[Full-disclosure] Secunia Research: SHOUTcast DNAS Relay Server Buffer Overflow

2009-02-26 Thread Secunia Research
== 

 Secunia Research 25/02/2009

  - SHOUTcast DNAS Relay Server Buffer Overflow -

== 
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

== 
1) Affected Software 

* SHOUTcast 1.9.8

NOTE: Other versions may also be affected.

== 
2) Severity 

Rating: Less critical
Impact: System access
Where:  From remote

== 
3) Vendor's Description of Software 

The SHOUTcast Radio Distributed Network Audio Software (DNAS)
is a software application that runs on your server attached to the
Internet or an IP network and is responsible for receiving audio
from a broadcaster such as your Win amp media player running the
SHOUTcast Radio DSP plug-in..

Product Link:
http://www.shoutcast.com/download

== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in SHOUTcast DNAS,
which can be exploited by malicious people to compromise a vulnerable
system.

The vulnerability is caused due to a boundary error when receiving
data from a relay master server. This can be exploited to overflow
a static buffer by tricking a SHOUTcast admin into setting up a
server to act as relay for a malicious server.

Successful exploitation allows to e.g. overwrite the password of the
web administration interface.

== 
5) Solution 

Relay trusted servers only.

== 
6) Time Table 

09/01/2009 - Vendor notified.
04/02/2009 - Requested status update from vendor.
25/02/2009 - Public disclosure.

== 
7) Credits 

Discovered by Stefan Cornelius, Secunia Research.

== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has not yet
assigned a CVE for the vulnerability.

== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2008-62/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Secunia Research: ksquirrel-libs Radiance RGBE Buffer Overflows

2009-02-26 Thread Secunia Research
== 

 Secunia Research 25/02/2009

 - ksquirrel-libs Radiance RGBE Buffer Overflows -

== 
Table of Contents

Affected Software1
Severity.2
Vendor's Description of Software.3
Description of Vulnerability.4
Solution.5
Time Table...6
Credits..7
References...8
About Secunia9
Verification10

== 
1) Affected Software 

* ksquirrel-libs 0.8.0.

NOTE: Other versions may also be affected.

== 
2) Severity 

Rating: Moderately critical
Impact: System access
Where:  From remote

== 
3) Vendor's Description of Software 

ksquirrel-libs is a set of image codecs for KSquirrel. It is written
on pure C++, so you can simply use it in any other project. At this
time ksquirrel-libs supports 57 image formats..

Product Link:
http://ksquirrel.sourceforge.net/subprojects.php

== 
4) Description of Vulnerability

Secunia Research has discovered some buffer overflows ksquirrel-libs,
which can be exploited by malicious people to compromise an
application using the library.

The vulnerabilities are caused due to boundary errors within the
mt_codec::getHdrHead() function in kernel/kls_hdr/fmt_codec_hdr.cpp,
which can be exploited to cause stack-based buffer overflows by e.g.
tricking a user into opening a specially crafted Radiance RGBE 
(*.hdr) file.

== 
5) Solution 

Do not open untrusted Radiance RGBE images in an application using
ksquirrel-libs.

== 
6) Time Table 

09/01/2009 - Vendor notified.
04/02/2009 - Requested status update from vendor.
25/02/2009 - Public disclosure.

== 
7) Credits 

Discovered by Stefan Cornelius, Secunia Research.

== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2008-5263 for the vulnerability.

== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2008-63/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

==

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1727-1] New proftpd-dfsg packages fix SQL injection vulnerabilites

2009-02-26 Thread Steffen Joeris
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 1727-1secur...@debian.org
http://www.debian.org/security/ Steffen Joeris
February 26th, 2009 http://www.debian.org/security/faq
- --

Package: proftpd-dfsg
Vulnerability  : SQL injection vulnerabilites
Problem type   : remote
Debian-specific: no
CVE Ids: CVE-2009-0542 CVE-2009-0543

Two SQL injection vulnerabilities have been found in proftpd, a
virtual-hosting FTP daemon.  The Common Vulnerabilities and Exposures
project identifies the following problems:

CVE-2009-0542

Shino discovered that proftpd is prone to an SQL injection
vulnerability via the use of certain characters in the username.

CVE-2009-0543

TJ Saunders discovered that proftpd is prone to an SQL injection
vulnerability due to insufficient escaping mechanisms, when
multybite character encodings are used.

For the stable distribution (lenny), these problems have been fixed in
version 1.3.1-17lenny1.

For the oldstable distribution (etch), these problems will be fixed
soon.

For the testing distribution (squeeze), these problems will be fixed
soon.

For the unstable distribution (sid), these problems have been fixed in
version 1.3.2-1.

We recommend that you upgrade your proftpd-dfsg package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- 

  Source archives:


http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-dfsg_1.3.1-17lenny1.dsc
  Size/MD5 checksum: 1348 bb4118976a78b6eef4356123b4e322da

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-dfsg_1.3.1-17lenny1.diff.gz
  Size/MD5 checksum:   102388 7873fdab33c5e044dce721300d496d7e

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-dfsg_1.3.1.orig.tar.gz
  Size/MD5 checksum:  2662056 da40b14c5b8ec5467505c98b4ee4b7b9

  Architecture independent components:


http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-doc_1.3.1-17lenny1_all.deb
  Size/MD5 checksum:  1256300 f0e73bd54793839c802b3c3ce85bb123

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd_1.3.1-17lenny1_all.deb
  Size/MD5 checksum:   194896 cda6edb78e4a5ab9c8a90cfdaeb19b32

  AMD64 architecture:


http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-basic_1.3.1-17lenny1_amd64.deb
  Size/MD5 checksum:   744914 4c09f5af5f825f0c068f3dce4a1c7a84

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-ldap_1.3.1-17lenny1_amd64.deb
  Size/MD5 checksum:   214334 eb8f6f56afda836f85f6d808a6086c6a

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-mysql_1.3.1-17lenny1_amd64.deb
  Size/MD5 checksum:   203878 8d13ce2c0d2c15eec496d3e014aa1ea3

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-pgsql_1.3.1-17lenny1_amd64.deb
  Size/MD5 checksum:   203902 ce74fcf7e0f082fcf4454120e984a0c3

  ARM architecture:


http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-basic_1.3.1-17lenny1_arm.deb
  Size/MD5 checksum:   696884 cab353aa755852b2c07916f234268e39

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-ldap_1.3.1-17lenny1_arm.deb
  Size/MD5 checksum:   213832 faad0df7dab14fdca108c6370ae3edf0

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-mysql_1.3.1-17lenny1_arm.deb
  Size/MD5 checksum:   203260 3940f22df22db3ce6a3644a22b68e82b

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-pgsql_1.3.1-17lenny1_arm.deb
  Size/MD5 checksum:   203448 35f6cb99d5f9886d74a8a1e72df36a2d

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-basic_1.3.1-17lenny1_i386.deb
  Size/MD5 checksum:   688540 bdcbe2b33ed58bf474824c4639dcfb99

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-ldap_1.3.1-17lenny1_i386.deb
  Size/MD5 checksum:   212208 bcb4bce6c950fe4fd416fcf9e97b79f6

http://security.debian.org/pool/updates/main/p/proftpd-dfsg/proftpd-mod-mysql_1.3.1-17lenny1_i386.deb
  Size/MD5 checksum:   203074 55e8334da716aeb8efe43803c8f71d00


Re: [Full-disclosure] Weird traffic

2009-02-26 Thread srl
Don't open the pcap file in wireshark ! Is exploiting a hole in the
whireshark you will pe pwned !!!

