[Full-disclosure] ANNOUNCE: Apache-SSL release, version 1.3.37+ssl_1.57

2007-03-17 Thread Adam Laurie
Apache-SSL version 1.3.37+ssl_1.57 is released.

There are no code changes in this version - just bringing into line with 
Apache.

   http://www.apache-ssl.org

Enjoy,
Adam
-- 
Adam Laurie Tel: +44 (0) 1304 814800
The Bunker Secure Hosting Ltd.  Fax: +44 (0) 1304 814899
Ash Radar Station
Marshborough Road
Sandwichmailto:[EMAIL PROTECTED]
Kent
CT13 0PL
UNITED KINGDOM  PGP key on keyservers

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Rhapsody IRC 0.28b (NICK) Multiple fs and bof vulnerability

2007-03-17 Thread starcadi
Rhapsody IRC 0.28b (NICK) Multiple fs and bof vulnerability

Description:

Rhapsody is a text console IRC client for Unix operating systems. It
is small, fast, portable, easy to use and full featured. An intuitive
menu-driven user interface makes rhapsody ideal for beginner to
intermediate users.
Found buffer overflow in various functions.
source: http://sourceforge.net/projects/rhapsody/

Source error:

#define MAXDATASIZE 1024
char nick[MAXDATASIZE];

- command request overflow

if (!sscanf(buffer, /%s %[^\n], command, parameters)){
return(E_NONE);
}

- connect and server request overflow

if (strcasecmp(command, connect) == 0 || strcasecmp(command, server) == 0){
pnum = sscanf(parameters, %s %d, server, port);
if (pnum  1){
vprint_all(Usage: /%s server [port]\n, command);
return(E_OTHER);
}

- nick request overflow

else if (strcasecmp(command, nick) == 0){
pnum = sscanf(parameters, %s, nick);
if (pnum  1){
vprint_all(Usage: /nick nick\n);
}
else{
sendcmd_server(currentserver, NICK, nick, , 
currentserver-nick);
strcpy(currentserver-lastnick, currentserver-nick);
strcpy(currentserver-nick, nick);

}
return(E_OTHER);
}

- ctcp request overflow

else if (strcasecmp(command, ctcp) == 0){
if (sscanf(parameters, %s %[^\n], nick, message) == 2){
sendcmd_server(currentserver, PRIVMSG,
create_ctcp_message(message), nick, currentserver-nick);
}
else vprint_all(Usage: /ctcp nick message|command\n);
return(E_OTHER);
}

- dcc chat/send request overflow

if (strcasecmp(subcommand, chat) == 0){
pnum = sscanf(subparameters, %s %[^\n], nick, message);
if (pnum  1){
vprint_all(Usage: /dcc chat nick\n);
return(E_OTHER);
}

- notice request overflow

else if (strcasecmp(command, notice) == 0){
pnum = sscanf(parameters, %s %[^\n], nick, message);
if (pnum  2){
vprint_all(Usage: /%s nick|channel message\n, command);
return(E_OTHER);
}
sendcmd_server(currentserver, NOTICE, message, nick, 
currentserver-nick);
return(E_OTHER);
}

- msg and message request overflow

else if (strcasecmp(command, msg) == 0 || strcasecmp(command,
message) == 0){
pnum = sscanf(parameters, %s %[^\n], nick, message);
if (pnum  2){
vprint_all(Usage: /%s nick message\n, command);
return(E_OTHER);
}
else if (strcmp(nick, currentserver-nick) == 0) print_all(You can
not chat with yourself.\n);
else if (!currentserver-active) print_all(Must be connected to a
server to chat.\n);
else {
sendcmd_server(currentserver, PRIVMSG, message, nick, 
currentserver-nick);
return(E_OTHER);
}
}

- chat and query request overflow

else if (strcasecmp(command, chat) == 0 || strcasecmp(command,
query) == 0){
chat *C;

pnum = sscanf(parameters, %s %[^\n], nick, message);
if (pnum  1){
vprint_all(Usage: /%s nick message\n, command);
return(E_OTHER);
}

- me and ctcp request format string

comm.c: 472
char *create_ctcp_message(char *message, ...){
static char buffer[MAXDATASIZE];
va_list ap;
char string[MAXDATASIZE];

va_start(ap, message);
vsprintf(string, message, ap);
va_end(ap);

sprintf(buffer, %c%s%c, 1, string, 1);
return(buffer);
}

and other: whois, mode, topic..

