
Common Vulnerabilities and Exposures project assigned the name
CAN-2005-1769 to this issue.

All users of SquirrelMail should upgrade to this updated package, which
contains backported patches that resolve these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163047

6. RPMs required:

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/squirrelmail-1.4.3-0.f0.9.6.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/squirrelmail-1.4.3-0.f0.9.6.legacy.noarch.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/squirrelmail-1.4.3-0.f1.1.5.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/squirrelmail-1.4.3-0.f1.1.5.legacy.noarch.rpm

Fedora Core 2:

SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/squirrelmail-1.4.4-1.FC2.2.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/squirrelmail-1.4.4-1.FC2.2.legacy.noarch.rpm


7. Verification:

SHA1 sum Package Name
-

5182c295693a72d9602945a5985c39c125f2b422
redhat/9/updates/i386/squirrelmail-1.4.3-0.f0.9.6.legacy.noarch.rpm
1aec842c861408106c2818cf4c58caf762367230
redhat/9/updates/SRPMS/squirrelmail-1.4.3-0.f0.9.6.legacy.src.rpm
10dcfc4975cbe049df638ff43304e0a6a22f58a2
fedora/1/updates/i386/squirrelmail-1.4.3-0.f1.1.5.legacy.noarch.rpm
5f0c54493ae619de8a85813947470bfedd5415f2
fedora/1/updates/SRPMS/squirrelmail-1.4.3-0.f1.1.5.legacy.src.rpm
83e7c1b6a1f070894be5456b3dd850b3a6f090b2
fedora/2/updates/i386/squirrelmail-1.4.4-1.FC2.2.legacy.noarch.rpm
de4f2ef84e23b310f7f845ee8624360dadb7b74d
fedora/2/updates/SRPMS/squirrelmail-1.4.4-1.FC2.2.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum 

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2095

9. Contact:

The Fedora Legacy security contact is <[EMAIL PROTECTED]>. More
project details at http://www.fedoralegacy.org

-


signature.asc
Description: OpenPGP digital signature
___
Full-Disclos

[Full-disclosure] [FLSA-2005:163274] Updated CUPS packages fix security issue

2005-09-14 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated CUPS packages fix security issue
Advisory ID:   FLSA:163274
Issue date:2005-09-14
Product:   Red Hat Linux, Fedora Core
Keywords:  Bugfix
CVE Names: CAN-2005-2154
-


-
1. Topic:

Updated CUPS packages that fix a security issue are now available.

The Common UNIX Printing System provides a portable printing layer for
UNIX(R) operating systems.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386
Fedora Core 2 - i386

3. Problem description:

When processing a request, the CUPS scheduler would use case-sensitive
matching on the queue name to decide which authorization policy should
be used. However, queue names are not case-sensitive. An unauthorized
user could print to a password-protected queue without needing a
password. The Common Vulnerabilities and Exposures project has assigned
the name CAN-2005-2154 to this issue.

All users of CUPS should upgrade to these erratum packages which contain
a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163274

6. RPMs required:

Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/cups-1.1.14-15.4.5.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/cups-1.1.14-15.4.5.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/cups-devel-1.1.14-15.4.5.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/cups-libs-1.1.14-15.4.5.legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/cups-1.1.17-13.3.0.14.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/cups-1.1.17-13.3.0.14.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/cups-devel-1.1.17-13.3.0.14.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/cups-libs-1.1.17-13.3.0.14.legacy.i386.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/cups-1.1.19-13.9.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/cups-1.1.19-13.9.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/cups-devel-1.1.19-13.9.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/cups-libs-1.1.19-13.9.legacy.i386.rpm

Fedora Core 2:

SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/cups-1.1.20-11.11.2.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/cups-1.1.20-11.11.2.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/2/updates/i386/cups-devel-1.1.20-11.11.2.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/2/updates/i386/cups-libs-1.1.20-11.11.2.legacy.i386.rpm


