[Full-disclosure] Funniest thing at DefCon this year...

2008-08-14 Thread Exibar
 
Was certainly the roll of 1000 stickers that was found near the (then
closed) registration window, just sitting there inviting all to take a bunch
of them

The stickers were 4 inches round, black with white lettering, and said...

 N3TD3V
 SUCKS!


   I nearly fell on my ass I was laughing so hard!  Of course I grabbed a
crapload of them too :-)


  Exibar

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [funsec] Estonia similarities begin to manifest (fwd)

2008-08-14 Thread Gadi Evron
It seems like the online Russian population is getting mobilized. Like a
meme spreading on the blogosphere, the mob is forming and starting to
riot, attacking Georgia.

This seems very similar to the Estonian incident, only my current guess is
natural evolution rather than grass-roots implanted--but I am getting more
and more convinced of the similarities as more information becomes
available. Determining exactly when the use of scripts by regular users
started, is key to this determination.

So, this may possibly be in copy-cat fashion, filling in for the missing
coordination that existed in Estonia's case, or a duplicate after all. It
is still too early to come to conclusions.

This information was recieved from Shadowserver, which posted a reduced
public report on this subject on their wiki:
http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20080813

Great work from Shadowserver!

My Colleague Randy Vaughn, came up with the following theory, which is
contradictory to my own:
I would say more like the result of past training.  That is, the
.ee attacks served to set a behavioral response that will
automatically trigger during any real or perceived conflict.

Gadi.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CORE-2008-0103: Internet Explorer Zone Elevation Restrictions Bypass and Security Zone Restrictions Bypass

2008-08-14 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

~  Core Security Technologies - CoreLabs Advisory
~   http://www.coresecurity.com/corelabs/

Internet Explorer Zone Elevation Restrictions Bypass and Security Zone
Restrictions Bypass


*Advisory Information*

Title: Internet Explorer Zone Elevation Restrictions Bypass and Security
Zone Restrictions Bypass
Advisory ID: CORE-2008-0103
Advisory URL:
http://www.coresecurity.com/content/internet-explorer-zone-elevation
Date published: 2008-08-13
Date of last update: 2008-08-13
Vendors contacted: Microsoft
Release mode: Coordinated release


*Vulnerability Information*

Class: Zone Elevation Restrictions Bypass and Security Zone Restrictions
Bypass
Remotely Exploitable: Yes
Locally Exploitable: No
Bugtraq ID: 30585   
CVE Name: CVE-2008-1448 


*Vulnerability Description*

Internet Explorer introduces the concept of URL Security Zones, which
basically define a set of privileges for web applications (such as, for
example, accessing and/or modifying the local computer files) depending
on their level of trustworthiness.

Issues have been found in the way that security policies are applied
when a URI is specified in the UNC form:
'\\MACHINE_NAME_OR_IP\PATH_TO_RESOURCE'

* When a remote site attempts to access a local resource, Internet
Explorer will fail to enforce the Zone Elevation restrictions.

* When browsing a remote site, Internet Explorer will not apply the
right Security Zone permissions, allowing a site belonging to a less
secure zone to be treated as one belonging to a more privileged zone.


*Vulnerable Packages*

. Internet Explorer 5 under Windows 2000/2003/XP
. Internet Explorer 6 under Windows 2000/2003/XP
. Internet Explorer 7 under Windows 2000/2003/XP
. Internet Explorer 7 under Windows Vista (when protected mode is turned
off)


*Non-vulnerable Packages*

. This vulnerability is addressed by Microsoft Security Bulletin
MS08-048 [1]


*Vendor Information, Solutions and Workarounds*

Microsoft has issued Security Bulletin MS08-048 to address this
vulnerability. The bulletin includes workarounds and mitigating factors.
For more information refer to the bulletin:
http://www.microsoft.com/technet/security/bulletin/ms08-048.mspx

Workarounds communicated by the vendor include:

* Locking down the MHTML protocol handler. Below are the required
registry changes.

/---

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet
Explorer\MAIN\FeatureControl\FEATURE_PROTOCOL_LOCKDOWN]
explorer.exe=dword:0001
iexplore.exe=dword:0001
*=dword:0001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\RestrictedProtocols]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\RestrictedProtocols\1]
mhtml=mhtml

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\RestrictedProtocols\2]
mhtml=mhtml

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\RestrictedProtocols\3]
mhtml=mhtml

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\RestrictedProtocols\4]
mhtml=mhtml

- ---/

* Disabling the MHTML protocol handler. To disable the protocol handler,
follow these steps:

1. Click Start and then click Run. Enter regedit.exe in the text box and
click OK.
2. Navigate to
HKEY_CLASSES_ROOT\CLSID\{05300401-BCBC-11d0-85E3-00C04FD85AB4}.
3. Right click {05300401-BCBC-11d0-85E3-00C04FD85AB4} and select
Permissions.
4. Click Advanced.
5. Deselect Allow inheritable permissions from the parent to propagate
6. Click Remove, and then click OK. Click Yes and OK on subsequent screens.


*Credits*

This vulnerability was discovered and researched by Jorge Luis Alvarez
Medina from Core Security Technologies.


*Technical Description / Proof of Concept Code*

Internet Explorer is the most popular Internet browser in the world as
it is an integrated component of every Windows installation. It
introduces the concept of URL Security Zones, as explained in [2], which
basically define a set of privileges for web applications (such as
accessing and modifying the local computer files) depending on their
level of trustworthiness, namely:

* Local Intranet Zone: for content located on an organization's
intranet. Because the servers and information are within an
organization's firewall, it is reasonable to assign a higher level of
trust to content on the intranet.

* Trusted Sites Zone: for content located on Web sites that are
considered more reputable or trustworthy than other sites on the
Internet. Assigning a higher level of trust to these sites minimizes the
number of related authentication requests. The user adds the URLs of
trusted Web sites to this zone.

* Internet Zone: for Web sites on the Internet that do not belong to
another zone. This default setting causes Internet Explorer to prompt
the user whenever potentially unsafe content is about to be downloaded.
Web sites that are not mapped into other zones 

[Full-disclosure] Coordinated Russia vs Georgia cyber attack in progress

2008-08-14 Thread Dancho Danchev
Hello,

The following factual analysis is a complete account of the events
that took place during the weekend in regard to Russia's
self-mobilization of Internet users in an attempt to coordinate and
launch a cyber attack against Georgia's Internet infrastructure, and
limit the Georgian government's ability to disseminate information on
the events taking place inside the country.  The attacks are ongoing
despite the ceasefire.

http://blogs.zdnet.com/security/?p=1670

Regards
-- 
Dancho Danchev
Cyber Threats Analyst/Blogger
http://ddanchev.blogspot.com
http://blogs.zdnet.com/security
http://windowsecurity.com/Dancho_Danchev

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ISOI 5 (Tallinn) agenda is now online

2008-08-14 Thread Gadi Evron
Greetings!

