[Full-disclosure] FD subject line/name of org suggestion...

2008-12-10 Thread - o z -
Hi everyone!

Is it just me, or is it normal for everyone else *not* to usually see  
the entire exploit notification, e.g.,
subject line in client:

[Full-disclosure] [ GL** #-0* ] Critical Squirrel Meat Timer v. 
371117a Threat to Earth and All Inhabitants

'(cut 
  off right about @Meat Timer) [date]'

What has happened over time (10+ years) is that while average desktop  
space has grown, font real-estate
has shrunk.   Way more stuff is on-screen.  We're bombarded with even  
more info, some of it critical, and yeah,
maybe some of us like to keep current 'cause we live & breath infosec  
and have to "kill -s netdev 666" just to
make sense of it all sometimes.  Belay that, nothing, nothing makes  
sense there...makes my orange
run like clockwork.   That's it!

Using an informal survey method, most of my peers display FD the same  
waycritical version info is usually obscuficated
(or it's something else dearly important...say what you want...the  
community is creative with names).

It would be easier on the eyes and achieve a better productivity  
metric for my capitalist oppressors if the sub. line read:

[Full-disclosure] Warning goes here .xxx [good  
job, now put your name/date thingy here, right here!]

When my FD mailbox has 1000+ messages, many of them pertaining to  
software I'm responsible for, it would make
it easier if the subject line devoted as much space possible for the  
'sploit...firstfollowed by the author's naming convention.

Credit will be remembered no matter what, since if it affects you, it  
will be opened.  If it's been a long night or day,
whoa, it's easy to overlook something I shouldn't.   Right now it's  
like, "Wow, that was some exploit I saw by
'insert name here and date' -- sure wish I could have read it at one  
glance, damn..."

Somebody might be screaming, "Dude, change your settings" -- and  
they're right.  I should and do...but still have the same
issue, on a variety of clients -- increasing available subject line  
space helps, regardless.  Some org. ID's rent *16!*
characters in the subj. line, and the last five can be a real bitch,  
i.e., "v.371117" -- etc.

Maybe some of 'ya think this is persnickety, and hell, it might be,  
it's just the 'best job, least amount of time thing.'
It just makes more sense to me is all, quite unlike my apparent  
deteriorating cognitive & grammatical abilities.

-oz









___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Black Hat: New Webinar, Japan audio now on-line.

2008-12-10 Thread jmoss
Full Disclosure peeps, some new content to consume.

NEW FREE WEBCAST - Oracle Database Forensics

Black Hat's webcast series continues with another powerful presentation from
a popular Black Hat speaker. This month's presenter is David Litchfield of
NGS software, speaking on Oracle database forensics, and he will be
releasing a new tool called orablock which he describes this way:

"Orablock allows a forensic investigator to dump data from a "cold" Oracle
data file - i.e. there's no need to load up the data file in the database
which would cause the data file to be modified, so using orablock preserves
the evidence. Orablock can also be used to locate "stale" data - i.e. data
that has been deleted or updated. It can also be used to dump SCNs for data
blocks which can be useful during the examination of a compromised Oracle
box."

Please join us to learn about Oracle DB forensics from one of the innovators
of the field, as well as learn about his new tool and to get your questions
answered. The webcast will be held on December 18 at 1pm PST. The URL for
registration is:
http://w.on24.com/r.htm?e=122240&s=1&k=57F93C9128D5D1BBC64B8AE7177FB981

For more information about Black Hat's webcast series, including an archive
of our previous webcasts in audio format:
https://www.blackhat.com/webinars/webinars-index.html

BLACK HAT JAPAN audio is now online!
Encoded in .m4b format these audio files are tiny, as well as being
bookmarkable and iTunes friendly.
https://www.blackhat.com/html/bh-japan-08/brief-bh-jp-08-archives.html

UPCOMING BLACK HAT EVENTS

The next big Black Hat event is Black Hat DC, scheduled for February 16-19
at the Hyatt Regency Crystal City in Arlington Virginia. The event is divide
into two sections with two days of intense, hands-on Training Sessions
followed by a two-day, four-track Briefings portion with a wide variety of
exciting speakers and presentations. Black Hat DC is a unique information
security event that places a special emphasis on the needs of security
professionals who work in government service and infrastructure. And we
think this one will be our best DC event yet. Even though the Black Hat DC
Call for Papers doesn't close until January 1, but we've already confirmed
some exciting Briefings presentations.

- Crowd favorite Adam Laurie will return with a satellite-hacking
presentation that is sure to be popular.
- Database guru David Litchfield will present a powerful new database
forensics tool.
- Andrew Lindell's contribution is entitled  "Making Privacy-Preserving data
Mining Practical with Smartcards."
- In the hardware hacking area we have a very interesting presentation from
Travis Goodspeed on reverse engineering and exploiting wireless sensors.

Our lineup of brand new training sessions includes a physical security
training by Zac Franken and Adam Laurie entitled "RFID, Access Control and
Biometric Systems", a Metasploit course called "Tactical Exploitation" by
Metasploit creator HD Moore and a course on "Understanding and Deploying
DNNSEC" by Paul Wouters and Patrick Nauber.

As always, it's best to register early for the training of your choice to
make sure there's a place for you - seats are limited. To learn more about
all of our training courses, follow this link:
https://www.blackhat.com/html/bh-dc-09/train-bh-dc-09-index.html

REGISTER NOW
Please keep in mind that the early bird rate that's in effect for the
Briefings and the Training classes will end on January 1. To take advantage
of those significant savings, please consider registering soon.  The Black
Hat Europe early bird rate ends February 1 - we'll have more details about
that event in our next mailing.

CFP OPEN FOR BLACK HAT DC AND EUROPE
Another reminder is that Black Hat is still considering Briefings speaker
applications for both Black Hat DC and Black Hat Europe, so if you have a
strong, compelling and technical presentation to share, please let us know!
To be considered for Black Hat DC, you'll need to have your work in our
system by January 1. The deadline is February 1 for the Black Hat Europe
CFP, the details for potential presenters are available online:
https://cfp.blackhat.com/

GET INVOLVED WITH BLACK HAT!

- Join the Black Hat LinkedIn group and participate in discussions and
comment on news.
http://www.linkedin.com/groups?gid=37658&trk=hb_side_g

- Share your pictures of past events, or just check out ours:
Yes it is just getting started, but please post your Black Hat pics.
http://www.flickr.com/photos/[EMAIL PROTECTED]/

-Follow us on Twitter:
https://twitter.com/blackhatusa2008

-Subscribe to our main RSS feed to get timely announcements that won't be in
monthly newsletters:
https://www.blackhat.com/BlackHatRSS.xml

Thank you,
Jeff Moss
Director of Black Hat, CMP Media LLC

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [FULL DISCLOSURE] Facebook Non Persistant XSS

2008-12-10 Thread Chris Evans
On Tue, Dec 9, 2008 at 2:41 PM, Facebook IsBuggy
<[EMAIL PROTECTED]> wrote:
> Found in August, I tried to alert facebook as quickly as was possible
> - however I received no further correspondence to my communications.
> At time of writing, it was possible to exploit both Firefox 3 and IE 7
> - by simply using an IFRAME or even an object tag. (Dependant on the
> browser target)
>
> This allows you to overwrite the whole page with your choice of script/embed.

Although the domain is 2.channel15.facebook.com, all the significant
Facebook cookies appear to be .facebook.com domain cookies so wouldn't
the more significant attack involve those, rather than some elaborate
phishing scheme?

>
> Vulnerability was found by accident when I was routing my web traffic
> via WebScarab with an advanced list of strings to use with the
> in-built XSS/CSRF tool.
>
> 
>
> http://2.channel15.facebook.com/iframe/7/?pv=49&rev=";>Google src="http://www.google.com/"; type="text/html" width="100%"
> height="100%">
>
> Naturally that rather obvious URL could be encoded, or cut down to
> prevent the obvious anomaly. However, I feel the facebook domain name
> itself would be enough to fool most users.

This is not a significant aspect of this vulnerability.
You could go and register http://www.facebook-secure.com/ (or similar)
and that would leave users more than happy to believe & trust it is
Facebook.
Things can be different if the XSS is on an https-supporting login
domain, but that does not seem to be the case here.