7. Verification:

SHA1 sum Package Name
-

0c703164c4314cc91e31a859ed8e149e4249bd68
redhat/7.3/updates/i386/cups-1.1.14-15.4.5.legacy.i386.rpm
62414dc09ab8e240f92fe476dc272d227ba223ce
redhat/7.3/updates/i386/cups-devel-1.1.14-15.4.5.legacy.i386.rpm
4bce41d4c0323700d3a78adf21bb3ff0790cbe44
redhat/7.3/updates/i386/cups-libs-1.1.14-15.4.5.legacy.i386.rpm
2fa58515d46929fe6116c8c72e50c26b8313c504
redhat/7.3/updates/SRPMS/cups-1.1.14-15.4.5.legacy.src.rpm
4d6585d937c4855c8d999bc292d17e13258d5cb5
redhat/9/updates/i386/cups-1.1.17-13.3.0.14.legacy.i386.rpm
445a0332fff4b09cd2c4f8d7643fb12213498608
redhat/9/updates/i386/cups-devel-1.1.17-13.3.0.14.legacy.i386.rpm
d65b045173aba91de7fa2d44217ba6d939a775a3
redhat/9/updates/i386/cups-libs-1.1.17-13.3.0.14.legacy.i386.rpm
35bf3fdafd340588d4c8f167709d53bcc2eb6ff4
redhat/9/updates/SRPMS

[Full-disclosure] FF IDN buffer overflow workaround works in Netscape too

2005-09-14 Thread Juha-Matti Laurio
Summary about Firefox IDN buffer overflow vulnerability workarounds in 
Netscape Browser


[a new, more informative title used]

Instructions and methods described at Mozilla Foundation Security 
Advisory "What Firefox and Mozilla users should know about the IDN 
buffer overflow security issue"
https://addons.mozilla.org/messages/307259.html (yes, it was 
http://www.mozilla.org/security/idn.html earlier) can be used in Netscape too.
This advisory has been included to security company advisories handling 
this security issue and mentioned in the news widely.


Disabling IDN (Internationalized Domain Names) support via about:config 
Location Bar
feature or prefs.js configuration file is possible in Netscape Browser 8 
too. Additionally, .xpi file for Firefox and Mozilla Suite works in 
Netscape 8.0.3.3 too. Test in Windows environment was successful and 
even UA was changed to include 'Gecko/20050729 <<(No IDN)>> 
Netscape/8.0.3.3' string.

However, the manual method is recommended.
Vendor developer team was contacted, no reply yet.

Like US-CERT says in Firefox VU#573857: "While implementing this 
workaround does not correct the buffer overflow error, it prevents the 
vulnerable portion of code from being exploited."


When an updated version of Netscape Browser 8 is available the download 
link is http://browser.netscape.com/ns8/download/default.jsp


Regards,
Juha-Matti Laurio
Security researcher
Finland

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploiting an online store

2005-09-14 Thread Valdis . Kletnieks
On Thu, 15 Sep 2005 03:29:25 +0200, Gadi Evron said:

> Check the date of the article. That company no longer exists and SQL 
> injections are not THAT big of an issue for established eCommerce sites 
> as they were in 1999.

Which is exactly why the previous posting on the list was an SQL injection
in Oracle Reports.  I see.. :)


pgpLOKHS65AAc.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] FireFox Host: Buffer Overflow is not justexploitable on FireFox

2005-09-14 Thread Juha-Matti Laurio

Hi Juha!

> I have informed the vendor Netscape being affected on 9th 
> September 2005.


I did the same on the 10th of September - still no reply nor official
statement from Netscape which makes me a little worried.


Good to know. It seems that's their way to act.
They had a coverage Security Center wp.netscape.com/security/index.html 
earlier, but all these wp.netscape.com pages redirect to Netscape 
Browser 8.0 Main Page when writing this.


> Disabling IDN support via about:config (or prefs.js file) is 
> possible in Netscape Browser 8 too. Xpi file for Firefox and 


Correct. I reported that workaround on the 10th of September.

I did so using both the security address at netscape.com and the "submission
form" on Netscape's official webpage. I never got any reply/respons from
netscape. 


Yes, I have similar experiences. I have information that they are 
reading their bug report submissions, however.



Netscape uses the same rendering engine as Firefox (unless explicitly told
to use IE) and as such, will also be vulnerable. The workaround, covered by
the Mozilla Team, will correct the problem simply by disabling IDN.

Regards
Peter Kruse


Thanks for sharing the word.