On Wed, Feb 25, 2009 at 9:56 PM, julio sanchez pete.sanc...@gmail.comwrote:

 Here's the cap file
 10.240 is the A-V server.
 You can see various ARP loop scan


 Regards Pete


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [USN-724-1] Squid vulnerability

2009-02-26 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-724-1  February 25, 2009
squid vulnerability
CVE-2009-0478
===

A security issue affects the following Ubuntu releases:

Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
  squid   2.7.STABLE3-1ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Joshua Morin, Mikko Varpiola and Jukka Taimisto discovered that Squid did
not properly validate the HTTP version when processing requests. A remote
attacker could exploit this to cause a denial of service (assertion failure).


Updated packages for Ubuntu 8.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1.diff.gz
  Size/MD5:   303042 9132293f589a71ae3f771e1ae6de30f1

http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1.dsc
  Size/MD5: 1252 6953f88d6f4825daabd9e77bd0fa1a88

http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3.orig.tar.gz
  Size/MD5:  1782040 a4d7608696e2b617aa5853c7d23e25b0

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid-common_2.7.STABLE3-1ubuntu2.1_all.deb
  Size/MD5:   495876 b6d1e76b140c792297c14382a06ed3e3

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_amd64.deb
  Size/MD5:   771610 7f2ca95b0497cc23f0bf26b7a6503cc7

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_amd64.deb
  Size/MD5:   119880 27ff06a902debe143acb7b3959fb1c52

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_i386.deb
  Size/MD5:   695708 312c710ebdb46e3017b02cb672d14524

http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_i386.deb
  Size/MD5:   118638 f2f2f698523d49d8971c7a22faebc427

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_lpia.deb
  Size/MD5:   694080 6720b3aca93aabb7600a1a2c2f699af5

http://ports.ubuntu.com/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_lpia.deb
  Size/MD5:   118550 7484981bd7c4c8b6361362e98d5d1631

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://ports.ubuntu.com/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_powerpc.deb
  Size/MD5:   777958 b9d530e92ad4638fb8d169ef55eb33f4

http://ports.ubuntu.com/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_powerpc.deb
  Size/MD5:   120446 9899cd403bbca3e0e6f5a936cd2d9955

  sparc architecture (Sun SPARC/UltraSPARC):


http://ports.ubuntu.com/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_sparc.deb
  Size/MD5:   719088 2781d6fd1c7adc0b76aa12670ac1abb5

http://ports.ubuntu.com/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_sparc.deb
  Size/MD5:   119398 8a26b4da728c31d7bd11191575b2




signature.asc
Description: Digital signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ANNOUNCE: RFIDIOt-0.1x release - February 2009

2009-02-26 Thread Adam Laurie
Hi All,

Well, it's been a busy month... thanks to pytey, I came across TikiTags, 
which proved to be rather more interesting than they at first seemed...

http://hackerati.com/post/57314994/rfid-on-the-cheap-hacking-tikitag

These devices contain an NXP PN532 reader chip, which, it turns out, is 
also capable of running in emulator mode (it is the chip used in a lot 
of NFC mobile phones), and, after looking at documentation from NXP, I 
was able to get this functionality working, and I'm delighted that NXP 
have also agreed to allow me to release the code despite it being based 
on information that was provided under NDA, so massive props to NXP for 
supporting the open source security research community! :)

As a result, I'm able to release two new tools:

   pn532emulate.py - sets up the emulator and processes one command.

   pn532mitm.py - 'pn532 man-in-the-middle', which will drive two 
readers: one as an emulator and one as a reader, and will log all 
traffic that flows between them. Additionally, you can separate the 
reader and emulator onto two different machines, and relay the traffic 
via TCP.

As always, this is very much a work in progress, and I know the error 
handling is not perfect and needs tweaking. Low level command processing 
is also slightly wacky, and will probably be re-written now I understand 
what's going on a bit more... :)

I've also added a tool for reading HID ProxCard IDs - 'hidprox.py'

and I finally got around to writing some more detailed documentation, 
which you can find here:

   http://www.rfidiot.org/documentation.html

Homepage and download instructions etc. can be found here:

   http://www.rfidiot.org/

Enjoy!
Adam
-- 
Adam Laurie Tel: +44 (0) 20 7993 2690
Suite 117   Fax: +44 (0) 1308 867 949
61 Victoria Road
Surbiton
Surrey  mailto:a...@algroup.co.uk
KT6 4JX http://rfidiot.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Drupal Viewfield Module XSS Vulnerability

2009-02-26 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Yes, it's yet another CCK related module with XSS vulnerabilities.  It's
lame, but it should be reported since the Drupal security team has
already made an announcement about the issue in these modules.  Drupal
security and module maintainer have been notified.  Details can also be
found at http://www.lampsecurity.org/node/20.

The Drupal Viewfield module (http://drupal.org/project/viewfield) is
designed to allow the creation of nodes that display views and is
vulnerable to cross site scripting attacks.  Version 5.x-1.5 was tested
and found vulnerable, but other versions may be affected.  This problem
is related to SA-CORE-2009-002 (http://drupal.org/node/372836).  The
problem occurs when an administrator creates a new content type using
CCK and then adds or edits a view field for the new content type.  Users
authorized to administer content types can configure this field with
malicious code in the Help text: area.  Input to this field is not
properly sanitized and JavaScript can be executed while attempting to
create new content that includes the link field, or while configuring
the link field.

Here are the steps involved in reproducing this issue:


1.  Log in as a user with 'Administer content types' privilege
2.  Click Administer - Content Types
3.  Click 'Add content type'
4.  Fill in required text in the Identification, Submission and other
fieldsets
5.  Click 'Save content type' button
6.  Click 'edit' under the Operations column on the 'Administer' -
'Content management' screen for the new content type
7.  Click 'Add field'
8.  Fill in the 'Name' text box in the 'Create new field' fieldset and
select the 'View' radio button
9.  Click the 'Create field' button
10.  In the next screen (assuming the new field was named 'test' and the
new type was named 'test' this will be in Home  Administer  Content
management  Content types  test) find the 'Widget settings' filedset
11.  Under Help text: enter scriptalert(xss);/script
12.  Click 'Save field settings' button
13.  Click 'configure' under the Operations column for the View field OR
click Create content and then choose the content type you  created in
the previous steps to trigger the JavaScript.

- --
Justin C. Klein Keane
http://www.MadIrish.net
http://www.LAMPSecurity.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQD1AwUBSaaxipEpbGy7DdYAAQL38Qb/UdUjLby/IgNk8RUwF2d63uYfwfy1G6rn
vyuiGvpcOOz0y/iBmSs64UUSAPS55kYe4VQm9WXXMSQVfeBPuPnVACS8aGFmmCuX
ZZXSE+wRYq1NlXw2L2tOw2br/rszm+DK4TREPkVYiBDpKbfMAuiGjBP9RQQunhqD
+itxAvhspCjECOTfmE6s0PUXclC9Ypc2w9ow7a4yua5tmT2MntPjM1ByvXbldeNl
O9S8O0D8DauoCxieKRMQWusdnh1yG7zMmSGUXOtkIAdGaRkTQ8JHKdQqKt8923hN
3fbz9oU7bV8=
=wH4k
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:057 ] valgrind

2009-02-26 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:057
 http://www.mandriva.com/security/
 ___

 Package : valgrind
 Date: February 26, 2009
 Affected: 2008.0, 2008.1, 2009.0
 ___

 Problem Description:

 A vulnerability has been identified and corrected in valgrind:
 
 Untrusted search path vulnerability in valgrind before 3.4.0
 allows local users to execute arbitrary programs via a Trojan horse
 .valgrindrc file in the current working directory, as demonstrated
 using a malicious --db-command options. NOTE: the severity of this
 issue has been disputed, but CVE is including this issue because
 execution of a program from an untrusted directory is a common
 scenario. (CVE-2008-4865)
 