-- 
.original http://intel.shacknet.nu/
~ starcadi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1268-1] New libwpd packages fix arbitrary code execution

2007-03-17 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1268-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 17th, 2007http://www.debian.org/security/faq
- --

Package: libwpd
Vulnerability  : integer overflow
Problem type   : local (remote)
Debian-specific: no
CVE ID : CVE-2007-0002

iDefense reported several integer overflow bugs in libwpd, a library
for handling WordPerfect documents.  Attackers were able to exploit
these with carefully crafted Word Perfect files that could cause an
application linked with libwpd to crash or possibly execute arbitrary.

For the stable distribution (sarge) these problems have been fixed in
version 0.8.1-1sarge1.

For the testing distribution (etch) these problems have been fixed in
version 0.8.7-6.

For the unstable distribution (sid) these problems have been fixed in
version 0.8.7-6.

We recommend that you upgrade your libwpd package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/libw/libwpd/libwpd_0.8.1-1sarge1.dsc
  Size/MD5 checksum:  771 3f766aab2c2c0ff76feb561e51e17350

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd_0.8.1-1sarge1.diff.gz
  Size/MD5 checksum:12523 9cd210c306a22900d77afbc3e62b3557

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd_0.8.1.orig.tar.gz
  Size/MD5 checksum:   487187 75eabcc479c23461715ee58813c4b9b5

  Architecture independent components:


http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8-doc_0.8.1-1sarge1_all.deb
  Size/MD5 checksum:   523184 0c9bfe4ac1b79688d408b1685246138e

  Alpha architecture:


http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-stream8_0.8.1-1sarge1_alpha.deb
  Size/MD5 checksum:10200 8457ae23ea4638ecbf774198676e62b6

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-tools_0.8.1-1sarge1_alpha.deb
  Size/MD5 checksum:25800 94c9d4fd23fdac66ddf368e74761690e

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8_0.8.1-1sarge1_alpha.deb
  Size/MD5 checksum:   148594 8af570673eddd1d436eb0befb40b5ef9

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8-dev_0.8.1-1sarge1_alpha.deb
  Size/MD5 checksum:   286542 b7aae6d0dc6f3f3618e2613d3136c456

  AMD64 architecture:


http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-stream8_0.8.1-1sarge1_amd64.deb
  Size/MD5 checksum: 9998 076ff186f2150afd40318ac9b0764cfe

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-tools_0.8.1-1sarge1_amd64.deb
  Size/MD5 checksum:24214 1c75a6141ca3e9b5c9247cad1994a814

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8_0.8.1-1sarge1_amd64.deb
  Size/MD5 checksum:   137528 c804cc0ebc56eae0b4af35aac2b8dce2

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8-dev_0.8.1-1sarge1_amd64.deb
  Size/MD5 checksum:   231074 785d0bbf7fc34e7a592843145d55520f

  ARM architecture:


http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-stream8_0.8.1-1sarge1_arm.deb
  Size/MD5 checksum: 9872 502b16e468b369c865f68036651f25c8

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-tools_0.8.1-1sarge1_arm.deb
  Size/MD5 checksum:21736 3c8862d95e911fa3e96527def67271a9

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8_0.8.1-1sarge1_arm.deb
  Size/MD5 checksum:   134440 cae03d0c40607eb2e09abe3a7aafdc9f

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8-dev_0.8.1-1sarge1_arm.deb
  Size/MD5 checksum:   233142 9c9bf1780e7337a6e3c68ed2fcecf052

  HP Precision architecture:


http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-stream8_0.8.1-1sarge1_hppa.deb
  Size/MD5 checksum:11058 cc181a60e7d528ca531b2967bebd29ff

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd-tools_0.8.1-1sarge1_hppa.deb
  Size/MD5 checksum:29762 236721a143d8514e1d961c1570664a0f

http://security.debian.org/pool/updates/main/libw/libwpd/libwpd8_0.8.1-1sarge1_hppa.deb
  Size/MD5 checksum:   174812 9531c09294d4450e77dc0052a5b6cb04


[Full-disclosure] Xbox live accounts are being stolen

2007-03-17 Thread Kevin Finisterre (lists)
There have been rumor going around that Bungie.net was hacked and  
that a portion of Xbox live has been taken over because of it. Some  
folks are having their Microsoft points stolen and or points  
purchased via their stolen gamer tag.