- Juha-Matti

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploiting an online store

2005-09-14 Thread Gadi Evron

Josh perrymon wrote:

I was reading an article about an attacker that could have changed a
price in an online shopping cart-


Check the date of the article. That company no longer exists and SQL 
injections are not THAT big of an issue for established eCommerce sites 
as they were in 1999.


Web security is still a major issue, but this article is nothing but FUD 
in 2005.


Eran Reshef is now CEO of the infamous Blue Security.

Gadi.

--
Available for consulting:
+972-50-5428610 / [EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mozilla / Mozilla Firefox authentication weakness

2005-09-14 Thread Juha-Matti Laurio

This is https://bugzilla.mozilla.org/show_bug.cgi?id=281851



It seems that this is assigned to 
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2395 (in July 
'05) too.


- Juha-Matti

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Oracle Reports: Generic SQL Injection Vulnerability via Lexical References

2005-09-14 Thread Kornbrust, Alexander


Red-Database-Security GmbH  - Oracle Reports Security Advisory

Generic SQL Injection Vulnerability in Oracle Reports via Lexical
References

 NameGeneric SQL Injection Vulnerability in Oracle
Reports 
 via Lexical References
 Systems AffectedGenerated Oracle Reports using Lexical References
 SeverityHigh Risk 
 CategorySQL Injection
 Remote Exploitable  Yes
 Vendor URL  http://www.oracle.com 
 Author  Alexander Kornbrust (ak at
red-database-security.com) 
 Date15 September 2005 (V 1.00) 
 Advisory-URL
 http://www.red-database-security.com/wp/sql_injection_reports_us.pdf

 

Details
###
Oracle Reports provides a feature called lexical references. A lexical 
reference is a placeholder for text that you embed in a SELECT
statement. 
It is possible to replace the clauses appearing after SELECT, FROM,
WHERE, 
GROUP BY, ORDER BY, HAVING, CONNECT BY and START WITH.

If lexical references are in use it is possible to modify SQL statements
via a simple URL. After adding the parameter "paramform=yes" in the URL
a parameter form window appears (=SQL Injection with a menu). 

An attacker can modify the parameter values and inject SQL statements.



Testcase

Executed an Oracle Report via an URL, e.g.
http://myserver:8889/reports/rwservlet?report=sqlinject3.rdf+userid=scot
t/[EMAIL PROTECTED] 

Add the value paramform=yes to the URL
http://myserver:8889/reports/rwservlet?report=sqlinject3.rdf+userid=scot
t/[EMAIL PROTECTED] 

A parameter window appears. Inject the SQL statement by modifying the
values
in the parameter form and submit the query.


A detailed description including hardcopies is available in the PDF
advisory:

http://www.red-database-security.com/wp/sql_injection_reports_us.pdf
(English)
http://www.red-database-security.com/wp/sql_injection_reports_dt.pdf
(German)



Affected systems

All generated reports using lexical references without input validation.



Patch Information
#
This issue is not a bug in Oracle Reports itself. It is a problem of
missing input validation in all generated Oracle Reports.



Fix
###
Validate all parameter values before the SQL statement is executed in an

After-Parameter-Form-Trigger.



History
###
14-may-2004 Oracle secalert was informed to give them time to fix their
reports in the E-Business Suite.

15-sep-2005 Red-Database-Security published this advisory



(c) 2005 by Red-Database-Security GmbH
http://www.red-database-security.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Exploiting an online store

2005-09-14 Thread Thomas Quinlan
















From:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Josh perrymon
Sent: Wednesday, September 14,
2005 4:05 PM
To:
full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure]
Exploiting an online store



 

I was reading an article about an attacker that could have
changed a price in an online shopping cart-

 

Snip

<>

 

What are laws on this??  What if the guy did make the
transaction using his credit card? Since it is just a web transaction sending
html from the client to the server what proof would they have?  

 

Joshua Perrymon

 

IANAL, but I believe that the contract
isn’t formed between buyer and seller until the purchase price is
accepted on both sides and money changes hands.  The price in a store is analogous
to one in a catalog – suggested, and subject to change.  Typically,
that means by the seller, but if the buyer does it and the seller accepts the
price, then it is a legal transaction.  Once the money is accepted, the seller
has agreed to sell at that price, and taken the money, making it difficult for him
to suggest that he was unaware.

