Re: [Full-disclosure] NUL Character Evasion

2005-09-16 Thread Steffen Kluge
On Tue, 2005-09-13 at 23:24 +0200, [EMAIL PROTECTED] wrote:
 Internet Explorer ignores NUL characters
 -- i.e. ascii characters with the value 0x00 -- most
 security software does not.

Interesting. Did you test this with Outlook as well?

Cheers
Steffen.



signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] FileZilla (client) public credentials vulnerability

2005-09-16 Thread PASTOR ADRIAN

Title: 
FileZilla (client) public credentials vulnerabilityRisk: 
MediumVersions 
affected:=2.2.15Credits:pagvac (Adrian Pastor)Date 
found:10th September, 2005Homepage:www.ikwt.comwww.adrianpv.comE-mail:m123303 
[ - a t - ] richmond.ac.uk
Background--FileZilla client is an open source Windows 
FTP/SFTP client.
Vulnerability Description-FileZilla 
client stores all users' credentials (including passwords) in a globally 
public directory under Windows which allows all users with local access 
(including restricted users) to dump the credentials of all users and 
decrypt their passwords.

The directory is %programfiles%\FileZilla\
where %programfiles% is usually "C:\program files".

The default Windows ACLs grants *read* access to %programfiles% to all 
users. This means that even restricted accounts can dump any user 
credentials (including the administrators' credentials) from 
"FileZilla.xml"

This would *not* be possible if the developers had programmed the FileZilla 
client to save the config file under %homepath% which would be 
"C:\Documents and Settings\username\FileZilla.xml" by default.

The advantage of the %homepath% directory is that, by default, only its 
owner and users within the "administrators" group have read access (rather 
than all users).
Disclaimer--If I get a response from the project 
developers arguing that the previous security flaw is not a vulnerability 
but rather a feature, I will simply *not* answer. 

No offence, but I'm not willing to waste my time with the common "insecure 
by design" debate. In my humble opinion applications should *never* store 
user credentials in locations in the file system that are readable by 
allusers (unless you want all users to steal your passwords).
PoC---I coded a small tool which dumps all users' credentials 
from "FileZilla.xml" and the registry and decrypts all passwords 
found.

In order to exploit this vulnerability the credentials need to be saved 
in "FileZilla.xml" (rather than the registry). Luckily, the XML 
file is the default location used to save the credentials :-)

In case the credentials were stored in the registry, then you would 
need to run this tool as the user you want to dump the credentials 
from(this is because the credentials are saved under 
"HKEY_CURRENT_USER"rather than HKEY_LOCAL_MACHINE).

Executable and source code along with Visual Studio project file:

http://www.ikwt.com/projects/filezilla-pwdump.ziphttp://www.adrianpv.com/projects/filezilla-pwdump.zip

I tested this tool in Windows XP SP1 by running it with restricted accounts 
from the "Users" and "Guests" groups and it successfully dumped all 
userscredentials (including admins'). 

This is possible because the default Windows ACLS of the 
%programfiles%directory grants *read* access to all users. As far as I know 
this istrue in Windows 2000 SPX and Windows XP SPX as well (please correct 
meif I'm wrong as I'm *not* a computer security guru).
SolutionChoose to save user settings in the Windows 
registry or select"Use secure mode" during the installation (this 
disablesFileZilla client from saving passwords at all), lockdown your client 
machines where the FileZilla client is installed.

Alternitavely you can try convincing the FileZilla developers to modify 
the application so that each user's credentials are stored in 
his/herhome folder.

Regards,
pagvac (Adrian Pastor)Earth, SOLAR SYSTEM___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re[2]: [Full-disclosure] NUL Character Evasion

2005-09-16 Thread 3APA3A
Dear Steffen Kluge,

This is old news reported long time ago by ben moeckel (ben.moeckel at
online.de), see http://www.security.nnov.ru/advisories/content.asp

9. Bypassing filters with special characters

  There  are some characters client application may ignore silently. For
  Example, for HTML browsers:

  0, 9, 10, 13, 173 for Opera
  13, 10, 9, 0 for Internet Explorer

  by inserting characters with this codes into document it's possible to
  hide some dangerous tags from content filter.