Cheers
Chris

>
> http://2.channel15.facebook.com/iframe/7/?pv=49&rev=%22%3E%3C/script%3E%3Ctitle%3EGoogle%3C/title%3E%3C/head%3E%3C/body%3E%3CIFRAME%20src%3D%22http%3A//www.google.com/%22%20type%3D%22text/html%22%20width%3D%22100%25%22%20height%3D%22100%25%22%3E%3C/IFRAME%3E
>
> 
>
> *Similar vulnerabilities had been spoken about on a credit card fraud
> (carding) forum prior to my discovery of this. Possibly for the use of
> phisihing.*
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] AST-2008-012: Remote crash vulnerability in IAX2

2008-12-10 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2008-012

   ++
   |   Product| Asterisk|
   |--+-|
   |   Summary| Remote crash vulnerability in IAX2  |
   |--+-|
   |  Nature of Advisory  | Remote Crash|
   |--+-|
   |Susceptibility| Remote Unauthenticated Sessions |
   |--+-|
   |   Severity   | Major   |
   |--+-|
   |Exploits Known| No  |
   |--+-|
   | Reported On  | November 22, 2008   |
   |--+-|
   | Reported By  |Jon Leren Scho/pzinsky   |
   |--+-|
   |  Posted On   | |
   |--+-|
   |   Last Updated On| December 9, 2008|
   |--+-|
   |   Advisory Contact   | Mark Michelson|
   |--+-|
   |   CVE Name   | |
   ++

   ++
   | Description | There is a possibility to remotely crash an Asterisk |
   | | server if the server is configured to use realtime IAX2  |
   | | users. The issue occurs if either an unknown user|
   | | attempts to authenticate or if a user that uses hostname |
   | | matching attempts to authenticate.   |
   | |  |
   | | The problem was due to a broken function call to |
   | | Asterisk's realtime configuration API.   |
   ++

   ++
   |   Resolution| The function calls in question have been fixed.  |
   ++

   ++
   |   Affected Versions|
   ||
   | Product | Release Series | |
   |-++-|
   |  Asterisk Open Source   | 1.2.x  | 1.2.26-1.2.30.3 |
   |-++-|
   |  Asterisk Open Source   | 1.4.x  | Unaffected  |
   |-++-|
   |  Asterisk Open Source   | 1.6.x  | Unaffected  |
   |-++-|
   | Asterisk Addons | 1.2.x  | Unaffected  |
   |-++-|
   | Asterisk Addons | 1.4.x  | Unaffected  |
   |-++-|
   | Asterisk Addons | 1.6.x  | Unaffected  |
   |-++-|
   |Asterisk Business Edition| A.x.x  | Unaffected  |
   |-++-|
   |Asterisk Business Edition| B.x.x  | B.2.3.5-B.2.5.5 |
   |-++-|
   |Asterisk Business Edition| C.x.x  | Unaffected  |
   |-++-|
   |   AsteriskNOW   |  1.5   | Unaffected  |
   |-++-|
   |   s800i (Asterisk Appliance)| 1.2

[Full-disclosure] Browser Security Handbook

2008-12-10 Thread Michal Zalewski
Hi all,

I am happy to announce the availability of our "Browser Security Handbook" 
- a comprehensive, 60-page document meant to provide web application 
developers and information security researchers with a one-stop reference 
to several hundred key security properties and sometimes counterintuitive 
quirks in contemporary web browsers:

   http://code.google.com/p/browsersec/wiki/Main

Having a clear picture of these characteristics appears to be of 
significance to building secure web applications, and to auditing existing 
designs for potential weaknesses. For this reason, I am hoping that the 
document is a valuable contribution to the information security community.

BSH currently covers recent releases of Microsoft Internet Explorer 
(versions 6 and 7), Mozilla Firefox (versions 2 and 3), Apple Safari, 
Opera, Google Chrome, Android embedded browser, and a handful of browser 
plugins.

Please note that due to the sheer number of characteristics covered, I 
fully expect some kinks to show up here and there; feedback from vendors 
and security researchers is greatly appreciated.

Cheers,
/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ GLSA 200812-11 ] CUPS: Multiple vulnerabilities

2008-12-10 Thread Pierre-Yves Rofes

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200812-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

   Severity: High
  Title: CUPS: Multiple vulnerabilities
   Date: December 10, 2008
   Bugs: #238976, #249727
 ID: 200812-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Several remotely exploitable bugs have been found in CUPS, which allow
remote execution of arbitrary code.

Background
==

CUPS is the Common Unix Printing System.

Affected packages
=

 ---
  Package /  Vulnerable  /   Unaffected
 ---
   1  net-print/cups < 1.3.9-r1 >= 1.3.9-r1

Description
===

Several buffer overflows were found in:

* The read_rle16 function in imagetops (CVE-2008-3639, found by
   regenrecht, reported via ZDI)

* The WriteProlog function in texttops (CVE-2008-3640, found by
   regenrecht, reported via ZDI)

* The Hewlett-Packard Graphics Language (HPGL) filter (CVE-2008-3641,
   found by regenrecht, reported via iDefense)

* The _cupsImageReadPNG function (CVE-2008-5286, reported by iljavs)

Impact
==

A remote attacker could send specially crafted input to a vulnerable
server, resulting in the remote execution of arbitrary code with the
privileges of the user running the server.

Workaround
==

None this time.

Resolution
==

All CUPS users should upgrade to the latest version.

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-print/cups-1.3.9-r1"

References
==

   [ 1 ] CVE-2008-3639
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639
   [ 2 ] CVE-2008-3640
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640
   [ 3 ] CVE-2008-3641
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641
   [ 4 ] CVE-2008-5286
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

   http://security.gentoo.org/glsa/glsa-200812-11.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5




signature.asc
Description: OpenPGP digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] CA ARCserve Backup LDBserver Vulnerability

2008-12-10 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Title: CA ARCserve Backup LDBserver Vulnerability


CA Advisory Date: 2008-12-10


Reported By:
Dyon Balding of Secunia Research


Impact: A remote attacker can cause a denial of service or execute 
arbitrary code.


Summary: CA ARCserve Backup contains a vulnerability that can 
allow a remote attacker to cause a denial of service or execute 
arbitrary code. CA has issued patches to address the 
vulnerability. The vulnerability, CVE-2008-5415, is due to 
insufficient verification of client data. A remote attacker can 
crash the LDBserver service or execute arbitrary code in the 
context of the service. Note: The client installation is not 
affected.


Mitigating Factors: The client installation is not affected.


Severity: CA has given this vulnerability a High risk rating.


Affected Products:
CA ARCserve Backup r12.0 Windows
CA ARCserve Backup r11.5 Windows*
CA ARCserve Backup r11.1 Windows*
CA Server Protection Suite r2
CA Business Protection Suite r2
CA Business Protection Suite for Microsoft Small Business Server 
   Standard Edition r2
CA Business Protection Suite for Microsoft Small Business Server 
   Premium Edition r2

*Formerly known as BrightStor ARCserve Backup.


Non-Affected Products
CA ARCserve Backup r12.0 Windows SP1


Affected Platforms:
Windows


Status and Recommendation:
CA has issued the following patches to address the vulnerability.

CA ARCserve Backup r12.0 Windows:
Apply Service Pack 1 (RO01340)

CA ARCserve Backup r11.5 Windows:
RO04383

CA ARCserve Backup r11.1 Windows:
RO04382

CA Protection Suites r2:
RO04383


How to determine if you are affected:

CA ARCserve Backup r12.0 Windows,
CA ARCserve Backup r11.5 Windows:

1. Run the ARCserve Patch Management utility. From the Windows 
   Start menu, it can be found under:
   Programs > CA > ARCserve Patch Management > Patch Status

2. The main patch status screen will indicate if the respective 
   patch in the below table is currently applied. If the patch is 
   not applied, the installation is vulnerable.

Product Patch
CA ARCserve Backup r12.0 WindowsRO01340
CA ARCserve Backup r11.5 Windows*   RO04383

For more information on the ARCserve Patch Management utility, 
read document TEC446265.

Alternatively, use the file information below to determine if the 
product installation is vulnerable.

CA ARCserve Backup r11.1 Windows:

1. Using Windows Explorer, locate the file "DBserver.dll". By 
   default, the file is located in the 
   "C:\Program Files\CA\BrightStor ARCserve Backup" directory.

2. Right click on the file and select Properties.

3. Select the General tab.

4. If the file timestamp is earlier than indicated in the table 
   below, the installation is vulnerable.

Product version:  CA ARCserve Backup r11.1 Windows
File Name:  DBserver.dll
File Size:  675840 bytes
Timestamp:  11/25/2008 09:32:21

*CA Protection Suites r2 includes CA ARCserve Backup 11.5


Workaround: None


References (URLs may wrap):
CA Support:
http://support.ca.com/
Security Notice for CA ARCserve Backup LDBserver
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=1942
93
Solution Document Reference APARs:
RO01340, RO04383, RO04382
CA Security Response Blog posting:
CA ARCserve Backup LDBserver Vulnerability
community.ca.com/blogs/casecurityresponseblog/archive/2008/12/10.aspx
Reported By: 
Dyon Balding of Secunia Research
CVE References:
CVE-2008-5415 - LDBserver code execution
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5415
OSVDB References: Pending
http://osvdb.org/


Changelog for this advisory:
v1.0 - Initial Release


Customers who require additional information should contact CA
Technical Support at http://support.ca.com.

For technical questions or comments related to this advisory, 
please send email to vuln AT ca DOT com.

If you discover a vulnerability in CA products, please report your 
findings to the CA Product Vulnerability Response Team.
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=1777
82


Regards,
Ken Williams, Director ; 0xE2941985
CA Product Vulnerability Response Team


CA, 1 CA Plaza, Islandia, NY 11749

Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2008 CA. All rights reserved.

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.9.0 (Build 397)
Charset: utf-8

wj8DBQFJQC8NeSWR3+KUGYURAgM3AJ0Y07s2AHILwcEFx6TnBquybQMfbACgkbwX
ZVMX5nrB//gqq9wcOpUXlgY=
=dBR8
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2008:240 ] vinagre

2008-12-10 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2008:240
 http://www.mandriva.com/security/
 ___

 Package : vinagre
 Date: December 10, 2008
 Affected: 2008.1, 2009.0
 ___

 Problem Description:

 Alfredo Ortega found a flaw in how Vinagre uses format strings.
 A remote attacker could exploit this vulnerability if they were able to
 trick a user into connecting to a malicious VNC server, or opening a
 specially crafted URI with Vinagre.  With older versions of Vinagre,
 it was possible to execute arbitrary code with user privileges.
 In later versions, Vinagre would abort, leading to a denial of service.
 