 

Of course, what typically happens is that
the seller goes to ship the item, and sees how much was paid, and sends a bill for
the remaining balance before the item is shipped.  Proof isn’t
really needed.

 

Tom






___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Exploiting an online store

2005-09-14 Thread Josh perrymon








I was reading an article about an attacker that could have changed
a price in an online shopping cart-

 

Snip

 

Next,
Reshef performed a little number he calls ``electronic 
shoplifting'': He edited the site's online order form to reduce the price 
of a book from $22.95 to $2.95. Had he gone a few steps farther, Reshef 
actually could have purchased the book for the reduced price, adding a 
whole new spin to Priceline.com's ``name-your-own-price'' marketing 
campaign. 



Reshef's exploits didn't
require any sophisticated software or 
particularly detailed knowledge of computer code. ``The only thing you 
need is an HTML editor that comes bundled with your Netscape or Internet 
Explorer browser,'' he said. ``There is no magic to this.'' 



 

What are laws on this??  What if the guy did make the
transaction using his credit card? Since it is just a web transaction sending
html from the client to the server what proof would they have?  

 

 

 

Joshua Perrymon

 






___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] Fwd: SF new mailing list announcement: BS 7799Security

2005-09-14 Thread ad
What a news!!keep up the good work n3td3v :D

-Message d'origine-
De : [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] De la part de n3td3v
Envoyé : mercredi 14 septembre 2005 19:11
À : full-disclosure@lists.grok.org.uk
Objet : [Full-disclosure] Fwd: SF new mailing list announcement: BS
7799Security

-- Forwarded message --
From: Daniel Hanson <[EMAIL PROTECTED]>
Date: Sep 14, 2005 3:02 PM
Subject: SF new mailing list announcement: BS 7799 Security
To: [EMAIL PROTECTED]



The following mailing list was just added to the SecurityFocus
collection of moderated mailing lists: BS 7799 Security. To see the
complete list of all 31 moderated SecurityFocus mailing lists and their
charters, visit http://www.securityfocus.com/archive.


How do I subscribe to the list ?

Send an e-mail message to  [EMAIL PROTECTED] The
contents of the subject or message body do not matter. You will receive
a confirmation request message to which you will have to answer.

How do I unsubscribe from the list ?

Send an e-mail message to  [EMAIL PROTECTED] The
contents of the subject or message body do not matter. You will receive
a confirmation request message to which you will have to answer.



-- 
http://www.geocities.com/n3td3v
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Mozilla / Mozilla Firefox authentication weakness

2005-09-14 Thread Daniel Veditz

This is https://bugzilla.mozilla.org/show_bug.cgi?id=281851

3APA3A wrote:

  I  have  reported  this issue some time ago:
  http://www.security.nnov.ru/Fnews19.html
  but  it looks like it was ignored, and not fixed in latest mozilla and
  firefox releases, so I decided to send "formal" advisory


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Fwd: SF new mailing list announcement: BS 7799 Security

2005-09-14 Thread n3td3v
-- Forwarded message --
From: Daniel Hanson <[EMAIL PROTECTED]>
Date: Sep 14, 2005 3:02 PM
Subject: SF new mailing list announcement: BS 7799 Security
To: [EMAIL PROTECTED]



The following mailing list was just added to the SecurityFocus
collection of moderated mailing lists: BS 7799 Security. To see the
complete list of all 31 moderated SecurityFocus mailing lists and their
charters, visit http://www.securityfocus.com/archive.


How do I subscribe to the list ?

Send an e-mail message to  [EMAIL PROTECTED] The
contents of the subject or message body do not matter. You will receive
a confirmation request message to which you will have to answer.

How do I unsubscribe from the list ?

Send an e-mail message to  [EMAIL PROTECTED] The
contents of the subject or message body do not matter. You will receive
a confirmation request message to which you will have to answer.



-- 
http://www.geocities.com/n3td3v
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploiting a Worm

2005-09-14 Thread Frank Knobbe
On Tue, 2005-09-13 at 22:29 +, Ian Gizak wrote:
> I'm pentesting a client's network and I have found a Windows NT4 machine 
> with ports 620 and 621 TCP ports open.
> 
> When I netcat this port, it returns garbage binary strings. When I connect 
> to port 113 (auth), it replies with random USERIDs.
> [...]
> I have checked the open ports and no-one seems to be the worm ftp server or 
> something useful related to the worm. Some ports allow input but don't reply 
> anything...

