Re: [Full-disclosure] stupid question again

2009-12-12 Thread Tracy Reed
On Fri, Dec 11, 2009 at 10:13:09PM -0600, Randall M spake thusly:
 On Dec 11, 2009, at 9:26 PM, Tim tim-secur...@sentinelchicken.org wrote:
  The answer is:  Once you're infected, you shouldn't be trying to clean
  things.  Reinstall.
 
  Need files off of that box first?  Mount the drive under another OS,
  or better yet, use the sleuthkit to get them off.

 NO!! Not the answer. Average user won't and don't know how and usually  
 don't recieve install disks

It most definitely IS the answer. Just because the average user
doesn't know how to do it doesn't mean it isn't the answer. They
shouldn't be entering their credit card info and other personal data
onto a machine which may still be infected. If they can't do it they
need to pay someone who can.

And nobody should be buying software that doesn't come with install
disks. That is just setting yourself up for failure. I know those
people do. And they are getting their personal info stolen too.

-- 
Tracy Reed
http://tracyreed.org


pgpIYWBtyYODU.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Gadi Evron: SecuriTeam: The Mossad: IE 0day for sale

2009-12-12 Thread cyber armageddon
Please don't give to Gadi Evron and/or The Mossad that would be a crime
against humanity and the west.

Remember folks, Securiteam.com is a front for Gadi Evron and The Mossad, do
_not_ send to them under any circumstances.

Only last month The Mossad were caught planting fake car bombs in Tel Aviv,
thats not a people you want to be associated with.

They fake car bombs could be a prep for anywhere, you don't know where they
were training for, it could be against any of us.

Report from BBC:
http://news.bbc.co.uk/1/hi/world/middle_east/8377746.stm

Analysis by Reuters:
http://blogs.reuters.com/axismundi/2009/11/25/frayed-cloak-rusty-dagger/

On Sat, Dec 12, 2009 at 3:12 AM, Jeff Williams jeffwilli...@gmail.com
wrote:
 And the question is now:
 should the Mossad, NSA, etc be considered as bad guys ?




 2009/12/12 Jeff Williams jeffwilli...@gmail.com

 If idefense pay 7000$ for a RCE on IE, it's possibly because they sell
 theses bugs to the NSA, MOSSAD, MI10 ?

 From my understanding, MS do not pay for any reported vulnerability, or
 maybe i missed the make a donation icon on idefense website ?



 2009/12/12 Shyaam shy...@gmail.com

 :) Good one Valdis. That is what I was exactly trying to do.

 #1. If his intent was good, he would have sent it to the vendor and to
 the US Cert.
 #2. His aim is to get money:
   a. Instead of selling it directly to black market and not getting
 any returns, or having some legal agency stepping onto his doors he
could as
 well sell it to these companies.
   b. These companies DO NOT sell stuff to BLACK MARKET. Straighten
 your facts before you accuse any of the below:
 zdi,idefense,securiteam,immunity,etc. They have better things to do than
to
 sell it off to the bad guys.

 Besides, many people have that kind of a notion only because there are
 many hollywood movie fanatics out there, who suspect every single entity
 around you.

 Thanks for your creative response though :). You really cracked me up :)

 Shyaam

 On Sat, Dec 12, 2009 at 2:31 AM, valdis.kletni...@vt.edu wrote:

 On Fri, 11 Dec 2009 20:13:52 EST, Jeff Williams said:

  zdi,idefense,securiteam,immunity,etc is a front, your exploit will
  anyways
  end up on the blackmarket by selling it to theses company.
  How can you be that naive ?

 You're talking to somebody willing to sell to the highest bidder on
F-D.
 Draw your own conclusions about whether they actually care if it ends
up
 on
 the black market.





 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Gadi Evron: SecuriTeam: The Mossad: IE 0day for sale

2009-12-12 Thread Freddie Vicious
Obviously you were banned for a reason, n3td3v. Spread your bullshit
elsewhere.