The agenda for the ISOI conference (held on the 11th and 12th of September
2008, in Tallinn Estonia) has just been made public.

You can find it here:
http://www.isotf.org/isoi5.html

Suggested hotel is the Viru:
http://www.viru.ee/

Our kind host is the Estonian CERT (Hillar) who is also planning a
special after-hours event for us to enjoy.

We have the option of moving to a bigger room if necessary, so you can RSVP
when you like (although we'd appreciate notice, and our confirmation is
required).

Best regards,

Randy Vaughn and Gadi Evron.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SECOBJADV-2008-03: PartyGaming PartyPoker Malicious Update Vulnerability

2008-08-14 Thread advisories
==
= Security Objectives Advisory (SECOBJADV-2008-03)   =
==

PartyGaming PartyPoker Malicious Update Vulnerability

http://www.security-objectives.com/advisories/SECOBJADV-2008-03.txt

AFFECTED: PartyPoker Client (Build Number 121/120, Build Date Mar 18 2008)
  Other versions may also be affected

PLATFORM: Intel / Windows

CLASSIFICATION: Origin Validation Error (CWE-346)

RESEARCHER: Derek Callaway

IMPACT: Client-side code execution

SEVERITY: Medium

DIFFICULTY: Moderate

REFERENCES: CVE-2008-3324


BACKGROUND

PartyPoker.com (www.PartyPoker.com) is the world's largest online poker brand
in terms of number of players and revenues. You'll find a great variety of 
poker games and tournaments, plus blackjack. 

SUMMARY

The PartyGaming PartyPoker client program can be forced into downloading a
malicious update. This is a result of the PartyPoker client not properly 
confirming the authenticity of the network update server or the 
executable update files themselves. When downloading an update, first  
the client program resolves the DNS address of the update host. Next, it 
establishes a TCP connection on port 80 of the previously resolved IP  
address. Then, it sends an HTTP request for an EXE file under the web 
server's Downloads directory. Upon receiving the HTTP response, the 
requested portable executable is written to disk and executed.

ANALYSIS

To successfully exploit this vulnerability an attacker must be able to 
somehow position themself such that they can impersonate the update server.
This can be accomplished through DNS cache poisoning, ARP redirection,
TCP hijacking, impersonation of a Wi-Fi Access Point, etc. The attacker 
also would have configured a rogue web server to push out update code of 
their choosing. 

Before PartyPoker downloads the update it communicates with another 
PartyGaming server in the 88.81.154.0/24 subnetwork via SSL to determine 
if a new client update is available; if so, a HTTP GET request is sent 
to www1.partypoker.com for an EXE file in the /Downloads/en/vcc 
directory and is stored on the local filesystem under 
C:\Programs\PartyGaming\tmpUpgrade and executed. Afterwards, the user 
may login and operate the PartyPoker client as usual.

Since the update itself is downloaded from a seperate server, the client 
can contact the legitimate PartyGaming server during exploitation to 
determine if an update is available as normal. The attacker only needs 
to masquerade as www1.partypoker.com.

WORKAROUND

Do not use the PartyPoker client program.

VENDOR RESPONSE

The vendor was contacted initially and fully aware of the vulnerability. 
However, after unsuccessfully attempting to reestablish dialogue multiple times
with limited responsiveness over a period of several months, Security 
Objectives proceeded with the advisory.

DISCLOSURE TIMELINE

20-Feb-2008 Discovery of Vulnerability
22-Feb-2008 Developed Proof-of-Concept
25-Feb-2008 Reported to Vendor
15-Aug-2008 Published Advisory

ABOUT SECURITY OBJECTIVES

Security Objectives is a security centric consultancy and software development 
corporation which operates in the area of application assurance software. 
Security Objectives employs methods that are centered on software 
comprehension, therefore a more in-depth contextual understanding of the 
application is developed.

http://security-objectives.com/

LEGAL

Permission is granted for electronic distribution of this advisory.
It may not be edited without the written consent of Security Objectives.

The information contained in this advisory is believed to be accurate based on 
currently available information and is provided as is without warranty of 
any kind, either expressed or implied, including, but not limited to, the 
implied warranties of merchantability and fitness for a particular purpose. 
The entire risk as to the quality and performance of the information is with 
you.
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SUSE Security Announcement: postfix (SUSE-SA:2008:040)

2008-08-14 Thread Thomas Biege

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

__

SUSE Security Announcement

Package:postfix
Announcement ID:SUSE-SA:2008:040
Date:   Thu, 14 Aug 2008 14:00:00 +
Affected Products:  openSUSE 10.2
openSUSE 10.3
openSUSE 11.0
SuSE Linux Enterprise Server 8
SUSE SLES 9
Novell Linux Desktop 9
Open Enterprise Server
Novell Linux POS 9
SUSE Linux Enterprise Desktop 10 SP1
SUSE Linux Enterprise Server 10 SP1
SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: local privilege escalation
Severity (1-10):6
SUSE Default Package:   yes
Cross-References:   CVE-2008-2936
CVE-2008-2937


Content of This Advisory:
1) Security Vulnerability Resolved:
 local privilege escalation and mbox ownership problem
   Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
6) Authenticity Verification and Additional Information

__

1) Problem Description and Brief Discussion

   Postfix is a well known MTA.
   During a source code audit the SuSE Security-Team discovered a local
   privilege escalation bug (CVE-2008-2936) as well as a mailbox ownership
   problem (CVE-2008-2937) in postfix. 
   The first bug allowed local users to execute arbitrary commands as root
   while the second one allowed local users to read other users mail.
   

2) Solution or Work-Around

   Please install the update package.

3) Special Instructions and Notes

   After successfully installing the postfix update, execute the command
   /etc/init.d/postfix restart
   as root to restart the postfix system.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

 rpm -Fhv file.rpm

   to apply the update, replacing file.rpm with the filename of the
   downloaded RPM package.

   
   x86 Platform:
   
   openSUSE 11.0:
   
http://download.opensuse.org/pub/opensuse/update-debug/11.0/rpm/i586/postfix-debuginfo-2.5.1-28.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update-debug/11.0/rpm/i586/postfix-debugsource-2.5.1-28.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/postfix-2.5.1-28.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/postfix-devel-2.5.1-28.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/postfix-mysql-2.5.1-28.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/postfix-postgresql-2.5.1-28.3.i586.rpm
   
   openSUSE 10.3:
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/postfix-2.4.5-20.4.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/postfix-devel-2.4.5-20.4.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/postfix-mysql-2.4.5-20.4.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/postfix-postgresql-2.4.5-20.4.i586.rpm
   
   openSUSE 10.2:
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/postfix-2.3.2-32.i586.rpm
   
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/postfix-devel-2.3.2-32.i586.rpm
   
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/postfix-mysql-2.3.2-32.i586.rpm
   
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/postfix-postgresql-2.3.2-32.i586.rpm
   
   Sources:
   
   openSUSE 11.0:
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/postfix-2.5.1-28.3.src.rpm
   
   openSUSE 10.3:
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/postfix-2.4.5-20.4.src.rpm
   
   openSUSE 10.2:
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/postfix-2.3.2-32.src.rpm
   
   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:
   
   Open Enterprise Server
 

Re: [Full-disclosure] Internet attacks against Georgian web sites

2008-08-14 Thread Pavel Labushev
n3td3v ?:

 Watch this video by Marcus Sachs at Black Hat 2008
 http://www.youtube.com/watch?v=FSUPTZVlkyU, he talks about, how are we
 going to get the next president's attention in the transition period
 in the first 100 days of Obama or McCain getting into the White House
 and to take cyber seriously?