 The updated packages have been patched to prevent this issue.
 ___

 Updated Packages:

 Mandriva Linux 2008.1:
 a8a6ada09391c2e6a84b21e9df02be0a  
2008.1/i586/vinagre-0.5.0-1.1mdv2008.1.i586.rpm 
 eb08aeb2f86562c079477bf0c478c546  
2008.1/SRPMS/vinagre-0.5.0-1.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 edeeac6c489b5d1f3863f292c030318f  
2008.1/x86_64/vinagre-0.5.0-1.1mdv2008.1.x86_64.rpm 
 eb08aeb2f86562c079477bf0c478c546  
2008.1/SRPMS/vinagre-0.5.0-1.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 b09a10bb652f5d9afa23e076e139d87c  
2009.0/i586/vinagre-2.24.0-1.1mdv2009.0.i586.rpm 
 a22e09709e3c947737a2eefa29983175  
2009.0/SRPMS/vinagre-2.24.0-1.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 5e6214867963cc0d8c3776b05212567a  
2009.0/x86_64/vinagre-2.24.0-1.1mdv2009.0.x86_64.rpm 
 a22e09709e3c947737a2eefa29983175  
2009.0/SRPMS/vinagre-2.24.0-1.1mdv2009.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJQAIdmqjQ0CJFipgRAlQ0AJ4hS6N/kMl+qoEFXgeuvtX88t7JDwCg0wfX
5HuiWdeJVkEsonVh7+XKfA0=
=TpM8
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] iDefense Security Advisory 12.10.08: Microsoft Excel Malformed Object Memoy Corruption Vulnerability

2008-12-10 Thread iDefense Labs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

iDefense Security Advisory 12.09.08
http://labs.idefense.com/intelligence/vulnerabilities/
Dec 09, 2008

I. BACKGROUND

Excel is the spreadsheet application included with Microsoft Corp.'s
Office productivity software suite. More information is available at
the following website:

http://office.microsoft.com/excel/

II. DESCRIPTION

Remote exploitation of a memory corruption vulnerability in Microsoft
Corp.'s Excel spreadsheet could allow attackers to execute arbitrary
code with the privileges of the current user.

This issue exists in the handling of certain malformed object records
within an Excel spreadsheet (XLS), allowing memory corruption to occur.
This could lead to an exploitable situation.

iDefense's proof of concept code can redirect the program execution flow
to a user controllable address on Excel 2000 SP3, and crash on other
versions of Excel, including Excel XP SP3, Excel 2003 SP3 and Excel
2007 SP1.

III. ANALYSIS

Exploitation allows an attacker to execute arbitrary code in the context
of the currently logged-on user. To exploit this vulnerability, the
attacker must persuade a user to open a specially crafted Excel (XLS)
document.

Likely attack vectors include sending the file as an e-mail attachment
or linking to the file on a website. By default, systems with Office
2000 installed will open Office documents, including Excel spreadsheet
files, from websites without prompting the user. This allows attackers
to exploit this vulnerability without user interaction. Later versions
of Office do not open these documents automatically unless the user has
chosen this behavior.

Using the Office Document Open Confirmation Tool for Office 2000 can
prevent Office files from opening automatically from web sites. Use of
this tool is highly recommended for users still using Office 2000.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability with Office
2000 SP3 fully patched as of July 2008.

V. WORKAROUND

iDefense is currently unaware of any effective workaround for this
issue, since the vulnerability exists in the core component of Excel.

VI. VENDOR RESPONSE

Microsoft Corp. has released a patch which addresses this issue. For
more information, consult their advisory at the following URL.

http://www.microsoft.com/technet/security/bulletin/ms08-074.mspx

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-4265 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

07/21/2008  Initial Vendor Notification
07/22/2008  Initial Vendor Reply
07/24/2008  Additional Vendor Feedback
12/09/2008  Coordinated Public Disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2008 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail [EMAIL PROTECTED] for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
~ There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJQB6ebjs6HoxIfBkRAjKTAKD3meNs6BwgFJhQDoUlNy6qqa09ZQCdFLST
XWdAq1pjchUyhLQ94ZfT2uE=
=atK5
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] 21 Million German bank accounts stolen

2008-12-10 Thread James Matthews
Also money transfers are traceable I am guessing that they also have EC
card data.

On Wed, Dec 10, 2008 at 2:06 PM, Jost Krieger
<[EMAIL PROTECTED]<[EMAIL PROTECTED]>
> wrote:

> On Tue, Dec 09, 2008 at 04:11:48PM +0200, James Matthews wrote:
> > German banks are some of the oldest in the world. This is pretty scary
> > however it is also the reality of germanys new laws... I hope they find
> it
> > soon and protect the people that need to be protected
> > http://it.slashdot.org/it/08/12/09/0125201.shtml
>
> What Slashdot doesn't say:
>
> What was disclosed were 1.2 million account numbers plus additional
> information, but not means of access. This is bad enough of course.
>
> The 21 million were claimed to be available by the perps, which is
> believable, as they tried to sell them to a newspaper.
>
> The trail seems to lead to small call centers, where someone collects
> these data and sells them on the side. The banks seem not to be
> involved at all.
>
> If you find this all weird, payments in Germany work totally different
> from the US. Noone uses checks for private payments, either you use
> money transfer or you have the money directly pulled from your account
> (and you can call it back for at least 6 weeks). So a lot of people know
> your account number.
>
> Jost
> --
> | Helft Spam ausrotten!HTML in Mail ist unhöflich. |
> | Postmaster, JAPH, manchmal Wahrsager   am RZ der RUB |
> | Wahre Worte sind nicht gefällig, gefällige Worte sind nicht wahr.|
> |  Lao Tse, Tao Te King 81 |
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
http://www.goldwatches.com/

http://www.jewelerslounge.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] U.S. Is Losing Global Cyberwar, Commission Says

2008-12-10 Thread Elazar Broad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

"You should revisit this opinion after you're out of school and in
the workforce for 5 years. :)"

6 years and counting, a little cynicism never hurt anyone. On a
side note, I am well aware of the impact that PCI has had on the
industry(currently involved in a project which falls in the realm
of PCI compliance), those on the council as well as the those in
the field pushing and advocating the standards have done some great
work, unfortunately(and it is not their fault), its not enough...

On Wed, 10 Dec 2008 11:27:19 -0500 Michael Krymson
<[EMAIL PROTECTED]> wrote:
>Like tiny Link holding the almighty Triforce braced overhead
>glinting in the
>sunlight, so too shall we raise up PCI to the heavens as our
>shining,
>guiding light of all things good; it will save us from all evils,
>so shall
>it be...
>
>You should revisit this opinion after you're out of school and in
>the
>workforce for 5 years. :)
>
>On Tue, Dec 9, 2008 at 1:53 PM, Luke Scharf <[EMAIL PROTECTED]>
>wrote:
>
>> Elazar Broad wrote:
>> > Neither, because ultimately no one cares, and that is why the
>> > financial industry foots the 60 billion identity theft bill.
>My
>> > rant was a little bit of wishful thinking and a shred of
>belief in
>> > the human race...
>> >
>>
>> Having been a student in a computer-security training class
>taught by
>> one of the people who helps banks deal with these problems, I'd
>say
>> you're wrong.  This is a hard set of problems.  Smart people are
>working
>> on it -- not everywhere, but in enough places to make a
>difference.
>>
>> Read the PCI and learn its role in the financial industry.  Then
>this
>> conversation will become interesting.  Here's a link to get you
>started:
>>http://en.wikipedia.org/wiki/PCI_DSS
>>
>> -Luke
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpsEAQECAAYFAkk//FkACgkQi04xwClgpZgMQAP4wPXhHHNSUdNuxFIwP3OXChR4kuID
orrJj0QyJn9kvz7b8B3J00g5xrTAOr51HXECr6uPE1YXl9LqvBxt41mqznml8pttVoQt
F7hF2uQ4TBMGc0I7EXOxfHgRKRnyhvN1yDhkmQl51bT7fw94ISWYYQhTvscnRMkV4R26
tiSHOg==
=Avgu
-END PGP SIGNATURE-

--
Click for free information on earning a medical transcriptionist degree.
 
http://tagline.hushmail.com/fc/PnY6qxthN5XQLNMTzhTyL6rrUEkhz4FESxwZfHZaXjMaNHKOpaXrS/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] U.S. Is Losing Global Cyberwar, Commission Says

2008-12-10 Thread Elazar Broad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Financial IT has much competence, the problem is the red tape and
politics that many face when trying to get the job done, but then
again, you have that everywhere, I am just venting/lamenting over
it...

