[Full-disclosure] Funny smtp helo in the logs

2005-10-30 Thread Aditya Deshmukh
I have been seeing this in my logs over all the public smtp server, from
all over the net. 

Anyone know what sends these kinds of helo ?


*please* when responding to this mail trim out anything below this --

124 09/10/2005 09:54:35 HELO -1209283632  ---  250 my.smtp.domain.server  
125 09/10/2005 09:55:27 HELO -1209747464  ---  250 my.smtp.domain.server  
126 09/10/2005 09:56:01 HELO -1213477808  ---  250 my.smtp.domain.server  
129 09/10/2005 09:56:47 HELO -120870  ---  250 my.smtp.domain.server  
12A 09/10/2005 09:57:46 HELO -1209957152  ---  250 my.smtp.domain.server  
131 09/10/2005 10:02:36 HELO -1218370912  ---  250 my.smtp.domain.server  
134 09/10/2005 10:04:55 HELO -1217834696  ---  250 my.smtp.domain.server  
135 09/10/2005 10:05:36 HELO -1217676688  ---  250 my.smtp.domain.server  
137 09/10/2005 10:06:23 HELO -1218157032  ---  250 my.smtp.domain.server  
13A 09/10/2005 10:06:57 HELO -1216091056  ---  250 my.smtp.domain.server  
13B 09/10/2005 10:07:35 HELO -1216184136  ---  250 my.smtp.domain.server  
13C 09/10/2005 10:08:13 HELO -1217914984  ---  250 my.smtp.domain.server  
13D 09/10/2005 10:08:40 HELO -1209896648  ---  250 my.smtp.domain.server  
13E 09/10/2005 10:09:43 HELO -1213166296  ---  250 my.smtp.domain.server  
13F 09/10/2005 10:10:35 HELO -1213642136  ---  250 my.smtp.domain.server  
140 09/10/2005 10:11:16 HELO -1209605968  ---  250 my.smtp.domain.server  
006 11/10/2005 08:43:45 HELO -1212929616  ---  250 my.smtp.domain.server  
008 11/10/2005 08:44:26 HELO -1214982448  ---  250 my.smtp.domain.server  
009 11/10/2005 08:46:07 HELO -1215268000  ---  250 my.smtp.domain.server  
00A 11/10/2005 08:47:06 HELO -1214871440  ---  250 my.smtp.domain.server  
00B 11/10/2005 08:49:16 HELO -1215063696  ---  250 my.smtp.domain.server  
00C 11/10/2005 08:50:12 HELO -1215031936  ---  250 my.smtp.domain.server  
00D 11/10/2005 08:50:55 HELO -1213038648  ---  250 my.smtp.domain.server  
010 11/10/2005 08:52:09 HELO -1212896896  ---  250 my.smtp.domain.server  
014 11/10/2005 08:53:48 HELO -1212788072  ---  250 my.smtp.domain.server  
016 11/10/2005 09:00:02 HELO -1213862536  ---  250 my.smtp.domain.server  
017 11/10/2005 09:00:44 HELO -1216032616  ---  250 my.smtp.domain.server  
005 20/10/2005 17:55:02 HELO -1208757800  ---  250 my.smtp.domain.server  
006 20/10/2005 17:55:43 HELO -1208466864  ---  250 my.smtp.domain.server  
009 20/10/2005 17:57:38 HELO -1208425264  ---  250 my.smtp.domain.server  