I just got off the phone with a Microsoft Tech for Xbox live that has  
confirmed this to with me and they have stated that accounts are  
being stolen and that Hackers have control of Xbox live and there is  
nothing we can do about it

If anyone else has experienced their Xbox live account info being  
stolen let me know. I am trying to archive as much info on this as  
possible. During the conversations I have had with Xbox live support  
I would certainly say that Microsoft  staff is more than negligent in  
dealing with this issue especially with regard to the potential theft  
of personal information.

-KF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Xbox live accounts are being stolen

2007-03-17 Thread Jason Miller
I'm sorry but I find this funny actually. :-P Seems Microsoft has a weakness.

On 3/17/07, Kevin Finisterre (lists) [EMAIL PROTECTED] wrote:
 There have been rumor going around that Bungie.net was hacked and
 that a portion of Xbox live has been taken over because of it. Some
 folks are having their Microsoft points stolen and or points
 purchased via their stolen gamer tag.

 I just got off the phone with a Microsoft Tech for Xbox live that has
 confirmed this to with me and they have stated that accounts are
 being stolen and that Hackers have control of Xbox live and there is
 nothing we can do about it

 If anyone else has experienced their Xbox live account info being
 stolen let me know. I am trying to archive as much info on this as
 possible. During the conversations I have had with Xbox live support
 I would certainly say that Microsoft  staff is more than negligent in
 dealing with this issue especially with regard to the potential theft
 of personal information.

 -KF

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] fabios ultra vulnerability extravaganza

2007-03-17 Thread fabiodancedjsupreme
fabios ultra vulnerability extravaganza

[wireshark buffer over flow]
sscanf (data,
%6d   %1s   %6d  %d:%d:%d.%d   %12s  %12s  
ETHV2   Type: %s,
pktnum, direction, cap_len, hr, min, sec, csec, 
destmac,
srcmac, type);
donot open iseries capturefiles!

[apache buffer over flow]
static void usage(process_rec *process)
{
const char *bin = process-argv[0];
char pad[MAX_STRING_LEN];
unsigned i;

for (i = 0; i  strlen(bin); i++) {
pad[i] = ' ';
}
this routin will fly over buffer but only with the spaces

watch out for: MONTH OF FABIO! i get many attentions every 
day
in month!

[nagios plugins(they are real nagios not just a extra]
-check_http: many many overflow possibillys here course im the dj
supremo:
#define URI_HOST %[-
..abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789]
#define HD1 URI_HTTP URI_HOST URI_PORT URI_PATH
addr = malloc (MAX_IPV4_HOSTLENGTH + 1);
if (sscanf (pos, HD1, type, addr, port, url) == 4) {

-check_snmp: overflows to when understanding snmpget resullt:
char perfstr[MAX_INPUT_BUFFER] = ;
while (ptr) {
foo = strstr (ptr, delimiter);
strncat(perfstr, ptr, foo-ptr);
strcat(perfstr, =);
strcat(perfstr, show);

loved the vulnerabilitys? buy also my nice nude calendar!!

greats to zybadawg333 (i call u frend ),omid,sapheal,hasadya 
raed,born to kill

by fabio dance dj supreme
(i'm fabio with darklong hair and i'm gotta make you M-O-V-E-move
to the G-R-O-V-E-grove)

--
Click for free info on getting an MBA and make $200K/ year
http://tagline.hushmail.com/fc/CAaCXv1I83CeqRUuciNVIIqk41z7nLAB/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Xbox live accounts are being stolen

2007-03-17 Thread Peter Dawson

why ??

Is there not a secondary layer of economics for points ??  WoW and SL has
virtual $$ being  bartered into real world value...

On 3/17/07, Jason Miller [EMAIL PROTECTED] wrote:


I'm sorry but I find this funny actually. :-P Seems Microsoft has a
weakness.

On 3/17/07, Kevin Finisterre (lists) [EMAIL PROTECTED] wrote:
 There have been rumor going around that Bungie.net was hacked and
 that a portion of Xbox live has been taken over because of it. Some
 folks are having their Microsoft points stolen and or points
 purchased via their stolen gamer tag.

 I just got off the phone with a Microsoft Tech for Xbox live that has
 confirmed this to with me and they have stated that accounts are
 being stolen and that Hackers have control of Xbox live and there is
 nothing we can do about it

 If anyone else has experienced their Xbox live account info being
 stolen let me know. I am trying to archive as much info on this as
 possible. During the conversations I have had with Xbox live support
 I would certainly say that Microsoft  staff is more than negligent in
 dealing with this issue especially with regard to the potential theft
 of personal information.

