[Full-disclosure] [USN-745-1] Firefox and Xulrunner vulnerabilities

2009-03-27 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-745-1 March 28, 2009
firefox, firefox-3.0, xulrunner-1.9 vulnerabilities
CVE-2009-1044, CVE-2009-1169
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  firefox 1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1

Ubuntu 7.10:
  firefox 2.0.0.21~tb.21.308+nobinonly-0ubuntu0.7.10.1

Ubuntu 8.04 LTS:
  firefox-3.0 3.0.8+nobinonly-0ubuntu0.8.04.2
  xulrunner-1.9   1.9.0.8+nobinonly-0ubuntu0.8.04.1

Ubuntu 8.10:
  abrowser3.0.8+nobinonly-0ubuntu0.8.10.2
  firefox-3.0 3.0.8+nobinonly-0ubuntu0.8.10.2
  xulrunner-1.9   1.9.0.8+nobinonly-0ubuntu0.8.10.1

After a standard system upgrade you need to restart Firefox and any
applications that use xulrunner, such as Epiphany, to effect the necessary
changes.

Details follow:

It was discovered that Firefox did not properly perform XUL garbage
collection. If a user were tricked into viewing a malicious website, a
remote attacker could cause a denial of service or execute arbitrary code
with the privileges of the user invoking the program. This issue only
affected Ubuntu 8.04 LTS and 8.10. (CVE-2009-1044)

A flaw was discovered in the way Firefox performed XSLT transformations.
If a user were tricked into opening a crafted XSL stylesheet, an attacker
could cause a denial of service or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2009-1169)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1.diff.gz
  Size/MD5:   11 4c0e1bcc5b9c6628cabb1043e00e232e

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1.dsc
  Size/MD5: 2389 4c85617a64728b2735fa16dbad02d549

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614l.orig.tar.gz
  Size/MD5: 49519625 c566aa02a30d72b532b1831df653fa27

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_all.deb
  Size/MD5:53936 1847ca99bedc6c3b3a9e452b78fc

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_all.deb
  Size/MD5:53046 a389c09950c126495ba024ccd61e6c99

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5: 47686418 ec36b8546bbc4916096b55d05ee5fe4d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:  2859286 0e9174111e38cf2c1962acebff79483d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:86304 f9988fd7e2a5caea479d4c7ac53437f5

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:  9494192 0f830daf3dde2de3f8ffddc128ba1d28

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:   222592 7399acc67756f6af23c4a86e41a6670e

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:   166156 9cd3f1bcd036a5fa4d04d11cbb10a0bb

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:   248148 7f09db8598e69799f131aec1c4d10fb2

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:   826572 30171fcf81e6a0736457067d489c351f

http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_amd64.deb
  Size/MD5:   218878 dc19e2d7c1d904bbe28385bbea946894

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_i386.deb
  Size/MD5: 44229562 65e5840f0b11f6c5675afcf0b85cfd2d

http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.15~prepatch080614l-0ubuntu1_i386.deb
  Size/MD5:

Re: [Full-disclosure] Novell Netstorage Multiple Vulnerabilities

2009-03-27 Thread mrdkaaa
-??-??: People still ROFLing.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2009:081 ] libsoup

2009-03-27 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:081
 http://www.mandriva.com/security/
 ___

 Package : libsoup
 Date: March 27, 2009
 Affected: 2008.0, Corporate 3.0
 ___

 Problem Description:

 An integer overflow in libsoup Base64 encoding and decoding functions
 enables attackers either to cause denial of service and to execute
 arbitrary code (CVE-2009-0585).
 
 This update provides the fix for that security issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0585
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 1972c4b9fcdd24c4e58a5d8126934192  
2008.0/i586/libsoup-2.2_8-2.2.100-1.1mdv2008.0.i586.rpm
 bdd6df7a38ef005ee0f04783dee36756  
2008.0/i586/libsoup-2.2_8-devel-2.2.100-1.1mdv2008.0.i586.rpm 
 c99c9cabb6fd1391dc3b97850c259694  
2008.0/SRPMS/libsoup-2.2.100-1.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 237ddbddfbee3f0f91a752e4b7433a07  
2008.0/x86_64/lib64soup-2.2_8-2.2.100-1.1mdv2008.0.x86_64.rpm
 78d90baeb9b5ac5f405577386c68159f  
2008.0/x86_64/lib64soup-2.2_8-devel-2.2.100-1.1mdv2008.0.x86_64.rpm 
 c99c9cabb6fd1391dc3b97850c259694  
2008.0/SRPMS/libsoup-2.2.100-1.1mdv2008.0.src.rpm

