[Full-disclosure] CVSTrac 2.0.0 Denial of Service (DoS) vulnerability

2007-01-29 Thread Ralf S. Engelschall
SECURITY ADVISORY
=

Application:CVSTrac
Version:2.0.0
Vulnerability:  Denial of Service (DoS)
Identification: CVE-2007-0347
Date:   2007-01-29 12:00 UTC

DESCRIPTION
---

A Denial of Service (DoS) vulnerability exists in CVSTrac
(http://www.cvstrac.org/) version 2.0.0, a web-based bug and patch-set
tracking system for the version control systems CVS, Subversion and Git.

The vulnerability is in the Wiki-style text output formatter and is
triggered by special text constructs in commit messages, tickets and
Wiki pages. Only users with check-in permissions and Wiki or ticket edit
permissions can perform an attack. But as the anonymous user usually
is granted Wiki edit and ticket creation permissions, an attacker
remotely and anonymously can cause a partial DoS (depending on the pages
requested) on a CVSTrac installation by opening a new ticket or editing
a Wiki page with an arbitrary text containing for instance the string
/foo/bar'quux.

The result of an attack is an error of the underlying SQLite RDBMS:

| Database Error
| db_exists: Database exists query failed
| SELECT filename FROM filechng WHERE filename='foo/bar'quux'
| Reason: near quux: syntax error

ANALYSIS


The DoS vulnerability exists because the is_eow() function in format.c
does NOT just check the first(!) character of the supplied string
for an End-Of-Word terminating character, but instead iterates over
string and this way can skip a single embedded quotation mark. The
is_repository_file() function then in turn assumes that the filename
string can never contain a single quotation mark and traps into an SQL
escaping problem.

An SQL injection via this technique is somewhat limited as is_eow()
bails on whitespace. So while one _can_ do an SQL injection, one is
limited to SQL queries containing only characters which get past the
function isspace(3). This effectively limits attacks to SQL commands
like VACUUM.

WORKAROUND
--

Administrators can quickly workaround by revoking permissions on the
users. Restoring those permissions, obviously, would require keeping
vulnerable permissions on at least one infrequently used account like
setup or using the CLI sqlite3(1) to manually add them back later.

One can resurrect an attacked CVSTrac 2.0.0 by fixing the texts in the
underlying SQLite database with the following small Perl script.

##
##  cvstrack-resurrect.pl -- CVSTrac Post-Attack Database Resurrection
##  Copyright (c) 2007 Ralf S. Engelschall [EMAIL PROTECTED]
##

use DBI;   # requires OpenPKG perl-dbi
use DBD::SQLite;   # requires OpenPKG perl-dbi, perl-dbi::with_dbd_sqlite=yes
use DBIx::Simple;  # requires OpenPKG perl-dbix
use Date::Format;  # requires OpenPKG perl-time

my $db_file = $ARGV[0];

my $db = DBIx::Simple-connect(
dbi:SQLite:dbname=$db_file, , ,
{ RaiseError = 0, AutoCommit = 0 }
);

my $eow = q{\x00\s.,:;?!)'};

sub fixup {
my ($data) = @_;
if ($$data =~ m:/[^$eow]*/[^$eow]*'[^$eow]+:s) {
$$data =~ s:(/[^$eow]*/[^$eow]*)('[^$eow]+):$1 $2:sg;
return 1;
}
return 0;
}