 -KF

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Xbox live accounts are being stolen

2007-03-17 Thread Andrew Redman




Funny, I've always kinda figured that MS was it's own weakness. - ATR

Jason Miller wrote:

  I'm sorry but I find this funny actually. :-P Seems Microsoft has a weakness.

On 3/17/07, Kevin Finisterre (lists) [EMAIL PROTECTED] wrote:
  
  
There have been rumor going around that Bungie.net was hacked and
that a portion of Xbox live has been taken over because of it. Some
folks are having their Microsoft points stolen and or points
purchased via their stolen gamer tag.

I just got off the phone with a Microsoft Tech for Xbox live that has
confirmed this to with me and they have stated that accounts are
being stolen and that "Hackers have control of Xbox live and there is
nothing we can do about it"

If anyone else has experienced their Xbox live account info being
stolen let me know. I am trying to archive as much info on this as
possible. During the conversations I have had with Xbox live support
I would certainly say that Microsoft  staff is more than negligent in
dealing with this issue especially with regard to the potential theft
of personal information.

-KF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  
  
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
  




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Xbox live accounts are being stolen

2007-03-17 Thread Kevin Finisterre (lists)
I find it funny too... there is nothing more than I love to hear than  
an Microsoft employee telling me that their network is pwned and  
there is nothing they can do about it.
-KF

On Mar 17, 2007, at 7:33 PM, Jason Miller wrote:

 I'm sorry but I find this funny actually. :-P Seems Microsoft has a  
 weakness.

 On 3/17/07, Kevin Finisterre (lists) [EMAIL PROTECTED]  
 wrote:
 There have been rumor going around that Bungie.net was hacked and
 that a portion of Xbox live has been taken over because of it. Some
 folks are having their Microsoft points stolen and or points
 purchased via their stolen gamer tag.

 I just got off the phone with a Microsoft Tech for Xbox live that has
 confirmed this to with me and they have stated that accounts are
 being stolen and that Hackers have control of Xbox live and there is
 nothing we can do about it

 If anyone else has experienced their Xbox live account info being
 stolen let me know. I am trying to archive as much info on this as
 possible. During the conversations I have had with Xbox live support
 I would certainly say that Microsoft  staff is more than negligent in
 dealing with this issue especially with regard to the potential theft
 of personal information.

 -KF

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Xbox live accounts are being stolen

2007-03-17 Thread Kevin Finisterre (lists)

Microsoft points are directly tied to $$$

2000 points is about the equivalent of $25 dollars.

Zune Market Place and Xbox live share the same system for points /  
dollars.

-KF

On Mar 17, 2007, at 8:49 PM, Peter Dawson wrote:


why ??

Is there not a secondary layer of economics for points ??  WoW and  
SL has virtual $$ being  bartered into real world value...


On 3/17/07, Jason Miller [EMAIL PROTECTED] wrote:
I'm sorry but I find this funny actually. :-P Seems Microsoft has a  
weakness.


On 3/17/07, Kevin Finisterre (lists) [EMAIL PROTECTED]  
wrote:

 There have been rumor going around that Bungie.net was hacked and
 that a portion of Xbox live has been taken over because of it. Some
 folks are having their Microsoft points stolen and or points
 purchased via their stolen gamer tag.

 I just got off the phone with a Microsoft Tech for Xbox live that  
has

 confirmed this to with me and they have stated that accounts are
 being stolen and that Hackers have control of Xbox live and  
there is

 nothing we can do about it

 If anyone else has experienced their Xbox live account info being
 stolen let me know. I am trying to archive as much info on this as
 possible. During the conversations I have had with Xbox live support
 I would certainly say that Microsoft  staff is more than  
negligent in
 dealing with this issue especially with regard to the potential  
theft

 of personal information.

 -KF

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Xbox live accounts are being stolen

2007-03-17 Thread Kevin Finisterre (lists)
Here is someone on youtube with the same problem using a capture  
card to get the guy on video talking about it. He blatantly says he  
can steal any account on your xbox with just your IP address. One  
side of the conversation has been cut out but you can clearly hear  
the gentleman talking about stealing the account.

http://www.youtube.com/watch?v=1QdG_xwkPH4

Your shit is getting jacked just so ya know

-KF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/