On Wed, 10 Dec 2008 12:23:38 -0500 Luke Scharf
<[EMAIL PROTECTED]> wrote:
>Michael Krymson wrote:
>> Like tiny Link holding the almighty Triforce braced overhead
>glinting in the
>> sunlight, so too shall we raise up PCI to the heavens as our
>shining,
>> guiding light of all things good; it will save us from all
>evils, so shall
>> it be...
>>
>> You should revisit this opinion after you're out of school and
>in the
>> workforce for 5 years. :)
>>
>
>The OP seemed to think that there was no competence in financial
>IT.  I
>know firsthand that  are some smart people, but, like everywhere
>else,
>there must be more than enough morons too -- especially given what
>I've
>been hearing in the news, lately.
>
>But, hey, I work in academia, not the financial industry and I
>should
>better than to post to FD -- so, whatever.  *shrug*
>
>-Luke
>
>
>___
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQECAAYFAkk//qgACgkQi04xwClgpZh+rgP/cvuk1UUANZZI8DITKfOXDaKH9M1I
gv5dKJVBWkk5UulB1QX7f2h0VALh5iGgS4UIOoRA7OJNsiJXaLwKMxAKpDvdouJDHNKd
b6PTCqT3GvS7JSR2QVqNkhDCmuyoC52ZGsWc4zXvo1fv16D30JnFGUgx+OSN8u1R5l8b
2nOnGyY=
=253G
-END PGP SIGNATURE-

--
Click here for free information on business phone systems from top companies.
 
http://tagline.hushmail.com/fc/PnY6qxu9tWBLk71Xl9cycxiWlxre6C3YgHWw4ZPSMTuljZWL8GEO0/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] U.S. Is Losing Global Cyberwar, Commission Says

2008-12-10 Thread Luke Scharf
Michael Krymson wrote:
> Like tiny Link holding the almighty Triforce braced overhead glinting in the
> sunlight, so too shall we raise up PCI to the heavens as our shining,
> guiding light of all things good; it will save us from all evils, so shall
> it be...
>
> You should revisit this opinion after you're out of school and in the
> workforce for 5 years. :)
>   

The OP seemed to think that there was no competence in financial IT.  I
know firsthand that  are some smart people, but, like everywhere else,
there must be more than enough morons too -- especially given what I've
been hearing in the news, lately.

But, hey, I work in academia, not the financial industry and I should
better than to post to FD -- so, whatever.  *shrug*

-Luke


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ GLSA 200812-10 ] Archive::Tar: Directory traversal vulnerability

2008-12-10 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200812-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Archive::Tar: Directory traversal vulnerability
  Date: December 10, 2008
  Bugs: #192989
ID: 200812-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A directory traversal vulnerability has been discovered in
Archive::Tar.

Background
==

Archive::Tar is a Perl module for creation and manipulation of tar
files.

Affected packages
=

---
 Package/  Vulnerable  /Unaffected
---
  1  perl-core/Archive-Tar   < 1.40>= 1.40

Description
===

Jonathan Smith of rPath reported that Archive::Tar does not check for
".." in file names.

Impact
==

A remote attacker could entice a user or automated system to extract a
specially crafted tar archive, overwriting files at arbitrary locations
outside of the specified directory.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Archive::Tar users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=perl-core/Archive-Tar-1.40"

References
==

  [ 1 ] CVE-2007-4829
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4829

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200812-10.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: This is a digitally signed message part.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200812-09 ] OpenSC: Insufficient protection of smart card PIN

2008-12-10 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200812-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: OpenSC: Insufficient protection of smart card PIN
  Date: December 10, 2008
  Bugs: #233543
ID: 200812-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Smart cards formatted using OpenSC do not sufficiently protect the PIN,
allowing attackers to reset it.

Background
==

OpenSC is a smart card application that allows reading and writing via
PKCS#11.

Affected packages
=

---
 Package  /  Vulnerable  /  Unaffected
---
  1  dev-libs/opensc  < 0.11.6   >= 0.11.6

Description
===

Chaskiel M Grundman reported that OpenSC uses weak permissions (ADMIN
file control information of 00) for the 5015 directory on smart cards
and USB crypto tokens running Siemens CardOS M4.

Impact
==

A physically proximate attacker can exploit this vulnerability to
change the PIN on a smart card and use it for authentication, leading
to privilege escalation.

Workaround
==

There is no known workaround at this time.

Resolution
==

All OpenSC users should upgrade to the latest version, and then check
and update their smart cards:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.11.6"
# pkcs15-tool --test-update
# pkcs15-tool --test-update --update

References
==

  [ 1 ] CVE-2008-2235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200812-09.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[EMAIL PROTECTED] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
===

Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: This is a digitally signed message part.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass

2008-12-10 Thread Toni Koivunen
Hrm,
Are you talking about linux AV by F-Secure or linux AV by F-Prot.

These are different companies. Also, a short glance on both company
websites tells pretty much that neither have 4.X strain as the latest.

Usually when posting vulns on software it's recommended to use the latest
and greatest versions.

my 0.02 euros.

--Toni

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] U.S. Is Losing Global Cyberwar, Commission Says

2008-12-10 Thread Michael Krymson
Like tiny Link holding the almighty Triforce braced overhead glinting in the
sunlight, so too shall we raise up PCI to the heavens as our shining,
guiding light of all things good; it will save us from all evils, so shall
it be...

You should revisit this opinion after you're out of school and in the
workforce for 5 years. :)

On Tue, Dec 9, 2008 at 1:53 PM, Luke Scharf <[EMAIL PROTECTED]> wrote:

> Elazar Broad wrote:
> > Neither, because ultimately no one cares, and that is why the
> > financial industry foots the 60 billion identity theft bill. My
> > rant was a little bit of wishful thinking and a shred of belief in
> > the human race...
> >
>
> Having been a student in a computer-security training class taught by
> one of the people who helps banks deal with these problems, I'd say
> you're wrong.  This is a hard set of problems.  Smart people are working
> on it -- not everywhere, but in enough places to make a difference.
>
> Read the PCI and learn its role in the financial industry.  Then this
> conversation will become interesting.  Here's a link to get you started:
>http://en.wikipedia.org/wiki/PCI_DSS
>
> -Luke
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [IVIZ-08-011] ClamAV lzh unpacking segmentation fault

2008-12-10 Thread iViZ Security Advisories
---
[ iViZ Security Advisory 08-01110/12/2008 ]
---
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
---

* Title: ClamAV lzh unpacking segmentation fault
* Date:  10/12/2008
* Software:  ClamAV 0.93.3 and prior

--[ Synopsis:

Clamav uses an external unpacker, which can be deterministically crashed,
when processing corrupted LZH files.

--[ Affected Software:

  * ClamAV 0.93.3 and prior

--[ Non Affected Software:

  * ClamAV 0.94 and newer

--[ Impact:

Remote DoS, possibly remote code execution.

--[ Vendor response:

  * "Support for external unpackers has been dropped in 0.94 for
security issues".

--[ Credits:

This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

--[ Disclosure timeline:

  * First private disclosure to vendor on October 14th 2008
  * First vendor reply on October 15th 2008 : issue fixed.

--[ Reference:

http://www.ivizsecurity.com/security-advisory.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [IVIZ-08-014] AVG antivirus for Linux vulnerability

2008-12-10 Thread iViZ Security Advisories
---
[ iViZ Security Advisory 08-01410/12/2008 ]
---
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
---

* Title: AVG antivirus for Linux vulnerability
* Date:  10/12/2008
* Software:  AVG version 7.5.51

--[ Synopsis:

AVG antivirus can be deterministically forced to crash
(segmentation fault) when analyzing corrupted UPX files.


--[ Affected Software:

  * AVG for Linux version 7.5.51 (current), possibly others.

--[ Impact:

Remote DoS, possibly remote code execution.

--[ Vendor response:

  * None.

--[ Credits:

This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

--[ Disclosure timeline:

  * First attempt to contact the vendor on September 18th 2008.
  * Received an automated reply on September 18th 2008.
  * No actual reponse from vendor in spite of our multiple emails.

--[ Reference:

http://www.ivizsecurity.com/security-advisory.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [IVIZ-08-012] Bitdefender antivirus for Linux multiple vulnerabilities

2008-12-10 Thread iViZ Security Advisories
---
[ iViZ Security Advisory 08-01210/12/2008 ]
---
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
---

* Title: Bitdefender antivirus for Linux multiple vulnerabilities.
* Date:  10/12/2008
* Software:  Bitdefender v7 for Linux

--[ Synopsis:

Multiple integer overflows were discovered in the GNU/Linux
version of Bitdefender when analyzing corrupted PE binaries
packed with neolite and asprotect packers.

--[ Affected Software:

  * Bitdefender for GNU/Linux version 7.60825 and earlier.

--[ Non Affected Software:

  * Bitdefender for GNU/Linux version after v7.60825 and newer.

--[ Impact:

Remote DoS, possibly remote code execution.

--[ Final vendor response:

  * The vendor acknowledged the problems and fixed them
in the latest versions of the product.

--[ Credits:

This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

--[ Disclosure timeline:

  * First private disclosure to vendor on September 19th 2008.
  * First vendor reply on September 19th 2008 : Without asking for any PoC,
The BitDefender Support Team states that "This has been fixed in
latest version".
  * September 19th 2008 : We manage to repeat crash with the updated
version of the scanner.
  * September 19th 2008 : We send a PoC to the vendor.
  * September 23th 2008 : Vendor states "Yes, the issue was reproduced
in the lab and it
seems that was an engine problem."
  * September 24th 2008 : Problem fixed in latest version.

--[ Reference:

http://www.ivizsecurity.com/security-advisory.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [IVIZ-08-015] Sophos Antivirus for Linux vulnerability

2008-12-10 Thread iViZ Security Advisories
---
[ iViZ Security Advisory 08-01510/12/2008 ]
---
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
---

* Title: Sophos Antivirus for Linux vulnerability
* Date:  10/12/2008
* Software:  Sophos SAVScan 4.33.0 for Linux

--[ Synopsis:

Sophos Antivirus deterministically crashes (segmentation fault)
when analyzing corrupted packed files for multiple packers :
armadillo, asprotect, asprotectSKE. The same behavior has also
been observed when analyzing corrupted CAB files.