foreach my $rec ($db-query(SELECT name, invtime, text FROM wiki)-hashes()) {
if (fixup(\$rec-{text})) {
printf(++ adjusting Wiki page \%s\ as of %s\n,
$rec-{name}, time2str(%Y-%m-%d %H:%M:%S, -$rec-{invtime}));
$db-query(UPDATE wiki SET text = ? WHERE name = ? AND invtime = ?,
$rec-{text}, $rec-{name}, $rec-{invtime});
}
}
foreach my $rec ($db-query(SELECT tn, description, remarks FROM 
ticket)-hashes()) {
if (fixup(\$rec-{description}) or fixup(\$rec-{remarks})) {
printf(++ adjusting ticket #%d\n,
$rec-{tn});
$db-query(UPDATE ticket SET description = ?, remarks = ? WHERE tn = 
?,
$rec-{description}, $rec-{remarks}, $rec-{tn});
}
}
foreach my $rec ($db-query(SELECT tn, chngtime, oldval, newval FROM 
tktchng)-hashes()) {
if (fixup(\$rec-{oldval}) or fixup(\$rec-{newval})) {
printf(++ adjusting ticket [%d] change as of %s\n,
$rec-{tn}, time2str(%Y-%m-%d %H:%M:%S, $rec-{chngtime}));
$db-query(UPDATE tktchng SET oldval = ?, newval = ? WHERE tn = ? AND 
chngtime = ?,
$rec-{oldval}, $rec-{newval}, $rec-{tn}, 
$rec-{chngtime});
}
}
foreach my $rec ($db-query(SELECT cn, message FROM chng)-hashes()) {
if (fixup(\$rec-{message})) {
printf(++ adjusting change [%d]\n,
$rec-{cn});
$db-query(UPDATE chng SET message = ? WHERE cn = ?,
$rec-{message}, $rec-{cn});
}
}

$db-commit();
$db-disconnect();

RESOLUTION
--

Upgrade to the now available CVSTrac 2.0.1:
http://www.cvstrac.org/cvstrac-2.0.1.tar.gz

Or apply the following upstream vendor patch against CVSTrac 2.0.0:
http://www.cvstrac.org/cvstrac/chngview?cn=852

Index: cvstrac/format.c
--- format.c2006/07/05 01:06:50 1.87
+++ format.c2006/08/16 23:02:14 1.88
@@ -77,6 +77,8 @@
 ** Return TRUE if *z points 

[Full-disclosure] [OpenPKG-SA-2007.008] OpenPKG Security Advisory (cvstrac)

2007-01-29 Thread OpenPKG GmbH
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



Publisher Name:  OpenPKG GmbH
Publisher Home:  http://openpkg.com/

Advisory Id (public):OpenPKG-SA-2007.008
Advisory Type:   OpenPKG Security Advisory (SA)
Advisory Directory:  http://openpkg.com/go/OpenPKG-SA
Advisory Document:   http://openpkg.com/go/OpenPKG-SA-2007.008
Advisory Published:  2007-01-29 14:02 UTC

Issue Id (internal): OpenPKG-SI-20070117.01
Issue First Created: 2007-01-17
Issue Last Modified: 2007-01-29
Issue Revision:  08


Subject Name:cvstrac
Subject Summary: VCS web frontend
Subject Home:http://www.cvstrac.org/
Subject Versions:* = 2.0.0

Vulnerability Id:CVE-2007-0347
Vulnerability Scope: global (not OpenPKG specific)

Attack Feasibility:  run-time
Attack Vector:   remote network
Attack Impact:   denial of service

Description:
Ralf S. Engelschall from OpenPKG GmbH discovered a Denial of Service
(DoS) vulnerability in the CVS/Subversion/Git Version Control System
(VCS) frontend CVSTrac [0], version 2.0.0.

The vulnerability is in the Wiki-style text output formatter and is
triggered by special text constructs in commit messages, tickets and
Wiki pages. Only users with check-in permissions and Wiki or ticket
edit permissions can perform an attack. But as the anonymous user
usually is granted Wiki edit and ticket creation permissions, an
attacker remotely and anonymously can cause a partial DoS (depending
on the pages requested) on a CVSTrac installation by opening a new
ticket or editing a Wiki page with an arbitrary text containing for
instance the string /foo/bar'quux.

The DoS vulnerability exists because the is_eow() function in
format.c does NOT just check the FIRST character of the supplied
string for an End-Of-Word terminating character, but instead
iterates over string and this way can skip a single embedded
quotation mark. The is_repository_file() function then in turn
assumes that the filename string can never contain a single
quotation mark and traps into an SQL escaping problem.

An SQL injection via this technique is somewhat limited as is_eow()
bails on whitespace. So while one _can_ do an SQL injection, one is
limited to SQL queries containing only characters which get past the
function isspace(3). This effectively limits attacks to SQL commands
like VACUUM.

Administrators can quickly workaround by revoking permissions on the
users. Restoring those permissions, obviously, would require keeping
vulnerable permissions on at least one infrequently used account
like setup or using the CLI sqlite3(1) to manually add them back
later.