I'm afraid, all that cyberterrorism nonsense is proposed (solely or not)
for the purpose of gaining more control over the Internet.
Today we hear: There are terrorism, so we need to eavesdrop your
communications.
Tomorrow we may hear: There are terrorism *and* cyberterrorism.
Cyberterrorists use techniques that made an eavesdropping ineffective
today, so to save Democracy and Peace we need to *control* your
communications.
Yeah, to control like this: Ban everything and allow only what *we*
explicitly allow.
North Korea is coming.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] DNS forward only: why does it help?

2008-08-14 Thread Florian Weimer
* Paul Szabo:

 As a workaround, it is recommended to set DNS servers to forward only.
 Can someone explain why that helps?

It helps if the network between recursor and forwarder is trusted.  If
it's not, the attacker must still obtain the IP addresses involved and
the forwarder source port, which doesn't immediately leak to the
attacker.  So automated attacks are somewhat less likely.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Internet attacks against Georgian web sites

2008-08-14 Thread n3td3v
On Thu, Aug 14, 2008 at 1:53 PM, Pavel Labushev [EMAIL PROTECTED] wrote:
 n3td3v ?:

 Watch this video by Marcus Sachs at Black Hat 2008
 http://www.youtube.com/watch?v=FSUPTZVlkyU, he talks about, how are we
 going to get the next president's attention in the transition period
 in the first 100 days of Obama or McCain getting into the White House
 and to take cyber seriously?

 I'm afraid, all that cyberterrorism nonsense is proposed (solely or not)
 for the purpose of gaining more control over the Internet.
 Today we hear: There are terrorism, so we need to eavesdrop your
 communications.
 Tomorrow we may hear: There are terrorism *and* cyberterrorism.
 Cyberterrorists use techniques that made an eavesdropping ineffective
 today, so to save Democracy and Peace we need to *control* your
 communications.
 Yeah, to control like this: Ban everything and allow only what *we*
 explicitly allow.
 North Korea is coming.


Yes, once Marcus Sachs and friends have done the false flag cyber 9/11
after Obama or McCain get in, cyber will finally be on top of the
Agenda.

Right now that video doesn't seem like much, but as soon as the cyber
9/11 false flag happens then it will be key evidence in the
investigation into who in the U.S government under world was involved
in the plannning, execution and cover up.

By the way, ignore Gadi Evron and Dancho Danchev, they are secret
intelligence service operatives who want you to believe there is a
Russia and/or Estonia link.

Also, the U.S cyber command isn't suspended, that was just propaganda
to make sure the U.S cyber command was in the media at the same time
as the Georgia cyber attacks.

They might say it is suspended at the end of the month, but they know
it will be restarted after the false flag cyber 9/11 happens, so it
was well worth it just to get mentioned at the same time as the
Georgia cyber attacks.

However, Air Force leaders insisted Wednesday that they were not
torpedoing plans to establish the new Cyberspace Command. Rather,
leaders have decided to pause on making any further plans in order
to give leaders time to get more information and set a proper course
of action concerning the new command and other Air Force initiatives.

The Air Force remains committed to providing full-spectrum cyber
capabilities to include global command and control, electronic warfare
and network defense, Air Force spokesman Ed Gulick said in a prepared
statement.

http://www.bizjournals.com/sanjose/stories/2008/08/11/daily67.html

leaders have decided to pause on making any further plans in order
to give leaders time to get more information and set a proper course
of action concerning the new command and other Air Force initiatives.

They are putting it on hold because they are waiting for the cyber
9/11 false flag, that Marcus Sachs talks about in the video.

Because if the cyber command is built before the infulence of the
false flag then it won't be as big and powerful as it wants to be.
However if they wait for the cyber 9/11 false flag, then the cyber
command will be bigger, better with better funding.

So according to bizjournals.com there is going to be a pause. Is
this pause to allow the U.S government under world cyber 9/11 false
flag to happen, so that all folks in the U.S government's cyber can
become even more powerful than ever before.

The cyber 9/11 false flag will give the the cyber leaders in the U.S
government all the money and power they want, that they are currently
frustrated about not having, because main land terrorism is currently
distracting what the power hungry cyber guys in the U.S government
are wanting. (See the Marcus Sachs video).

Don't allow Marcus Sachs and company to carry out a cyber 9/11 false
flag, this is ultimately what all this is leading up to when Obama,
McCain get in to the White House.

Gadi Evron and Dancho Danchev are the secret service operatives doing
the ground work at the moment, so that the public have known people to
blame, and other things the public can connect with for after the
false flag cyber 9/11 happens.

Its likely the cyber 9/11 false flag will be blamed on Russia, China
or Al-Qaeda.

Die Hard 4.0 was also put into the public domain on the lead up to the
Obama and McCain election by the Marcus Sachs's of the world to get
the idea of cyber terrorism into the hearts and minds of the public.

If they didn't have a lead up and all the background work put in
first, the false flag wouldn't be as good, they've got to make sure
the public know everything about cyber attacks and cyber terrorism
first and have known enemies the public and the media can blame
afterwards.

By the way, I suggest folks mirror the Youtube video as soon as
possible, as I predict its going to mysteriously disappear.

There are power hungry cyber folks in Washington who are currently
frustrated they don't have the power and money they want and they will
do anything in their power to get it. If it means a cyber 9/11 false
flag, they will do it, to 

Re: [Full-disclosure] Funniest thing at DefCon this year...

2008-08-14 Thread North, Quinn
Is n3td3v the new stile ??

 http://img142.imageshack.us/my.php?image=n3td3vsuxft5.jpg 

--=Q =--

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Exibar
Sent: Thursday, August 14, 2008 1:04 AM
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Funniest thing at DefCon this year...

 
Was certainly the roll of 1000 stickers that was found near the (then
closed) registration window, just sitting there inviting all to take a
bunch
of them

The stickers were 4 inches round, black with white lettering, and
said...

 N3TD3V
 SUCKS!


