[Full-disclosure] CORE-2008-0320 - Insufficient argument validation of hooked SSDT functions on multiple Antivirus and Firewalls

2008-04-28 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


  Core Security Technologies - CoreLabs Advisory
   http://www.coresecurity.com/corelabs/

 Insufficient argument validation of hooked SSDT functions on
 multiple Antivirus and Firewalls


*Advisory Information*

Title: Insufficient argument validation of hooked SSDT functions on
multiple Antivirus and Firewalls
Advisory ID: CORE-2008-0320
Advisory URL: http://www.coresecurity.com/?action=item&id=2249
Date published: 2008-04-28
Date of last update: 2008-04-28
Vendors contacted: BitDefender, Comodo, Sophos and Rising
Release mode: Coordinated release (BitDefender, Comodo, Rising), User
release (Sophos)


*Vulnerability Information*

Class: Invalid memory reference
Remotely Exploitable: No
Locally Exploitable: Yes
Bugtraq ID: 28741, 28742, 28743, 28744  
CVE Name: CVE-2008-1735, CVE-2008-1736, CVE-2008-1737, CVE-2008-1738


*Vulnerability Description*

Insufficient argument validation of hooked SSDT functions on multiple
Antivirus and Firewalls (BitDefender Antivirus [1], Comodo Firewall [2],
Sophos Antivirus [3] and Rising Antivirus [4]) have been found that
could lead to a Denial of Service (DoS) and possibly to code execution
attacks. An attacker, utilizing these flaws, could be able to locally
reboot the whole system shutting down the firewall or anti-virus
protection. However, in some cases it may be possible to extend the
impact of these bugs, and they could lead to the execution of arbitrary
code in the privileged kernel mode.


*Vulnerable Packages*

. BitDefender Antivirus 2008 Build 11.0.11
. Comodo Firewall Pro 2.4.18.184
. Sophos Antivirus 7.0.5
. Rising Antivirus 19.60.0.0 and 19.66.0.0
. Older versions may be affected, but were not checked.


*Non-vulnerable Packages*

. BitDefender Antivirus 2008 builds available through automatic updates,
posterior to January 18th.
. Comodo Firewall Pro 3.0
. Rising Antivirus 20.38.20


*Vendor Information, Solutions and Workarounds*

1) BITDEFENDER ANTIVIRUS (BID 28741, CVE-2008-1735)

According to BitDefender, the flaw was not exploited by any malicious
application, and it was corrected through automatic updates. Information
on this issue can be found on BitDefender website at this location:
http://kb.bitdefender.com/KB419-en--Security-vulnerability-in-BitDefender-2008.html.



2) COMODO FIREWALL PRO (BID 28742, CVE-2008-1736)

The vulnerability is fixed in Comodo Firewall Pro 3.0, available at:
http://www.personalfirewall.comodo.com/download_firewall.html


3) SOPHOS ANTIVIRUS (BID 28743, CVE-2008-1737)

Vendor statement:

"Sophos Anti-Virus 7.x for Windows 2000, 2003 and XP is affected by this
vulnerability.

Non-vulnerable products from Sophos are earlier versions of Sophos
Anti-Virus for Windows, Sophos Anti-Virus for non-Windows platforms and
all other Sophos products.

The vulnerability is only exploitable if Runtime Behavioural Analysis is
switched on. Even then the exploit will only be effective if the end
user is using security settings that are lower than the defaults for
most web browsers today, or if the end user agrees to activate an
ActiveX or Java Applet from the webpage hosting the exploit.

Workarounds to avoid this vulnerability include:

a. Using the default security settings or higher on the latest version
of your chosen web browser. In line with general security best practice
we would also encourage end users not to download ActiveX or Java
Applets unless confident about their content.

b. Turning off the Runtime Behavioural Analysis functionality within
Sophos Anti-Virus (customers will still benefit from Sophos Behavioural
Genotype protection and other means of protecting endpoints against
malware).

N.B. Should an exploit be released into the wild, Sophos will deploy
protection against that exploit.

The fix for this vulnerability requires customers to reboot their
endpoints. Given the low severity of the vulnerability, to minimise
disruption to our customers Sophos will release the fix at the earliest
opportunity that coincides with a necessary reboot of the product."