Could it be that you are buzzing around a honeypot like a moth around a
porch light? Or have to followed up with the client and can you rule it
out as a honeypot? Otherwise it's a very interesting port fingerprint
for an NT4 box :)

Cheers,
Frank

-- 
Ciscogate: Shame on Cisco. Double-Shame on ISS.


signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Security Conference

2005-09-14 Thread Ron Bidule
For those of you that are interested in :hack.lu 2005The purpose of the hack.lu convention is to give an open and freeplayground where people can discuss the implication of new technologies
(mainly security) on society. hack.lu is a balanced convention wheretechnical and non-technical people can meet each others and share freelyall kind of information. The convention will be held in the Grand-Duchy
of Luxembourg on Friday/Saturday 14-15 octobre 2005(http://www.hack.lu/wiki/index.php/Map). The convention is open and freeto everyone.
ScopeTopics of interest include, but are not limited to :* Software Engineering* Honeypots/Honeynets* Electronic/Digital Privacy* Wireless Network and Security* Attacks on Information Systems and/or Digital Information Storage
* Electronic Voting* Free Software and Security* Assessment of Computer, Electronic Devices and Information Systems* Standards for Information Security* Legal and Social Aspect of Information Security
* Software Engineering and Security* Forensic AnalysisAgendaA preview agenda is available including workshops and lectures -
http://www.hack.lu/wiki/index.php/AgendaRegistrationRegistration is now open http://www.hack.lu/wiki/index.php/RegistrationPage
As the hack.lu 2005 event is free, registration is optional but highlyrecommended.The 100 first users to register will receive a MISC magazine.Capture The Flag Contest
A Capture The Flag Contest will be held on Saturday. If you want toparticipate and propose a team, feel free to check the web page :
http://www.hack.lu/wiki/index.php/CaptureTheFlag
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WiFi encryption performance comparrison?

2005-09-14 Thread Xyberpix
Hey Paul,

What sort of info exactly are you looking for? Throughput figures, etc?

The difference you will notice in network performance between WEP 128 and WPA is
really minimal, to be honest with you, you shouldn't really notice any
performance hit at all. When it comes to WEP 64 and WEP 128, you shouldn't 
notice
a difference either. As far as WEP 64, WEP 128, and WPA go, they all use RC4
encryption, the difference is that WPA uses TKIP as well as the RC4 encryption
method. When it comes to WPA2 though, you are talking about stronger encryption
methods such as AES, this may have a hit on your network throughput depending on
the hardware in use, but you will need pretty recent hardware to be using WPA2,
so theorecticaly you shouldn't notice too much difference here either.

This really begs the question though as to why you are even asking about WEP,
either 64 or 128? Care to ellaborate at all?

xyberpix
 
>On Wed Sep 14  7:16 , Paul Day [EMAIL PROTECTED]> sent:
>
>>Howdy,
>>
>>Does anyone have any real-world info/papers/figures on comparing the
>>performance of WEP64 vs 128 vs WPA vs WPA2 etc on recent-ish hardware? ie,
>>same hardware, different encryption methods, performance trade-offs from
>>each. Google's not being awfully helpful.
>>
>>Thanks in advance. :)
>>
>>Cheers,
>>Paul
>>
>>___
>>Full-Disclosure - We believe in it.
>>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>Hosted and sponsored by Secunia - http://secunia.com/
>
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Secunia Research: AVIRA Antivirus ACE Archive Handling Buffer Overflow

2005-09-14 Thread Secunia Research
== 

 Secunia Research 14/09/2005

  - AVIRA Antivirus ACE Archive Handling Buffer Overflow -

== 
Table of Contents

Affected Software1
Severity.2
Description of Vulnerability.3
Solution.4
Time Table...5
Credits..6
References...7
About Secunia8
Verification.9

== 
1) Affected Software 

AVIRA Desktop for Windows version 1.00.00.68 
with AVPACK32.DLL version 6.31.0.3.

Prior versions may also be affected.