--[ Affected Software:

  * Sophos SAVScan 4.33.0 for Linux, possibly others

--[ Impact:

Remote DoS, possibly remote code execution.

--[ Vendor response:

  * Vendor acknowledged the problems and will "fix the issues" in the
next release.

--[ Credits:

This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

--[ Disclosure timeline:


--[ Reference:

http://www.ivizsecurity.com/security-advisory.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass

2008-12-10 Thread iViZ Security Advisories
---
[ iViZ Security Advisory 08-01610/12/2008 ]
---
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
---

* Title: F-Secure f-prot Antivirus for Linux corrupted ELF header
 Security Bypass.
* Date:  10/12/2008
* Software:  f-prot version 4.6.8 for GNU/Linux

--[ Synopsis:

It is possible to protect an ELF binary against
f-prot by corrupting its ELF header, while letting
the binary completely functional. F-prot will crash
when analyzing the file, letting the possible malware
undetected.

--[ Affected Software:

   * f-prot version 4.6.8 for GNU/Linux

--[ Impact:

Remote DoS, possibly remote code execution.

--[ Vendor response:

   * No vendor response

--[ Credits:

This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

--[ Disclosure timeline:

  * First private disclosure to vendor on September 1st 2008.

--[ Reference:

http://www.ivizsecurity.com/security-advisory.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [IVIZ-08-013] Avast antivirus for Linux multiple vulnerabilities

2008-12-10 Thread iViZ Security Advisories
---
[ iViZ Security Advisory 08-01310/12/2008 ]
---
iViZ Techno Solutions Pvt. Ltd.
http://www.ivizsecurity.com
---

* Title: Avast antivirus for Linux multiple vulnerabilities.
* Date:  10/12/2008
* Software:  Avast for Workstations v1.0.8

--[ Synopsis:

Multiple buffer overflows were discovered in the GNU/Linux
version of Avast when analyzing corrupted ISO and RPM files.

--[ Affected Software:

  * Avast for Workstations v1.0.8 Trial versions, possibly others.

--[ Impact:

Remove DoS, possibly remote code execution.

--[ Vendor response:

  * On September 24th 2008, the vendor stated :
"With (the) mentioned version of avast4workstation 1.0.8_2, indeed,
this bug existed. It was a stack-overflow, caused by cycling over
intertwined directories on corrupted ISO files. All versions built
since 22.1.2008 have this fixed. Thanks for your report."

--[ Credits:

This vulnerability was discovered by Security Researcher
Jonathan Brossard from iViZ Techno Solutions Pvt. Ltd.

--[ Disclosure timeline:

  * First private disclosure to vendor on September 18th 2008.
  * First vendor reply on September 19th 2008.
  * On September 23th 2008, the vendor claims to have fixed the problem :
"my colleague identified the problem few minutes ago as a bug which was
fixed 22. Jan 2008."
  * On October 15th 2008, the vulnerable trial version link hasn't been updated:
http://download664.avast.com/files/linux/avast4workstation_1.0.8-2_i386.deb

--[ Reference:

http://www.ivizsecurity.com/security-advisory.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CORE-2008-0228: Microsoft Word Malformed FIB Arbitrary Free Vulnerability

2008-12-10 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

  Core Security Technologies - CoreLabs Advisory
   http://www.coresecurity.com/corelabs/

  Microsoft Word Malformed FIB Arbitrary Free Vulnerability



1. *Advisory Information*

Title: Microsoft Word Malformed FIB Arbitrary Free Vulnerability
Advisory ID: CORE-2008-0228
Advisory URL: http://www.coresecurity.com/content/word-arbitrary-free
Date published: 2008-12-10
Date of last update: 2008-12-10
Vendors contacted: Microsoft
Release mode: Coordinated release


2. *Vulnerability Information*

Class: Arbitrary free
Remotely Exploitable: Yes (client-side)
Locally Exploitable: No
Bugtraq ID: 29633
CVE Name: CVE-2008-4024


3. *Vulnerability Description*

A vulnerability has been found in the way that Microsoft Word handles
specially crafted Word files. The vulnerability could allow remote code
execution if a user opens a specially crafted Word file that includes a
malformed record value. An attacker who successfully exploited this
vulnerability could execute arbitrary code with the privileges of the
user running the MS Word application.

More specifically, a Word file with a specially crafted 'lcbPlcfBkfSdt'
field value (offset '0x4f0') inside the File Information Block (FIB) can
corrupt the heap structure on vulnerable Word versions and enable an
arbitrary free with controlled values.


4. *Vulnerable packages*

   . Microsoft Word 2000 Service Pack 3
   . Microsoft Word 2002 Service Pack 3


5. *Non-vulnerable packages*

   . Microsoft Word 2003 Service Pack 3
   . Microsoft Word 2007


6. *Vendor Information, Solutions and Workarounds*

Microsoft has released patches for this vulnerability. For more
information refer to the Microsoft Security Bulletin MS08-072 released
on December 9th, 2008, available at
http://www.microsoft.com/technet/security/Bulletin/ms08-072.mspx

Microsoft recommends that customers apply the update immediately.


7. *Credits*

This vulnerability was discovered and researched by Ricardo Narvaja,
from CORE IMPACT's Exploit Writing Team (EWT), Core Security Technologies.


8. *Technical Description / Proof of Concept Code*

A vulnerability has been found in the way that Microsoft Word handles
specially crafted Word files. A Word file with a specially crafted
'lcbPlcfBkfSdt' field value (offset '0x4f0') inside the File Information
Block (FIB) can corrupt the heap structure on vulnerable Word versions,
and enable an arbitrary free with controlled values. If successfully
exploited, this vulnerability could allow an attacker to execute
arbitrary code on vulnerable systems with the privileges of the user
running the MS Word application.

To construct a PoC file that demonstrates this bug it is sufficient to
use Microsoft Word 2007 to generate a Word 97-2003 compatible '.doc'
file, and then change the byte at offset 0x4f0, this is the
'lcbPlcfBkfSdt' field value located inside the File Information Block
(FIB). By simply changing this byte from 0 to 1, we obtain a file that
will make vulnerable Word versions crash when closing the file. This can
be improved to make Word crash when opening the file by changing some
other values. This fact was detected using automated fuzzing.

In location 0x2b80, there is an arbitrary pointer that can be controlled
to choose the address that will be used as parameter of a call to the
free function '__MsoPvFree'. If the 'lcbPlcfBkfSdt' value is 0,
modifying this pointer has no effect. But if this value is 1, then
modifying this arbitrary pointer will cause the free function to close
the program.

The execution of '__MsoPvFree' is reached with two controlled values,
the pointer that was directly changed in the .doc file and the contents
of the memory position that it points to. That is, both of them are
controlled, one directly and the other in an indirect manner, we can
thus fully control the effect of the free function.

The exploitation of this bug depends on the construction of a file such
that different arbitrary blocks are allocated when closing the file
before 'free' is called. However this scenario is complex due to the
limitations of the '__MsoPvFree' API, including checks that make the
exploitation difficult.

The vendor's analysis indicates that the root cause of this
vulnerability is the processing of a 'PlfLfo' structure that is read in
from the file. It contains an array of 'Lfo' objects. If any of those
'Lfo' objects has a 'clfolvl' value of 0 and a 'plfolvl' (the previous 4
bytes) value that is non-zero, Word will attempt to free memory at
'plfolvl'. This is because 'plfolvl' is supposed to be overwritten with
a valid pointer to allocated memory, but if 'clfolvl' is 0 this
initialization step is skipped. Later on cleanup code will check if
'plfolvl' has a non-zero value and if so, attempt to free the memory
chunk it points to.

A Proof of Concept '.doc' file which makes Word 2000 and Word 2002 crash
('WINWORD.EXE', main thread, module 'MS09') is available at [2]. An
illustrated explanati

[Full-disclosure] CYBSEC News - New sapyto release (v0.98)

2008-12-10 Thread Mariano Nuñez Di Croce
Hello list,

I'm glad to let you know that a new version of sapyto, the SAP Penetration 
Testing Framework, is available.

You can download it by accessing the following link: 
http://www.cybsec.com/EN/research/sapyto.php

News in this version:
-

This version is mainly a complete re-design of sapyto's core and architecture 
to support future releases. Some of the new features now available are:

. Target configuration is now based on "connectors", which represent different 
ways to communicate with SAP services and components. This makes the
framework extensible to handle new types of connections to SAP platforms.

. Plugins are now divided in three categories:
. Discovery: Try to discover new targets from the 
configured/already-discovered ones.
. Audit: Perform some kind of vulnerability check over configured 
targets.
. Exploit: Are used as proofs of concept for discovered vulnerabilities.

. Exploit plugins now generate shells and/or sapytoAgent objects.

. New plugins!: User account bruteforcing, client enumeration, SAProuter 
assessment, and more...

. Plugin-developer interface drastically simplified and improved.

. New command switches to allow the configuration of targets/scripts/output 
independently.

. Installation process and general documentation improved.