References:
[0] http://www.cvstrac.org/


Primary Package Name:cvstrac
Primary Package Home:http://openpkg.org/go/package/cvstrac

Corrected Distribution:  Corrected Branch: Corrected Package:
OpenPKG Enterprise   E1.0-SOLIDcvstrac-2.0.0-E1.0.2


For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document.


-BEGIN PGP SIGNATURE-
Comment: OpenPKG GmbH http://openpkg.com/

iD8DBQFFvfCEZwQuyWG3rjQRApMLAJ0Q/mkpIIar3VjFoMVay7b70i5DIwCfX8lJ
6ITu0bSW6c3RR9sQ6q6cIpQ=
=kxz6
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Oracle - Indirect Privilege Escalation and Defeating Virtual Private Databases

2007-01-29 Thread David Litchfield
Hey all,
For anyone that's interested I've just put out two papers (chapters really); 
one on Indirect Privilege Escalation in Oracle and the other on Defeating 
Virtual Private Databases in Oracle. You can grab them here.
http://www.databasesecurity.com/dbsec/ohh-indirect-privilege-escalation.pdf
http://www.databasesecurity.com/dbsec/ohh-defeating-vpd.pdf
Cheers,
David

--
E-MAIL DISCLAIMER

The information contained in this email and any subsequent
correspondence is private, is solely for the intended recipient(s) and
may contain confidential or privileged information. For those other than
the intended recipient(s), any disclosure, copying, distribution, or any
other action taken, or omitted to be taken, in reliance on such
information is prohibited and may be unlawful. If you are not the
intended recipient and have received this message in error, please
inform the sender and delete this mail and any attachments.

The views expressed in this email do not necessarily reflect NGS policy.
NGS accepts no liability or responsibility for any onward transmission
or use of emails and attachments having left the NGS domain.

NGS and NGSSoftware are trading names of Next Generation Security
Software Ltd. Registered office address: 52 Throwley Way, Sutton, SM1
4BF with Company Number 04225835 and VAT Number 783096402

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Phishing Evolution Report Released

2007-01-29 Thread Sûnnet Beskerming
Hello List(s),

For those interested in the original FD email about a new phishing  
technique being employed on a professional networking site (late last  
week), the investigation and subsequent report have been published.   
Readers of 'The Register' will note a write up already in place with  
some feedback from the site involved.  Although the claim of 10 or so  
reports per month of similar scams being made are probable, I doubt  
that many (if any) have taken as much detailed involvement from the  
scammer before the phish is set.

http://www.theregister.co.uk/2007/01/29/ecademy_419_scam/

You can find the report at the following address:

http://www.beskerming.com/marketing/reports/index.html

Or, for the direct link:

http://www.beskerming.com/marketing/reports/ 
Beskerming_Phishing_Report_Jan_07.pdf

A higher detailed version is available upon request, which includes  
sufficient detail in the account screenshots for the profile text to  
be legible.

An Executive Summary for those who don't want to read the report:

  - Yes, it was a scam.  The scammer started out with a stolen  
identity, maintaining it all the way through the scam (even when  
confronted)
  - Ultimately it was a 419-style phish / scam that was traced back  
to Nigeria
  - The first recorded use of the particular stolen identity was  
November 06, with a very similar scam (though a more traditional mass  
spam email).
  - The scammer invested at least 2-3 days of communication and trust- 
building before beginning to seed the phish / scam
  - The initial round of the phish bait was mild enough to almost be  
missed.
  - The Networking site was VERY prompt in addressing the situation  
once notified (less than 5 minutes to remove the account when it  
reappeared and they were notified again).  Props to Ecademy in this  
case.
  - Sometimes you just need to be paranoid.

Any questions or queries, just ask them.

Carl

Sûnnet Beskerming Pty. Ltd.
Adelaide, Australia
http://www.beskerming.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Universal printer provider exploit for Windows

2007-01-29 Thread Andres Tarasco

We have developed a new exploit that should allow code execution as SYSTEM
with the following software:

- DiskAccess NFS Client (dapcnfsd.dll v0.6.4.0) - REPORTED  NOTFIXED
-0day!!!
- Citrix Metaframe - cpprov.dll - FIXED
- Novell (nwspool.dll - CVE-2006-5854 - untested. pls give feedback)
More information at :
http://www.514.es/2007/01/universal_exploit_for_vulnerab.html (spanish)
exploit code:
http://www.514.es/2007/01/29/Universal_printer_provider_exploit.zip

/*
Title: Universal exploit for vulnerable printer providers (spooler service).
Vulnerability: Insecure EnumPrintersW() calls
Author: Andres Tarasco Acuña - [EMAIL PROTECTED]
Website: http://www.514.es


This code should allow to gain SYSTEM privileges with the following
software:
blink !blink! blink!