On Sat, Dec 12, 2009 at 12:56 PM, cyber armageddon 
cyberarmaged...@googlemail.com wrote:

 Please don't give to Gadi Evron and/or The Mossad that would be a crime
 against humanity and the west.

 Remember folks, Securiteam.com is a front for Gadi Evron and The Mossad, do
 _not_ send to them under any circumstances.

 Only last month The Mossad were caught planting fake car bombs in Tel Aviv,
 thats not a people you want to be associated with.

 They fake car bombs could be a prep for anywhere, you don't know where they
 were training for, it could be against any of us.

 Report from BBC:
 http://news.bbc.co.uk/1/hi/world/middle_east/8377746.stm

 Analysis by Reuters:
 http://blogs.reuters.com/axismundi/2009/11/25/frayed-cloak-rusty-dagger/

 On Sat, Dec 12, 2009 at 3:12 AM, Jeff Williams jeffwilli...@gmail.com
 wrote:
  And the question is now:
  should the Mossad, NSA, etc be considered as bad guys ?
 
 
 
 
  2009/12/12 Jeff Williams jeffwilli...@gmail.com
 
  If idefense pay 7000$ for a RCE on IE, it's possibly because they sell
  theses bugs to the NSA, MOSSAD, MI10 ?
 
  From my understanding, MS do not pay for any reported vulnerability, or
  maybe i missed the make a donation icon on idefense website ?
 
 
 
  2009/12/12 Shyaam shy...@gmail.com
 
  :) Good one Valdis. That is what I was exactly trying to do.
 
  #1. If his intent was good, he would have sent it to the vendor and to
  the US Cert.
  #2. His aim is to get money:
a. Instead of selling it directly to black market and not getting
  any returns, or having some legal agency stepping onto his doors he
 could as
  well sell it to these companies.
b. These companies DO NOT sell stuff to BLACK MARKET. Straighten
  your facts before you accuse any of the below:
  zdi,idefense,securiteam,immunity,etc. They have better things to do
 than to
  sell it off to the bad guys.
 
  Besides, many people have that kind of a notion only because there are
  many hollywood movie fanatics out there, who suspect every single
 entity
  around you.
 
  Thanks for your creative response though :). You really cracked me up
 :)
 
  Shyaam
 
  On Sat, Dec 12, 2009 at 2:31 AM, valdis.kletni...@vt.edu wrote:
 
  On Fri, 11 Dec 2009 20:13:52 EST, Jeff Williams said:
 
   zdi,idefense,securiteam,immunity,etc is a front, your exploit will
   anyways
   end up on the blackmarket by selling it to theses company.
   How can you be that naive ?
 
  You're talking to somebody willing to sell to the highest bidder on
 F-D.
  Draw your own conclusions about whether they actually care if it ends
 up
  on
  the black market.
 
 
 
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
Best wishes,
Freddie Vicious
http://twitter.com/viciousf
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Gadi Evron: SecuriTeam: The Mossad: IE 0day for sale

2009-12-12 Thread cyber armageddon
Oh which part of it is _bullshit_? Do you research before replying.

On Sat, Dec 12, 2009 at 11:29 AM, Freddie Vicious
fred.vici...@gmail.com wrote:

 Obviously you were banned for a reason, n3td3v. Spread your bullshit 
 elsewhere.

 On Sat, Dec 12, 2009 at 12:56 PM, cyber armageddon 
 cyberarmaged...@googlemail.com wrote:

 Please don't give to Gadi Evron and/or The Mossad that would be a crime 
 against humanity and the west.

 Remember folks, Securiteam.com is a front for Gadi Evron and The Mossad, do 
 _not_ send to them under any circumstances.

 Only last month The Mossad were caught planting fake car bombs in Tel Aviv, 
 thats not a people you want to be associated with.

 They fake car bombs could be a prep for anywhere, you don't know where they 
 were training for, it could be against any of us.