 Corporate 3.0:
 05c986deeb98dd73e1ac22d23ff605ae  
corporate/3.0/i586/libsoup-1.99.28-1.2.C30mdk.i586.rpm
 e99b68c6c991d6a97698bf9b08bdf854  
corporate/3.0/i586/libsoup-2.0_0-1.99.28-1.2.C30mdk.i586.rpm
 f67bb628913f0a17f6b29cb2cbc5aa6f  
corporate/3.0/i586/libsoup-2.0_0-devel-1.99.28-1.2.C30mdk.i586.rpm 
 2e1a20ca0d80dcf735855a5f95347646  
corporate/3.0/SRPMS/libsoup-1.99.28-1.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 e7863b68562e8f2ea4eebb1d5c4ce05c  
corporate/3.0/x86_64/lib64soup-2.0_0-1.99.28-1.2.C30mdk.x86_64.rpm
 50fd063851379413327a6878fbe44bf3  
corporate/3.0/x86_64/lib64soup-2.0_0-devel-1.99.28-1.2.C30mdk.x86_64.rpm
 dc97738bc5397ea6290372e6fa13bc90  
corporate/3.0/x86_64/libsoup-1.99.28-1.2.C30mdk.x86_64.rpm 
 2e1a20ca0d80dcf735855a5f95347646  
corporate/3.0/SRPMS/libsoup-1.99.28-1.2.C30mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJzSPamqjQ0CJFipgRAhZ5AJ9HevNsvcfZOLIRqwzSHZr9DJSFGQCgmNmq
6Qm9NtIGAnHR5QIgDcGxsLE=
=DBhP
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] phishing attacks against ISPs (also with Google translations)

2009-03-27 Thread mac . user
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

What pertinence will this observation and possible discovery of
fact bear upon the computer security world?  Please refer to the
list charter and take your off topic banter back to your childish
funsec world.

thank you

On Thu, 26 Mar 2009 21:35:30 -0400 Gadi Evron 
wrote:
>I'd be happy if someone has other ideas to help us reach a better
>conclusion?
>
>   Gadi.
>
>___
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQMCAAYFAknM878ACgkQfuF4tUz/X+Lq6gP+NP0wTRkrB5w/IC3WlFnK8xVcg+RZ
kjhuVLnhs1Z7unJ5USpabrC9D920lRPEENtSemMb0ydQsp0FMybXaiEMJfm03n2ELD0n
bkD1zY3cy9xJMgrn37pRJffXc0O07Gsy/1vokFlLseeslnz6IVpNMFARTNghUVT9q5/c
R9Fd7Us=
=fuK3
-END PGP SIGNATURE-

--
Start your medical billing career!  Click here for more information.
 
http://tagline.hushmail.com/fc/BLSrjkqmWewUC6yB2K4ytVzmwABx3tR1hyAxMotEDASdjMXRqoHRuAZ7fws/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] phishing attacks against ISPs (also with Google translations)

2009-03-27 Thread Gadi Evron
M.B.Jr. wrote:
> Dear Gadi,
> 
> 
> On Wed, Mar 25, 2009 at 9:40 AM, Gadi Evron  wrote:
>> While we have seen ISP phishing and Hebrew phishing before, these
>> attacks started when Google added translation into Hebrew.
> 
> 
> How exactly did you establish such a certain connection between
> Google's Hebrew translation service's debut and these phishing attacks
> you're referring to?
> 
> If you're going to provide us with dates, please point out trustable
> probative sources.


Dear Mr. M.B.Jr.,

While I cannot show conclusive evidence between the two concurrent 
events, the causality in this case seems pretty obvious for the 
following reasons:

1. The two (phishing and translation module) occurred at around
the same time frame.

2. Previously, this was not happening.

3. The imperfect Hebrew looks like a machine translation.

4. In fact, the only new element I can discern being added to
the game was the new Google module.

Google is not at fault, they provide a valuable and good service. 
Criminals abuse the same tools we use.

I concede that it is not outside the realm of possibility some crappy 
Hebrew translator suddenly started working with the phishing gangs, but 
it doesn't seem likely.

Conversely, do note I did not state it was Google's translation engine 
that was abused, but rather asked if others see this as well and can 
confirm. I say it now, it is the most likely conclusion.

I'd be happy if someone has other ideas to help us reach a better 
conclusion?

Gadi.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/