== 
2) Severity 

Rating: Highly Critical
Impact: System access
Where:  Remote

== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in AVIRA Desktop for
Windows antivirus, which can be exploited by malicious people to 
compromise a vulnerable system.

The vulnerability is caused due to a boundary error when reading the
filename of a compressed file from an ACE archive. This can be
exploited to cause a stack-based buffer overflow when an ACE archive
containing a compressed file with an overly long filename is scanned.

Successful exploitation allows arbitrary code execution, but
requires that archive scanning is enabled.

The vulnerability is related to:
SA14359

== 
4) Solution 

Update to the latest version via online update.
(AVPACK32.DLL version 6.31.1.7).

== 
5) Time Table 

05/09/2005 - Initial vendor notification.
05/09/2005 - Initial vendor reply.
06/09/2005 - Vendor provides updated version for testing.
14/09/2005 - Public disclosure.

== 
6) Credits 

Discovered by Tan Chew Keong, Secunia Research.

== 
7) References

AVIRA:
http://www.avira.com/en/news/avira_desktop_for_windows_patched_
against_vulnerability.html

== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2005-43/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Mozilla Firefox "Host:" Buffer Overflow Exploit

2005-09-14 Thread Larry Seltzer
There was some confusion as to whether this bug
(https://bugzilla.mozilla.org/show_bug.cgi?id=307259 in bugzilla) was
similar or identical to https://bugzilla.mozilla.org/show_bug.cgi?id=267669.
David Baron of Mozilla is saying (I think - see
https://bugzilla.mozilla.org/show_bug.cgi?id=267669#c39) that they are not
the same. 

Can someone parse that comment 39 in my last link for me? I don't understand
what he is saying, and if I take Firefox 1.0.6 with network.enableIDN set to
true and run the test case linked to in bug 267669, the browser crashes. If
I run it with network.enableIDN set to false, it doesn't crash. It sure
quacks like the same bug.

Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.ziffdavis.com/seltzer
Contributing Editor, PC Magazine
[EMAIL PROTECTED] 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] WiFi encryption performance comparrison?

2005-09-14 Thread Paul Day
Howdy,

Does anyone have any real-world info/papers/figures on comparing the
performance of WEP64 vs 128 vs WPA vs WPA2 etc on recent-ish hardware? ie,
same hardware, different encryption methods, performance trade-offs from
each. Google's not being awfully helpful.

Thanks in advance. :)

Cheers,
Paul

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Full-Disclosure Digest, Vol 7, Issue 25

2005-09-14 Thread Peer Janssen

lonely wolf wrote:


Peer Janssen wrote:


Aditya Deshmukh wrote:


(on system you want to copy)
dd if=/dev/hda | nc otherhost 5000   


If you are running bash, then you do not even need netcat:

dd if=/dev/hda > /dev/tcp/otherhost/5000  


This is interesting.


Indeed :-)

Which version of bash are you using ? I havent found it in my man 
page! 


My guess is that it probably has nothing to do with bash but with the 
devices your system provides.

But where is documentation for this kind of useful information anyway?


it's in bash for a long time. however not all distributions compile 
bash with this option activated. debian for instance does not.


That's good to know, thank you.

My question was somewhat more about finding information about such 
things, though. (Related: Will a bash compiled with that option 
automatically include the doc for this feature?)


I never found information about the following recurrent question of mine 
either:
If a plug in an USB storage device, it has a /dev/sg<...> assigned to 
it. But which one? I need to know this mapping in order to mount it. I 
always deduce this device's name from the syslog, which works but is a 
bit of a PITA, so I always wondered if there is no other way to get this 
info, namely something like lsusb. lsusb, which would be the logical 
place to look for it, doesn't give away this info, at least not in an 
easily recognizable form (e.g. I never figured it out). sg_scan and such 
didn't do the trick for me either, although I might have missed 
something here.