 Report from BBC:
 http://news.bbc.co.uk/1/hi/world/middle_east/8377746.stm

 Analysis by Reuters:
 http://blogs.reuters.com/axismundi/2009/11/25/frayed-cloak-rusty-dagger/

 On Sat, Dec 12, 2009 at 3:12 AM, Jeff Williams jeffwilli...@gmail.com 
 wrote:
  And the question is now:
  should the Mossad, NSA, etc be considered as bad guys ?
 
 
 
 
  2009/12/12 Jeff Williams jeffwilli...@gmail.com
 
  If idefense pay 7000$ for a RCE on IE, it's possibly because they sell
  theses bugs to the NSA, MOSSAD, MI10 ?
 
  From my understanding, MS do not pay for any reported vulnerability, or
  maybe i missed the make a donation icon on idefense website ?
 
 
 
  2009/12/12 Shyaam shy...@gmail.com
 
  :) Good one Valdis. That is what I was exactly trying to do.
 
  #1. If his intent was good, he would have sent it to the vendor and to
  the US Cert.
  #2. His aim is to get money:
    a. Instead of selling it directly to black market and not getting
  any returns, or having some legal agency stepping onto his doors he 
  could as
  well sell it to these companies.
    b. These companies DO NOT sell stuff to BLACK MARKET. Straighten
  your facts before you accuse any of the below:
  zdi,idefense,securiteam,immunity,etc. They have better things to do than 
  to
  sell it off to the bad guys.
 
  Besides, many people have that kind of a notion only because there are
  many hollywood movie fanatics out there, who suspect every single entity
  around you.
 
  Thanks for your creative response though :). You really cracked me up :)
 
  Shyaam
 
  On Sat, Dec 12, 2009 at 2:31 AM, valdis.kletni...@vt.edu wrote:
 
  On Fri, 11 Dec 2009 20:13:52 EST, Jeff Williams said:
 
   zdi,idefense,securiteam,immunity,etc is a front, your exploit will
   anyways
   end up on the blackmarket by selling it to theses company.
   How can you be that naive ?
 
  You're talking to somebody willing to sell to the highest bidder on F-D.
  Draw your own conclusions about whether they actually care if it ends up
  on
  the black market.
 
 
 
 
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 --
 Best wishes,
 Freddie Vicious
 http://twitter.com/viciousf

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread cyber armageddon
Security Evangelist at Beyond Security

IDF, Military Intelligence

(Government Agency; 10,001 or more employees; Defense  Space industry)

2000 — 2003 (3 years )

http://il.linkedin.com/in/gadievron

IP address: 192.117.232.213
Host name: securiteam.com

Alias:
securiteam.com
192.117.232.213 is from Israel(IL) in region Middle East

http://network-tools.com/default.asp?prog=expresshost=securiteam.com

The SecuriTeam web portal is a vital part of Beyond Security's
activities and an essential competitive advantage.

http://www.beyondsecurity.com/company_overview.html

Aman: the supreme military intelligence branch of the Israeli Defense
Forces (IDF).

Mossad: the agency responsible primarily for overseas intelligence work.

http://en.wikipedia.org/wiki/Israeli_Intelligence_Community

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread Paul Schmehl
--On December 12, 2009 7:37:08 AM -0600 cyber armageddon 
cyberarmaged...@googlemail.com wrote:


 Security Evangelist at Beyond Security

 IDF, Military Intelligence

 (Government Agency; 10,001 or more employees; Defense  Space industry)

 2000 — 2003 (3 years )

 ^

That was six years ago.  Do the math doofus.

Paul Schmehl, If it isn't already
obvious, my opinions are my own
and not those of my employer.
**
WARNING: Check the headers before replying

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread cyber armageddon
On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl pschmehl_li...@tx.rr.com wrote:
 --On December 12, 2009 7:37:08 AM -0600 cyber armageddon
 cyberarmaged...@googlemail.com wrote:
 IDF, Military Intelligence

 (Government Agency; 10,001 or more employees; Defense  Space industry)

 2000 — 2003 (3 years )

        ^

 That was six years ago.  Do the math doofus.