00A 20/10/2005 17:58:36 HELO -1209153048  ---  250 my.smtp.domain.server  
00B 20/10/2005 17:59:21 HELO -1208221040  ---  250 my.smtp.domain.server  
00C 20/10/2005 18:00:16 HELO -1209204568  ---  250 my.smtp.domain.server  
00F 20/10/2005 18:01:36 HELO -1209432360  ---  250 my.smtp.domain.server  
027 20/10/2005 18:56:40 HELO -1208740112  ---  250 my.smtp.domain.server  
21E 25/10/2005 04:52:01 HELO -1208817024  ---  250 my.smtp.domain.server  
21F 25/10/2005 04:53:06 HELO -1207974056  ---  250 my.smtp.domain.server  
220 25/10/2005 04:55:26 HELO -1208954808  ---  250 my.smtp.domain.server  
221 25/10/2005 04:56:07 HELO -1208091560  ---  250 my.smtp.domain.server  
222 25/10/2005 04:56:46 HELO -1215556832  ---  250 my.smtp.domain.server  
223 25/10/2005 04:57:16 HELO -1208017712  ---  250 my.smtp.domain.server  
224 25/10/2005 04:58:03 HELO -1208351328  ---  250 my.smtp.domain.server  
227 25/10/2005 04:58:58 HELO -1215519416  ---  250 my.smtp.domain.server  
228 25/10/2005 04:59:46 HELO -1208139640  ---  250 my.smtp.domain.server  
229 25/10/2005 05:01:10 HELO -1208158800  ---  250 my.smtp.domain.server  
22A 25/10/2005 05:01:53 HELO -1208056904  ---  250 my.smtp.domain.server  
22C 25/10/2005 05:03:06 HELO -1215816112  ---  250 my.smtp.domain.server  
22D 25/10/2005 05:04:31 HELO -1216238864  ---  250 my.smtp.domain.server  
22E 25/10/2005 05:05:15 HELO -1208157944  ---  250 my.smtp.domain.server  
22F 25/10/2005 05:05:58 HELO -1215473168  ---  250 my.smtp.domain.server  
230 25/10/2005 05:06:56 HELO -1208746080  ---  250 my.smtp.domain.server  
231 25/10/2005 05:08:36 HELO -1209142096  ---  250 my.smtp.domain.server  
232 25/10/2005 05:09:09 HELO -1210509584  ---  250 my.smtp.domain.server  
233 25/10/2005 05:10:34 HELO -1210106016  ---  250 my.smtp.domain.server  
234 25/10/2005 05:12:10 HELO -1210964032  ---  250 my.smtp.domain.server  
235 25/10/2005 05:12:48 HELO -1209218672  ---  250 my.smtp.domain.server  
127 26/10/2005 02:42:59 HELO -1212817800  ---  250 my.smtp.domain.server  
128 26/10/2005 02:43:32 HELO -1212894352  ---  250 my.smtp.domain.server  
129 26/10/2005 02:43:45 HELO -1213176336  ---  250 my.smtp.domain.server  
12C 26/10/2005 02:44:19 HELO -1212856784  ---  250 my.smtp.domain.server  
12D 26/10/2005 02:45:29 HELO -1212385064  ---  250 my.smtp.domain.server  
12E 26/10/2005 02:47:31 HELO -1212692064  ---  250 my.smtp.domain.server  
12F 26/10/2005 02:48:06 HELO -1212321816  ---  250 my.smtp.domain.server  
130 26/10/2005 02:49:10 HELO -1212623592  ---  250 