- DiskAccess NFS Client (dapcnfsd.dll v0.6.4.0) - REPORTED  NOTFIXED
-0day!!!
- Citrix Metaframe - cpprov.dll  - FIXED
- Novell (nwspool.dll  - CVE-2006-5854 - untested)
- More undisclosed stuff =)

 If this code crashes your spooler service (spoolsv.exe) check your
 vulnerable printer providers at:
 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers

 Workaround: Trust only default printer providers Internet Print Provider

 and LanMan Print Services and delete the other ones.

 And remember, if it doesnt work for you, tweak it yourself. Do not ask


 D:\Programación\EnumPrinters\Exploitstestlpc.exe
[+] Citrix Presentation Server - EnumPrinterW() Universal exploit
[+] Exploit coded by Andres Tarasco - [EMAIL PROTECTED]


[+] Connecting to spooler LCP port \RPC Control\spoolss
[+] Trying to locate valid address (1 tries)
[+] Mapped memory. Client address: 0x003d
[+] Mapped memory. Server address: 0x00a7
[+] Targeting return address to  : 0x00A700A7
[+] Writting to shared memory...
[+] Written 0x1000 bytes
[+] Exploiting vulnerability
[+] Exploit complete. Now Connect to 127.0.0.1:51477


D:\Programación\EnumPrintersnc localhost 51477
Microsoft Windows XP [Versión 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\WINDOWS\system32whoami
NT AUTHORITY\SYSTEM

regards,

Andres Tarasco
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [DRUPAL-SA-2007-005] Drupal 4.7.6 / 5.1 fixes arbitrary code execution issue

2007-01-29 Thread Uwe Hermann

Drupal security advisory  DRUPAL-SA-2007-005

Project:  Drupal core
Version:  4.7.x, 5.x
Date: 2007-Jan-29 
Security risk:Highy critical
Exploitable from: Remote
Vulnerability:Arbitrary code execution

 
Description
---
Previews on comments were not passed through normal form validation routines,
enabling users with the 'post comments' permission and access to more than
one input filter to execute arbitrary code. By default, anonymous and
authenticated users have access to only one input format.

Immediate workarounds include: disabling the comment module, revoking the
'post comments' permission for all users or limiting access to one input
format.
 
Versions affected
-
- Drupal 4.7.x versions before Drupal 4.7.6
- Drupal 5.x versions before Drupal 5.1

Solution

- If you are running Drupal 4.7.x then upgrade to Drupal 4.7.6.
   http://ftp.osuosl.org/pub/drupal/files/projects/drupal-4.7.6.tar.gz
- If you are running Drupal 5.x then upgrade to Drupal 5.1.
   http://ftp.osuosl.org/pub/drupal/files/projects/drupal-5.1.tar.gz

- To patch Drupal 4.7.5 use 
http://drupal.org/files/sa-2007-005/SA-2007-005-4.7.5.patch.
- To patch Drupal 5.0 use 
http://drupal.org/files/sa-2007-005/SA-2007-005-5.0.patch.

Please note that the patches only contain changes related to this advisory,
and do not fix bugs that were solved in 4.7.6 or 5.1.

Reported by
---
The Drupal security team.

Contact
---
The security contact for Drupal can be reached at security at drupal.org
or using the form at http://drupal.org/contact.


// Uwe Hermann, on behalf of the Drupal Security Team.
-- 
http://www.hermann-uwe.de  | http://www.holsham-traders.de
http://www.crazy-hacks.org | http://www.unmaintained-free-software.org


signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] PC/Laptop microphones

2007-01-29 Thread Jim Popovitch
I started this discussion elsewhere, but I feel that there is more
experience and concern here.   When I look at BIOS settings I see config
options to disable sound cards, USB, CDROM, INTs, etc., but what about
the PC or laptop microphone?  Does disabling the sound card remove the
availability of a built-in microphone? What if I want to play mp3s but
never have the need to use a microphone? Given recent info about the US
FBIs capabilities to remotely enable mobile phone microphones
(presumably via corporate cellular service providers), what prevents my
OS provider (or distribution) and ISP from working on a way to listen in
on my office or home conversations via the microphone or the built-in
speakers?  Thoughts?