   I nearly fell on my ass I was laughing so hard!  Of course I grabbed
a
crapload of them too :-)


  Exibar

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

This email is intended for the recipient only.  If you are not the intended 
recipient please disregard, and do not use the information for any purpose.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Internet attacks against Georgian web sites

2008-08-14 Thread Ureleet
On Wed, Aug 13, 2008 at 12:49 PM, n3td3v [EMAIL PROTECTED] wrote:
 On Wed, Aug 13, 2008 at 6:43 AM, Viktor Larionov
 [EMAIL PROTECTED] wrote:
 Hi all,

 As a comment to Gadi's story: it's not nice to accuse anyone if it's still
 not clear who's behind all this and what is really happening.


 It would be great for the U.S to take down the .ge sites while Russia
 is attacking Georgia in a ground conflict, as it ramps up U.S's
 ambitions for an offensive cyber command.

 They already cyber false flagged Estonia to get money support
 politically and public acceptance for the big U.S cyber command to get
 built in the first place.

 Now that the big U.S cyber command has been given the go ahead because
 of the Estonia cyber false flag, they've got to keep reasons in the
 media that the U.S cyber command is still a good idea.

u mean the cyber command that was just cancelled and told to stop?


 Russia gets all the blame for the .ge cyber attacks and U.S get to
 keep the politicians and the public sweet about the ongoing need for
 the big U.S cyber command and legitimate reasons for its existence.

 I couldn't think of a better time for U.S to do a bit of cyber false
 flagging, than is when another country invading another, while keeping
 U.S cyber ambitions afloat politically and publically.

 Remember, U.S need to keep the idea of ground conflict and cyber
 attacks as the same thing in the eyes of the public and the
 politicians or the idea of the U.S cyber command doesn't float.

 In reality, proper government-led cyber attacks wouldn't target web
 sites, this is purely an attention seeking exercise to highlight the
 ongoing need for the U.S cyber command.

 In reality, proper government-led cyber attacks are invisible to the
 public, as they are targeting specific government and military stuff
 that the public and politicians don't get a chance to know about. Its
 a classic media whoring exercise to take out web sites, as taking out
 websites has no real cyber operational value apart from a bit of media
 whoring.

 I don't think it was Russia, but Russia have been framed by the U.S.
 who need to keep the ideology of a U.S offensive cyber command afloat
 and OK'd as the next president and its administration take over, so
 that cyber gets full funding and the attention of Obama or McCain.

 Watch this video by Marcus Sachs at Black Hat 2008
 http://www.youtube.com/watch?v=FSUPTZVlkyU, he talks about, how are we
 going to get the next president's attention in the transition period
 in the first 100 days of Obama or McCain getting into the White House
 and to take cyber seriously?

 Now by this video it seems that Marcus Sachs
 http://en.wikipedia.org/wiki/Marcus_Sachs is trying to say we need a
 cyber false flag attack in the first 100 days that Obama or McCain get
 into the White House to make sure cyber is fully funded and that
 cyber offensive operations are fully OK'd for the next four to eight
 years.

 We want to get the attention of the next administration as they are
 coming in --Marcus Sachs.

marcus sachs is a media wh0reing bloehard.  he seems he is in the
right place at the right time.  what has he done besides run his
mouth?


 He talks about the first two months or 100 days of the next presidency
 is crucial in getting the attention of the president and its
 administration.

 Is this a hidden message here by Marcus Sachs about a Die Hard 4.0
 scenario false flag attack being planned?

he wouldnt know if it bit him in the ass.


 He said also in the video, when Bush was coming in, the powers that be
 got their attention with 9/11 and that cyber got distracted, and now
 he is basically saying when Obama or McCain come in that the U.S
 government under world are planning a cyber 9/11.

he said something about the first 100 days and shit before bush got
elected too.  u could say the same thing every 4 yrs.


 It seems that Marcus Sachs is frustrated that 9/11 got all the
 attention last time, and now the powers of be are going to make sure
 cyber takes up the main agenda this time around.

 How are they going to get the attention of the next presidency to get
 cyber fully funded and taken seriously is anyones guess, but I fear
 the worst and that we must keep our eyes and ears open for any false
 flagging and other suspicious looking cyber security incidents, so we
 are better prepared to call out false flag at the earliest
 opportunity.

marcus is trying to get a government appt to lead the us cyber
command.  this is called 'dick sucking'

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Funniest thing at DefCon this year...

2008-08-14 Thread Ureleet
and i missed em.  fuck.

On Thu, Aug 14, 2008 at 1:04 AM, Exibar [EMAIL PROTECTED] wrote:

 Was certainly the roll of 1000 stickers that was found near the (then
 closed) registration window, just sitting there inviting all to take a bunch
 of them

 The stickers were 4 inches round, black with white lettering, and said...

  N3TD3V
  SUCKS!


   I nearly fell on my ass I was laughing so hard!  Of course I grabbed a
 crapload of them too :-)


  Exibar

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] (no subject)

2008-08-14 Thread Ureleet
dear ff,

u suck.  die.

that is all.

On Wed, Aug 13, 2008 at 6:18 AM,  [EMAIL PROTECTED] wrote:
 [EMAIL PROTECTED] has sent you a secure email using Hushmail. To read it,
 please visit the following web page:

 https://www.hushmail.com/express/4JS7VCHT

 Frequently Asked Questions:

 Why did I receive this email?

 You have received this email because you have been sent a secure email
 through Hushmail. To read your secure email, you must follow the link
 provided and correctly answer a secret question chosen by the sender.

 What is a secure email?

 Sending a regular email is like sending a postcard - it may be read by any
 number of people before reaching its recipient(s). A secure email is like
 sending a letter in a sealed envelope - it can only be read by the sender
 and intended recipient(s).

 Is it safe to follow the link in this email?

 Yes, it is safe to visit the Hushmail web site by following the link
 provided in this email. However, you should never open an email attachment
 unless you know the person who sent it, were expecting to receive the file
 from them, and have scanned the file for viruses.

 When you arrive at the Hushmail web site, be sure to check the following:

 The address bar of your web browser shows: https://www.hushmail.com/express/
 A small picture of a padlock appears in the bottom right corner of your web
 browser

 If you would prefer to access your message by entering its message code,
 please visit the following web page: https://www.hushmail.com/express. You
 will be asked to enter the following message code: 4JS7 VCHT

 What is Hushmail?

 Hushmail is a web-based email service that lets you send and receive email
 in total security using OpenPGP standard algorithms. These algorithms,
 combined with Hushmail's unique key management system, provide unrivalled
 levels of security. Hushmail's encryption is automatic, transparent, and
 seamless - no special computer skills are required.

 How do I create a free Hushmail account?

 You can create a free Hushmail account by clicking on the following link:
 https://www.hushmail.com/
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Great Council of Internet Superheros

2008-08-14 Thread Ureleet
r u jealous because they are stealing ur troll thunder?

On Fri, Aug 8, 2008 at 2:31 PM, n3td3v [EMAIL PROTECTED] wrote:
 Stop spamming Full-Disclosure or i'll get your Hushmail account
 terminated and your parents informed.