Re: [Full-disclosure] Re: Microsoft AntiSpyware falling furtherbehind

2005-10-30 Thread Valdis Shkesters

But I classify anti-spyware programs in one encampment only -
composed of unneeded programs. Does identification of so called
spyware technically differ from identification of usual computer
virus or worm? No.
Is that which now is called spyware
(http://antispywarecoalition.org/documents/definitions.htm) within
sphere detected by antiviruses? Yes, it is, with exception of tracking 
cookies.


I for many years use antivirus which excellently detects all classes
of harmful programs. Within last year, using the same antivirus,
I have found very large number of active harmful programs
(which are called spyware by many) in several hundreds of
infected computers. And at least one third of these computers
had installed the so called anti-spyware.


From the point of view of an average user until now the word virus

was synonym for all harmful programs. Now for large part of them
the name spyware has been introduced. Why? In order to get
money - for antivirus and anti-spyware? Then we will see
anti-crimeware tomorrow and anti-terrorware - the day after tomorrow.

Best regards,

Valdis

- Original Message - 
From: Nick FitzGerald [EMAIL PROTECTED]

To: full-disclosure@lists.grok.org.uk
Sent: Saturday, October 29, 2005 2:42 PM
Subject: Re: [Full-disclosure] Re: Microsoft AntiSpyware falling 
furtherbehind




Valdis Shkesters wrote:


At first you can take look here http://secunia.com/product/4256/.

This summer German magazine ComputerBild compared several
popular antispyware products. Test results are available in the forum
http://www.rokop-security.de/lofiversion/index.php/t8810.html.
Scrolling through detailed figures by categories of harmful programs
can be seen. I warn that the figures may be very unpleasant for fans
of some products.


...which may simply reflect that they are shite tests, rather than
anything especially meaningful about the products??

As a rule, anti-spyware products fall into one of two camps:

1.  Never mind the quality, feel the width -- you can usually pick
these because their advertising lays heavy stress on the 43 quadrillion
spyware items they claim to detect.  These products will remove 17
bazillion entirely harmless items from normal systems simply because
they happended to be string-matches on filename (of course you don't
want ANY 'unwise.exe' files on your system!), reg key/value/etc, and
so on.

2.  Cluefull.  These will not have the stupid false-positive rates of
the above, but as a result will not apparently score as well on
clueless tests of the kind the proponents of the first kind of anti-
spyware product push.

I'd like to say -- stealing something from a colleague -- welcome to
antivirus 101 but actually, I think things in the anti-spyware testing
arena are a lot worse than all but the very, very, very worst ever AV
tests AND it seems anti-spyware tests will continue to get worse,
rather than better...


--
Nick FitzGerald
Computer Virus Consulting Ltd.
Ph/FAX: +64 3 3267092

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/ 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Funny smtp helo in the logs

2005-10-30 Thread Thierry Zoller
Dear Aditya Deshmukh,

No clue, just a thought : Covert channel ? program inside might read promiscious
mode data? Or smtp logs ?

-- 
http://Thierry.sniff-em.com
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] for IE researchers, found a link crashing IE

2005-10-30 Thread ad








This link crashes my fully patched IE on 



Crash-Windows 2k SP4 Workstation (6.0.2800.1106)

Crash-Windows XP SP1 64-bit (IE32-6.0.3790.1830)

NoCrash- Windows XP SP1 64-bit (IE64-6.0.3790.1830)





Poclink:http://www.kotaku.com/gaming/sex/girl-gives-xbox-360-controller-a-blowjob-134028.php



Dunno if its a high risk since I dont really
care about IE security but this might interest some security researchers
working on IE.








___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Funny smtp helo in the logs

2005-10-30 Thread trains

Quoting Aditya Deshmukh [EMAIL PROTECTED]:


I have been seeing this in my logs over all the public smtp server, from
all over the net.

Anyone know what sends these kinds of helo ?

124 09/10/2005 09:54:35 HELO -1209283632  ---  250 my.smtp.domain.server
125 09/10/2005 09:55:27 HELO -1209747464  ---  250 my.smtp.domain.server


snip


02D 29/10/2005 20:39:12 HELO -1208865784  ---  250 my.smtp.domain.server
017 30/10/2005 11:21:26 HELO -1216191992  ---  250 my.smtp.domain.server


they look like ip addresses to me (1216191992 = 72.125.157.248 ).  I 
checked a few and they weren't smpt listeners.  I  would go for the 
possibility that your mail server is being used as part of a reporting 
mechanism to notify the mother ship of vulnerable or infected IP 
addresses.