Peer

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Mozilla / Mozilla Firefox authentication weakness

2005-09-14 Thread 3APA3A
Dear bugTraq,

  I  have  reported  this issue some time ago:
  http://www.security.nnov.ru/Fnews19.html
  but  it looks like it was ignored, and not fixed in latest mozilla and
  firefox releases, so I decided to send "formal" advisory


Issue:  Mozilla browsers authentication weakness
Author: 3APA3A <[EMAIL PROTECTED]>
Advisory URL:   http://www.security.nnov.ru/Fnews19.html
Vendor: Mozilla (http://www.mozilla.org)
Products:   Mozilla 1.7.11 (Windows version tested)
FireFox 1.0.6 (Windows version tested)
Type:   Man-in-the-Middle, information leak
Exploit:Not required

I. Intro

 RFC  2617  defines  Authentication mechanism for HTTP protocol. Any web
 browser implement this standard for web site access authentication.

II. Vulnerability

 Firefox  and  Mozilla  browser  have  vulnerability  in  authentication
 mechanism  implementation.  Potential  impact  of this vulnerability is
 weak  authentication protocol (for example cleartext) may be chosen for
 Web site authentication instead of stronger one.

III. Details

From RFC 2617:

   The user agent MUST
   choose to use one of the challenges with the strongest auth-scheme it
   understands and request credentials from the user based upon that
   challenge.

 Instead,   Mozilla   uses   authentication  schemas  in  the  order  of
 WWW-Authenticate  headers  sent by Web server. It may lead to situation
 weak  authentication (for example cleartext "Basic" authentication) may
 be  chosen  by  Mozilla  while both server and Mozilla support stronger
 authentication mechanism.

IV. Demonstration

This  links  demonstrate  initial handshake for different authentication
protocols:

http://www.security.nnov.ru/files/atest/basic.asp - Basic authentication
http://www.security.nnov.ru/files/atest/digest.asp - Digest authentication
http://www.security.nnov.ru/files/atest/ntlm.asp - NTLM authentication
http://www.security.nnov.ru/files/atest/negotiate.asp - Negotiate authentication

With  this  link  you can check which protocol was chosen by browser, if
server support few authentication protocols:
http://www.security.nnov.ru/files/atest/all.asp
For Mozilla/Firefox "Basic" authentication with cleartext login/password
transmitted  over  the  wire  will  be  chosen  by  default. By pressing
"Cancel"  you  can  choose  different  authentication. Internet Explorer
offers strongest authentication.
 
-- 
http://www.security.nnov.ru
 /\_/\
{ , . } |\
+--oQQo->{ ^ }<-+ \
|  ZARAZA  U  3APA3A   } You know my name - look up my number (The Beatles)
+-o66o--+ /
|/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Full-Disclosure Digest, Vol 7, Issue 25

2005-09-14 Thread lonely wolf

Peer Janssen wrote:


Aditya Deshmukh wrote:


(on system you want to copy)
dd if=/dev/hda | nc otherhost 5000



If you are running bash, then you do not even need netcat:

dd if=/dev/hda > /dev/tcp/otherhost/5000
  


This is interesting.


Indeed :-)


Which version of bash are you using ? I havent found it in my man page!
 

My guess is that it probably has nothing to do with bash but with the 
devices your system provides.
But where is documentation for this kind of useful information anyway? 



it's in bash for a long time. however not all distributions compile bash 
with this option activated. debian for instance does not.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] FireFox Host: Buffer Overflow is not justexploitable on FireFox

2005-09-14 Thread Peter Kruse
Hi Juha!

> I have informed the vendor Netscape being affected on 9th 
> September 2005.

I did the same on the 10th of September - still no reply nor official
statement from Netscape which makes me a little worried.
 
> 2)
> Disabling IDN support via about:config (or prefs.js file) is 
> possible in Netscape Browser 8 too. Xpi file for Firefox and 
> Mozilla Suite works in Netscape 8.0.3.3 too. Test was 
> successful and even UA was changed to include 
> Gecko/20050729 (No IDN) Netscape/8.0.3.3.
> However, the manual method is recommended.
> I.e. there is a workaround for Netscape. Vendor developer 
> team contacted during a weekend, no reply yet.

Correct. I reported that workaround on the 10th of September.

I did so using both the security address at netscape.com and the "submission
form" on Netscape's official webpage. I never got any reply/respons from
netscape. 

Netscape uses the same rendering engine as Firefox (unless explicitly told
to use IE) and as such, will also be vulnerable. The workaround, covered by
the Mozilla Team, will correct the problem simply by disabling IDN.