Gadi Evron’s Specialties: I'm a campaign manager and an _agent_ of change.

http://il.linkedin.com/in/gadievron

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread Valdis . Kletnieks
On Sat, 12 Dec 2009 11:08:36 CST, Paul Schmehl said:
  2000 — 2003 (3 years )
 ^
 That was six years ago.  Do the math doofus.

Yes, but he was in fact in the position for 3 years. Do the math doofus. :)



pgpPkIK0xdy6y.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread Paul Schmehl
--On December 12, 2009 5:24:27 PM + cyber armageddon 
cyberarmaged...@googlemail.com wrote:

 On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl pschmehl_li...@tx.rr.com
 wrote:
 --On December 12, 2009 7:37:08 AM -0600 cyber armageddon
 cyberarmaged...@googlemail.com wrote:
 IDF, Military Intelligence

 (Government Agency; 10,001 or more employees; Defense  Space industry)

 2000 — 2003 (3 years )

        ^

 That was six years ago.  Do the math doofus.


 Gadi Evron’s Specialties: I'm a campaign manager and an _agent_ of
 change.

 http://il.linkedin.com/in/gadievron

Oh, well that clinches it then.  Cause only spy agencies employ campaign 
managers and agents of change.

You're hilarious.

Paul Schmehl, If it isn't already
obvious, my opinions are my own
and not those of my employer.
**
WARNING: Check the headers before replying

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Brilliant attack bypasses bitlocker

2009-12-12 Thread bugtraq
  http://www.theregister.co.uk/2009/12/05/windows_bitlocker_attacks/
 
 Research grant ideas for 2010:
 
 1) Replacing not only the computer, but victim's entire apartment,
 with cardboard cutouts to intercept passwords,

You know your continued innovation continues to inspire and amaze us. In order 
to ensure you're
properly credited everytime this attack is conducted/referenced, I propose that 
we should call this 
Zalewski Complex Jacking. 

I could totally see DARPA funding this :)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 1949-1] New php-net-ping packages fix arbitrary code execution

2009-12-12 Thread Raphael Geissert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1949-1  secur...@debian.org
http://www.debian.org/security/  Raphael Geissert
December 12, 2009 http://www.debian.org/security/faq
- 

Package: php-net-ping
Vulnerability  : programming error
Problem type   : remote
Debian-specific: no
CVE Id : CVE-2009-4024

It was discovered that php-net-ping, a PHP PEAR module to execute ping
independently of the Operating System, performs insufficient input
sanitising, which might be used to inject arguments (no CVE yet) or
execute arbitrary commands (CVE-2009-4024) on a system that uses
php-net-ping.


For the stable distribution (lenny), this problem has been fixed in
version 2.4.2-1+lenny1.

For the oldstable distribution (etch), this problem has been fixed in
version 2.4.2-1+etch1.

For the testing distribution (squeeze), this problem will be fixed
soon.

For the unstable distribution (sid), this problem has been fixed in
version 2.4.2-1.1.


We recommend that you upgrade your php-net-ping packages.


Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- ---

Debian (oldstable)
- --

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+etch1.diff.gz
Size/MD5 checksum: 3270 b53c3677d3d7d44c472cd395d710748d
  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2.orig.tar.gz
Size/MD5 checksum: 9309 5bfd8d695c35d30d353b51134ad8ca35
  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+etch1.dsc
Size/MD5 checksum:  607 e7e1d01e802bc6108c1faea148f3e25a

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+etch1_all.deb
Size/MD5 checksum:13924 4ef13559e1412c0811c33f36ddaa6f23