 The updated packages have been patched to prevent this.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 7d2fdce148a8c9883262ff3d6b2cf843  
2008.0/i586/valgrind-3.2.3-2.2mdv2008.0.i586.rpm 
 a204fd31df3f302c19b8e6c74bd58eb1  
2008.0/SRPMS/valgrind-3.2.3-2.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 dfe5025371c9dc804b71e84081a62743  
2008.0/x86_64/valgrind-3.2.3-2.2mdv2008.0.x86_64.rpm 
 a204fd31df3f302c19b8e6c74bd58eb1  
2008.0/SRPMS/valgrind-3.2.3-2.2mdv2008.0.src.rpm

 Mandriva Linux 2008.1:
 c8df0a495d0d70b8dd61900037e2  
2008.1/i586/valgrind-3.3.0-3.1mdv2008.1.i586.rpm 
 391e202fc7f592ba63280a34245bb255  
2008.1/SRPMS/valgrind-3.3.0-3.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 2e16854eec6bc05f5a6d39e1fef120be  
2008.1/x86_64/valgrind-3.3.0-3.1mdv2008.1.x86_64.rpm 
 391e202fc7f592ba63280a34245bb255  
2008.1/SRPMS/valgrind-3.3.0-3.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 c61e803ffafdcfbf889b604dec79fa4e  
2009.0/i586/valgrind-3.3.1-2.1mdv2009.0.i586.rpm 
 49a62badfb184864bd5764f1d3b8280b  
2009.0/SRPMS/valgrind-3.3.1-2.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 b0b4fecae9ffd5613c4ebfcb369ba23f  
2009.0/x86_64/valgrind-3.3.1-2.1mdv2009.0.x86_64.rpm 
 49a62badfb184864bd5764f1d3b8280b  
2009.0/SRPMS/valgrind-3.3.1-2.1mdv2009.0.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJpos8mqjQ0CJFipgRArW7AKCD5t24AcyIloyEvYt2XIdj84BnSACg6y47
jVLQtGJ6WmVL1iMqQEPQ8lA=
=9zCC
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Thierry Zoller

 Just because a bug class can crash an application
 doesn't make it a security issue.
A remotely triggerable DoS condition is a security issue per se, my
opinion about the trend to remove the A in CIA for statisitca reasons
can be read here :
http://blog.zoller.lu/2009/01/open-letter-remove-a-in-cia-or-venting.html


-- 
http://secdev.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread jf
also keep in mind that null ptr deref's can sometimes be exploitable--
especially on certain processors that store important things at 0x0;
of which, from what i recall, the iphone is one.



On Thu, 26 Feb 2009, Thierry Zoller wrote:

 Date: Thu, 26 Feb 2009 16:21:18 +0100
 From: Thierry Zoller thie...@zoller.lu
 To: full-disclosure full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer
 Dereference Denial of, Service Vulnerability


  Just because a bug class can crash an application
  doesn't make it a security issue.
 A remotely triggerable DoS condition is a security issue per se, my
 opinion about the trend to remove the A in CIA for statisitca reasons
 can be read here :
 http://blog.zoller.lu/2009/01/open-letter-remove-a-in-cia-or-venting.html




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-02-26 Thread Michael Krymson
The fun times of security semantics! I'd have to argue that DoS conditions
have the potential to be security issues. Then again, I'd also prefer not to
remove A from CIA, but this is not from the standpoint of a developer or
software vendor. I understand how that opinion changes based on
perspective...  Maybe someone will be interested in some non-technical
discussion! =)

Three examples:
A- A DoS condition is discovered in Apache. I can trigger it by sending a
specially crafted packet to Apache. Apache crashes. I can do this many times
until you stop me or Apache fixes it.

B- A DoS condition is discovered in Safari. I can trigger it by getting you
to go to my web page www.youhavenobusinessreasontobehere.com/goats.blah. You
hit my site, you decide not to come back after your browser bombs.

C- A DoS condition is discovered in Safari, the same as before. I can
trigger it by editing your intranet portal and inserting my lovely code. All
of your internal users need to use your intranet portal, but they all keep
crashing, crashing, crashing. Yikes!

I would suggest that DoS conditions are not a priori security issues, but it
certainly depends on the context and whether security has or could have an
*interest* in them.

I would suggest A is a security issue because more power is in the hands of
the attacker than the user. (Yeah, what a horrible definition that will be
once someone tears it up!)

I would suggest B is simply a bug and not something that really affects the
world too much.

I would suggest C is a security bug in the intranet portal, but the browser
crash is of a concern to security as well. It might not specifically be a
security issue in the browser, but the effect of it is a concern to
security.





On Thu, Feb 26, 2009 at 9:21 AM, Thierry Zoller thie...@zoller.lu wrote:


  Just because a bug class can crash an application
  doesn't make it a security issue.
 A remotely triggerable DoS condition is a security issue per se, my
 opinion about the trend to remove the A in CIA for statisitca reasons
 can be read here :
 http://blog.zoller.lu/2009/01/open-letter-remove-a-in-cia-or-venting.html


 --
 http://secdev.zoller.lu
 Thierry Zoller
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-02-26 Thread Thierry Zoller


Dear Michael,
I understand your point, however consider that
your examples are showing the different *impacts* of a DoS condition.

A bug becomes a security problem once it violates at least one of the three
letters C or I or A. That's the point. The impact and risk assesement
is to be done later on and can only be done partialy by a vendor since
the use of the affected products sometimes heavily depends on the
implementation or use case.

MK I would suggest that DoS conditions are not a priori security issues, but it
MK certainly depends on the context and whether security has or could have an
MK *interest* in them.

This is not to be measured or estimated completely by a vendor
but the client/user/integrator of said products in their specific
enviroment and use and abuse cases. For example Internet Kiosk vendors.

-- 
http://secdev.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Trancer
iPhone is not affected by this issue.

jf wrote:
 also keep in mind that null ptr deref's can sometimes be exploitable--
 especially on certain processors that store important things at 0x0;
 of which, from what i recall, the iphone is one.



 On Thu, 26 Feb 2009, Thierry Zoller wrote:

   
 Date: Thu, 26 Feb 2009 16:21:18 +0100
 From: Thierry Zoller thie...@zoller.lu
 To: full-disclosure full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer
 Dereference Denial of, Service Vulnerability


 
 Just because a bug class can crash an application
 doesn't make it a security issue.
   
 A remotely triggerable DoS condition is a security issue per se, my
 opinion about the trend to remove the A in CIA for statisitca reasons
 can be read here :
 http://blog.zoller.lu/2009/01/open-letter-remove-a-in-cia-or-venting.html



 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

   


-- 
Moshe :: Trancer
0nly Human.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari ... DoS Vulnerability

2009-02-26 Thread Michal Zalewski
 The fun times of security semantics!

Old debates never die...

Vulnerabilities are a subset of software engineering bugs. As the name
implies, they are defined strictly by the impact they have; if a bug
does not render the victim appreciably susceptible to anything that
would be of value to external attackers, it is not a security problem.
Now, there are two points to be made:

1) Value to the attacker is a broad and fuzzy term that also covers
emotional gratification (by just causing hardship to a disliked party)
- so loss of availability should be often treated as a security glitch
(well, you could also say a reliability glitch and start another
argument); but the important thing is, not all bugs that cause a crash
will cause noticeable loss of availability - i.e., no service is
denied or deferred to third parties. For example, crashing a sshd or
ftpd child handling my own connection is not interesting by itself,
unless events leading to the crash, or the crash itself, impose a
significant and repeatable resource strain. Crashing a keep-alive
httpd child might be marginally more expensive, and hence maybe a
limited security concern.