-
Email solutions, MS Exchange alternatives and extrication,
security services, systems integration.
Contact:[EMAIL PROTECTED]


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] for IE researchers, found a link crashing IE

2005-10-30 Thread ad









Correcting my previous post , IE64 also
crashes, gogo it smells the secbug :











De:
[EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] De la part de [EMAIL PROTECTED]
Envoy: dimanche 30
octobre 2005 13:56
:
full-disclosure@lists.grok.org.uk
Objet: [Full-disclosure] for
IE researchers, found a link crashing IE
Importance: Haute





This link crashes my fully patched IE on 



Crash-Windows 2k SP4 Workstation (6.0.2800.1106)

Crash-Windows XP SP1 64-bit (IE32-6.0.3790.1830)

NoCrash- Windows XP SP1 64-bit (IE64-6.0.3790.1830)





Poclink:http://www.kotaku.com/gaming/sex/girl-gives-xbox-360-controller-a-blowjob-134028.php



Dunno if its a high risk since I dont really care
about IE security but this might interest some security researchers working on
IE.








___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] for IE researchers, found a link crashing IE

2005-10-30 Thread ad
Strange, I have tested here on english OS , I notice 1/5 tries passes on XP
try to refresh with ?? caracters at the end of the link to retrieve
outside of the cache dunno, it crashes at all else here on 2k sp4 english.

-Message d'origine-
De : Thierry Zoller [mailto:[EMAIL PROTECTED] 
Envoyé : dimanche 30 octobre 2005 14:27
À : [EMAIL PROTECTED]
Cc : full-disclosure@lists.grok.org.uk
Objet : Re: [Full-disclosure] for IE researchers, found a link crashing IE

Dear Ad..,

aco
Poclink:http://www.kotaku.com/gaming/sex/girl-gives-xbox-360-controller-a-bl
owjob-134028.php

Does not crash GERMAN XP SP2 6.0.2900.2180.xpsp_sp2_gdr-050301-1519
-- 

Thierry Zoller
mailto:[EMAIL PROTECTED]



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] for IE researchers, found a link crashing IE

2005-10-30 Thread ad
Windows XP  Professional SP1  ENGLISH 64-bit (IE32-6.0.3790.1830) -crash-
Windows XP  Professional SP1  ENGLISH 64-bit (IE64-6.0.3790.1830) -crash-
Windows XP  Professional SP2  ENGLISH 32-bit (IE32-6.0.2900.2180) -nocrash-
Windows XP  Professional SP1  ENGLISH 32-bit (IE32-6.0.2900.1106) -crash-
Windows 2k  Workstation  SP4  ENGLISH 32-bit (IE32-6.0.2800.1106) -crash-
Windows 2k  Server   SP4  ENGLISH 32-bit (IE32-6.0.2800.1106) -crash-
Windows NT4 Workstation  SP6a ENGLISH 32-bit (IE32-6.0.2800.1106) -nocrash-
Windows NT4 Server   SP6a ENGLISH 32-bit (IE32-6.0.2800.1106) -nocrash-
Windows 2k3 Server Std   SP1  ENGLISH 32-bit (IE32-6.0.3790.1830) -crash-

Hope it helps :)

-Message d'origine-
De : Thierry Zoller [mailto:[EMAIL PROTECTED] 
Envoyé : dimanche 30 octobre 2005 14:27
À : [EMAIL PROTECTED]
Cc : full-disclosure@lists.grok.org.uk
Objet : Re: [Full-disclosure] for IE researchers, found a link crashing IE

Dear Ad..,

aco
Poclink:http://www.kotaku.com/gaming/sex/girl-gives-xbox-360-controller-a-bl
owjob-134028.php

Does not crash GERMAN XP SP2 6.0.2900.2180.xpsp_sp2_gdr-050301-1519
-- 

Thierry Zoller
mailto:[EMAIL PROTECTED]



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Fwd: Re: [Full-disclosure] for IE researchers, found a link crashing IE]

2005-10-30 Thread misiu

sorry, was a direct reply

Thierry Zoller schrieb:

Dear Ad..,

aco 
Poclink:http://www.kotaku.com/gaming/sex/girl-gives-xbox-360-controller-a-blowjob-134028.php

Does not crash GERMAN XP SP2 6.0.2900.2180.xpsp_sp2_gdr-050301-1519

Hmmm,

Win XP Home Version 2002 Service Pack2 German

AppName: iexplore.exeAppVer: 6.0.2900.2180   ModName: mshtml.dll
ModVer: 6.0.2900.2668Offset: 0021727c

Crash

2. Restart Browser Copy Link nothing
Klick through page all cool...

Reload Page.crash

Restart Browsernothing - reload page nothing
reload page nothing, again ... crash .