4) RISING ANTIVIRUS (BID 28744, CVE-2008-1738)

A fixed version of Rising Antivirus can be downloaded from:
http://rsdownload.rising.com.cn/for_down/rsfree/ravolusrfree.exe

All Rising customers can also update up to a patched version through
automatic updates.


*Credits*

These vulnerabilities (except the Rising one) were discovered by Damian
Saura, Anibal Sacco, Dario Menichelli, Norberto Kueffner, Andres Blanco
y Rodrigo Carvalho from Core Security Technologies, during Bugweek 2007.
The Rising vulnerability was discovered by Anibal Sacco from Core
Security Technologies exploit writers team.

These vulnerabilities were researched by Anibal Sacco and Damian Saura
from Core Security Technologies.


*Technical Description / Proof of Concept Code*

We have found that BitDefender Antivirus, Rising Antivirus, Comodo
Firewall and Sophos Antivirus have hooks that do not properly validate
the argum

[Full-disclosure] [SECURITY] [DSA 1562-1] New iceape packages fix arbitrary code execution

2008-04-28 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1562-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Moritz Muehlenhoff
April 28, 2008http://www.debian.org/security/faq
- 

Package: iceape
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2008-1380

It was discovered that crashes in the Javascript engine of Iceape,
an unbranded version of the Seamonkey internet suite could
potentially lead to the execution of arbitrary code.

For the stable distribution (etch), this problem has been fixed in
version 1.0.13~pre080323b-0etch3.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.9-2.

We recommend that you upgrade your iceape packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 4.0 (stable)
- ---

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.13~pre080323b-0etch3.diff.gz
Size/MD5 checksum:   272290 65a6cc900463ab3324a42250ce39c10b
  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.13~pre080323b.orig.tar.gz
Size/MD5 checksum: 4299 f2a3c50d814f6e7015f779b10494fac8
  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.13~pre080323b-0etch3.dsc
Size/MD5 checksum: 1439 7e71d648dcc53a64aa9e8675c09021f8

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-calendar_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27638 9ea252e567314297df273d1d0565c081
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27636 19e71b334df21b23b2f511830972a0d4
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-dom-inspector_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27682 7bfcf10a1034eefac22ae8657dee9bd2
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-dev_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27772 36a3464a2d8fd4fc3847039b82dd1f5f
  
http://security.debian.org/pool/updates/main/i/iceape/iceape_1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:29034 a9f31dc27b4b17c63b783f07c3f8fd2c
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-chatzilla_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27650 6894ea2d406646086f60a29c1aba9cbe
  
http://security.debian.org/pool/updates/main/i/iceape/iceape-dev_1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:  3928844 9a28456f31b2b5a06c6e69b175183ab9
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-browser_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:28606 6e89267d545052a9b053c0b17b02d265
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-js-debugger_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27676 fed0fa97fb88ec0c975c432003dffaea
  
http://security.debian.org/pool/updates/main/i/iceape/iceape-chatzilla_1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:   282388 f6e5876a2562123eb182f44a9d28c0f5
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-psm_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27644 97fd6c82d0386ed6f1ed8c2b45391634
  
http://security.debian.org/pool/updates/main/i/iceape/mozilla-mailnews_1.8+1.0.13~pre080323b-0etch3_all.deb
Size/MD5 checksum:27658 67afa911887af3df5a081d9bcaeb9e7b

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/i/iceape/iceape-mailnews_1.0.13~pre080323b-0etch3_alpha.deb
Size/MD5 checksum:  2281694 6688ce20712749da04e7bc0e1f63b531
  
http://security.debian.org/pool/updates/main/i/iceape/iceape-gnome-support_1.0.13~pre080323b-0etch3_alpha.deb
Size/MD5 checksum:55052 d14150e730a8357b0e2ef81542eb604b
  
http://security.debian.org/pool/updates/main/i/iceape/iceape-dbg_1.0.13~pre080323b-0etch3_alpha.deb
Size/MD5 checksum: 60657374 ebc2656e676b129223a0d7b060205d32
  
http://security.debian.org/pool/updates/main/i/iceape/iceape-browser_1.0.13~pre080323b-0etch3_alpha.deb
Size/MD5 checksum: 12886440 aa35edb178dc8812275a005cb0449e7b
  
http://security.debian.org/pool/updates/main/i/iceape/iceape-calendar_1.0.13~pre0

Re: [Full-disclosure] R.I.P rgod - :(

2008-04-28 Thread M. Shirk
You're not dead...you don't want to go on the cart... you feel fine...you might 
go for a walk...you feel happy? 