 All the best,

 n3td3v

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Internet justice delivered [UPDATE ON M. ROTHMAN AND ALAN]

2008-08-14 Thread Ureleet
sic.

On Sun, Aug 10, 2008 at 11:07 AM, Squadron of Justice
[EMAIL PROTECTED] wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 We missed some relevant updates.

 Mike Rothman's phone number:
 +1 678-449-7183

 And some neat insight into Alan Shimel's income, his IRS forms
 scanned:

 http://bayimg.com/image/cakkdaabc.jpg
 SSN: 088-54-4202

 This guy earns 16k US dollars monthly. In the meanwhile, people
 are struggling in Africa to fight starvation, walking a few miles
 to bring non-edible water to their people.

 If Alan spared some dollars from paying abortions for his
 extramarital
 relationships and burgers at McDonalds, a few dozen families could
 realize there's a better world for them out there.

 This Great Council disapproves these abuses against humankind. An
 overweight man makes 16k-plus bucks a month just for blogging,
 taking phone calls, meeting other obese executives, and a child has
 to walk 4 miles in Africa to avoid dieing dehydrated.

 Alan Shimel goes to Disneyworld with his family (we won't release
 information on minors, or relatives unless they are associated
 with business or activities in the industry, superheroes have strict
 ethical codes and creeds) while other kids are brutally abused
 in Thailand by midget executives from Europe and the USA.

 See his reservation (if someone dares to do anything with his
 family information we will lay acts of Great Justice upon them,
 kids aren't to blame for their parents sins):

 http://vacation.disneyworld.com/T0RH02575A0A79374DCC3A15AFDA40

 These people, who claim to protect Internet infrastructure, who
 claim hacking does not mean breaking into systems. The same people
 who have never experienced breaking into a system with PaX, mprotect
 restrictions, 16 bit ASLR, and RBAC policies configured, the same
 people who have never backdoored a PHP extension on runtime, the
 same people who have never broken into Fortune 100 C-level
 executives
 mailboxes.

 On Sun, 10 Aug 2008 16:03:37 +0200 Night Ninja [EMAIL PROTECTED]
 wrote:
May great justice be had!  Whitehats enter my oven.

 Zeroday can happen to anyone. Especially if it's openssl flavored.

 Love,
 the Great Council of Internet Superheros.
 To protect exposure and serve ruin.
 -BEGIN PGP SIGNATURE-
 Charset: UTF8
 Note: This signature can be verified at https://www.hushtools.com/verify
 Version: Hush 3.0

 wpwEAQMCAAYFAkifBDQACgkQ5g5u/REitpZ0FQP/TGutvRBVnLG6+2X17fHbffC3jbK4
 SRc9NDvI3/QCmDbSc8JbEpUfGkTfgtQBbfPHQJj+69ujN9iF6/PypIoJGwczIQYR+BVd
 HfufQn3yzBwaFxvtO78ugngRDsQN1n5ppiio+YtVIlBrTNR/KYtryon+kfCiRO1KABbE
 xdz+25E=
 =LEBw
 -END PGP SIGNATURE-

 --
 Click here for great computer networking solutions!
 http://tagline.hushmail.com/fc/Ioyw6h4fM6mdPYIAVDpw8cBy8QcCxLirHsJLiRlgUfA4eQLXUtLq5q/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Cisco IOS Shellcodes

2008-08-14 Thread Gyan Chawdhary
Following our Cisco IOS shell code presentation at Blackhat Vegas 2008,
IRM has decided to release three variants of the IOS shell codes
discussed in the presentation. Following are the payloads that can be
used as both code execution based payloads and runtime memory resident
backdoors within IOS:-

 

*   Password protected bind shell -
http://www.irmplc.com/downloads/presentations/IOS_Bindshell_v.1.0.txt 

 

*   Connect Back Shell -
http://www.irmplc.com/downloads/presentations/IOS_Connectback_v.1.0.txt 

 

*   Two byte overwrite bind shell -
http://www.irmplc.com/downloads/presentations/IOS_tiny_v.1.0.txt 

 

 

Regards,

 

Gyan Chawdhary

Gyan Chawdhary | Senior Consultant

Information Risk Management Plc

8th Floor | Kings Buildings | Smith Square | London SW1P 3JJ

Tel: +44 (0)20 7808 6420

Fax: +44 (0)20 7808 6421

www.irmplc.com http://www.irmplc.com/ 

 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] (no subject)

2008-08-14 Thread Valdis . Kletnieks
On Wed, 13 Aug 2008 10:18:13 -, [EMAIL PROTECTED] said:

 Is it safe to follow the link in this email?
 
 Yes, it is safe to visit the Hushmail web site by following the link
 provided.

Which is, of course, what any miscreant who wanted you to visit a site that
will drop malware into your browser would say.

The risk is mitigated quite a bit for *this* e-mail because the link is in
a text/plain, so you're either cut-n-pasting the link and can see where you're
going, or your MUA has linkified it but you still can see the actual target.

Unfortunately, most users can't tell the difference between a link in a
text/plain and a href=http://127.0.0.1;http://www.goodstuff.com/a (and
you probably should double-check what your MUA did with the above line :)


pgpoTQqU7aK3y.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] SUSE Security Announcement: openwsman (SUSE-SA:2008:041)

2008-08-14 Thread Thomas Biege

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

__

SUSE Security Announcement

Package:openwsman
Announcement ID:SUSE-SA:2008:041
Date:   Thu, 14 Aug 2008 18:00:00 +
Affected Products:  openSUSE 10.3
openSUSE 11.0
Vulnerability Type: remote code execution
Severity (1-10):7
SUSE Default Package:   no
Cross-References:   CVE-2008-2233
CVE-2008-2234

Content of This Advisory:
1) Security Vulnerability Resolved:
 remote code execution, SSL session replay
   Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
- pdns
- dnsmasq
- gnome-screensaver
- mysql
- rdesktop
6) Authenticity Verification and Additional Information

__

1) Problem Description and Brief Discussion

   The openwsman project provides an implementation of the Web Service
   Management specification.
   The SuSE Security-Team has found two critical issues in the code: 
   - two remote buffer overflows while decoding the HTTP basic authentication
 header (CVE-2008-2234) 
   - a possible SSL session replay attack affecting the client (depending on
 the configuration) (CVE-2008-2233)
   Both issues were fixed.


2) Solution or Work-Around

   Please install the fixed package.


3) Special Instructions and Notes

   Please restart the openwsman daemon.