Strange, it does not crash the browser everytime...

m

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] for IE researchers, found a link crashing IE

2005-10-30 Thread Manuel \ekerazha\ C.

Here -nocrash- and -noshutdown- :-P
Everything works fine...

On 2k3 there is prolly a security restriction because it has shutdown
iexplorer without a crash here on the English os ye

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Funny smtp helo in the logs

2005-10-30 Thread Fco. Jose Garrido Matamoros
They are looking for a bad configured SMTP server; it's looking for a server 
that accept unauthenticated session from supposed old mail client (HELO in 
front of EHLO) whitout authentication funcionality.

Perhaps they are spammers searching unautheticated SMTP servers.

Note.- HELO is the old command to begin session.

Sorry by my english!


El Domingo, 30 de Octubre de 2005 08:09, Aditya Deshmukh escribió:
 I have been seeing this in my logs over all the public smtp server, from
 all over the net.

 Anyone know what sends these kinds of helo ?


 *please* when responding to this mail trim out anything below this --

 124 09/10/2005 09:54:35 HELO -1209283632  ---  250 my.smtp.domain.server
 ...
 ...
 017 30/10/2005 11:21:26 HELO -1216191992  ---  250 my.smtp.domain.server


 
 Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

-- 
Fco. Jose Garrido Matamoros
Ingeniero Sup. Telecomunicacion

TecVD - Seguridad y Control de Sistemas de Informacion
http://www.tecvd.com

NOTA.- Las tildes de este mensaje han sido omitidas expresamente para evitar
cualquier tipo de alteracion en los caracteres del texto.


**AVISO LEGAL**

Este mensaje es privado y confidencial y solamente para la persona a la 
que va dirigido. Si usted ha recibido este mensaje por error, no debe 
revelar, copiar, distribuir o usarlo en ningun sentido. Le rogamos lo 
comunique al remitente y borre dicho mensaje y cualquier documento 
adjunto que pudiera contener. No hay renuncia a la confidencialidad ni a 
ningun privilegio por causa de transmision erronea o mal funcionamiento. 
Cualquier opinion expresada en este mensaje pertenece unicamente al autor 
remitente, y no representa necesariamente la opinion de Tecnologias de 
Vigilancia y Deteccion, S.L., a no ser que expresamente se diga y el 
remitente este autorizado para hacerlo. 
Los correos electronicos no son seguros, no garantizan la confidencialidad 
ni la correcta recepcion de los mismos, dado que pueden ser interceptados, 
manipulados, destruidos, llegar con demora, incompletos, o con virus. 
Tecnologias de Vigilancia y Deteccion, S.L. no se hace responsable de las 
alteraciones que pudieran hacerse al mensaje una vez enviado. Este mensaje 
solo tiene una finalidad de informacion, y no debe interpretarse como una 
oferta de venta o de compra de cualquier producto o servicio. En el caso 
de que el destinatario de este mensaje no consintiera la utilizacion del 
correo electronico via Internet, rogamos lo ponga en nuestro conocimiento.

Se le informa que los datos de caracter personal que libremente 
suministre pueden ser incluidos en un fichero para facilitar la oferta de 
servicios y/o productos basados en las preferencias y requerimientos que 
comunique. En todo caso le asiste el derecho de acceso, rectificacion, 
cancelacion u oposicion al tratamiento de esos datos; para ejercer estos 
derechos debe dirigirse por escrito adjuntando fotocopia de DNI, o documento
equivalente, a la sede de la empresa.