2) Appreciably susceptible is just as hard to quantify when dealing
with high loss, but low probability scenarios; there were quite a few
bugs that likely affected very few or no users (e.g., many of the
publicly reported command-line overflows in non-suid programs), but a
hypothetical scenario where it would matter could be constructed (in
the aforementioned case, say, really bad PHP / CGI scripting). Most
people dismiss such vulnerability reports, but it's difficult to draw
the line.

Anyway... bottom line is, any attempts to formalize the criteria are
bound to fail (and have mostly failed in the past), and common sense
is the best tool we have.

/mz

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Drupal Taxonomy Theme Module XSS Vulnerability

2009-02-26 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Version Tested:
Taxonomy Theme 5.x-1.1 (http://drupal.org/project/taxonomy_theme)
Drupal 5.15 (http://drupal.org)

Module maintainer and Drupal security team notified

The taxonomy_theme module allows you to change the theme of a given
node based on the taxonomy term, vocabulary or nodetype of that node.
You can also theme your forums and map themes to Drupal paths or path
aliases directly.  The module contains a Cross Site Scripting (XSS)
vulnerability that can allow users with 'administer taxonomy' privileges
to expose users of the Taxonomy Theme module to XSS attacks.  Details
are also available at http://www.lampsecurity.org/node/21

Executing the Attack:

1.  Enable the Drupal core Taxonomy module
2.  Create a new vocabulary by clicking Administer - Content Management
- - Categories.
3.  Click the 'Add Vocabulary' link
4.  For the 'Vocabulary name' enter scriptalert('xss');/script, fill
in arbitrary values for all other fields
5.  Click on Administer - Site configuration - Taxonomy Theme, then
click the 'Taxonomy' link to trigger the JavaScript.

Technical Details:

This flaw exists do to a lack of output checking in the
taxonomy_theme_admin_table_builder() function.  Specifically, on line
388 of taxonomy_theme_admin.inc, which reads:

$form['table'][$item-$data['key']]['title'] = array('#value' =
$item-name);

Should use check_plain() or similar sanitation function on the
$item-name value like so:

$form['table'][$item-$data['key']]['title'] = array('#value' =
check_plain($item-name));

- --
Justin C. Klein Keane
http://www.MadIrish.net
http://www.LAMPSecurity.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQD1AwUBSacCnZEpbGy7DdYAAQJYPQb/YnDXlQPm5RBW/p9nnx0ER/LJQ2KbFUUR
KTY9L+JsCiClV8PmLxjH8kSUsD5ITIMNmiVoA7OtsOGPD2oiaIuxqrjEKiXkThTb
ugkdrxMsu0dxITI837vt2nJfiHThCuk293Dzf6mGbrMJ77DDeybvyKKP/YxZGqNv
XOI87vedSjqJnREFLjGcyFfmczVTY+CkOaDkgKvWxrqoeOlUvbu7zO52UJm1ZSm0
vJ8gz176zl9R5O/Ar28f7ddlksFmWANgqBSmRCRQLoNBdPcNz4bjmuLc7YFVlYDi
yP1P/e/PNYw=
=laaL
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Cambium Group, LLC. CAMAS Advisory

2009-02-26 Thread Smoking Gun
On Wed, Feb 25, 2009 at 11:57 AM, Adriel T. Desautels
ad_li...@netragard.com wrote:
 I'm not sure if its appropriate for this list but it is related to
 penetration testing and vulnerability disclosure (moderators decide).


The irony of Kevin (don't make fun of my complexion) Finisterre disclosing
he has a full time job outside of security followed by his foray into the realm
of security with advisories is puzzling. So Kevin isn't working in the
industry as he disclosed in his previous email which means he obviously
isn't working for Netragard which leads me to believe that Netragard is
merely a fictitious company formed on an IRC channel amongst friends.
Now this is not to say there is anything wrong with this however, to trust
a bunch of IRC kids on an infrastructure would amount to career suicide.
For starters outside of a modded Pentium, they'd have little experience in
the real world. Themes like DoDAF, DIACAP, Information Security
Architecture would be beyond the scope of their understanding.

Without further-ado, I'll now speculate on the intent of this current
Critical advisory Netragard was gracious enough to bless the community
with.

 - 
 -
 Contact : Adriel T. Desautels
 Researcher  : Kevin Finisterre
 Vendor Notified : 08/22/2007


 [Proof Of Concept]
 - 
 -
 Proof of concept code exists but is not provided as to not increase
 CAMAS
 users overall risk levels. Any website that reads Powered by the
 Cambium
 Group, LLC. is a CAMAS powered website.

Snake oil at it's finest. You may recall Netragard has a pay for play
scheme working where they never disclose any code. This works
to anyone's advantage as a trump card when you think about it on
a psychological warfare like scale. We found a tumor somewhere
in your body however, we're choosing not to tell you about how we
found it, nor where it is.

Imagine if you will those words coming out of a doctor's mouth.
You have to take into account that a doctor is a professional as
should someone in this industry be - a professional. The entire
absurdity of finding a tumor and not revealing that tumor is
quite shady. Wouldn't you agree? You may choose to disagree
but offer some supportive argument should you choose to say
so.

 [Vendor Status and Chronology]
 - 
 -
 08/06/2007 07:11:57 PM EDT - Vulnerabilities Discovered
 08/24/2007 09:38:41 AM EDT - Cambium Group, LLC. Notified in full detail
 08/24/2007 10:54:01 AM EDT - Cambium Group, LLC. Responds to
 Notification
 08/27/2007 10:31:30 AM EDT - Conference Call Scheduled
 08/29/2007 03:00:00 PM EDT - Held Conference call - Presented Solution
 08/29/2007 03:00:00 PM EDT - Communication with the Cambium Group Faded
 09/26/2008 11:17:35 PM EDT - Issues remain unfixed
 02/09/2009 09:00:00 PM EDT - Issues remain unfixed
 02/11/2009 03:44:19 PM EST - Whistle Blower FD Posting (No affiliation
 to Netragard)
 02/11/2009 04:55:20 PM EST - Netragard Prepares Advisory for Release

During the initial discovery by the self-impose-experts at Netragard, it
seems that Cambium performed some form of diligence in the sense
they took the time to listen to Netragard however, much can be gleaned
from Netragards own choice of wording:

 08/29/2007 03:00:00 PM EDT - Held Conference call - Presented Solution
 08/29/2007 03:00:00 PM EDT - Communication with the Cambium Group Faded

At the onset of a conference call - dot dot dot - there was an immediate
breakdown. Not one day later, not one week later - according to Netragard
it occurred the minute Netragard got on call with them. This is a rather
peculiar scenario if you think about it logically. What could have been
the potential breakdown; after all, Cambium took the time out of their
schedules to do something. Could it have been the pitch offered by
Netragard. Were you guys trying to extort them Adriel? How could that
conference have played out?

http://www.copyright.gov/1201/2003/comments/019.pdf

It has been brought to my attention that, on July 18, 2002, a buffer overflow
exploit of Tru64 UNIX was posted on securityfocus.com under the alias
pha...@webtribe.net (a/k/a phased, pha...@mail.ru and James Green).
Based on information provided by Gil Novak to HP concerning aliases utilized
by SnoSoft, we understand that this action was taken by an agent of SnoSoft
despite SnoSoft's representations that it intended to comply with the industry
standard practice of reporting its findings to CERT and despite the ongoing
discussions between Gil Novak and Rich Boren on this issue.

Snosoft and its agents are nothing more than wanna be security experts
without having the capacity to keep out of the big boys club of penetration
testing. The purpose 

Re: [Full-disclosure] Cambium Group, LLC. CAMAS Advisory

2009-02-26 Thread Jason Starks
I guess these days it isn't so amazing that people can type, and even hit
send, rarely sharing their views face to face. Hiding in your grandmother's
closet with your indestructable, glow-in-the-dark keyboard from Best Buy is
sooo in. Anyways, free Kev.. speech!

