Re: [Full-disclosure] Wikipedia and Pedophilia

2007-01-20 Thread Timo Schoeler
In epistula a V Vendetta [EMAIL PROTECTED] die horaque Fri, 19
Jan 2007 13:29:53 -0800 (PST):

 Full Dislosure: Wikipedia  
 
(...)
 
 Also, I apologize for my english - as it is only my second language.
 
 The Wikipedia ideology is like communism - all the people working
 together in harmony - it sounds like... Peace.  It's idealism at its
 highest level.
 

no, the wikipedia ideology is NOT like communism. i even doubt they
have something like an ideology.

however, you should also apologize for your ranting about something
(communism) you don't even know the basics of (i.e., it's definition).

your superior system of capitalism destroys the planet for long time
now. at least, we're getting at an end as climate change (carbon
dioxide, methan, etc.) leads to mass extinctions within the next two
decades (at a maxmimum) due to 'the weather being reconfigured around
the planet'.

so in future those who cause this won't be able to satisfy their needs
on burgers, hot dogs etc., thus not being able to drive their SUVs.
nature will win :)

most interesting, alas Cuba is on its way to communism (no, it is no
communism there, this is socialism, the first step to) is the only
country with sustainable development (*although* the US put an embargo
on them *decades* ago):

http://www.panda.org/news_facts/publications/key_publications/living_planet_report/index.cfm

capitalism is about exponential, endless growth; the physician will say
that this is not possible because the universe is not endless. the
doctor will tell you that the only thing that achieves this is:
cancer. (which, as capitalism, is its own murderer :)


(...)
 
 V

haef phun,

t. - at least anticapitalist and still waiting for a _single_
democracy that works as the definition says.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [RISE-2007001] Apple Mac OS X 10.4.x kernel shared_region_map_file_np() memory corruption vulnerability

2007-01-20 Thread RISE Security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

RISE-2007001
Apple Mac OS X 10.4.x kernel shared_region_map_file_np() memory corruption
vulnerability

Released: January 19, 2007
Last updated: January 19, 2007

INTRODUCTION

There exists a vulnerability within a function of the Apple Mac OS X 10.4.x
kernel (Apple Mac OS X 1.4.8 and lower), which when properly exploited
can lead
to local compromise of the vulnerable system.
This vulnerability was confirmed by us in the up-to-date Apple Mac OS X
1.4.8
(8L2127).

DETAILS

The kernel provides a mechanism for system-wide memory sharing, the Shared
Memory Server subsystem. Using this facility, both the kernel and user
programs
can share code and data among all tasks on the system. It is also
possible to
give one or more tasks private versions of the shared memory.

shared_region_map_file_np() is used by dyld to map parts of a split-segment
library in the global shared read-only and read-write regions. dyld
parses the
load commands in the library file and prepares an array of shared region
mapping
structures, each of which specifies the address, size, and protection
values of
a single mapping. It passes this array along with an open file
descriptor for
the library to shared_region_map_file_np(), which attempts to establish
each of
the requested mappings. shared_region_map_file_np() also takes as an
argument a
pointer to an address variable: If the pointer is non-NULL and the requested
mappings cannot fit in the target address space as desired, the kernel will
attempt to slide (move around) the mappings to make them fit. The resultant
slide value is returned in the address variable. If the pointer is NULL
instead,
the call returns an error without attempting to slide.

This vulnerability can be triggered by calling the
shared_region_map_file_np()
system call with a high mapping_count value, which due to lack of bounds
checking will result in the consumption of all available operating system
resources.
This is part of the vulnerable function from Apple Mac OS X 1.4.8.

/*
 * Get the list of mappings the caller wants us to establish.
 */
mapping_count = uap-mappingCount; /* the number of mappings */
mappings_size = (vm_size_t) (mapping_count * sizeof (mappings[0]));
if (mapping_count == 0) {
SHARED_REGION_TRACE(
SHARED_REGION_TRACE_INFO,
(shared_region: %p [%d(%s)] map_file(%p:'%s'): 
 no mappings\n,
 current_thread(), p-p_pid, p-p_comm,
 vp, vp-v_name));
error = 0;  /* no mappings: we're done ! */
goto done;
} else if (mapping_count = SFM_MAX_STACK) {
mappings = stack_mappings[0];
} else {
if ((mach_vm_size_t) mappings_size !=
(mach_vm_size_t) mapping_count * sizeof (mappings[0])) {
/* 32-bit integer overflow */
error = EINVAL;
goto done;
}
kr = kmem_alloc(kernel_map,
(vm_offset_t *) mappings,
mappings_size);

A little proof of concept code that triggers this vulnerability can be found
in appendix section of this document.