  Reported by ben.moeckel at online.de

--Friday, September 16, 2005, 10:25:06 AM, you wrote to 
full-disclosure@lists.grok.org.uk:

SK On Tue, 2005-09-13 at 23:24 +0200, [EMAIL PROTECTED] wrote:
 Internet Explorer ignores NUL characters
 -- i.e. ascii characters with the value 0x00 -- most
 security software does not.

SK Interesting. Did you test this with Outlook as well?

SK Cheers
SK Steffen.



-- 
~/ZARAZA
Есть там версии Отелло, где Дездемона душит Мавра. (Лем)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 815-1] New kdebase packages fix local root vulnerability

2005-09-16 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 815-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
September 16th, 2005http://www.debian.org/security/faq
- --

Package: kdebase
Vulnerability  : programming error
Problem type   : local
Debian-specific: no
CVE ID : CAN-2005-2494

Ilja van Sprundel discovered a serious lock file handling error in
kcheckpass that can, in some configurations, be used to gain root
access.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in
version 3.3.2-1sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 3.4.2-3.

We recommend that you upgrade your kdebase-bin package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2-1sarge1.dsc
  Size/MD5 checksum: 1470 1bba89e478ef850d4c634ffae067075c

http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2-1sarge1.diff.gz
  Size/MD5 checksum:   881169 8a0ca94aa8607a134af2a24b70cee92e

http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2.orig.tar.gz
  Size/MD5 checksum: 23750520 32d59e3bcb972a9a29414935c7f72481

  Architecture independent components:


http://security.debian.org/pool/updates/main/k/kdebase/kdebase-data_3.3.2-1sarge1_all.deb
  Size/MD5 checksum:  3700050 3f9bb57f5450e969ba7c452ddf00ac29

http://security.debian.org/pool/updates/main/k/kdebase/kdebase-doc_3.3.2-1sarge1_all.deb
  Size/MD5 checksum:   997006 732bf896c5b9aadd33076f9f4e8ec4da

http://security.debian.org/pool/updates/main/k/kdebase/kdebase_3.3.2-1sarge1_all.deb
  Size/MD5 checksum:20134 f10a0a9e1caa782849bdb382d113560b

http://security.debian.org/pool/updates/main/k/kdebase/xfonts-konsole_3.3.2-1sarge1_all.deb
  Size/MD5 checksum:35902 99ff8f2a1e66d2859f834849a1b8271a

  Alpha architecture:


http://security.debian.org/pool/updates/main/k/kdebase/kappfinder_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   239726 a0e08c50e0c1b1cb9ce06e5a66d4a6d6

http://security.debian.org/pool/updates/main/k/kdebase/kate_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   616324 0d2ced176c43b6faeb49b8c1ee1d37ef

http://security.debian.org/pool/updates/main/k/kdebase/kcontrol_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:  7894868 8f7f1c1828fa32ccecbf6b569da97ffe

http://security.debian.org/pool/updates/main/k/kdebase/kdebase-bin_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:  1069856 88ddfa12596abd67c09f2b4e2f52ebfd

http://security.debian.org/pool/updates/main/k/kdebase/kdebase-dev_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:57148 5f98cf718508a919f0ee4de5e4ede454

http://security.debian.org/pool/updates/main/k/kdebase/kdebase-kio-plugins_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   764278 52ff79d25d60992e2589cc7477784a4b

http://security.debian.org/pool/updates/main/k/kdebase/kdepasswd_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   226854 ac66583eb58c1a4333f5e1d13d2b5311

http://security.debian.org/pool/updates/main/k/kdebase/kdeprint_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:  1084162 fd991547e74d735258311034dda4a3ef

http://security.debian.org/pool/updates/main/k/kdebase/kdesktop_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   707074 95f79ef7d4d369d1a59f8b26db758f8a

http://security.debian.org/pool/updates/main/k/kdebase/kdm_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   467958 cbb23ae0f9b7e6149abc081605deee02

http://security.debian.org/pool/updates/main/k/kdebase/kfind_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   189660 8cb7206bd4136fafa379f3b0d3f2ef86

http://security.debian.org/pool/updates/main/k/kdebase/khelpcenter_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   723122 70278a68402600b0530fa5e6aa1188c0

http://security.debian.org/pool/updates/main/k/kdebase/kicker_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:  2378516 5e6b80aca64040d76afcee88b608aeed

http://security.debian.org/pool/updates/main/k/kdebase/klipper_3.3.2-1sarge1_alpha.deb
  Size/MD5 checksum:   219954 3732a2e0c4c1f2ffb5a0047ac394af2b