-Jim P.


signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] PC/Laptop microphones

2007-01-29 Thread Tyop?
On 1/30/07, Jim Popovitch [EMAIL PROTECTED] wrote:
 Given recent info about the US
 FBIs capabilities to remotely enable mobile phone microphones
 (presumably via corporate cellular service providers),

Do you have some links on that?
Paranoia inside :p

-- 
Tyop?
Etudiant.
http://altmylife.blogspot.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] PC/Laptop microphones

2007-01-29 Thread Simon Smith
Jim, 
In all reality you don't have to be an agent  to do this. You could just
write an exploit that when successfully executed would compromise the target
and then fetch an application from a remote site. I'm sure that things like
this have been done in the past. Hell imagine what you could do with a web
cam! ;]

New telephones are no different I'm sure.

On 1/29/07 9:26 PM, Jim Popovitch [EMAIL PROTECTED] wrote:

 I started this discussion elsewhere, but I feel that there is more
 experience and concern here.   When I look at BIOS settings I see config
 options to disable sound cards, USB, CDROM, INTs, etc., but what about
 the PC or laptop microphone?  Does disabling the sound card remove the
 availability of a built-in microphone? What if I want to play mp3s but
 never have the need to use a microphone? Given recent info about the US
 FBIs capabilities to remotely enable mobile phone microphones
 (presumably via corporate cellular service providers), what prevents my
 OS provider (or distribution) and ISP from working on a way to listen in
 on my office or home conversations via the microphone or the built-in
 speakers?  Thoughts?
 
 -Jim P.
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] PC/Laptop microphones

2007-01-29 Thread Clement Dupuis
This was discussed in the past.  It is one of the features within Core
Impact from Core Security.  Here is an old post on the subject:

 CORE IMPACT has a Python module (uses win32api)to do just that, it is
called
 Record audio file (there is also a play audio file and a grab 1 frame
 from Webcam)

 Basically, it uses the Windows MCI interface:

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/multimed/ht
m/_win32_about_mci.asp

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/multimed/ht
m/_win32_mci_reference.asp

 There is also a generic Execute MCI string that we commonly use to amuse
 ourselves by opening/closing the CD door remotely once we've gain access
to
 a target system running windows.

 It should not be difficult to write your own quickly with Python and the
 above reference from the MSDN


-Original Message-
From: Simon Smith [mailto:[EMAIL PROTECTED] 
Sent: Monday, January 29, 2007 10:02 PM
To: Jim Popovitch; Untitled
Subject: Re: [Full-disclosure] PC/Laptop microphones

Jim, 
In all reality you don't have to be an agent  to do this. You could just
write an exploit that when successfully executed would compromise the target
and then fetch an application from a remote site. I'm sure that things like
this have been done in the past. Hell imagine what you could do with a web
cam! ;]

New telephones are no different I'm sure.

On 1/29/07 9:26 PM, Jim Popovitch [EMAIL PROTECTED] wrote:

 I started this discussion elsewhere, but I feel that there is more
 experience and concern here.   When I look at BIOS settings I see config
 options to disable sound cards, USB, CDROM, INTs, etc., but what about
 the PC or laptop microphone?  Does disabling the sound card remove the
 availability of a built-in microphone? What if I want to play mp3s but
 never have the need to use a microphone? Given recent info about the US
 FBIs capabilities to remotely enable mobile phone microphones
 (presumably via corporate cellular service providers), what prevents my
 OS provider (or distribution) and ISP from working on a way to listen in
 on my office or home conversations via the microphone or the built-in
 speakers?  Thoughts?
 
 -Jim P.
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] S21sec-034-en: Cisco VTP DoS vulnerability

2007-01-29 Thread Clay Seaman-Kossmeyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hello -

Cisco has posted a Security Response in reference to this issue at the
following URL:

http://www.cisco.com/warp/public/707/cisco-sr-20070129-vtp.shtml

Cisco Response
==

An issue has been reported to the Cisco PSIRT involving malformed VLAN
Trunking Protocol (VTP) packets. This attack may cause the target
device to reload, causing a Denial of Service (DoS).