On Thu, Feb 26, 2009 at 5:22 PM, Smoking Gun pentesterk...@gmail.comwrote:

 On Wed, Feb 25, 2009 at 11:57 AM, Adriel T. Desautels
 ad_li...@netragard.com wrote:
  I'm not sure if its appropriate for this list but it is related to
  penetration testing and vulnerability disclosure (moderators decide).
 

 The irony of Kevin (don't make fun of my complexion) Finisterre disclosing
 he has a full time job outside of security followed by his foray into the
 realm
 of security with advisories is puzzling. So Kevin isn't working in the
 industry as he disclosed in his previous email which means he obviously
 isn't working for Netragard which leads me to believe that Netragard is
 merely a fictitious company formed on an IRC channel amongst friends.
 Now this is not to say there is anything wrong with this however, to trust
 a bunch of IRC kids on an infrastructure would amount to career suicide.
 For starters outside of a modded Pentium, they'd have little experience in
 the real world. Themes like DoDAF, DIACAP, Information Security
 Architecture would be beyond the scope of their understanding.

 Without further-ado, I'll now speculate on the intent of this current
 Critical advisory Netragard was gracious enough to bless the community
 with.

  -
 -
  Contact : Adriel T. Desautels
  Researcher  : Kevin Finisterre
  Vendor Notified : 08/22/2007
 

  [Proof Of Concept]
  -
 -
  Proof of concept code exists but is not provided as to not increase
  CAMAS
  users overall risk levels. Any website that reads Powered by the
  Cambium
  Group, LLC. is a CAMAS powered website.

 Snake oil at it's finest. You may recall Netragard has a pay for play
 scheme working where they never disclose any code. This works
 to anyone's advantage as a trump card when you think about it on
 a psychological warfare like scale. We found a tumor somewhere
 in your body however, we're choosing not to tell you about how we
 found it, nor where it is.

 Imagine if you will those words coming out of a doctor's mouth.
 You have to take into account that a doctor is a professional as
 should someone in this industry be - a professional. The entire
 absurdity of finding a tumor and not revealing that tumor is
 quite shady. Wouldn't you agree? You may choose to disagree
 but offer some supportive argument should you choose to say
 so.

  [Vendor Status and Chronology]
  -
 -
  08/06/2007 07:11:57 PM EDT - Vulnerabilities Discovered
  08/24/2007 09:38:41 AM EDT - Cambium Group, LLC. Notified in full detail
  08/24/2007 10:54:01 AM EDT - Cambium Group, LLC. Responds to
  Notification
  08/27/2007 10:31:30 AM EDT - Conference Call Scheduled
  08/29/2007 03:00:00 PM EDT - Held Conference call - Presented Solution
  08/29/2007 03:00:00 PM EDT - Communication with the Cambium Group Faded
  09/26/2008 11:17:35 PM EDT - Issues remain unfixed
  02/09/2009 09:00:00 PM EDT - Issues remain unfixed
  02/11/2009 03:44:19 PM EST - Whistle Blower FD Posting (No affiliation
  to Netragard)
  02/11/2009 04:55:20 PM EST - Netragard Prepares Advisory for Release

 During the initial discovery by the self-impose-experts at Netragard, it
 seems that Cambium performed some form of diligence in the sense
 they took the time to listen to Netragard however, much can be gleaned
 from Netragards own choice of wording:

  08/29/2007 03:00:00 PM EDT - Held Conference call - Presented Solution
  08/29/2007 03:00:00 PM EDT - Communication with the Cambium Group Faded

 At the onset of a conference call - dot dot dot - there was an immediate
 breakdown. Not one day later, not one week later - according to Netragard
 it occurred the minute Netragard got on call with them. This is a rather
 peculiar scenario if you think about it logically. What could have been
 the potential breakdown; after all, Cambium took the time out of their
 schedules to do something. Could it have been the pitch offered by
 Netragard. Were you guys trying to extort them Adriel? How could that
 conference have played out?

 http://www.copyright.gov/1201/2003/comments/019.pdf

 It has been brought to my attention that, on July 18, 2002, a buffer
 overflow
 exploit of Tru64 UNIX was posted on securityfocus.com under the alias
 pha...@webtribe.net (a/k/a phased, pha...@mail.ru and James Green).
 Based on information provided by Gil Novak to HP concerning aliases
 utilized
 by SnoSoft, we understand that this action 

Re: [Full-disclosure] Weird traffic

2009-02-26 Thread julio sanchez
No virus in there, it's a normal cap file...


2009/2/26 srl security.research.l...@gmail.com

 Don't open the pcap file in wireshark ! Is exploiting a hole in the
 whireshark you will pe pwned !!!

 On Wed, Feb 25, 2009 at 9:56 PM, julio sanchez pete.sanc...@gmail.comwrote:

 Here's the cap file
 10.240 is the A-V server.
 You can see various ARP loop scan


 Regards Pete


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Jubei Trippataka
On Fri, Feb 27, 2009 at 10:54 AM, jf j...@danglingpointers.net wrote:

 also keep in mind that null ptr deref's can sometimes be exploitable--
 especially on certain processors that store important things at 0x0;
 of which, from what i recall, the iphone is one.


Can you please give one example of a NULL deref that was exploitable?

-- 
ciao

JT
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] PDP Architect and your great book

2009-02-26 Thread Petko D. Petkov
Hi Bob,

Thank you for your concerns. The truth is that I've been incredibly
busy lately both in my personal and professional life and therefore I
am not so active at the moment. I am also taking the time to think
about new ideas and wrap up some old projects.

In fact, the Agile Hacking project is one of them. I still believe in
the idea and I am very excited about it.

This project gathered quite a lot of interest but we do not have any
deadlines to meet. Just because I am not talking about it, it does not
mean that I am not silently working on it. The quality of the final
product is very important to me. The way I see it right now, the book
should take no more than year and half to be fully completed.

I just want to remind you that this is entirely a community project
and it depends on the contributions of everyone and I do not
financially benefit from it.

All the best,
pdp

On Thu, Feb 26, 2009 at 5:41 AM, bob jones bhold...@gmail.com wrote:
 I was wondering when your book about how to become a become a real hacker
 and write programs through alt codes will be coming out. I read on your blog
 long ago about this book you envisioned but I have not seen announcments or
 preordering on Amazon. I also have not seen you posting much on the mailing
 lists. Did some event in your life that made you less talkative? I hope this
 is not true and look forward to your great book. maybe it will rival the
 great hacker kevin mitnick's books about hacking stories he could never
 accomplish in real life since they did not revolve around social
 engineering.

 Thanks,
 BB Gun Holder




-- 

Petko D. (pdp) Petkov | GNUCITIZEN | Hakiri | Spin Hunters

gnucitizen.org | hakiri.org | spinhunters.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Jeremy Brown
Not all are practically exploitable, but exploitation seems to be
possible at least on ARM, XScale, and possibly PowerPC as
www.juniper.net/solutions/literature/white_papers/Vector-Rewrite-Attack.pdf
points out. As for examples.. doesn't look like they are public.

On Thu, Feb 26, 2009 at 6:52 PM, Jubei Trippataka
vpn.1.fana...@gmail.com wrote:


 On Fri, Feb 27, 2009 at 10:54 AM, jf j...@danglingpointers.net wrote:

 also keep in mind that null ptr deref's can sometimes be exploitable--
 especially on certain processors that store important things at 0x0;
 of which, from what i recall, the iphone is one.


 Can you please give one example of a NULL deref that was exploitable?

 --
 ciao

 JT

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread jf
  Can you please give one example of a NULL deref that was exploitable?

http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf

http://www.ruxcon.org.au/files/2006/unusual_bugs.pdf

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Windows 7 or KDE4?