Regards
Peter Kruse


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] NUL Character Evasion

2005-09-14 Thread ju

The Problem:

Internet Explorer ignores NUL characters
-- i.e. ascii characters with the value 0x00 -- most
security software does not. This behaviour of IE
does not depend on the charset in the Content-Type-Header.


En Detail

You can embed NUL characters at any place in an HTML
document, even inside of tags. IE parses the file, as
if they were not there. The number of NUL characters
does not matter: a single one is ignored as well as
5000 en bloc after every single valid character. In
tests I sucessfully infected an unpatched Windows
system from html pages containing 5000 NUL
characters.


Example:


Both versions work with all tested versions of IE:

< script>alert("Hello world");

< s\0x0cript>alert("Hello world");

(\0x0 stands for a charachter with a value of 0,
the blanks in the script tags have been inserted
intentionally)


The consequences:
-
Protection mechanisms against evil embedded in
HTML can be evaded. Intrusion Detection/Prevention
Systems and Antivirus programms don't recognize
exploits for known browser problems any more, if they
are obfuscated by embedded NUL characters. Filtering
of JavaScript or ActiveX may fail.

Test results


Antivirus

I took a standard mhtml exploit, that was recognized by
ten AV programms:

AntiVir HTML/Exploit.OBJ-Mht
BitDefender Exploit.Html.MhtRedir.Gen (suspected)
ClamAV  Exploit.HTML.MHTRedir-8
eTrust-VET  HTML.MHTMLRedir!exploit
F-SecureExploit.HTML.Mht
FortinetHTML/MHTRedir.A
McAfee  Exploit-MhtRedir.gen
Kaspersky   Exploit.HTML.Mht
Panda   Exploit/Mhtredir.gen
SymantecBloodhound.Exploit.6

After I modified it by inserting NUL characters none
of the AV scanners found anything suspicious --
although the exploits were still fully
functional.

Intrusion Prevention

A recent IE exploit using the HHCtrl addon to execute
arbitrary commands (see
http://www.heise.de/security/dienste/browsercheck/demos/ie/e5_25.shtml).
was detected and blocked by ISS Proventia (Desktop
Edition). After I inserted NUL characters, Proventia
did not detect the exploit any more, but the demo was
working. heise Security informed ISS and they promised to
publish new signatures, detecting NUL character evasion.

Other ID/IP Systems were not tested, but are likely to
show similar behaviour. Ask your vendor or test
yourself. We have setup a web page to demonstrate
NUL character evasion, where you can test your
AV/IDS/IPS solution. See:

http://www.heise.de/security/dienste/browsercheck/demos/ie/null/



Not affected:
-

Content Security Solutions that sanitize HTML
before delivering it to the client. I checked Webwasher
CSM 5.2. Its Proxy replaces embedded NUL characters (0x00)
with spaces (0x20) by default. Pure Proxies like squid
deliver NULs to the client.



Remarks:


As far as I know, Andreas Marx from AV-Test
(www.av-test.de) discovered this strange behaviour.
He started informing AV vendors and other vendors of
security products over a year ago.

Microsoft Security Response Center considers the
behaviour of Internet Explorer correct:

---
We have investigated this issue and have determined
that this is actually by design as IE is processing the
MIME type as expected.  For details on how this is
handled, please see
http://msdn.microsoft.com/library/default.asp?url=/workshop/networking/moniker/overview/appendix_a.asp
---


Please note, that the behaviour of IE is not a security
problem itself but a problem for security software.
In combination with a security hole, it can be used
to evade protection by Antivirus software
and or ID/IP Systems.

Thanks:
---

The antivirus tests have been done with help of AV-Test
(http://www.av-test.de).


Further information:

"Null Problemo", article on heise Security (german)
http://www.heise.de/security/artikel/63411

NUL Demos
http://www.heise.de/security/dienste/browsercheck/demos/ie/null/

-- 
Juergen Schmidt   editor in chiefheise Security www.heisec.de
Heise Zeitschriften Verlag,Helstorferstr. 7,   D-30625 Hannover
Tel. +49 511 5352 300  FAX +49 511 5352 417   EMail [EMAIL PROTECTED]
GPG-Key: 0x38EA4970,  5D7B 476D 84D5 94FF E7C5  67BE F895 0A18 38EA 4970

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/