. Many (*many*) bugs fixed. :P


Enjoy!
Cheers,

-- 
-
Mariano Nuñez Di Croce

CYBSEC S.A. Security Systems
Email: [EMAIL PROTECTED]
Tel/Fax: (54-11) 4371-
Web: http://www.cybsec.com
PGP: http://www.cybsec.com/pgp/mnunez.txt
-


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] List Charter

2008-12-10 Thread Stuart Dunkeld
On Wed, Dec 10, 2008 at 1:44 PM, Ureleet <[EMAIL PROTECTED]> wrote:
> now, what is the point in sending this out to the list, if no1 ever
> enforces any part of it?
>
> On Wed, Dec 10, 2008 at 5:13 AM, John Cartwright <[EMAIL PROTECTED]> wrote:
>>
>> [Full-Disclosure] Mailing List Charter

Because it's up to individual list members to abide by the charter:
most do, some don't, as I'm sure you've noticed.

--stuart

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] We're letting the bad guys win

2008-12-10 Thread infolookup
Care to share a few with the rest of us :).
Sent from my Verizon Wireless BlackBerry

-Original Message-
From: Ureleet <[EMAIL PROTECTED]>

Date: Wed, 10 Dec 2008 08:42:22 
To: n3td3v<[EMAIL PROTECTED]>
Cc: 
Subject: Re: [Full-disclosure] We're letting the bad guys win


this is not a serious mailing list.  this is an announcement nd a
bitching list.  there r serious mailing lists, and im on sum.  this
aint 1.

On Wed, Dec 10, 2008 at 3:51 AM, n3td3v <[EMAIL PROTECTED]> wrote:
> On Tue, Dec 9, 2008 at 9:50 PM, Some Guy Posting To Full Disclosure
> <[EMAIL PROTECTED]> wrote:
>> a stupid fat kid attempting to be funny with his freinds
>
> This is a serious mailing list not one where there are kids fooling
> around, they would be too scared to post here because of the military,
> government and intelligence services who are HUMINT subscribed.
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] List Charter

2008-12-10 Thread Ureleet
now, what is the point in sending this out to the list, if no1 ever
enforces any part of it?

On Wed, Dec 10, 2008 at 5:13 AM, John Cartwright <[EMAIL PROTECTED]> wrote:
>
> [Full-Disclosure] Mailing List Charter
> John Cartwright <[EMAIL PROTECTED]>
>
>
> - Introduction & Purpose -
>
> This document serves as a charter for the [Full-Disclosure] mailing
> list hosted at lists.grok.org.uk.
>
> The list was created on 9th July 2002 by Len Rose, and is primarily
> concerned with security issues and their discussion.  The list is
> administered by John Cartwright.
>
> The Full-Disclosure list is hosted and sponsored by Secunia.
>
>
> - Subscription Information -
>
> Subscription/unsubscription may be performed via the HTTP interface
> located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure.
>
> Alternatively, commands may be emailed to
> [EMAIL PROTECTED], send the word 'help' in
> either the message subject or body for details.
>
>
> - Moderation & Management -
>
> The [Full-Disclosure] list is unmoderated. Typically posting will be
> restricted to members only, however the administrators may choose to
> accept submissions from non-members based on individual merit and
> relevance.
>
> It is expected that the list will be largely self-policing, however in
> special circumstances (eg spamming, misappropriation) then offending
> members may be removed from the list by the management.
>
> An archive of postings is available at
> http://lists.grok.org.uk/pipermail/full-disclosure/.
>
>
> - Acceptable Content -
>
> Any information pertaining to vulnerabilities is acceptable, for
> instance announcement and discussion thereof, exploit techniques and
> code, related tools and papers, and other useful information.
>
> Gratuitous advertisement, product placement, or self-promotion is
> forbidden.  Disagreements, flames, arguments, and off-topic discussion
> should be taken off-list wherever possible.
>
> Humour is acceptable in moderation, providing it is inoffensive.
> Politics should be avoided at all costs.
>
> Members are reminded that due to the open nature of the list, they
> should use discretion in executing any tools or code distributed via
> this list.
>
>
> - Posting Guidelines -
>
> The primary language of this list is English. Members are expected to
> maintain a reasonable standard of netiquette when posting to the list.
>
> Quoting should not exceed that which is necessary to convey context,
> this is especially relevant to members subscribed to the digested
> version of the list.
>
> The use of HTML is discouraged, but not forbidden. Signatures will
> preferably be short and to the point, and those containing
> 'disclaimers' should be avoided where possible.
>
> Attachments may be included if relevant or necessary (e.g. PGP or
> S/MIME signatures, proof-of-concept code, etc) but must not be active
> (in the case of a worm, for example) or malicious to the recipient.
>
> Vacation messages should be carefully configured to avoid replying to
> list postings. Offenders will be excluded from the mailing list until
> the problem is corrected.
>
> Members may post to the list by emailing
> [EMAIL PROTECTED] Do not send subscription/
> unsubscription mails to this address, use the -request address
> mentioned above.
>
>
> - Charter Additions/Changes -
>
> The list charter will be published at
> http://lists.grok.org.uk/full-disclosure-charter.html.
>
> In addition, the charter will be posted monthly to the list by the
> management.
>
> Alterations will be made after consultation with list members and a
> concensus has been reached.
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] We're letting the bad guys win

2008-12-10 Thread Ureleet
no, n3tdev, u r wrong.  again.

if we email u in private, u forward the email 2 the list?  u do the
same thing, 2 every1!  do we need to pull up the archives 2 prove it?
dont be hypocritical.

im not trying 2 get u down 2 my level.  i really am trying 2 get u 2
leave.  pretty simple.

On Tue, Dec 9, 2008 at 8:23 PM, n3td3v <[EMAIL PROTECTED]> wrote:
> On Tue, Dec 9, 2008 at 9:50 PM, Some Guy Posting To Full Disclosure
> <[EMAIL PROTECTED]> wrote:
>> ok this is what this whole thing looks like to me:
>
> They (Ureleet) try to get my attention, they don't care if I stop or
> not, they flame me. If I email them in private, then they forward the
> message to the list and keep the noise going.
>
> They aren't interested in me leaving the list, they are interested in
> being troublemakers and bring me down to their level.
>
> You like me are gullible and naive to respond to them, I have stopped
> responding to them and so should you, pretend you don't see their
> posts.
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] We're letting the bad guys win

2008-12-10 Thread Ureleet
this is not a serious mailing list.  this is an announcement nd a
bitching list.  there r serious mailing lists, and im on sum.  this
aint 1.

On Wed, Dec 10, 2008 at 3:51 AM, n3td3v <[EMAIL PROTECTED]> wrote:
> On Tue, Dec 9, 2008 at 9:50 PM, Some Guy Posting To Full Disclosure
> <[EMAIL PROTECTED]> wrote:
>> a stupid fat kid attempting to be funny with his freinds
>
> This is a serious mailing list not one where there are kids fooling
> around, they would be too scared to post here because of the military,
> government and intelligence services who are HUMINT subscribed.
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] We're letting the bad guys win

2008-12-10 Thread Ureleet
i like ur email.  will note it.

On Tue, Dec 9, 2008 at 4:50 PM, Some Guy Posting To Full Disclosure
<[EMAIL PROTECTED]> wrote:
> ok this is what this whole thing looks like to me:
>
> To n3td3v:
> You often post ideas and express your opinion to this list. The  some
> (often the more liberal) of us often disagree with you and others mock
> you for your adventurousness. Actually sometimes it looks childish,
> almost as if you're desperately trying to propose the big new thing
> that changes the world.
> The thing is your posting to a list where really, all that happens is
> people (mostly sec companies) post information on vulnerabilities in
> software and news in the sec field.
> You say you came here for information, then LEACH like the rest of us
> - just shut up. If you want a mailing list for proposed security
> project ideas then make one.
> You're enthusiastic and a dreamer who's obviously very forward and
> ambitious with that excellence. Just think before you talk, and maybe
> do something, like sit down and think:
> I want to be $A(as in what you're going to do with your LIFE!). To be
> that I need to get $B done. To do that I have to do $C[]/*<-that's a
> list(:s)*/.
>
> To all that oppose n3td3v:
> Some of you (UreLeet + others) get a little too excited and flame. If
> you don't like how someone acts, what they have to say, who they are:
> then shut up! You don't need to bully something into submission just
> because you don't like it. If you get some angry rush feeling when you
> see a some stupid fat kid majorly embarrass himself by attempting to
> be funny with his freinds and just looking like that annoying retard
> kid the don't bully him! Be gentle and point out the problem
> (privately) (of course first think are you really of a knowledge and
> responsibility to instruct this child how to change his life) OR, much
> better: shut up, and go take your (own) anger out somewhere else, PC
> games do it for me,  -
> even that's good enough.
> btw  n3td3v - I don't think you're a retarded fat child (ur not right?).
>
> Come to think about it: We're being listened to by a bunch of other
> people, mostly geeks who think FD is the shitz where all the l33t sec
> companies go for their patches and sec news (it isn't!). But are we
> all just doing this crap for the benefit of out audience. I mean I
> could have written these things to the individuals they where intended
> for. Hell I could have taken my own advice and shut up, blocked the
> troublesome email addresses, and carried on with my life (I'm a
> hobbiest). Are You All Just Doing This For The Benefit Of The Sec Gods
> We Wish We Where?  THINK ABOUT IT
>
> Oh also I don't care about me - I'm a leach, I'll should probably not
> post on this list unless I have something decent to say too.
>
> On 12/9/08, Ureleet <[EMAIL PROTECTED]> wrote:
>> thats all he does is deflect, weve established that he never gives a
>> real answer.
>>
>> On Tue, Dec 9, 2008 at 12:25 PM, Elazar Broad <[EMAIL PROTECTED]> wrote:
>>> -BEGIN PGP SIGNED MESSAGE-
>>> Hash: SHA1
>>>
>>> Brilliant use of deflection, keep it up, you might end up as some
>>> loser serial rapist on Law and Order, oh wait, they want actor's,
>>> not the real thing...
>>>
>>> On Tue, 09 Dec 2008 11:55:08 -0500 n3td3v <[EMAIL PROTECTED]>
>>> wrote:
On Tue, Dec 9, 2008 at 3:08 PM, Paul Schmehl
<[EMAIL PROTECTED]> wrote:
> --On Tuesday, December 09, 2008 00:25:18 -0600
[EMAIL PROTECTED] wrote:
>
>>
>> On Tue, 09 Dec 2008 04:03:57 GMT, n3td3v said:
>>> We need to stop this back and forth fighting its making
infosec look
>>> bad, this isn't what infosec should be about.
>>
>> It's making one very small insignificant corner of infosec look
bad.
>>
>> Let's keep a sense of perspective, guys.
>
> Or, to look at it another way, it's tying up all the idiots in
one place and
> keeping the rest of infosec unsullied.  :-)
>