[Full-disclosure] (TOOL) TAPiON ver 0.1c

2005-09-16 Thread Piotr Bania

Hi,

For those who are interrested, new version (0.1c) of TAPiON (polymorphic 
decryptor generator) is now available. The package can be downloaded at:


http://pb.specialised.info/all/tapion/

- the list of changes in 0.1c version is also stored at this url.

best regards,
Piotr Bania


--

Piotr Bania - [EMAIL PROTECTED] - 0xCD, 0x19
Fingerprint: 413E 51C7 912E 3D4E A62A  BFA4 1FF6 689F BE43 AC33
http://pb.specialised.info  - Key ID: 0xBE43AC33


   Dinanzi a me non fuor cose create
se non etterne, e io etterno duro.
Lasciate ogne speranza, voi ch'intrate 
  - Dante, Inferno Canto III
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ncompress insecure temporary file creation

2005-09-16 Thread ZATAZ Audits

#

ncompress insecure temporary file creation

Vendor: ftp://ftp.leo.org/pub/comp/os/unix/linux/sunsite/utils/compress/
Advisory: http://www.zataz.net/adviso/ncompress-09052005.txt
Vendor informed: yes
Exploit available: yes
Impact : low
Exploitation : low

#

The vulnerability is caused due to temporary file being created insecurely.
This can be exploited via symlink attacks in combination with a race
condition to create and overwrite arbitrary files
with the privileges of the user running the affected script.

Secunia has reported that D1g1t4lLeech has discovered this bug
the 2005-09-16

ZATAZ Audit has discovered this bug the 2005-09-05

D1g1t4lLeech is a true Leecher :)

Gentoo Security take care on your IRC Channel, spy everywhere.

##
Versions:
##

ncompress = 4.2.4-r1

##
Solution:
##

To prevent symlink attack use kernel patch such as grsecurity

#
Timeline:
#

Discovered : 2005-09-05
Vendor notified : 2005-09-05
Vendor response : no reponse
Vendor fix : no patch
Vendor Sec report ([EMAIL PROTECTED]) :
Disclosure :

#
Technical details :
#

ncompress use vulnerable version off zdiff and zcmp.

#
Related :
#

Secunia : http://secunia.com/advisories/13131/
CVE : CAN-2004-0970

#
Credits :
#

Eric Romang ([EMAIL PROTECTED] - ZATAZ Audit)
Thxs to Gentoo Security Team. (Taviso, jaervosz, solar, Koon, etc.)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Message for D1g1t4lLeech ZATAZ Audit has discovered this bug the 2005-09-05 D1g1t4lLeech you are a true Leecher ;)

2005-09-16 Thread ZATAZ Audits

Hello Mister D1g1t4lLeech,

You are not able to find by yourself security holes ;)

So you leech other people research.

Go back to you kazaa leech.

Secunia you continu to don't respect vendor release date ;)

Bye
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] LSADump2 Crashing Windows

2005-09-16 Thread Nicolas RUFF
 This is a bug in lsadump2 - there's a type mismatch in one of the
 functions, although I forget which one. Something is a pointer which
 shouldn't be, or vice versa. Once you fix that, it'll be good to go.

Are you sure about that ?
After investigating deeper, I found several problems in LSADUMP2 :
- Buffers too small (300 bytes for the smallest)
- Allocated memory not flagged as executable (that is why LSADUMP2 is
not compatible with the NX flag)
- Reuse of freed memory

Here is a small patch that has been tested sucessfully on Windows XP SP2
with DEP AlwaysOn enabled (where LSADUMP2 failed).