VENDOR

Vendor was notified, as this is not a critical vulnerability, proper
corrections
should be available soon.

CREDITS

This vulnerability was discovered by Adriano Lima
[EMAIL PROTECTED].

REFERENCES

[1] Mac OS X Internals: A Systems Approach By Amit Singh

DISCLAIMER

The authors reserve the right not to be responsible for the topicality,
correctness, completeness or quality of the information provided in this
document. Liability claims regarding damage caused by the use of any
information
provided, including any kind of information which is incomplete or
incorrect,
will therefore be rejected.

APPENDIX

osx-x86-shared.c

#include stdio.h
#include stdlib.h
#include fcntl.h
#include sys/syscall.h
#include unistd.h

int main(int argc,char **argv){
int fd;

if((fd=open(/usr/lib/libSystem.dylib,O_RDONLY))==-1){
perror(open);
exit(EXIT_FAILURE);
}

if(syscall(SYS_shared_region_map_file_np,fd,0x0200,NULL,NULL)==-1){
perror(shared_region_map_file_np);
exit(EXIT_FAILURE);
}

exit(EXIT_FAILURE);
}


$Id: RISE-2007001.txt 3 2007-01-19 23:07:37Z ramon $


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFFsVQrhFjK78TGSUERAgE+AKCAdZW2G8SIINp9xIZ6bbMsRMvi1QCfamDW
nZPrfyrojGHTZGIOvFJ8z1g=
=3RY9
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] iDefense Q-1 2007 Challenge -I WILL BUY FOR MORE

2007-01-20 Thread Mario D
So,

Let's say I know how to bypass the alarm to your house.  Should I put it up for 
sale and not worry about who buys it or why because it is none of my business?

Its people like you who give the security profession a bad name.

Mario


- Original Message 
From: Simon Smith [EMAIL PROTECTED]
To: Roman Medina-Heigl Hernandez [EMAIL PROTECTED]; Untitled 
full-disclosure@lists.grok.org.uk
Cc: bugtraq@securityfocus.com
Sent: Thursday, January 18, 2007 2:27:06 PM
Subject: Re: [Full-disclosure] iDefense Q-1 2007 Challenge -I WILL BUY FOR MORE


Oh, 
About your ROI question, that varies per buyer. I am not usually told
about why a buyer needs something as that's none of my business.

On 1/18/07 4:22 AM, Roman Medina-Heigl Hernandez [EMAIL PROTECTED]
wrote:

 Simon Smith escribió:
 Amen!
 KF is 100% on the money. I can arrange the legitimate purchase of most
 working exploits for significantly more money than iDefense, In some cases
 over $75,000.00 per purchase. The company that I am working with has a
 relationship with a legitimate buyer, all transactions are legal. If you're
 
 naive
 
 I was wondering which kind of (legal) enterprises/organizations would pay
 $75000 for a simple (or not so simple) exploit.
 - governmental organizations (defense? DoD? FBI? ...)
 - firms offering high-profiled pen-testing services?
 - ... ?
 
 What about the ROI for such investment?
 
 /naive
 
 Regards,
 -Roman
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 

Do you Yahoo!?
Everyone is raving about the all-new Yahoo! Mail beta.
http://new.mail.yahoo.com___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Atom Database

2007-01-20 Thread pdp (architect)
The purpose of this database is to collect and discuss useful attack
snippets (atoms) which can be employed when performing WEB Application
Security testing.

http://www.gnucitizen.org/topics/atom-database

-- 
pdp (architect) | petko d. petkov
http://www.gnucitizen.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] iDefense Q-1 2007 Challenge -I WILL BUY FOR MORE

2007-01-20 Thread Simon Smith
Mario, 
What Netragard is doing is in fact not nearly as naive as what you are
proposing.  In fact, what Netragard is doing will most probably help ³alarm
companies² in the future.

On 1/20/07 7:10 AM, Mario D [EMAIL PROTECTED] wrote:

 So,
  
 Let's say I know how to bypass the alarm to your house.  Should I put it up
 for sale and not worry about who buys it or why because it is none of my
 business?
  