:)

Shirkdog
' or 1=1-- 

http://www.shirkdog.us

From: [EMAIL PROTECTED]
To: full-disclosure@lists.grok.org.uk
Date: Mon, 28 Apr 2008 19:32:57 +0430
Subject: [Full-disclosure] R.I.P rgod - :(








I am *not* dead. :(

http://retrogods.blogspot.com/



Invite your mail contacts to join your friends list with Windows Live Spaces. 
It's easy! Try it!

_
Spell a grand slam in this game where word skill meets World Series. Get in the 
game.
http://club.live.com/word_slugger.aspx?icid=word_slugger_wlhm_admod_april08___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] R.I.P rgod - :(

2008-04-28 Thread Retro God

I am *not* dead. :(

http://retrogods.blogspot.com/

 -- rgod
_
News, entertainment and everything you care about at Live.com. Get it now!
http://www.live.com/getstarted.aspx

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] R.I.P rgod - :(

2008-04-28 Thread Retro God

I am *not* dead. :(

http://retrogods.blogspot.com/



_
Invite your mail contacts to join your friends list with Windows Live Spaces. 
It's easy!
http://spaces.live.com/spacesapi.aspx?wx_action=create&wx_url=/friends.aspx&mkt=en-us___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SECURITY] [DSA 1561-1] New ldm packages fix information disclosure

2008-04-28 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1561-1  [EMAIL PROTECTED]
http://www.debian.org/security/  Thijs Kinkhorst
April 28, 2008http://www.debian.org/security/faq
- 

Package: ldm
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2008-1293
Debian Bug : 469462

Christian Herzog discovered that within the Linux Terminal Server Project,
it was possible to connect to X on any LTSP client from any host on the
network, making client windows and keystrokes visible to that host.

NOTE: most ldm installs are likely to be in a chroot environment exported
over NFS, and will not be upgraded merely by upgrading the server itself.
For example, on the i386 architecture, to upgrade ldm will likely require:

chroot /opt/ltsp/i386 apt-get update
chroot /opt/ltsp/i386 apt-get dist-upgrade


For the stable distribution (etch), this problem has been fixed in
version 0.99debian11+etch1.

For the unstable distribution (sid), this problem has been fixed in
version 2:0.1~bzr20080308-1.

We recommend that you upgrade your ldm package.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Source archives:

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.tar.gz
Size/MD5 checksum:   183019 c97fa50f7a30f213742be6466a7817fc
  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp_0.99debian11+etch1.dsc
Size/MD5 checksum: 1243 c8d0f83f26c580a9fcf5079d303c1958

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server-standalone_0.99debian11+etch1_all.deb
Size/MD5 checksum:22346 edf27d69321dc6db44cb252719aad12b
  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client-builder_0.99debian11+etch1_all.udeb
Size/MD5 checksum: 2278 bd0856196c64cfcabc1c0f47808b5f4c
  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-server_0.99debian11+etch1_all.deb
Size/MD5 checksum:53332 70be96c089a449a543cfb678e55a0f1e
  
http://security.debian.org/pool/updates/main/l/ltsp/ldm_0.99debian11+etch1_all.deb
Size/MD5 checksum:   116452 51fa6e495db54926e77aa7f62a251dff

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_alpha.deb
Size/MD5 checksum:50686 145f4579f02af33e644674b0a2ecff67

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_amd64.deb
Size/MD5 checksum:50638 9ea8d9f916b011a9f5379ed31f8a7cc7

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_arm.deb
Size/MD5 checksum:49608 8c1b8f8908b2099c8f97946144dd7ca0

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_hppa.deb
Size/MD5 checksum:50448 08ca2c9cdc6bc5a274bb7114495e0e7d

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_i386.deb
Size/MD5 checksum:49302 b20a0740d53c1c6aeffdab69b2bb14bf

ia64 architecture (Intel ia64)

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_ia64.deb
Size/MD5 checksum:55934 b614ff92f4cb3dcea9329ea219f77a60

mips architecture (MIPS (Big Endian))