Regards,
- Nicolas RUFF
Security researcher @ EADS-CCR

---

diff lsadump2/dumplsa.c lsadump3/dumplsa.c
34a35
 #define BUF_SIZE 1024
110c111
 char szBuffer[1000];
---
 char szBuffer[BUF_SIZE];
137c138
 TCHAR szBuffer[300];
---
 TCHAR szBuffer[BUF_SIZE];
189c190
 WCHAR wszSecret[500];
---
 WCHAR wszSecret[BUF_SIZE];
230c231
 char szSecret[500];
---
 char szSecret[BUF_SIZE];
242a244
   lsaData = NULL;

diff lsadump2/lsadump2.c lsadump3/lsadump2.c
261c261
MEM_COMMIT, PAGE_READWRITE);
---
MEM_COMMIT, PAGE_EXECUTE_READWRITE);
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] PGPNet Upgrade path ?

2005-09-16 Thread Martijn Lievaart
Aditya Deshmukh zei:

 What alternatives are there to pgpnet ?

Have a look at OpenVPN.

M4



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Message for D1g1t4lLeech ZATAZ Audit has discovered this bug the 2005-09-05 D1g1t4lLeech you are a true Leecher ; )

2005-09-16 Thread Siegfried
If it's on your site, then it's released.. security sites publish
advisories as soon as they are online.
put an index or just put your advisories there when you wanna release
them if you don't want to annoy us and to be annoyed by leechers
i didn't find any reference about the D1g1t4lLeech mentioned in their
advisories though, they'll probably correct them

--
Hello Mister D1g1t4lLeech,

You are not able to find by yourself security holes ;)

So you leech other people research.

Go back to you kazaa leech.

Secunia you continu to don't respect vendor release date ;)

Bye
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NUL Character Evasion

2005-09-16 Thread Williams, James K

 List:   full-disclosure
 Subject:Re: [Full-disclosure] NUL Character Evasion
 From:   fd () ew ! nsci ! us
 Date:   2005-09-15 19:57:30

   On Thu, 15 Sep 2005, Williams, James K wrote:
   List:   full-disclosure
   Subject:[Full-disclosure] NUL Character Evasion
   From:   ju () heisec ! de
   Date:   2005-09-13 21:24:42
 
  Thank you for the report.  Computer Associates is currently 
  investigating the issue (as it relates to CA products).
  
  Regards,
  kw
 
 Ken,  

 How long until this update hits your product?

 -Eric

 -- 
 Eric Wheeler

As initially suspected, from the AV signature perspective, this
is not a critical issue until and unless something specific 
shows up in the wild or is reported to a vendor. The NUL char 
insertion concept is similar in theory to, for example, K2's 
classic ADMmutate[1] polymorphic shellcode engine for NIDS 
evasion, or simply adding NOPs to an executable. Alex and 
Neel[2] discussed this class of AV vulns at core05 and Blackhat.

Regards,
kw

[1] http://www.ktwo.ca/security.html
[2] http://www.blackhat.com/presentations/bh-usa-05/bh-us-05-wheeler.pdf

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] PGPNet Upgrade path ?

2005-09-16 Thread Aditya Deshmukh
  What alternatives are there to pgpnet ?
 
 Have a look at OpenVPN.

Thanks Martijn, but isn`t that a SSL vpn ? And from what I 
have read about PGPnet I need a IPSEC VPN that uses 
PGP keys to do the auth.

I know for ipsec VPNs I could use the winxp's builtin 
But that would require moving all the PGP keys to 
X.509 certs.



Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] FileZilla (client) public credentials vulnerability

2005-09-16 Thread Tobias Ulmer
PASTOR ADRIAN wrote:
 Title:FileZilla (client) public credentials vulnerability
 Risk:Medium
 Versions affected: =2.2.15
 Credits:  pagvac (Adrian Pastor)
 Date found:  10th September, 2005
 Homepage:  www.ikwt.com  www.adrianpv.com
 E-mail:   m123303 [ - a t - ] richmond.ac.uk
 

[...]

 Regards,
 pagvac (Adrian Pastor)
 Earth, SOLAR SYSTEM
 

I don't know why I even reply... But anyway, I attached a screen shot
especially for you. Please read it.

a) FileZilla Users most probably are the only user of the computer. This
is why the default makes sense (They work as administrator anyways).

b) There is a secure mode witch prevents you from saving any password
at all witch is the best solution if you want to be on the safe side.

c) There is an option to save the settings in the registry and ignore
the xml file. Settings are stored in HKEY_CURRENT_USER witch is in fact
under X:\%homepath%\username\NTUSER.DAT and is protected by the
filesytem ACL.