 Its people like you who give the security profession a bad name.
  
 Mario
 
 - Original Message 
 From: Simon Smith [EMAIL PROTECTED]
 To: Roman Medina-Heigl Hernandez [EMAIL PROTECTED]; Untitled
 full-disclosure@lists.grok.org.uk
 Cc: bugtraq@securityfocus.com
 Sent: Thursday, January 18, 2007 2:27:06 PM
 Subject: Re: [Full-disclosure] iDefense Q-1 2007 Challenge -I WILL BUY FOR
 MORE
 
 Oh, 
 About your ROI question, that varies per buyer. I am not usually told
 about why a buyer needs something as that's none of my business.
 
 On 1/18/07 4:22 AM, Roman Medina-Heigl Hernandez [EMAIL PROTECTED]
 wrote:
 
  Simon Smith escribió:
  Amen!
  KF is 100% on the money. I can arrange the legitimate purchase of 
most
  working exploits for significantly more money than iDefense, In some
 cases
  over $75,000.00 per purchase. The company that I am working with has a
  relationship with a legitimate buyer, all transactions are legal. If
 you're
  
  naive
  
  I was wondering which kind of (legal) enterprises/organizations would pay
  $75000 for a simple (or not so simple) exploit.
  - governmental organizations (defense? DoD? FBI? ...)
  - firms offering high-profiled pen-testing services?
  - ... ?
  
  What about the ROI for such investment?
  
  /naive
  
  Regards,
  -Roman
  
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
 Everyone is raving about the all-new Yahoo! Mail beta.
 http://us.rd.yahoo.com/evt=45083/*http://advision.webevents.yahoo.com/mailbet
 a 


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Wikipedia and Pedophilia

2007-01-20 Thread v3dt3n

Full Dislosure: Wikipedia

Voil?! In view, a humble vaudevillian veteran, cast vicariously as both
victim and villain by the vicissitudes of Fate. This visage, no mere veneer
of vanity, is a vestige of the vox populi, now vacant, vanished. However,
this valorous visitation of a by-gone vexation, stands vivified and has
vowed to vanquish these venal and virulent vermin van-guarding vice and
vouchsafing the violently vicious and voracious violation of volition. 



Whoa!
[EMAIL PROTECTED] wuz c0ll  !



Also, I apologize for my english - as it is only my second language.



No way dude! Wonder what great literary achievements the world will
never set their eyes upon.

V


This sig, dear sir, is _PURE_ genius.

-v3dt3n (Of course, this is no match to your immensely witty alternative)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Multiple OS kernel insecure handling of stdio file descriptor

2007-01-20 Thread eugeny gladkih
 SP == Shiva Persaud [EMAIL PROTECTED] writes:

  XFOCUS team (http://www.xfocus.org/)  had discovered Multiple OS kernel
  insecure handling of stdio file descriptor.
  
  ===
  Affected OS Version
  
  AIX 5.3

 SP The AIX Security Team can be reached at [EMAIL PROTECTED]

 SP We have investigated this issue and AIX is not affected. A privileged
 SP process will not inherit closed file descriptors for stdio, stdout and
 SP stderr.

well, but what is used for stdout if it's closed in the parent
process just before fork(2) call?!

-- 
Yours sincerely, Eugeny.
Doctor Web, Ltd. http://www.drweb.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] code release: cryptographic attack tool

2007-01-20 Thread Pavel Kankovsky
On Sun, 14 Jan 2007, Neil Kettle wrote:

 Solving the resultant formula, and hence *breaking* MD5 (computing
 collisions, invariant IV's [which has already been done by similar
 techniques], etc..) is equivalent to SAT, and thus NP-Complete
 requiring exponential time by conjecture.

It is obvious the problem (cracking MD5) can be reduced to SAT. But can
you reduce SAT to the problem? I am afraid it is impossible. (CNF formulas
of arbitrary complexity vs. a linear chain of fixed width linking multiple 
instances of a fixed logical circuit. Who wins?)

--Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
Resistance is futile. Open your source code and prepare for assimilation.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Multiple OS kernel insecure handling of stdio file descriptor

2007-01-20 Thread Michele Cicciotti
  SP The AIX Security Team can be reached at [EMAIL PROTECTED]
  SP We have investigated this issue and AIX is not affected. A privileged
  SP process will not inherit closed file descriptors for stdio, stdout and
  SP stderr.
 well, but what is used for stdout if it's closed in the parent
 process just before fork(2) call?!