4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

 rpm -Fhv file.rpm

   to apply the update, replacing file.rpm with the filename of the
   downloaded RPM package.

   
   x86 Platform:
   
   openSUSE 11.0:
   
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/openwsman-debuginfo-2.0.0-3.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/debug/update/11.0/rpm/i586/openwsman-debugsource-2.0.0-3.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libwsman-devel-2.0.0-3.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libwsman1-2.0.0-3.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/openwsman-client-2.0.0-3.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/openwsman-python-2.0.0-3.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/openwsman-ruby-2.0.0-3.3.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/openwsman-server-2.0.0-3.3.i586.rpm
   
   openSUSE 10.3:
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/openwsman-1.2.0-14.4.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/openwsman-client-1.2.0-14.4.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/openwsman-devel-1.2.0-14.4.i586.rpm
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/openwsman-server-1.2.0-14.4.i586.rpm
   
   Sources:
   
   openSUSE 10.3:
   
http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/openwsman-1.2.0-14.4.src.rpm

__

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   - pdns
 This update of pdns offers better spoofing resistance by not
 ignoring invalid queries. (CVE-2008-3337)
 
   - dnsmasq
 This update of dnsmasq uses random UDP source ports and a random
 TRXID now. (CVE-2008-1447)
 
   - gnome-screensaver
 This update of gnome-screensaver disallows local users to read
 the contents of the clipboard for a locked screen using ctrl-v.
 (CVE-2007-6389)
 
   - mysql
 The database server MySQL was updated to fix two security problems.
 (CVE-2008-2079, CVE-2006-7232)
 
   - rdesktop
 Multiple problems have been fixed in rdesktop.
 (CVE-2008-1801, CVE-2008-1802, CVE-2008-1803)

__

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and 

Re: [Full-disclosure] Funniest thing at DefCon this year...

2008-08-14 Thread ff0000
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

beware, he's got superpower!

On Thu, 14 Aug 2008 07:04:19 +0200 Exibar [EMAIL PROTECTED]
wrote:
Was certainly the roll of 1000 stickers that was found near the
(then
closed) registration window, just sitting there inviting all to
take a bunch
of them

The stickers were 4 inches round, black with white lettering, and
said...

 N3TD3V
 SUCKS!


   I nearly fell on my ass I was laughing so hard!  Of course I
grabbed a
crapload of them too :-)


  Exibar

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQMCAAYFAkikUTEACgkQFDPTJDb6CsnFYQQAiyyeq5a5K3E2ygGjnbxINs8dNGpg
PxMFv4lWoRZWms13G9tJbY/2XD1F1eRLTSz2Rfyaasl4sN2JyBwF0y3FpQd6fQtUBviP
c3o4SUbhabMap1raqz0mL0rBRjm/oPf8Vox6RYyOCoa6kTTVAiPYed4z9LQlGKXMWzho
l7TjL5k=
=d0AA
-END PGP SIGNATURE-

--
Click here to become certified as a medical assistant at a school near you.
http://tagline.hushmail.com/fc/Ioyw6h4fsDDENKR8XnskI4ggH11znTCJ1ViEDmSBv69DHwPIj5oOVa/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZDI-08-052: OpenLDAP BER Decoding Remote DoS Vulnerability

2008-08-14 Thread zdi-disclosures
ZDI-08-052: OpenLDAP BER Decoding Remote DoS Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-052
August 14, 2008

-- CVE ID:
CVE-2008-2952

-- Affected Vendors:
OpenLDAP Foundation

-- Affected Products:
OpenLDAP Foundation OpenLDAP

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 6237. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to deny services on
vulnerable installations of OpenLDAP. Authentication is not required to
exploit this vulnerability. 

The specific flaw exists in the decoding of ASN.1 BER network datagrams.
When the size of a BerElement is specified incorrectly, the application
will trigger an assert(), leading to abnormal program termination.

-- Vendor Response:
OpenLDAP Foundation has issued an update to correct this vulnerability. 
More
details can be found at:

http://www.openldap.org/software/release/changes.html

-- Disclosure Timeline:
2008-06-26 - Vulnerability reported to vendor
2008-08-14 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Oscar Mira-Sanchez

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [EMAIL PROTECTED] 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Security Assessment of the Internet Protocol

2008-08-14 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hello, folks,

The United Kingdom's Centre for the Protection of National Infrastructure
has just released the document Security Assessment of the Internet
Protocol, on which I have had the pleasure to work during the last year or
so.

The motivation to produce this document is explained in the Preface of the
document as follows:

-  cut here 
The TCP/IP protocols were conceived during a time that was quite different
from the hostile environment they operate in now. Yet a direct result of
their
effectiveness and widespread early adoption is that much of today's
global economy remains dependent upon them.

While many textbooks and articles have created the myth that the Internet
Protocols (IP) were designed for warfare environments, the top level goal
for the DARPA Internet Program was the sharing of large service machines on
the ARPANET. As a result, many protocol specifications focus only on the
operational aspects of the protocols they specify and overlook their
security implications.

Though Internet technology has evolved, the building blocks are basically
the same core protocols adopted by the ARPANET more than two decades ago.
During the last twenty years many vulnerabilities have been identified in
the TCP/IP stacks of a number of systems. Some were flaws in protocol
implementations which affect only a reduced number of systems. Others were
flaws in the protocols themselves affecting virtually every existing
implementation. Even in the last couple of years researchers were still
working on security problems in the core protocols.

The discovery of vulnerabilities in the TCP/IP protocols led to reports
being published by a number of CSIRTs (Computer Security Incident Response
Teams) and vendors, which helped to raise awareness about the threats as
well as the best mitigations known at the time the reports were published.

Much of the effort of the security community on the Internet protocols did
not result in official documents (RFCs) being issued by the IETF (Internet
Engineering Task Force) leading to a situation in which known
security problems have not always been addressed by all vendors. In many
cases vendors have implemented quick fixes to protocol flaws without
a careful analysis of their effectiveness and their impact on
interoperability.

As a result, any system built in the future according to the official
TCP/IP specifications might reincarnate security flaws that have already
hit our communication systems in the past.

Producing a secure TCP/IP implementation nowadays is a very difficult task
partly because of no single document that can serve as a security roadmap
for the protocols.

There is clearly a need for a companion document to the IETF specifications
that discusses the security aspects and implications of the protocols,
identifies the possible threats, proposes possible counter-measures, and
analyses their respective effectiveness.

This document is the result of an assessment of the IETF specifications of
the Internet Protocol from a security point of view. Possible threats were
identified and, where possible, counter-measures were proposed.
Additionally, many implementation flaws that have led to security
vulnerabilities have been referenced in the hope that future
implementations will not incur the same problems. This document does not
limit itself to performing a security assessment of the relevant IETF
specification but also offers an assessment of common implementation
strategies.

Whilst not aiming to be the final word on the security of the IP, this
document aims to raise awareness about the many security threats based on
the IP protocol that have been faced in the past, those that we are
currently facing, and those we may still have to deal with in the future.
It provides advice for the secure implementation of the IP, and also
insights about the security aspects of the IP that may be of help to the
Internet operations community.

Feedback from the community is more than encouraged to help this document
be as accurate as possible and to keep it updated as new threats are
discovered.
-  cut here 

The document is available at CPNI's web site:
http://www.cpni.gov.uk/Products/technicalnotes/3677.aspx

Any comments will be more than welcome.