**DISCLAIMER**

This message is private and confidential and it is intended exclusively for 
the addressee. If you receive this message by mistake, you should not 
disseminate, distribute or copy this e-mail. Please inform the sender and 
delete the message and attachments from your system. No confidentiality 
nor any privilege regarding the information is waived or lost by any 
mistransmission or malfunction. 
Any views or opinions contained in this message are solely those of the 
author, and do not necessarily represent those of Tecnologias de Vigilancia 
y Deteccion, S.L., unless otherwise specifically stated and the sender is 
authorised to do so. 
E-mail transmission cannot be guaranteed to be secure, confidential, or 
error-free, as information could be intercepted, corrupted, lost, 
destroyed, arrive late, incomplete, or contain viruses. Tecnologias de 
Vigilancia y Deteccion, S.L. does not accept responsibility for any changes 
in the contents of this message after it has been sent. 
This message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any product or service. 
If the addressee of this message does not consent to the use of internet 
e-mail, please communicate it to us.


pgpSewYaTVNQW.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] for IE researchers, found a link crashing IE

2005-10-30 Thread Greg


- Original Message - 
From: [EMAIL PROTECTED]

To: full-disclosure@lists.grok.org.uk
Sent: Sunday, October 30, 2005 11:55 PM
Subject: [Full-disclosure] for IE researchers, found a link crashing IE



This link crashes my fully patched IE on



Unsure if this was a real bug-crash report or not but for the heck of it, 
tested it from 2 Windows boxes.


1) Win XPSP2 with IE6SP2 all fully patched and running, because I was too 
lazy to stop it running, Zone Alarm Pro (yes, I know but I like to do this 
for other reasons). No crash.


2) Networked (runs wired through the XP box as above and out of that, 
wireless to a router) 98SE machine with IE6SP2 fully patched on it. No 
crash.


Was this one an honest report or just someone having a laugh?


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Advisory 17/2005: phpBB Multiple Vulnerabilities

2005-10-30 Thread Stefan Esser
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hardened-PHP Project
www.hardened-php.net

  -= Security  Advisory =-



 Advisory: phpBB Multiple Vulnerabilities
 Release Date: 2005/10/31
Last Modified: 2005/10/31
   Author: Stefan Esser [EMAIL PROTECTED]

  Application: phpBB = 2.0.17
 Severity: Multiple vulnerabilities allow XSS, SQL injection
   and remote code execution
 Risk: Critical
Vendor Status: Vendor has released an updated version
   References: http://www.hardened-php.net/advisory_172005.75.html


Overview:

   Quote from www.phpbb.com:
   phpBB is a high powered, fully scalable, and highly customizable 
   Open Source bulletin board package. phpBB has a user-friendly 
   interface, simple and straightforward administration panel, and 
   helpful FAQ. Based on the powerful PHP server language and your 
   choice of MySQL, MS-SQL, PostgreSQL or Access/ODBC database 
   servers, phpBB is the ideal free community solution for all 
   web sites.
   
   Because of our research into register_globals deregistration 
   codes, the implementation within phpBB was audited and several
   weaknesses were found, that allowed to completely bypass the
   protection on PHP5 servers.
   
   After these weaknesses were found and disclosed to the vendor 
   nearly 80 days ago, several problems with unitialised variables 
   were discovered that allow XSS, SQL injection and even remote 
   execution of arbitrary PHP code, when phpBB is used with 
   register_globals turned on.
   
   While register_globals=off is the recommended setting, most web-
   hosters, even those that actually run PHP5, still have it 
   enabled because it is their customers wish.


Details:

   To get rid of possible security problems caused by not properly
   initialised variables phpBB comes with the following piece of
   code, that is intended to deregister global variables, which were
   created because of the register_globals directive. Unfortunately
   there are atleast 3 ways to bypass the protection.
   