I don't know what's the case for AIX, but the typical fix for this 
vulnerability is to reopen stdout and stderr to /dev/null for setuid processes

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Major gcc 4.1.1 and up security issue

2007-01-20 Thread Pavel Kankovsky
On Mon, 15 Jan 2007, Felix von Leitner wrote:

   int foo(int a) {
 assert((int)(a+100)  0);
 printf(%d %d\n,a+100,a);
 return a;
   }

The assert() here is quite different from the code you published on the 
web where the condition reads (a+100  a).

 Now you might think that it's just assert, we use if and we are safe.
 No, assert() is just a macro that turns into if.  The whole assert code
 gets removed here, you won't see a trace of the whole overflow check in
 the disassembly.

Let's have a look at the code with ((int)(a+100)  0) because it will 
provide a better insight into the problem.

Here is the i386 machine code produced by GCC 4.1.1 without any options:

080483d4 foo:
 80483d4:   55  push   %ebp
 80483d5:   89 e5   mov%esp,%ebp
 80483d7:   83 ec 18sub$0x18,%esp
 80483da:   83 7d 08 9c cmpl   $0xff9c,0x8(%ebp)  (1)
 80483de:   7f 24   jg 8048404 foo+0x30 (2)
 80483e0:   c7 44 24 0c 08 85 04movl   $0x8048508,0xc(%esp)   (3)
 80483e7:   08 
 80483e8:   c7 44 24 08 05 00 00movl   $0x5,0x8(%esp)
 80483ef:   00 
 80483f0:   c7 44 24 04 0c 85 04movl   $0x804850c,0x4(%esp)
 80483f7:   08 
 80483f8:   c7 04 24 10 85 04 08movl   $0x8048510,(%esp)
 80483ff:   e8 f0 fe ff ff  call   80482f4 [EMAIL PROTECTED]
 8048404:   8b 55 08mov0x8(%ebp),%edx (4)
 8048407:   83 c2 64add$0x64,%edx
 804840a:   8b 45 08mov0x8(%ebp),%eax
 804840d:   89 44 24 08 mov%eax,0x8(%esp)
 8048411:   89 54 24 04 mov%edx,0x4(%esp)
 8048415:   c7 04 24 21 85 04 08movl   $0x8048521,(%esp)
 804841c:   e8 f3 fe ff ff  call   8048314 [EMAIL PROTECTED]
 8048421:   8b 45 08mov0x8(%ebp),%eax
 8048424:   c9  leave  
 8048425:   c3  ret

Instructions marked with (1) and (2) implement the conditional branching.
Instructions starting at (3) call __assert_fail().
This is the assert().

The check is interesting. It does not look as the original condition,
ie. ((int)(a+100)  0) at the first glance. Let's examine it:

- (1) compares the value of a with 0xff9c = -100
- (2) jumps to (4) if the value of a was greater than -100

In other words, the compiler subtracted 100 from both sides of 
the comparison and translated it into (a  -100).

This optimization (*) is ok as long as no overflow occurs during the
evaluation of the original condition. It modifies its semantics when 
integer overflows are involved but this is acceptable because the result 
of an overflowing arithmetic operation on signed integers is undefined.

A program expecting (a+100) = 0 when a is signed int and a = INT_MAX-100 
is and has always been broken.

 I opened a gcc bug for this.  They told me that the C standard says
 integer overflow for signed integers in undefined and therefore gcc is
 right in doing this.

Let's return to assert(a+100  a). Now it is obvious what happened:
the compiler subtracted a from both sides of the comparison and got
100  0. This condition is always true therefore it optimized the
assert() away (**).

Again, the program is and has always broken because it relies on
undefined behaviour.


(*) It is somewhat odd the compiler does it without any -On option 
for n  0. It is probably considered to be a kind of constant folding.

(**) We can see dead code elimination is another kind of optimization GCC 
performs without asking.


 I'm saying this will break tons of security checks in existing
 applications and will get people to get 0wned.  Please help make the gcc
 people fix this!

Helping people fix their broken code and teach them how to write 
correct code might be more productive imho. :P


--Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
Resistance is futile. Open your source code and prepare for assimilation.










___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/