Kind regards,
Fernando Gont





-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.3 (Build 5003) - not licensed for commercial 
use: www.pgp.com

wsBVAwUBSKSBzGl+Jnd3SMmAAQhJPAgAq4SY+PG0ONFUsJDMWmadjKnG+LUSbyg6
Fnr/Up7HF59Z61r6/NXUG2TiUccu8u/ZE2ew7aUteAvbRM4sUWuQBlGXTRwgtv6S
PKxOCQ5luLJjxDN9cKCN5KfpMmkCazoUXgno1PblKQH9CSxmZJxipsDWDLTMJHfU
sGIwtX0bpgj4kWw+S3ycAwTRiwBApVYAZbzC58HwxhFbxZdLohGNdaAv8yuKskFP
hzsEOfKSvcmoqLVE3kvm/8prjZhfocBcc/7Pr5RFugbP0dhUkLxye6GOiyY/tEzL
XL3sDKc9lygfr/l1hk5ZDFpZcp0Rjw6REMo8MlojiM4+3qR1L2Ib8g==
=xJ/e
-END PGP SIGNATURE-


--
Fernando Gont
e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED]
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 

[Full-disclosure] ZDI-08-053: Symantec Veritas Storage Foundation Scheduler Service NULL Session Authentication Bypass Vulnerability

2008-08-14 Thread zdi-disclosures
ZDI-08-053: Symantec Veritas Storage Foundation Scheduler Service NULL 
Session Authentication Bypass Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-053
August 14, 2008

-- Affected Vendors:
Symantec

-- Affected Products:
Symantec Veritas Storage Foundation

-- Vulnerability Details:
This vulnerability allows an attacker to execute arbitrary code on
vulnerable installations of Symantec Veritas Storage Foundation. User
interaction is not required to exploit this vulnerability.
Authentication is not required to exploit this vulnerability.

The specific flaw exists in the functionality exposed by the Storage
Foundation for Windows Scheduler Service, VxSchedService.exe, which
listens by default on TCP port 4888. The management console allows NULL
NTLMSSP authentication thereby enabling a remote attacker to add,
modify, or delete snapshots schedules and consequently run arbitrary
code under the context of the SYSTEM user. 

-- Vendor Response:
Symantec has issued an update to correct this vulnerability. More
details can be found at:

http://www.symantec.com/avcenter/security/Content/2008.08.14a.html

-- Disclosure Timeline:
2008-06-26 - Vulnerability reported to vendor
2008-08-14 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Tenable Network Security

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

CONFIDENTIALITY NOTICE: This e-mail message, including any attachments,
is being sent by 3Com for the sole use of the intended recipient(s) and
may contain confidential, proprietary and/or privileged information.
Any unauthorized review, use, disclosure and/or distribution by any 
recipient is prohibited.  If you are not the intended recipient, please
delete and/or destroy all copies of this message regardless of form and
any included attachments and notify 3Com immediately by contacting the
sender via reply e-mail or forwarding to 3Com at [EMAIL PROTECTED] 
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ GLSA 200808-12 ] Postfix: Local privilege escalation vulnerability

2008-08-14 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200808-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: High
 Title: Postfix: Local privilege escalation vulnerability
  Date: August 14, 2008
  Bugs: #232642
ID: 200808-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Postfix incorrectly checks the ownership of a mailbox, allowing, in
certain circumstances, to append data to arbitrary files on a local
system with root privileges.

Background
==

Postfix is Wietse Venema's mailer that attempts to be fast, easy to
administer, and secure, as an alternative to the widely-used Sendmail
program.

Affected packages
=

---
 Package   /  Vulnerable  / Unaffected
---
  1  mail-mta/postfix  2.5.3-r1  *= 2.4.7-r1
   = 2.5.3-r1

Description
===

Sebastian Krahmer of SuSE has found that Postfix allows to deliver mail
to root-owned symlinks in an insecure manner under certain conditions.
Normally, Postfix does not deliver mail to symlinks, except to
root-owned symlinks, for compatibility with the systems using symlinks
in /dev like Solaris. Furthermore, some systems like Linux allow to
hardlink a symlink, while the POSIX.1-2001 standard requires that the
symlink is followed. Depending on the write permissions and the
delivery agent being used, this can lead to an arbitrary local file
overwriting vulnerability (CVE-2008-2936). Furthermore, the Postfix
delivery agent does not properly verify the ownership of a mailbox
before delivering mail (CVE-2008-2937).

Impact
==

The combination of these features allows a local attacker to hardlink a
root-owned symlink such that the newly created symlink would be
root-owned and would point to a regular file (or another symlink) that
would be written by the Postfix built-in local(8) or virtual(8)
delivery agents, regardless the ownership of the final destination
regular file. Depending on the write permissions of the spool mail
directory, the delivery style, and the existence of a root mailbox,
this could allow a local attacker to append a mail to an arbitrary file
like /etc/passwd in order to gain root privileges.

The default configuration of Gentoo Linux does not permit any kind of
user privilege escalation.

The second vulnerability (CVE-2008-2937) allows a local attacker,
already having write permissions to the mail spool directory which is
not the case on Gentoo by default, to create a previously nonexistent
mailbox before Postfix creates it, allowing to read the mail of another
user on the system.

Workaround
==

The following conditions should be met in order to be vulnerable to
local privilege escalation.

* The mail delivery style is mailbox, with the Postfix built-in
  local(8) or virtual(8) delivery agents.

* The mail spool directory (/var/spool/mail) is user-writeable.

* The user can create hardlinks pointing to root-owned symlinks
  located in other directories.

Consequently, each one of the following workarounds is efficient.

* Verify that your /var/spool/mail directory is not writeable by a
  user. Normally on Gentoo, only the mail group has write access, and
  no end-user should be granted the mail group ownership.

* Prevent the local users from being able to create hardlinks
  pointing outside of the /var/spool/mail directory, e.g. with a
  dedicated partition.

* Use a non-builtin Postfix delivery agent, like procmail or
  maildrop.

* Use the maildir delivery style of Postfix (home_mailbox=Maildir/
  for example).

Concerning the second vulnerability, check the write permissions of
/var/spool/mail, or check that every Unix account already has a
mailbox, by using Wietse Venema's Perl script available in the official
advisory.

Resolution
==

All Postfix users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =mail-mta/postfix-2.5.3-r1

References
==

  [ 1 ] CVE-2008-2936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936
  [ 2 ] CVE-2008-2937
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937
  [ 3 ] Official Advisory
http://article.gmane.org/gmane.mail.postfix.announce/110

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200808-12.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality 

[Full-disclosure] [PLSA 2008-24] Amarok: Privilege escalation

2008-08-14 Thread Pınar Yanardağ

Pardus Linux Security Advisory 2008-24[EMAIL PROTECTED]

   Date: 2008-08-15
   Severity: 2
   Type: Local


Summary
===

A security issue has been reported in Amarok, which can be exploited by
malicious,  local users  to  perform  certain  actions  with  escalated
privileges.