Such an attack must be executed on a local ethernet segment, and the
VTP domain name must be known to the attacker. Additionally, these
attacks must be executed against a switch port that is configured for
trunking. Non-trunk access ports are not affected.

This issue is tracked as Cisco Bug ID CSCsa67294.

Details
===

The VLAN Trunking Protocol (VTP) is a Layer 2 protocol that manages
the addition, deletion, and renaming of VLANS on a network-wide basis
in order to maintain VLAN configuration consistency.

VTP packets are exchanged by VLAN-aware switches. For more information
on VTP, consult the following link:

http://www.cisco.com/en/US/products/hw/switches/ps663/products_configuration_guide_chapter09186a00800e47e3.html.

Upon receiving a malformed VTP packet, certain devices may reload. The
attack could be executed repeatedly causing a extended Denial of
Service.

In order to successfully exploit this vulnerability, the attacker must
know the VTP domain name, as well as send the malformed VTP packet to
a port on the switch configured for trunking.

This does not affect switch ports that are configured for voice
vlans. A complete Inter-Switch Link (ISL) or 802.1q trunk port is
required for the device to be vulnerable.

These platforms are affected:

* Cisco 2900XL Series Switches
* Cisco 2950 Series Switches
* Cisco 2955 Series Switches
* Cisco 3500XL Series Switches
* Cisco 3550 Series Switches
* Cisco 3570 Series Switches

No other Cisco products are known to be vulnerable to this issue.

This issue was made public on 26-Jan-2007 on the Full-Disclosure and
Bugtraq mailing lists. The Cisco bug ID CSCsa67294 was made available
to registered customers in May of 2005.

We would like to thank David Barroso Berrueta and Alfredo Andres
Omella for reporting this vulnerability to us. You can find their
release here: http://www.s21sec.com/es/avisos/s21sec-034-en.txt.

We greatly appreciate the opportunity to work with researchers on
security vulnerabilities and welcome the opportunity to review and
assist in security vulnerability reports against Cisco products.

Workarounds
===

In order to mitigate your exposure, ensure that only known, trusted
devices are connected to ports configured for ISL or 802.1q trunking.

More information on securing L2 networks can be found in the Cisco
SAFE Layer 2 Security document at this location:

http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008014870f.shtml

Additional Information
==

THIS DOCUMENT IS PROVIDED ON AN AS IS BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

Revision History


+--+--++
| Revision 1.0 |  2007-January-29 | Initial public release |
+--+--++

Cisco Security Procedures
=

Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco
security notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.



On Fri, Jan 26, 2007 at 02:46:43PM -0500, S21sec Labs wrote:
 ###
 ID: S21SEC-034-en
 Title: Cisco VTP Denial Of Service
 Date: 26/01/2007
 Status: Vendor contacted, bug fixed
 Severity: Medium - DoS - remote from the local subnet
 Scope: Cisco Catalyst Switch denial of service
 Platforms: IOS
 Author: Alfredo Andres Omella, David Barroso Berrueta
 Location: http://www.s21sec.com/es/avisos/s21sec-034-en.txt
 Release: Public
 ###
 
   S 2 1 S E C
 
  http://www.s21sec.com
 
   Cisco VTP Denial Of Service
 
 
 About VTP
 -
 
 VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used for  
 VLAN centralized management.
 For instance, when you configure a VLAN in a switch, the VLAN

Re: [Full-disclosure] PC/Laptop microphones

2007-01-29 Thread Jim Popovitch
On Tue, 2007-01-30 at 03:52 +0100, Tyop? wrote:
 On 1/30/07, Jim Popovitch [EMAIL PROTECTED] wrote:
  Given recent info about the US
  FBIs capabilities to remotely enable mobile phone microphones
  (presumably via corporate cellular service providers),
 
 Do you have some links on that?
 Paranoia inside :p

;-) Paranoia is a good characteristic to have.

Here's a few references:
http://www.google.com/search?hl=enq=FBI+Mob+microphone



-Jim P.


signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] PC/Laptop microphones

2007-01-29 Thread Simon Smith
Who's paranoid, I'm not paranoid, stop talking about me!