   // PHP4+ path
   $not_unset = array('HTTP_GET_VARS', 'HTTP_POST_VARS', 
  'HTTP_COOKIE_VARS', 'HTTP_SERVER_VARS', 
  'HTTP_SESSION_VARS', 'HTTP_ENV_VARS', 
  'HTTP_POST_FILES', 'phpEx', 'phpbb_root_path');

   // Not only will array_merge give a warning if a parameter
   // is not an array, it will actually fail. So we check if
   // HTTP_SESSION_VARS has been initialised.
   if (!isset($HTTP_SESSION_VARS))
   {
  $HTTP_SESSION_VARS = array();
   }

   // Merge all into one extremely huge array; unset
   // this later
   $input = array_merge($HTTP_GET_VARS, $HTTP_POST_VARS, 
$HTTP_COOKIE_VARS, $HTTP_SERVER_VARS, 
$HTTP_SESSION_VARS, $HTTP_ENV_VARS, 
$HTTP_POST_FILES);

   unset($input['input']);
   unset($input['not_unset']);

   while (list($var,) = @each($input))
   {
  if (!in_array($var, $not_unset))
  {
 unset($$var);
  }
   }
   
   unset($input);
   

   Bypass Vulnerabilities
   --
   
   [1] In PHP5 = 5.0.5 it is possible to register f.e. the global
   variable $foobar by supplying a GET/POST/COOKIE variable 
   with the name 'foobar' but also by supplying a GPC variable
   called 'GLOBALS[foobar]'. If the variable is supplied in
   that way, the code above will not try to unset $foobar, but
   $GLOBALS, which completely bypasses the protection.
   
   [2] When the session extension is not started by a call to 
   session_start(), PHP does not know about the variables
   $_SESSION or $HTTP_SESSION_VARS, which means, it is possible
   to fill them with any value if register_globals is turned on.
   Combined with the fact (that was even documented in the phpBB
   code), that array_merge() will fail in PHP5, when at least 
   one of the parameters is not an array, it is possible for an
   attacker to simply set HTTP_SESSION_VARS to a string and let
   the complete protection fail, because $input ends up empty.
   
   [3] When register_long_array is turned off PHP does not know
   anymore about all the HTTP_* variables. This means they can 
   be filled with anything that is completely unrelated to the
   existing global variables. It is obvious that the protection
   cannot work, when this configuration is choosen.
   
   Additonally to the 3 possible ways to bypass the globals
   deregistration code, several not properly initalised variables
   were disclosed to the vendor, that can even lead to remote code
   execution. 
   
   Not properly initialised variables
   --
   
   [1] Within usercp_register.php the variable 'error_msg' is not 
   properly initialised and can therefore be used to inject 
   arbitrary HTML code
   
  

Re: [Full-disclosure] Funny smtp helo in the logs

2005-10-30 Thread Valdis . Kletnieks
On Sun, 30 Oct 2005 12:39:52 +0530, Aditya Deshmukh said:

 124 09/10/2005 09:54:35 HELO -1209283632  ---  250 my.smtp.domain.server  

I'm not sure which is sadder, that the spamware is totally untested and buggy,
or that so many sites will accept this syntactically invalid HELO command that
the spammers weren't forced to fix their code.

And yes, it looks like somebody did an 'sprintf(HELO %d,my_ip_addr);'
without bothering to check what that produced


pgpSEEesseeZE.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Funny smtp helo in the logs

2005-10-30 Thread Bill Weiss
Aditya Deshmukh([EMAIL PROTECTED])@Sun, Oct 30, 2005 at 12:39:52PM +0530:
 I have been seeing this in my logs over all the public smtp server, from
 all over the net. 
 
 Anyone know what sends these kinds of helo ?

My server gets those as well.  I think it's just some broken spam-ware.

-- 
Bill Weiss
 
How To Write Good
 14. Don't be redundant; don't use more words than necessary; it's
highly superfluous.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/