2009-02-26 Thread Ivan .
http://olylug.org/read.php?73,13757

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread M.B.Jr.
Dear JT


On Wed, Feb 25, 2009 at 9:09 PM, Jubei Trippataka
vpn.1.fana...@gmail.com wrote:
 Why
 are these bugs even published to a security mailing list and not privately
 dealt with by the vendor?


What's this list's name again?




-- 
Marcio Barbado, Jr.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread bob jones
lol you must work for selinux

On Thu, Feb 26, 2009 at 5:52 PM, Jubei Trippataka
vpn.1.fana...@gmail.comwrote:



 On Fri, Feb 27, 2009 at 10:54 AM, jf j...@danglingpointers.net wrote:

 also keep in mind that null ptr deref's can sometimes be exploitable--
 especially on certain processors that store important things at 0x0;
 of which, from what i recall, the iphone is one.


 Can you please give one example of a NULL deref that was exploitable?

 --
 ciao

 JT

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread neeko
BM_X-Force_WP_final.pdf is called Application-Specific Attacks: 
Leveraging the ActionScript Virtual Machine and if you haven't read it, 
you should. It'll make you smile.

On Fri, Feb 27, 2009 at 08:10:10AM +, jf wrote:
   Can you please give one example of a NULL deref that was exploitable?
 
 http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf
 
 http://www.ruxcon.org.au/files/2006/unusual_bugs.pdf
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:058 ] wireshark

2009-02-26 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:058
 http://www.mandriva.com/security/
 ___

 Package : wireshark
 Date: February 26, 2009
 Affected: 2008.1, 2009.0, Corporate 4.0
 ___

 Problem Description:

 Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through
 1.0.5 allows user-assisted remote attackers to cause a denial
 of service (application crash) via a malformed NetScreen snoop
 file. (CVE-2009-0599)
 
 Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to
 cause a denial of service (application crash) via a crafted Tektronix
 K12 text capture file, as demonstrated by a file with exactly one
 frame. (CVE-2009-0600)
 
 Format string vulnerability in Wireshark 0.99.8 through 1.0.5
 on non-Windows platforms allows local users to cause a denial of
 service (application crash) via format string specifiers in the HOME
 environment variable. (CVE-2009-0601)
 
 This update provides Wireshark 1.0.6, which is not vulnerable to
 these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0599
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0600
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0601
 http://www.wireshark.org/security/wnpa-sec-2009-01.html
 ___

 Updated Packages:

 Mandriva Linux 2008.1:
 2d591a5772317d3587434424b8dc4a1d  
2008.1/i586/dumpcap-1.0.6-0.1mdv2008.1.i586.rpm
 bf65e163112b4dc5db4041c552823bcb  
2008.1/i586/libwireshark0-1.0.6-0.1mdv2008.1.i586.rpm
 80056b13d9146428645d6e67cb2ed8ea  
2008.1/i586/libwireshark-devel-1.0.6-0.1mdv2008.1.i586.rpm
 7923294ad925674ef116b6273835d8ef  
2008.1/i586/rawshark-1.0.6-0.1mdv2008.1.i586.rpm
 bd5a15d402a367058d61fd8dd6a2dcf9  
2008.1/i586/tshark-1.0.6-0.1mdv2008.1.i586.rpm
 5c7b0422b12d2eade1ce997de3766c6c  
2008.1/i586/wireshark-1.0.6-0.1mdv2008.1.i586.rpm
 d116f95d212119516dbca4bf1d353cf5  
2008.1/i586/wireshark-tools-1.0.6-0.1mdv2008.1.i586.rpm 
 2a31aab490fe670da93830f464154a48  
2008.1/SRPMS/wireshark-1.0.6-0.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 b7213fd4bf53ad0cb41b5cc5ab1057df  
2008.1/x86_64/dumpcap-1.0.6-0.1mdv2008.1.x86_64.rpm
 4e3f14a549d66f199171d6f91aa28c68  
2008.1/x86_64/lib64wireshark0-1.0.6-0.1mdv2008.1.x86_64.rpm
 aa39e29909ed34d5df2f0c85ac560c8f  
2008.1/x86_64/lib64wireshark-devel-1.0.6-0.1mdv2008.1.x86_64.rpm
 ef92c97f74a2811daf7d874755dd  
2008.1/x86_64/rawshark-1.0.6-0.1mdv2008.1.x86_64.rpm
 ea555917cd20aba1f0b4114730ad9924  
2008.1/x86_64/tshark-1.0.6-0.1mdv2008.1.x86_64.rpm
 c74402d6323f6a72188f214d2d002ef2  
2008.1/x86_64/wireshark-1.0.6-0.1mdv2008.1.x86_64.rpm
 fa5e55f0a5934c2bae263e9151a40b16  
2008.1/x86_64/wireshark-tools-1.0.6-0.1mdv2008.1.x86_64.rpm 
 2a31aab490fe670da93830f464154a48  
2008.1/SRPMS/wireshark-1.0.6-0.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 c661639631224e605d41a2985af43c93  
2009.0/i586/dumpcap-1.0.6-0.1mdv2009.0.i586.rpm
 bb633c409ddb95d2e6f6826b6fd2be3d  
2009.0/i586/libwireshark0-1.0.6-0.1mdv2009.0.i586.rpm
 5d2f7434a1dd322259907d14caf90e11  
2009.0/i586/libwireshark-devel-1.0.6-0.1mdv2009.0.i586.rpm
 d32a3de9e13b83d991a2d6c8577f50c2  
2009.0/i586/rawshark-1.0.6-0.1mdv2009.0.i586.rpm
 bcdf64d0e05d0bb964c946c83bdd5353  
2009.0/i586/tshark-1.0.6-0.1mdv2009.0.i586.rpm
 3537cea11294e8d1dff87c15b933c622  
2009.0/i586/wireshark-1.0.6-0.1mdv2009.0.i586.rpm
 c5ef95f5eb5255e10ccc12bcb0c6d77a  
2009.0/i586/wireshark-tools-1.0.6-0.1mdv2009.0.i586.rpm 
 3efca295d42d9e1686b46ca1c020f8a2  
2009.0/SRPMS/wireshark-1.0.6-0.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 90cffab44fe29d55f527ab4b76b0a0d6  
2009.0/x86_64/dumpcap-1.0.6-0.1mdv2009.0.x86_64.rpm
 838159ecdc95655df014d17d04434297  
2009.0/x86_64/lib64wireshark0-1.0.6-0.1mdv2009.0.x86_64.rpm
 d3dba0b501696a634627540517693b62  
2009.0/x86_64/lib64wireshark-devel-1.0.6-0.1mdv2009.0.x86_64.rpm
 bf51f59064d3ce3dd2dafd6889df  
2009.0/x86_64/rawshark-1.0.6-0.1mdv2009.0.x86_64.rpm
 3e33480b37b90293e1fd77c33934b9d2  
2009.0/x86_64/tshark-1.0.6-0.1mdv2009.0.x86_64.rpm
 6a22be605ea9e2357c8c5f38a1d6cc78  
2009.0/x86_64/wireshark-1.0.6-0.1mdv2009.0.x86_64.rpm
 a73dd1ee57fee0b886beb0542bdd3baa  
2009.0/x86_64/wireshark-tools-1.0.6-0.1mdv2009.0.x86_64.rpm 
 3efca295d42d9e1686b46ca1c020f8a2  
2009.0/SRPMS/wireshark-1.0.6-0.1mdv2009.0.src.rpm

 Corporate 4.0:
 cd40c4762bd0c4b5ffafc5023809ac04  
corporate/4.0/i586/dumpcap-1.0.6-0.1.20060mlcs4.i586.rpm
 629aa56a60730449858656e1ea062b84  
corporate/4.0/i586/libwireshark0-1.0.6-0.1.20060mlcs4.i586.rpm
 e7674da06cff0db774a65d40c8407ce1  
corporate/4.0/i586/libwireshark-devel-1.0.6-0.1.20060mlcs4.i586.rpm
 

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Jubei Trippataka
On Fri, Feb 27, 2009 at 12:26 PM, ne...@feelingsinister.net wrote:

 BM_X-Force_WP_final.pdf is called Application-Specific Attacks:
 Leveraging the ActionScript Virtual Machine and if you haven't read it,
 you should. It'll make you smile.