On 1/29/07 11:13 PM, Jim Popovitch [EMAIL PROTECTED] wrote:

 On Tue, 2007-01-30 at 03:52 +0100, Tyop? wrote:
 On 1/30/07, Jim Popovitch [EMAIL PROTECTED] wrote:
 Given recent info about the US
 FBIs capabilities to remotely enable mobile phone microphones
 (presumably via corporate cellular service providers),
 
 Do you have some links on that?
 Paranoia inside :p
 
 ;-) Paranoia is a good characteristic to have.
 
 Here's a few references:
 http://www.google.com/search?hl=enq=FBI+Mob+microphone
 
 
 
 -Jim P.
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] S21sec-034-en: Cisco VTP DoS vulnerability

2007-01-29 Thread Clay Seaman-Kossmeyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hello -

Cisco's response follows for this issue:

Cisco Response
==

An issue has been reported to the Cisco PSIRT involving malformed VLAN
Trunking Protocol (VTP) packets. This attack may cause the target
device to reload, causing a Denial of Service (DoS).

Such an attack must be executed on a local ethernet segment, and the
VTP domain name must be known to the attacker. Additionally, these
attacks must be executed against a switch port that is configured for
trunking. Non-trunk access ports are not affected.

This issue is tracked as Cisco Bug ID CSCsa67294.

Details
===

The VLAN Trunking Protocol (VTP) is a Layer 2 protocol that manages
the addition, deletion, and renaming of VLANS on a network-wide basis
in order to maintain VLAN configuration consistency.

VTP packets are exchanged by VLAN-aware switches. For more information
on VTP, consult the following link:

http://www.cisco.com/en/US/products/hw/switches/ps663/products_configuration_guide_chapter09186a00800e47e3.html.

Upon receiving a malformed VTP packet, certain devices may reload. The
attack could be executed repeatedly causing a extended Denial of
Service.

In order to successfully exploit this vulnerability, the attacker must
know the VTP domain name, as well as send the malformed VTP packet to
a port on the switch configured for trunking.

This does not affect switch ports that are configured for voice
vlans. A complete Inter-Switch Link (ISL) or 802.1q trunk port is
required for the device to be vulnerable.

These platforms are affected:

* Cisco 2900XL Series Switches
* Cisco 2950 Series Switches
* Cisco 2955 Series Switches
* Cisco 3500XL Series Switches
* Cisco 3550 Series Switches
* Cisco 3570 Series Switches

No other Cisco products are known to be vulnerable to this issue.

This issue was made public on 26-Jan-2007 on the Full-Disclosure and
Bugtraq mailing lists. The Cisco bug ID CSCsa67294 was made available
to registered customers in May of 2005.

We would like to thank David Barroso Berrueta and Alfredo Andres
Omella for reporting this vulnerability to us. You can find their
release here: http://www.s21sec.com/es/avisos/s21sec-034-en.txt.

We greatly appreciate the opportunity to work with researchers on
security vulnerabilities and welcome the opportunity to review and
assist in security vulnerability reports against Cisco products.

Workarounds
===

In order to mitigate your exposure, ensure that only known, trusted
devices are connected to ports configured for ISL or 802.1q trunking.

More information on securing L2 networks can be found in the Cisco
SAFE Layer 2 Security document at this location:
http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008014870f.shtml

Additional Information
==

THIS DOCUMENT IS PROVIDED ON AN AS IS BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.

Revision History


+--+-++
| Revision 1.0 | 2007-January-29 | Initial public release |
+--+-++

Cisco Security Procedures
=

Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco
security notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.


On Fri, Jan 26, 2007 at 02:46:43PM -0500, S21sec Labs wrote:
 ###
 ID: S21SEC-034-en
 Title: Cisco VTP Denial Of Service
 Date: 26/01/2007
 Status: Vendor contacted, bug fixed
 Severity: Medium - DoS - remote from the local subnet
 Scope: Cisco Catalyst Switch denial of service
 Platforms: IOS
 Author: Alfredo Andres Omella, David Barroso Berrueta
 Location: http://www.s21sec.com/es/avisos/s21sec-034-en.txt
 Release: Public
 ###
 