I agree,
But full-disclosure shouldn't be full of idiots so why do we let
it be
that way. It's because we reply to them that it happens. I was
gullible and naive to reply to them, i'm not replying to them
anymore.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
>>> -BEGIN PGP SIGNATURE-
>>> Charset: UTF8
>>> Note: This signature can be verified at https://www.hushtools.com/verify
>>> Version: Hush 3.0
>>>
>>> wpwEAQECAAYFAkk+qhEACgkQi04xwClgpZg3kQP9GEBAH9byz3/fJKvWHN9IFX0ycf17
>>> 0LS0fUg/5BRHXck+a2uEZsNujlKoMYyl1XshW+HWH0rwmDTw/1S88vCqULiqiMI7yXD0
>>> G01L1MDkA+dM9ntF0IHSPUz3r2a4qVfP4D8o6KB45oDizZOLiCB5zGQdV5g1hwlHEBsL
>>> KMecN/o=
>>> =dDzW
>>> -END PGP SIGNATURE-
>>>
>>> --
>>> Click for free info on getting an MBA, $200K/ year potential.
>>>
>>> http://tagline.hushmail.com/fc/PnY6qxsZwU

[Full-disclosure] Microsoft SQL Server 2005 sp_replwritetovarbin memory overwrite (update to SEC Consult SA-20081209)

2008-12-10 Thread Bernhard Mueller
Update to SEC Consult Security Advisory 20081210-0
(Microsoft SQL Server sp_replwritetovarbin limited memory overwrite
vulnerability)
===

Summary:


By calling the extended stored procedure sp_replwritetovarbin, an
attacker can write limited values to arbitrary locations in process
memory. This vulnerability has been described in a prior security
advisory for MS SQL Server 2000:

http://www.securityfocus.com/archive/1/499042

Moreno Zilli of Swisscom has reported that MS SQL Server 2005 is
vulnerable to the same attack. This has been confirmed in a lab test
conducted by SEC Consult.
Our public security advisory has been updated accordingly:

http://www.sec-consult.com/files/20081209_mssql-sp_replwritetovarbin_memwrite.txt



Workaround:
---

Remove the sp_replwriterovarbin extended stored procedure. Run the
following as an administrator:

execute dbo.sp_dropextendedproc 'sp_replwritetovarbin'

See also:

"Removing an Extended Stored Procedure from SQL Server"
http://msdn.microsoft.com/en-us/library/aa215995(SQL.80).aspx


Patch:
--

According to an email received by Microsoft in September, a fix for this
vulnerability has been completed.
The release schedule for this fix is currently unknown.


Vendor timeline:
---
Vendor notified: 2008-04-17
Vendor response: 2008-04-17
Last response from Microsoft: 09-29-2008
Request for update status 1: 10-14-2008
Request for update status 2: 10-29-2008
Request for update status 3: 11-12-2008
Request for update status 4
and prenotification about advisory release date: 11-28-2008
Public release: 12-09-2008
Update (added MS-SQL 2005): 12-10-2008


SEC Consult Unternehmensberatung GmbH

Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria

Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
www.sec-consult.com

EOF Bernhard Mueller / @2008

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] 21 Million German bank accounts stolen

2008-12-10 Thread Jost Krieger
On Tue, Dec 09, 2008 at 04:11:48PM +0200, James Matthews wrote:
> German banks are some of the oldest in the world. This is pretty scary
> however it is also the reality of germanys new laws... I hope they find it
> soon and protect the people that need to be protected
> http://it.slashdot.org/it/08/12/09/0125201.shtml

What Slashdot doesn't say:

What was disclosed were 1.2 million account numbers plus additional
information, but not means of access. This is bad enough of course.

The 21 million were claimed to be available by the perps, which is
believable, as they tried to sell them to a newspaper.

The trail seems to lead to small call centers, where someone collects
these data and sells them on the side. The banks seem not to be
involved at all.

If you find this all weird, payments in Germany work totally different
from the US. Noone uses checks for private payments, either you use
money transfer or you have the money directly pulled from your account
(and you can call it back for at least 6 weeks). So a lot of people know
your account number.

Jost
-- 
| Helft Spam ausrotten!HTML in Mail ist unhöflich. |
| Postmaster, JAPH, manchmal Wahrsager   am RZ der RUB |
| Wahre Worte sind nicht gefällig, gefällige Worte sind nicht wahr.|
|  Lao Tse, Tao Te King 81 |


smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] List Charter

2008-12-10 Thread John Cartwright

[Full-Disclosure] Mailing List Charter
John Cartwright <[EMAIL PROTECTED]>
 

- Introduction & Purpose -

This document serves as a charter for the [Full-Disclosure] mailing 
list hosted at lists.grok.org.uk.

The list was created on 9th July 2002 by Len Rose, and is primarily 
concerned with security issues and their discussion.  The list is 
administered by John Cartwright.

The Full-Disclosure list is hosted and sponsored by Secunia.


- Subscription Information -

Subscription/unsubscription may be performed via the HTTP interface 
located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure.

Alternatively, commands may be emailed to 
[EMAIL PROTECTED], send the word 'help' in 
either the message subject or body for details.

 
- Moderation & Management -

The [Full-Disclosure] list is unmoderated. Typically posting will be
restricted to members only, however the administrators may choose to 
accept submissions from non-members based on individual merit and 
relevance.

It is expected that the list will be largely self-policing, however in
special circumstances (eg spamming, misappropriation) then offending 
members may be removed from the list by the management.

An archive of postings is available at 
http://lists.grok.org.uk/pipermail/full-disclosure/.
 

- Acceptable Content -

Any information pertaining to vulnerabilities is acceptable, for 
instance announcement and discussion thereof, exploit techniques and 
code, related tools and papers, and other useful information.

Gratuitous advertisement, product placement, or self-promotion is 
forbidden.  Disagreements, flames, arguments, and off-topic discussion 
should be taken off-list wherever possible.

Humour is acceptable in moderation, providing it is inoffensive. 
Politics should be avoided at all costs.

Members are reminded that due to the open nature of the list, they 
should use discretion in executing any tools or code distributed via
this list.
 

- Posting Guidelines -

The primary language of this list is English. Members are expected to 
maintain a reasonable standard of netiquette when posting to the list. 

Quoting should not exceed that which is necessary to convey context, 
this is especially relevant to members subscribed to the digested 
version of the list.

The use of HTML is discouraged, but not forbidden. Signatures will 
preferably be short and to the point, and those containing 
'disclaimers' should be avoided where possible.

Attachments may be included if relevant or necessary (e.g. PGP or 
S/MIME signatures, proof-of-concept code, etc) but must not be active 
(in the case of a worm, for example) or malicious to the recipient.

Vacation messages should be carefully configured to avoid replying to 
list postings. Offenders will be excluded from the mailing list until 
the problem is corrected.

Members may post to the list by emailing 
[EMAIL PROTECTED] Do not send subscription/
unsubscription mails to this address, use the -request address 
mentioned above.


- Charter Additions/Changes -

The list charter will be published at 
http://lists.grok.org.uk/full-disclosure-charter.html.

In addition, the charter will be posted monthly to the list by the 
management.

Alterations will be made after consultation with list members and a 
concensus has been reached.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1684-1] New lcms packages fix multiple vulnerabilities

2008-12-10 Thread Devin Carraway
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1684[EMAIL PROTECTED]
http://www.debian.org/security/   Devin Carraway
December 10, 2008 http://www.debian.org/security/faq
- 

Package: lcms
Vulnerability  : multiple vulnerabilities
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)  : CVE-2008-5316 CVE-2008-5317

Two vulnerabilities have been found in lcms, a library and set of
commandline utilities for image color management.  The Common
Vulnerabilities and Exposures project identifies the following
problems:

CVE-2008-5316

Inadequate enforcement of fixed-length buffer limits allows an
attacker to overflow a buffer on the stack, potentially enabling
the execution of arbitrary code when a maliciously-crafted
image is opened.

CVS-2008-5317

An integer sign error in reading image gamma data could allow an
attacker to cause an under-sized buffer to be allocated for
subsequent image data, with unknown consequences potentially
including the execution of arbitrary code if a maliciously-crafted
image is opened.

For the stable distribution (etch), these problems have been fixed in
version 1.14-1.1+etch1.

For the upcoming stable distribution (lenny), and the unstable
distribution (sid), these problems are fixed in version 1.17.dfsg-1.