Tobias





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [CIRT.DK - Advisory 37] TAC Vista Webstation 3.0 Directory Traversal bug in webinterface

2005-09-16 Thread CIRT.DK Advisory

TAC Vista is based on open technologies, TAC VistaR is one of the most
advanced software solutions for building automation. 
TAC Vista efficiently and economically controls, checks and analyzes all
building operations, allowing system operators to control and monitor entire
systems on site or from remote locations. 

The Web application is running on a Microsoft IIS 5.0 Server in this case. 

The problem is occurring in the input field of where the Template is called,
resulting in the possibility to traverse into other parts of the system.

Read the full Advisory at http://www.cirt.dk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Search Results w/Trojan?

2005-09-16 Thread 'FoR ReaLz' E. Balansay

Hello all!

My systems relevant info:
Windows XP SP2 fully patched
Mcafee VirusScan 7.1 Engine 4.4 Definition 4581


Using XP SP2s Internet Explorer, in Google, i used the following search 
query:


mcafee driver packet received from the i/o subsystem patch 11

When the results return from google a trojan comes along as well, as 
detected by McAfee AV.


I'm aware that browsing to malicious sites can pass malware to users who 
visit those sites, but this is new to me:  Trojans being passed through 
google results.


Are passing of malicious programs through search engine results common?

Goodbye!
Edgardo
(not the same newbie Edgardo from a couple threads ago  =) )
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Search Results w/Trojan?

2005-09-16 Thread Fergie (Paul Ferguson)
Get in line:

 http://www.eeye.com/html/research/upcoming/20050915.html

More:

 http://www.eeye.com/html/research/upcoming/index.html

- ferg


-- 'FoR ReaLz' E. Balansay [EMAIL PROTECTED] wrote:

Hello all!

My systems relevant info:
Windows XP SP2 fully patched
Mcafee VirusScan 7.1 Engine 4.4 Definition 4581


Using XP SP2s Internet Explorer, in Google, i used the following search 
query:

mcafee driver packet received from the i/o subsystem patch 11

When the results return from google a trojan comes along as well, as 
detected by McAfee AV.

I'm aware that browsing to malicious sites can pass malware to users who 
visit those sites, but this is new to me:  Trojans being passed through 
google results.

Are passing of malicious programs through search engine results common?

Goodbye!
Edgardo
(not the same newbie Edgardo from a couple threads ago  =) )

--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Greyhats Security back online

2005-09-16 Thread Paul



It's been a while, but I have decided that because 
a lot of valuable information is hosted on greyhatsecurity.org, that it is 
within everyone's best interest to share the material.

Some things that have changed:
- The layout. The navigation system looks a lot 
cooler now (IMHO) and is easier to follow/more categorical.
- Bias is gone. No more criticism to either 
Microsoft nor Mozilla will be found on my website unless I deem it necissary for 
the progress of computer security.

You can find Greyhats Security at its old address, 
http://greyhatsecurity.org.

Kind regards,
Paul
Greyhats Security
http://greyhatsecurity.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] PGPNet Upgrade path ?

2005-09-16 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Yo Aditya!

On Fri, 16 Sep 2005, Aditya Deshmukh wrote:

   What alternatives are there to pgpnet ?
 
  Have a look at OpenVPN.

 Thanks Martijn, but isn`t that a SSL vpn ? And from what I
 have read about PGPnet I need a IPSEC VPN that uses
 PGP keys to do the auth.

IPSEC has nothing to do with PGP.  Also there is really no such thing
as a PGP key.  PGP uses what ever key scheme you ask it to use.  IPSEC
is the same way.  Both use keys, but are not themselves key standards.

OpenVPN similarly can use what ever key scheme you wish.  Since it is
based on the OpenSSL crupto libs it is very flexible that way.  For
simple setups you can use pre-shared keys.  For more complex setups
you can use public/private key pairs of any type that OpenSSL understands.

On top of that you can layer on other aith schemes like username/passwords
and such.

IMHO, if OpenVPN does not do what you want then you misunderstand the
problem.


RGDS
GARY
- ---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDKyni8KZibdeR3qURAv9tAJ9YxZiCL/QUCpM2ciZV2apCuj8MSgCffY1s
qOCCYwH7H5Ts0B2iL525tm4=
=+8Dj
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Search Results w/Trojan?