   S 2 1 S E C
 
  http://www.s21sec.com
 
   Cisco VTP Denial Of Service
 
 
 About VTP
 -
 
 VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used for  
 VLAN centralized management.
 For instance, when you configure a VLAN in a switch, the VLAN  
 information (the VLAN name and its identifier)
 will be configured automatically in all the switches that belong to  
 the 

[Full-disclosure] COSEINC Alert: Microsoft Agent Heap Overflow Vulnerability Technical Details (Patched)

2007-01-29 Thread COSEINC
Microsoft Agent Heap Overflow Vulnerability

COSEINC Alert
http://www.coseinc.com/alert.html

Vendor:
Microsoft

Systems Affected:
Windows 2000 All Service Packs
Windows XP All Service Packs

Overview:
Microsoft Agent is a software technology that enables an enriched form of
user interaction that makes learning to use a computer easier. With the
software service, developers can enhance the user interface of their
applications and Web pages with interactive personalities in the form of
animated characters.

This feature is preinstalled on Win2k/XP and allows loading of remote
character data via HTTP through Internet Explorer. Microsoft actually
utilizes a custom compression algorithm to compress the character data file
(.acf) which we presume is to speed up the distribution over network.

A security researcher of COSEINC Vulnerability Research Lab has discovered
that Microsoft Agent has a heap overflow vulnerability. This vulnerability
is triggered when Microsoft Agent parses the malformed character file in its
uncompressed state in memory, by having an overly large value in a length
field. This will lead to an integer overflow during the allocation of
buffer. Subsequently, when data is copied to the buffer, the heap overflow
will occur. The result is possible remote code execution.

Technical Details:
The vulnerability exists in the ReadWideString function in agentdpv.dll:

711a2cc4 mov eax,[ebp+0xc]
711a2cc7 cmp eax,ebx
711a2cc9 jz  agentdpv!ReadWideStringW+0x6b (711a2d0e)
711a2ccb lea eax,[eax+eax+0x2]
711a2ccf pusheax
711a2cd0 callagentdpv!operator new (711aaa6c)

The .acf format when uncompressed in memory, stores strings with their
lengths prepended to them. To trigger the vulnerability, a large value
7FFF can be set in the length field of a string before compression takes
place to create a malformed .acf file (This can be done using the Microsoft-
supplied Agent Character Editor and editing the memory contents when
creating the .acf file). When Microsoft Agent parses the .acf file, this
length is read after uncompressing the file in memory:

711a2cc4 mov eax,[ebp+0xc] ; length of string

An integer overflow occurs presumably during the calculation of the size of
the memory to allocate for a widestring using the supplied length, resulting
in an allocation of 0 bytes:

711a2ccb lea eax,[eax+eax+0x2]
711a2ccf pusheax
711a2cd0 callagentdpv!operator new (711aaa6c)

Sometime after, the string will be read from memory allocated earlier and
copied to the buffer leading to the overflow and corrupting the heap.

711a2ce8 pushebx
711a2ce9 add edx,edx
711a2ceb pushedx
711a2cec pusheax
711a2ced pushedi
711a2cee calldword ptr [ecx+0xc]{ole32!CMemStm::Read (771e7a1f)}

Notes:
The string has been earlier written (together with other data) to a
temporary buffer as a result of the uncompressing procedure. The 2nd DWORD
in the .acf file specifies the total size of the file in its uncompressed
state and is used internally to allocate the required memory for the
temporary buffer.

The number of bytes to copy from this temporary buffer is apparently
determined by subtracting from the total size, the size of previous data
chunks and does not utilize the supplied string length.

Hence, the amount of overflow can be controlled by simply using a string of
the desired length. This is why the large length of 7FFF does not result
in continuous copying leading to access violation (usually in the case of an
integer overflow). Consequently, an arbitrary 4-byte overwrite will occur
resulting in possible code execution.

Vendor Status:
Microsoft has released a patch for this vulnerability. The patch is
available at:
http://www.microsoft.com/technet/security/bulletin/ms06-068.mspx

Credit:
This vulnerability was discovered by Willow, a Windows security researcher
of the COSEINC Vulnerability Research Lab (VRL).

Disclaimer:
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
no warranties, implied or express, with regard to this information. In no
event shall the author or the company be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or spread of
this information. Any use of this information is at the user's own risk.

 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/