Description
===

The security issue is  caused  due  to  the
MagnatuneBrowser::listDownloadComplete() function handling  temporary
files in an insecure manner. This can be exploited via symlink  attacks
in combination with a race condition to overwrite arbitrary files  with
the privileges of the user running the application.


Affected packages:

   Pardus 2008:
 amarok, all before 1.4.9.1-52-4
 amarok-docs, all before 1.4.9.1-52-4

   Pardus 2007:
 amarok, all before 1.4.9.1-50-37
 amarok-docs, all before 1.4.9.1-50-38


Resolution
==

There are update(s) for amarok, amarok-docs. You can  update  them  via
Package Manager or with a single command from console:

   Pardus 2008:
 pisi up amarok amarok-docs

   Pardus 2007:
 pisi up amarok amarok-docs


References
==

   * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3699
   * http://secunia.com/advisories/31418
   * http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494765
   * http://websvn.kde.org/?view=revrevision=846626



-- 
Pardus Security Team
http://security.pardus.org.tr


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Cisco Security Advisory: Vulnerability in Cisco WebEx Meeting Manager ActiveX Control

2008-08-14 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory: Vulnerability in Cisco WebEx Meeting Manager
 ActiveX Control

Advisory ID: cisco-sa-20080814-webex

Revision 1.0

For Public Release 2008 August 14 2230 UTC (GMT)

+-

Summary
===

An ActiveX control (atucfobj.dll) that is used by the Cisco WebEx
Meeting Manager contains a buffer overflow vulnerability that may
result in a denial of service or remote code execution. The WebEx
Meeting Manager is a client-side program that is provided by the
Cisco WebEx meeting service. The Cisco WebEx meeting service
automatically downloads, installs, and configures Meeting Manager the
first time a user begins or joins a meeting.

When users connect to the WebEx meeting service, the WebEx Meeting
Manager is automatically upgraded to the latest version. There is a
manual workaround available for users who are not able to connect to
the WebEx meeting service.

Cisco WebEx is in the process of upgrading the meeting service
infrastructure with fixed versions of the affected file.

This advisory is posted at:

http://www.cisco.com/warp/public/707/cisco-sa-20080814-webex.shtml

Affected Products
=

Vulnerable Products
+--

The WebEx Meeting Manager downloads several components to meeting
participants before they join a WebEx meeting. The vulnerability in
this Security Advisory affects the atucfobj.dll library.

Products Confirmed Not Vulnerable
+

No other Cisco products are currently known to be affected by this
vulnerability.

Details
===

The WebEx meeting service is a hosted multimedia conferencing
solution that is managed by and maintained by Cisco WebEx. When a
meeting participant connects to the WebEx meeting service through a
web browser, the WebEx meeting service installs several components of
the WebEx Meeting Manager browser plugin on the meeting participant's
system.

WebEx Meeting Manager includes atucfobj.dll, a DLL that allows
meeting participants to view Unicode fonts. This library contains a
buffer overflow vulnerability that could allow an attacker to execute
arbitrary code.

The WebEx meeting service currently maintains three different
versions of software. WebEx meeting service servers run one of the
following versions: WBS 23, WBS 25, or WBS 26.

This vulnerability is documented in WebEx Bug IDs 292551 for WBS 26
and 306639 for WBS 25. This vulnerability has been assigned Common
Vulnerabilities and Exposures (CVE) identifier CVE-2008-2737.

Identifying WebEx Meeting Service Version
+

The following procedure allows meeting participants to identify the
version of client software that is provided by a WebEx server. The
procedure varies slightly depending on the version of the WebEx
server software. The URL in all the following examples is provided to
meeting participants as part of the WebEx meeting invite.

Client build numbers adhere to the format of XX.YY.ZZ.. The first
number indicates the major version number of the software build. For
example, a client build number of 26.49.9.2838 indicates a WBS
26-based software version.

For the WBS 26 version:

 1. Browse to the WebEx meeting server at
https://servername.webex.com/.
 2. Select Support from the left side of the web page.
 3. Select Downloads from the left side of the web page.
 4. The version of the client software that is provided by the server
is listed next to Client build.

For WebEx servers that are running WBS 26, the first fixed version is
26.49.9.2838. Client build versions prior to 26.49.9.2838 are
vulnerable.

For the WBS 25 version:

 1. Browse to the WebEx meeting server at
https://servername.webex.com/.
 2. Select Assistant on the left side of the page.
 3. Select the Support link.
 4. Select the Version link, which is displayed on the right side of
the top of the page.
 5. The Client Build version is displayed in a pop-up window.

There is currently no fixed version for the WBS 25-based WebEx
meeting service. This section of the Security Advisory will be
updated when fixed version information is available.

For the WBS 23 version:

Servers that run WBS 23-based WebEx meeting service display version
information using the following URL format:

https://servername.webex.com/version/wbxversionlist.do?siteurl=servername

On the redisplayed page the Client versions in files field will
indicate the Client Build.

For example: The 'T23' in WBXclient-T23L10NSP33EP13-1092.txt
indicates a WBS 23-based system.

Cisco WebEx is not planning to repair WBS 23-based software. Affected
WBS 23-based servers will be upgraded to fixed WBS 25 or WBS 26-based
software.

Attack Vector Details
+

This Security Advisory addresses a vulnerable ActiveX control
(atucfobj.dll). If atucfobj.dll is present on a client's computer, it
may be possible

[Full-disclosure] UPDATE!! Funniest thing at DefCon this year...

2008-08-14 Thread Exibar
 I'll be n3td3v himself (themselves) put that n3td3v sux! Sticker roll there
themselves

  They're pretty decent stickers too  Funny as heck!

  Exibar

-Original Message-
From: Ureleet [mailto:[EMAIL PROTECTED] 
Sent: Thursday, August 14, 2008 11:25 AM
To: Exibar
Cc: full-disclosure@lists.grok.org.uk
Subject: [inbox] Re: [Full-disclosure] Funniest thing at DefCon this year...

and i missed em.  fuck.

On Thu, Aug 14, 2008 at 1:04 AM, Exibar [EMAIL PROTECTED] wrote:

 Was certainly the roll of 1000 stickers that was found near the (then
 closed) registration window, just sitting there inviting all to take a
bunch
 of them

 The stickers were 4 inches round, black with white lettering, and said...

  N3TD3V
  SUCKS!


   I nearly fell on my ass I was laughing so hard!  Of course I grabbed a
 crapload of them too :-)


  Exibar

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] weev, baby

2008-08-14 Thread Tea Baggins
what did I tell you? you've been naughty. you need to stop being such a bad
boy. only bad boys wright such shitty c code. the hallcats are on to you, my
love.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/