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mips.deb
Size/MD5 checksum:50166 298ad47e264bf2b3e3b69fd52f772df1

mipsel architecture (MIPS (Little Endian))

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_mipsel.deb
Size/MD5 checksum:50914 770ee6fa07216c0a2a0da7922d820ea7

powerpc architecture (PowerPC)

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_powerpc.deb
Size/MD5 checksum:50602 3b30a76ae56aedbfdc67c2bd975eefd6

s390 architecture (IBM S/390)

  
http://security.debian.org/pool/updates/main/l/ltsp/ltsp-client_0.99debian11+etch1_s390.deb
Size/MD5 checksum:51558 9c2f6986508538205f6e5d937a9bc8d7


  These files will probably be moved into the stable distribution on
  its next update.

- 
-

[Full-disclosure] [SECURITY] [DSA 1560-1] New kronolith2 packages fix cross site scripting

2008-04-28 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1560-1  [EMAIL PROTECTED]
http://www.debian.org/security/  Thijs Kinkhorst
April 28, 2008http://www.debian.org/security/faq
- 

Package: kronolith2
Vulnerability  : insufficient input sanitising
Problem type   : remote
Debian-specific: no
Debian Bug : 478121

"The-0utl4w" discovered that the Kronolith, calendar component for
the Horde Framework, didn't properly sanitise URL input, leading to
a cross-site scripting vulnerability in the add event screen.

For the stable distribution (etch), this problem has been fixed in
version 2.1.4-1etch1.

The unstable distribution (sid) will be fixed soon.

We recommend that you upgrade your kronolith2 package.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Source archives:

  
http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4-1etch1.dsc
Size/MD5 checksum:  988 bed4712a2341c3a5043c6e69ad6e8309
  
http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4-1etch1.diff.gz
Size/MD5 checksum: 5388 580890a3d47459f77dd89aa664ca4a44
  
http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4.orig.tar.gz
Size/MD5 checksum:  1691114 df6d6fc99012865b18b089212c7544ad

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/k/kronolith2/kronolith2_2.1.4-1etch1_all.deb
Size/MD5 checksum:  1694916 d93492c52a99397b76f862705b7fd24e


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show ' and http://packages.debian.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iQEVAwUBSBWjomz0hbPcukPfAQKbIwf/blXd6XfVLmgZa2b2+XoMgnX0Cs/7xzBd
oEkgySKljK/xg5F3A5zgutiC1BMu/EQY0mQy8IdeltKlI4NkNLCcY4HFhWwQwdrJ
EHYsP0WLH5AitXxRaa6zkKUBK2y/8aYZ+Xy+xfOSS05uJ/1UTwO++wPBlzEHl094
VShXlRG1NrCF4bi9Ud/GAHq0tbTMlRj0ltcFGeoP/eCiqjOtWcFci0Zb/0nTpHkr
eJVhx5e2kxiW9i7zN12hdh8fOHyUTPsAFhHAZ72pCMpv25fed2ObuXW1n/oaL6Fd
OkpEWo92b6PD75vYN2bzDtPGSFttCAFF5aBuRk082IX1WUYyhSu+Zw==
=i6rS
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: Its time to take rick rolling seriously

2008-04-28 Thread mcwidget
On Sat, Apr 26, 2008 at 12:48 AM, n3td3v <[EMAIL PROTECTED]> wrote:

> -- Forwarded message 
>  I see a new craze of "cyber rolling" coming which hackers can exploit
>  and i'm not sure if I like it very much, its fun and games at the
>  moment, but just wait to the hackers catch on and things develop with
>  the rick roll trend.


Can you define what you mean by the term "cyber rolling" and how this
differs from the phishing attacks we see regularly already?  Are you meaning
a dry-run expedition before a more targeted malicious attack?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: Its time to take rick rolling seriously

2008-04-28 Thread MiW Mailing Lists
I don't agree at all -- being rickrolled is one thing (passive),
typing authentication credentials (active) is something very
different.

I mean
Somebody could want to to learn more about that blessed pokemon mudkip

they might visit:
http://so.i.herd.u.liek.mudki.ps/


> i actually agree with this thread.  but its not just rick rolling.
> its any link that anayone sends.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/