OK, and what about this vulnerability makes use of a NULL pointer? This goes
to show the shallow exploitation knowledge of this community. If you
actually understood the paper it's (NULL + offset). This is NOT the same as
a plain NULL deref bug. Also, you need to be able to map the NULL address,
so I ask again, in examples such as this, in users-space apps name one
exploitable condition.


-- 
ciao

JT
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Jason Starks
Better yet, name two.

On Thu, Feb 26, 2009 at 9:22 PM, Jubei Trippataka
vpn.1.fana...@gmail.comwrote:



 On Fri, Feb 27, 2009 at 12:26 PM, ne...@feelingsinister.net wrote:

 BM_X-Force_WP_final.pdf is called Application-Specific Attacks:
 Leveraging the ActionScript Virtual Machine and if you haven't read it,
 you should. It'll make you smile.



 OK, and what about this vulnerability makes use of a NULL pointer? This
 goes to show the shallow exploitation knowledge of this community. If you
 actually understood the paper it's (NULL + offset). This is NOT the same as
 a plain NULL deref bug. Also, you need to be able to map the NULL address,
 so I ask again, in examples such as this, in users-space apps name one
 exploitable condition.


 --
 ciao

 JT

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread neeko

On Fri, Feb 27, 2009 at 01:22:36PM +1100, Jubei Trippataka wrote:
 On Fri, Feb 27, 2009 at 12:26 PM, ne...@feelingsinister.net wrote:
 
  BM_X-Force_WP_final.pdf is called Application-Specific Attacks:
  Leveraging the ActionScript Virtual Machine and if you haven't read it,
  you should. It'll make you smile.
 
 
 
 OK, and what about this vulnerability makes use of a NULL pointer? This goes

See this --^

 to show the shallow exploitation knowledge of this community. If you
 actually understood the paper it's (NULL + offset). This is NOT the same as

and then this -^

 a plain NULL deref bug. Also, you need to be able to map the NULL address,
 so I ask again, in examples such as this, in users-space apps name one
 exploitable condition.
 
 
 -- 
 ciao
 
 JT

I'll clarify for everyone since you seem lost.
EVERYONE, THE NULL POINTER DOES NOT GET DEREFERENCED. It only 
gets referenced. And Jubei isn't even sure a null pointer is involved 
at all =)

With that out of the way, I'd just like to say that I only meant to 
encourage people to check out an excellent paper. I didn't mean to say 
anything related to your argument other than to say that that 
paper is a must-read. If you can't appreciate that, why the fuck are you 
on F-D? Think about it.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Jubei Trippataka


 I'll clarify for everyone since you seem lost.
 EVERYONE, THE NULL POINTER DOES NOT GET DEREFERENCED. It only
 gets referenced. And Jubei isn't even sure a null pointer is involved
 at all =)

 With that out of the way, I'd just like to say that I only meant to
 encourage people to check out an excellent paper. I didn't mean to say
 anything related to your argument other than to say that that
 paper is a must-read. If you can't appreciate that, why the fuck are you
 on F-D? Think about it.



I'm didn't even comment on Mark's paper, it is definitely a great piece of
research, there is no doubt. It's just that some people have read this paper
and thought, wow, all those NULL bugs are now exploitable. It's important to
separate these bug classes.

I'd even go to say that while this paper is a must-read, please also spend
some time understanding it, otherwise don't bother.

-- 
ciao

JT
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] VMSA-2009-0003 ESX 2.5.5 patch 12 updates service console package ed

2009-02-26 Thread VMware Security team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
   VMware Security Advisory

Advisory ID:   VMSA-2009-0003
Synopsis:  ESX 2.5.5 patch 12 updates service console package ed
Issue date:2009-01-26
Updated on:2009-01-26 (initial release of advisory)
CVE numbers:   CVE-2008-3916
- 

1. Summary

   ESX 2.5.5 patch 12 Build 142708 updates service console package ed

2. Relevant releases

   VMware ESX 2.5.5 before patch 12

   Extended support for ESX 2.5.5 ends on 2010-06-15.  Users should plan
   to upgrade to ESX 3.0.3 and preferably to the newest release
   available.

3. Problem Description

 a. Updated ESX patch updates Service Console package ed

ed is a line-oriented text editor, used to create, display, and
modify text files (both interactively and via shell scripts).

A heap-based buffer overflow was discovered in the way ed, the GNU
line editor, processed long file names. An attacker could create a
file with a specially-crafted name that could possibly execute an
arbitrary code when opened in the ed editor.

The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-3916 to this issue.

The following table lists what action remediates the vulnerability
(column 4) if a solution is available.

VMware Product   Running  Replace with/
ProductVersion   on   Apply Patch
=    ===  =
VirtualCenter  any   Windows  not affected

hosted *   any   any  not affected

ESXi   3.5   ESXi not affected

ESX3.5   ESX  not affected
ESX3.0.3 ESX  not affected
ESX3.0.2 ESX  not affected
ESX2.5.5 ESX  Upgrade Patch 12

* hosted products are VMware Workstation, Player, ACE, Server, Fusion.

4. Solution

   Please review the patch/release notes for your product and version
   and verify the md5sum of your downloaded file.

   ESX 2.5.5 Upgrade Patch 12 Build 142709
   www.vmware.com/support/esx25/doc/esx-255-142709-patch.html
   http://download3.vmware.com/software/esx/esx-2.5.5-142709-upgrade.tar.gz
   md5sum: 2a0bd5cc3591b1f6b04616fa2c97f78c

5. References

   CVE numbers
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916

- 
6. Change log

2009-02-20  VMSA-2009-0003
Initial security advisory after release of patch 12 for ESX 2.5.5
on 2009-02-20.

- ---
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  * security-announce at lists.vmware.com
  * bugtraq at securityfocus.com
  * full-disclosure at lists.grok.org.uk

E-mail:  security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center
http://www.vmware.com/security

VMware security response policy
http://www.vmware.com/support/policies/security_response.html

General support life cycle policy
http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html

Copyright 2009 VMware Inc.  All rights reserved.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (MingW32)

iD8DBQFJp2fAS2KysvBH1xkRAiBvAJ420qchZs/J2AiBRw+Gi4nTIlTprwCfU3Zx
KioldmTcIUXlhY7Iq7WlmGY=
=Ym/+
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread neeko
On Fri, Feb 27, 2009 at 03:19:29PM +1100, Jubei Trippataka wrote:
 I'd even go to say that while this paper is a must-read, please also spend
 some time understanding it, otherwise don't bother.
 
 -- 
 ciao
 
 JT

Does having the last word make you feel better?

Neeko

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SHOUTcast XSS Vulnerability

2009-02-26 Thread Stephen Komal
--

Description:

There exists a vulnerability in SHOUTcast, which can be exploited via
script insertion attacks.  Input passed to the incoming SHOUTcast web
interface (default is port 8000) is not properly sanitized.
Therefore, the input can contain arbitrary HTML and script code which
will be outputted to the log file without being sanitized.  Upon
viewing the log file in the browser via the administrator panel, the
malicious code will be executed in the administrator's browser.