We recommend that you upgrade your lcms packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Debian (stable)
- ---

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/l/lcms/lcms_1.15-1.1+etch1.diff.gz
Size/MD5 checksum: 2000 10fb445280ea38542701017292ffb1ca
  http://security.debian.org/pool/updates/main/l/lcms/lcms_1.15.orig.tar.gz
Size/MD5 checksum:   791543 95a710dc757504f6b02677c1fab68e73
  http://security.debian.org/pool/updates/main/l/lcms/lcms_1.15-1.1+etch1.dsc
Size/MD5 checksum:  636 188344016765736e5690a669a6dce88b

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1-dev_1.15-1.1+etch1_alpha.deb
Size/MD5 checksum:   179622 a64aa233ae03aa942c34e28af411f5fe
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1_1.15-1.1+etch1_alpha.deb
Size/MD5 checksum:   153452 12b7bbd297ef50a85f19da90d1c4f30f
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms-utils_1.15-1.1+etch1_alpha.deb
Size/MD5 checksum:61580 a821798d40f1d0990a053b825db129a8

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/l/lcms/liblcms-utils_1.15-1.1+etch1_amd64.deb
Size/MD5 checksum:53284 7eb60db022f80565251a0e4d9cadd8b2
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1_1.15-1.1+etch1_amd64.deb
Size/MD5 checksum:   140288 2b3fa89b3757f0431e2ab3e44f7d1c08
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1-dev_1.15-1.1+etch1_amd64.deb
Size/MD5 checksum:   147692 e8be34ecb4af9f7cfe1e51c759fc2c27

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1_1.15-1.1+etch1_arm.deb
Size/MD5 checksum:   135546 523110a99549778b3a5a9ddf38b381e5
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1-dev_1.15-1.1+etch1_arm.deb
Size/MD5 checksum:   135376 0e4f0fabbc9a04bc593f1887a1bcf35f
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms-utils_1.15-1.1+etch1_arm.deb
Size/MD5 checksum:50962 7f38a7371ca57f25080f227a3a3b373a

hppa architecture (HP PA RISC)

  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1-dev_1.15-1.1+etch1_hppa.deb
Size/MD5 checksum:   168420 e5aab4f34d88b9f8aefd43fed5f2fe78
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms-utils_1.15-1.1+etch1_hppa.deb
Size/MD5 checksum:59120 88bf9add52df55b353d0d26508486a96
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1_1.15-1.1+etch1_hppa.deb
Size/MD5 checksum:   157652 30f8396d4f78363befd2e0d72b9e56a8

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/l/lcms/liblcms1_1.15-1.1+etch1_i386.deb
Size/MD5 checksum:   137296 46695836065eb7b734e02706191872f7
  
http://security.debian.org/pool/updates/main/l/lcms/liblcms-utils_1.15-1.1+etch

[Full-disclosure] ISOI 6, Dallas, TX - January 29, 30

2008-12-10 Thread Gadi Evron
Hi all. ISOI is once again happening, and back to the States.

Almost final agenda: http://isotf.org/isoi6.html

As usual, while attendance is limited to the folks who are busy "saving the 
Internet"/"fighting crime", it is free of charge.

Once again we offer the public at-large the opportunity to attend without such 
membership. The process is: you submit a relevant talk, get vetted and get 
accepted. We have two slots reserved for such a purpose.

Subjects of interest: case studies, attacks, botnets, fraud, ...
To submit email your talk idea to [EMAIL PROTECTED]

Is it time to say merry Xmas yet?

Gadi.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [FULL DISCLOSURE] Facebook Non Persistant XSS

2008-12-10 Thread Facebook IsBuggy
Found in August, I tried to alert facebook as quickly as was possible
- however I received no further correspondence to my communications.
At time of writing, it was possible to exploit both Firefox 3 and IE 7
- by simply using an IFRAME or even an object tag. (Dependant on the
browser target)

This allows you to overwrite the whole page with your choice of script/embed.

Vulnerability was found by accident when I was routing my web traffic
via WebScarab with an advanced list of strings to use with the
in-built XSS/CSRF tool.



http://2.channel15.facebook.com/iframe/7/?pv=49&rev=";>Googlehttp://www.google.com/"; type="text/html" width="100%"
height="100%">

Naturally that rather obvious URL could be encoded, or cut down to
prevent the obvious anomaly. However, I feel the facebook domain name
itself would be enough to fool most users.

http://2.channel15.facebook.com/iframe/7/?pv=49&rev=%22%3E%3C/script%3E%3Ctitle%3EGoogle%3C/title%3E%3C/head%3E%3C/body%3E%3CIFRAME%20src%3D%22http%3A//www.google.com/%22%20type%3D%22text/html%22%20width%3D%22100%25%22%20height%3D%22100%25%22%3E%3C/IFRAME%3E



*Similar vulnerabilities had been spoken about on a credit card fraud
(carding) forum prior to my discovery of this. Possibly for the use of
phisihing.*

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Insomnia : ISVA-081209.1 - IE Webdav Request Parsing Heap Corruption Vulnerability

2008-12-10 Thread Brett Moore
__

 Insomnia Security Vulnerability Advisory: ISVA-081209.1
___

 Name: IE Webdav Request Parsing Heap Corruption Vulnerability 
 Released: 09 December 2008
  
 Vendor Link: 
http://www.microsoft.com/
  
 Affected Products:
Microsoft Internet Explorer 7 Running On Vista
Requires Office 2007
 
 Original Advisory: 
http://www.insomniasec.com/advisories/ISVA-081209.1.htm
 
 Researcher: 
Brett Moore, Insomnia Security
http://www.insomniasec.com
___

___

 Description
___

A vulnerability was found in the way that webdav requests are
cached and then later retrieved by Internet Explorer. This results
in the use of uninitialized memory which under the right situation 
can lead to command execution.

___

 Details
___

When Internet Explorer loads a file from a webdav share, a copy of
the file is stored in

\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV

This copy is used as the cached version of the file, and is loaded 
if a page refresh is done.

If the size of the requested file is larger that 190 characters then
the webdav handling service will not save it correctly.

Internet Explorer assumes that the file was stored, and is cached, so
when a refresh is done it attempts to load the file information from
the cached data.

This leads to a heap corruption with various values read that lead 
to exploitable conditions.

___

 Solution
___

Microsoft have released a security update to address this issue;
http://www.microsoft.com/technet/security/bulletin/ms08-073.mspx

___

 Legals
___

The information is provided for research and educational purposes
only. Insomnia Security accepts no liability in any form whatsoever
for any direct or indirect damages associated with the use of this
information.

___
 
Insomnia Security Vulnerability Advisory: ISVA-081209.1
___

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Secunia Research: Microsoft Hierarchical FlexGrid Control Integer Overflows

2008-12-10 Thread Secunia Research
== 

 Secunia Research 09/12/2008

 - Microsoft Hierarchical FlexGrid Control Integer Overflows -

== 
Table of Contents

Affected Software1
Severity.2
Description of Vulnerability.3
Solution.4
Time Table...5
Credits..6
References...7
About Secunia8
Verification.9

== 
1) Affected Software 

* Microsoft Hierarchical FlexGrid Control 6.0.88.4

NOTE: Other versions may also be affected.

== 
2) Severity 

Rating: Highly critical
Impact: System compromise
Where:  Remote

== 
3) Description of Vulnerability

Secunia Research has discovered some vulnerabilities in Microsoft
Hierarchical FlexGrid Control bundled with various products, which can
be exploited by malicious people to compromise a user's system.

The vulnerabilities are caused due to integer overflow errors in the 
ActiveX control (mshflxgd.ocx) when handling the "Rows" and "Cols" 
properties and the "ExpandAll()" and "CollapseAll()" methods. These
can be exploited to corrupt memory.

Successful exploitation allows execution of arbitrary code.

== 
4) Solution 

Apply patches from MS08-070.

== 
5) Time Table 

28/08/2007 - Vendor notified.
28/08/2007 - Vendor response.
26/09/2007 - Additional information provided and status update 
 requested.
26/09/2007 - Vendor informs that status update will be provided soon.
10/10/2007 - Vendor provides status update.
23/11/2007 - Status update requested.
24/11/2007 - Vendor provides status update.
15/08/2008 - Status update requested.
09/09/2008 - Status update requested.
26/09/2008 - Status update requested and vendor informed that 
 advisory will be published in a week if no status update
 is provided.
29/09/2008 - Vendor provides status update.
31/10/2008 - Vendor provides status update (targeted for November).
07/11/2008 - Vendor provides status update (targeted for December).
05/12/2008 - Vendor provides status update (on track for December).
09/12/2008 - Vendor acknowledges that fix will be issued today.
09/12/2008 - Vendor publishes security bulletin.
09/12/2008 - Public disclosure.

== 
6) Credits 

Discovered by Carsten Eiram, Secunia Research.

== 
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2008-4254 for the vulnerability.

MS08-070 (KB932349):
http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx

== 
8) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2007-72/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-

Re: [Full-disclosure] We're letting the bad guys win

2008-12-10 Thread n3td3v
On Tue, Dec 9, 2008 at 9:50 PM, Some Guy Posting To Full Disclosure
<[EMAIL PROTECTED]> wrote:
> a stupid fat kid attempting to be funny with his freinds

This is a serious mailing list not one where there are kids fooling
around, they would be too scared to post here because of the military,
government and intelligence services who are HUMINT subscribed.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/