2005-09-16 Thread Madison, Marc
What Trojan does McAfee report? 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of 'FoR
ReaLz' E. Balansay
Sent: Friday, September 16, 2005 2:40 PM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Search Results w/Trojan?

Hello all!

My systems relevant info:
Windows XP SP2 fully patched
Mcafee VirusScan 7.1 Engine 4.4 Definition 4581


Using XP SP2s Internet Explorer, in Google, i used the following search
query:

mcafee driver packet received from the i/o subsystem patch 11

When the results return from google a trojan comes along as well, as
detected by McAfee AV.

I'm aware that browsing to malicious sites can pass malware to users who
visit those sites, but this is new to me:  Trojans being passed through
google results.

Are passing of malicious programs through search engine results common?

Goodbye!
Edgardo
(not the same newbie Edgardo from a couple threads ago  =) )
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Search Results w/ Trojan?

2005-09-16 Thread 'FoR ReaLz' E. Balansay

Hello!

I noticed the same message as well =), we're not using the ebay toolbar.

I have just verified these results from a Win2k3 fully patched machine 
with no additional applications installed, except for McAfee 7.1.


Would someone else like to search google for those terms and verify as 
well?  Search terms:


mcafee driver packet received from the i/o subsystem patch 11

Goodbye!
Edgardo

On Fri, 16 Sep 2005, Dyke, Tim wrote:


I Noticed the following on the McAffee site

-- Update July 16, 2004 --
An Incorrect Identification of Exploit-URLSpoof.gen has been found when
scanning files associated with the eBay Toolbar. The file being detected
as Exploit-URLSpoof.gen is wsasc.xml. If you are seeing this specific
detection, please download the extra.dat files below which will correct
the Incorrect Identification.

Could this be a similar issue with your google search

Thanks



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: Search Results w/ Trojan?

2005-09-16 Thread craig
This is an accurate detection.  Google returns results that contain a 
hyperlink that contains the exploit. 

I've verified both the detection and exploit. 

Craig 


==
Using XP SP2s Internet Explorer, in Google, i used the following search
query: 

mcafee driver packet received from the i/o subsystem patch 11 


When the results return from google a trojan comes along as well, as
detected by McAfee AV. 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Search Results w/Trojan?

2005-09-16 Thread fd
On Fri, 16 Sep 2005, 'FoR ReaLz' E. Balansay wrote:

 On Fri, 16 Sep 2005, Madison, Marc wrote:
 
  What Trojan does McAfee report?
 
 Exploit-URLSpoof.gen

See the %00? That is probably wat mcafee calls a Exploit-URLSpoof.gen.  I 
would hardly call it a trojan ... still, it is interesting to see this 
show up in a googling.

[EMAIL PROTECTED]/zforen/sec/m/sec-112130-8756.html 

-Eric

 
 McAfee link:
 http://vil.nai.com/vil/content/v_100927.htm
 
 Goodbye!
 Edgardo
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 
 

-- 
Eric Wheeler
Vice President
National Security Concepts, Inc.
PO Box 3567
Tualatin, OR 97062

http://www.nsci.us/
Voice: (503) 293-7656
Fax:   (503) 885-0770

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Web Application Security Analyzer for PHP-Nuke/phpBB CMS

2005-09-16 Thread Paul Laudanski
With all the discussions surrounding the PHP-Nuke CMS wrapping phpBB2 as 
its forums, I've released an application called Analyzer (version 2.0) 
available from Download.com.

It checks the following versions and reports if newer versions exist:

mysql
php
apache
phpnuke
phpbb

It also checks certain settings in the php.ini file such as 
register_globals and provides the full path.

Also assists in debugging the installation of the application.

Available here:
http://www.download.com/Analyzer/3000-2648_4-10397073.html

The script itself is written in PHP.

ref: http://en.wikipedia.org/wiki/Php-nuke

-- 
Paul Laudanski, Microsoft MVP Windows-Security
CastleCops(SM), http://castlecops.com



 Information from Computer Cops, L.L.C. 
This message was checked by NOD32 Antivirus System for Linux Mail Server.

  part000.txt - is OK
http://castlecops.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/