--

Affected Versions:

The vulnerability is confirmed in version 1.9.8.  Other versions may
also be affected.

--

Method:

Construct a basic HTTP GET request destined to the victim's SHOUTcast
web interface.  Insert the malicious code in the User Agent field of
the packet.

--

Solution:

Filter malicious characters and character sequences before logging the
input to the log file, and also before displaying the contents of the
log file in the browser.

--

Discovered on:

December 15, 2008

--

Discovered by:

Stephen Komal, Ronald Gutierrez, Joseph Puran

--

Special thanks to our elite instructors:

Dan Guido, Mike Zusman, Erik Cabetas, Dean De Beer, Dino Dai Zovi,
Stephen A. Ridley

--

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] POP Peeper 3.4.0.0 UIDL Remote Buffer Overflow Vulnerability

2009-02-26 Thread Krakow Labs
KL0209ADV-poppeeper_uidl-bof.txt
02.27.2009

Krakow Labs Research [www.krakowlabs.com]
POP Peeper 3.4.0.0 UIDL Remote Buffer Overflow Vulnerability

-

==
BACKGROUND INFORMATION
==

POP Peeper is an email notifier that runs in your Windows task bar and 
alerts you when you have new email on your
POP3, IMAP (with IDLE support), Hotmail\MSN\LiveMail, Yahoo, GMail, 
Mail.com, MyWay, Excite, iWon, Lycos.com, RediffMail,
Juno and NetZero accounts. IMAP supports allows you to access AOL, AIM, 
Netscape and other services. Send mail directly
from POP Peeper and use the address book to email your frequently used 
contacts. POP Peeper allows you to view messages
using HTML or you can choose to safely view all messages in rich or 
plain text. Several options are available that will
decrease or eliminate the risks of reading your email (viruses, 
javascript, webbugs, etc). POP Peeper can be run from a
portable device and can be password protected. Many notification options 
are availble to indicate when new mail has
arrived, such as sound alerts (configurable for each account), flashing 
scroll lock, skinnable popup notifier, customized
screensaver and more.

Source: http://www.poppeeper.org

-

=
VULNERABILITY DESCRIPTION
=

POP Peeper is vulnerable to a remote buffer overflow vulnerability. This 
vulnerability is exploitable on the client side.
A vulnerable POP Peeper user must connect to an exploitation server and 
attempt use retrieve mail to affected.

-

=
TECHNICAL DETAILS
=

To trigger this vulnerability, POP Peeper has to connect to an 
exploitation server acting as a POP3 daemon. POP Peeper
then uses the UIDL command to get unique IDs for each email it later 
plans on retrieving. The exploitation server can
send an oversized ID (1040 bytes), overflowing a buffer on the stack, 
giving the attacker complete control over the
process.

-

=
PRODUCTS AFFECTED
=

POP Peeper 3.4.0.0 was confirmed vulnerable. All versions of below 
3.4.0.0 and are suspected vulnerable as well.

-


EXPLOITATION


An exploit has been made public to trigger this vulnerability.

http://www.krakowlabs.com/dev/exp/KL0209EXP-poppeeper_uidl-bof.pl.txt

The exploit code has been tested in the following environment(s):

Windows XP Professional with Service Pack 3 on x86 Architecture

Result: SUCCESS

-

===
WORKAROUNDS
===

The vendor has fixed this vulnerability but has not issued an updated 
version at the time of this advisory. We suggest
POP Peeper users do not connect to untrusted POP3 servers until a new 
release is available that remedies this vulnerability.



===
CREDITS
===

r...@kl (Jeremy Brown) [r...@krakowlabs.com] is credited with the 
discovery and research of this vulnerability.
r...@kl (Jeremy Brown) [r...@krakowlabs.com] and Jayji (James Burton) 
[jayji...@gmail.com] are both credited with the
development of exploit code for this vulnerability.

-

==
DISCLAIMER
==

Krakow Labs assumes no liability for the use or misuse of any or all 
information contained in this document or information
available at or referring to this document. Any or all information 
contained in this document or available at or referring to
this document is not misleading and all information provided by Krakow 
Labs in this document is accurate to the best knowledge
of Krakow Labs. This document can be published and/or reproduced as long 
as the document's data is left unchanged. Krakow Labs
may be accessed via krakowlabs.com for more information, personal 
reference, or other agendas supporting Krakow Labs.

Associated Files  Information:
http://www.krakowlabs.com/res/adv/KL0209ADV-poppeeper_uidl-bof.txt
http://www.krakowlabs.com/dev/exp/KL0209EXP-poppeeper_uidl-bof.pl.txt
http://www.krakowlabs.com/dev/exp/KL0209EXP-poppeeper_uidl-bof.jpg
KL0209ADV-poppeeper_uidl-bof.txt


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread bob jones
http://uninformed.org/?v=4a=5t=sumry

On Thu, Feb 26, 2009 at 10:19 PM, Jubei Trippataka
vpn.1.fana...@gmail.comwrote:




 I'll clarify for everyone since you seem lost.
 EVERYONE, THE NULL POINTER DOES NOT GET DEREFERENCED. It only
 gets referenced. And Jubei isn't even sure a null pointer is involved
 at all =)

 With that out of the way, I'd just like to say that I only meant to
 encourage people to check out an excellent paper. I didn't mean to say
 anything related to your argument other than to say that that
 paper is a must-read. If you can't appreciate that, why the fuck are you
 on F-D? Think about it.



 I'm didn't even comment on Mark's paper, it is definitely a great piece of
 research, there is no doubt. It's just that some people have read this paper
 and thought, wow, all those NULL bugs are now exploitable. It's important to
 separate these bug classes.

 I'd even go to say that while this paper is a must-read, please also spend
 some time understanding it, otherwise don't bother.

 --
 ciao

 JT

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread jf
 I'm didn't even comment on Mark's paper, it is definitely a great piece of
 research, there is no doubt. It's just that some people have read this paper
 and thought, wow, all those NULL bugs are now exploitable. It's important to
 separate these bug classes.

sorry to interrupt your self-aggrandizing tirade, however you're the only
one who took the implication that *all* null ptr related bugs are
exploitable-- i never implied or said that, just said in some instances
they can be. Furthermore, I think you're taking the word 'dereference' a
little too serious and you should perhaps take up a hobby such as baseball
cards or miniature collectibles to quench you're apparent need to
sub-categorize into nothing. If you want to insist that null+x/etc bugs be
in an entirely separate category than dereferences, that's cool, just don't
go all ape-shit on people who dont share your same narrow view at
some feeble attempt at elitism via syntactic pedantry.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of, Service Vulnerability

2009-02-26 Thread Jubei Trippataka
On Fri, Feb 27, 2009 at 5:04 PM, bob jones bhold...@gmail.com wrote:

 http://uninformed.org/?v=4a=5t=sumry


This exploitation relies on the ability to have the top-level UEF point to
an arbitrary address which hopefully you have the ability to control. The
NULL pointer is only used as a mechanism to trigger the exception necessary
to execute code where the handler now points. This doesn't need to be a NULL
deref, it can be any unhandled exception. I guess you could compare the NULL
pointer in this situation to a memory leak necesary to exploit another
condition. The memory leak itself wouldn't be called a vulnerability, it's
just used instrumentally to assist in exploitation. In this paper the NULL
pointer is used to assist in the exploitation of a hijacked UEF by
triggering the unhandled exception.

My original point stands, the NULL pointer dereference can be used to assist
in another explotiation, but in itself is not a vulnerability.

Do you disagree?

-- 
ciao

JT
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] User-mode keylogging technique?

2009-02-26 Thread Joshua Russel
Hi Friends,

Can someone give me some pointers on an effective and new user-mode
keyboard logging and system-call interception techniques?

Thanks.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/