Debian GNU/Linux 5.0 alias lenny
- 

Debian (stable)
- ---

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, 
mips, mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2.orig.tar.gz
Size/MD5 checksum: 9309 5bfd8d695c35d30d353b51134ad8ca35
  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+lenny1.dsc
Size/MD5 checksum: 1015 9c912fc0bbfcd10c8ab71f52f320ba48
  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+lenny1.diff.gz
Size/MD5 checksum: 3269 0097b6d5920a4cf32439cd9bf6e95bac

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/p/php-net-ping/php-net-ping_2.4.2-1+lenny1_all.deb
Size/MD5 checksum:13920 d0492ed51494045583f0fb99fc75d753


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-annou...@lists.debian.org
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAksjWMwACgkQ62zWxYk/rQcZaQCbBQPolJjoUjWzNqk/cYUeYtqF
/vQAn20tcbvwRT3g2yzsvOpJklYJ0A6H
=wbii
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA-1950-1] New webkit packages fix several vulnerabilities

2009-12-12 Thread Giuseppe Iuculano
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-1950  secur...@debian.org
http://www.debian.org/security/  Giuseppe Iuculano
December 12, 2009   http://www.debian.org/security/faq
- 

Package: webkit
Vulnerability  : several
Problem type   : remote (local)
Debian-specific: no
CVE Id : CVE-2009-0945 CVE-2009-1687 CVE-2009-1690 CVE-2009-1698
 CVE-2009-1711 CVE-2009-1712 CVE-2009-1725 CVE-2009-1714
 CVE-2009-1710 CVE-2009-1697 CVE-2009-1695 CVE-2009-1693
 CVE-2009-1694 CVE-2009-1681 CVE-2009-1684 CVE-2009-1692
Debian Bug : 532724 532725 534946 535793 538346


Several vulnerabilities have been discovered in webkit, a Web content engine
library for Gtk+. The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2009-0945

Array index error in the insertItemBefore method in WebKit, allows remote
attackers to execute arbitrary code via a document with a SVGPathList data
structure containing a negative index in the SVGTransformList, SVGStringList,
SVGNumberList, SVGPathSegList, SVGPointList, or SVGLengthList SVGList object,
which triggers memory corruption.


CVE-2009-1687

The JavaScript garbage collector in WebKit does not properly handle allocation
failures, which allows remote attackers to execute arbitrary code or cause a
denial of service (memory corruption and application crash) via a crafted HTML
document that triggers write access to an offset of a NULL pointer.


CVE-2009-1690

Use-after-free vulnerability in WebKit, allows remote attackers to execute
arbitrary code or cause a denial of service (memory corruption and application
crash) by setting an unspecified property of an HTML tag that causes child
elements to be freed and later accessed when an HTML error occurs, related to
recursion in certain DOM event handlers.


CVE-2009-1698

WebKit does not initialize a pointer during handling of a Cascading Style Sheets
(CSS) attr function call with a large numerical argument, which allows remote
attackers to execute arbitrary code or cause a denial of service (memory
corruption and application crash) via a crafted HTML document.


CVE-2009-1711

WebKit does not properly initialize memory for Attr DOM objects, which allows
remote attackers to execute arbitrary code or cause a denial of service
(application crash) via a crafted HTML document.


CVE-2009-1712

WebKit does not prevent remote loading of local Java applets, which allows
remote attackers to execute arbitrary code, gain privileges, or obtain sensitive
information via an APPLET or OBJECT element.


CVE-2009-1725

WebKit do not properly handle numeric character references, which allows remote
attackers to execute arbitrary code or cause a denial of service (memory
corruption and application crash) via a crafted HTML document.


CVE-2009-1714

Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit allows
user-assisted remote attackers to inject arbitrary web script or HTML, and read
local files, via vectors related to the improper escaping of HTML attributes.


CVE-2009-1710

WebKit allows remote attackers to spoof the browser's display of the host name,
security indicators, and unspecified other UI elements via a custom cursor in
conjunction with a modified CSS3 hotspot property.


CVE-2009-1697

CRLF injection vulnerability in WebKit allows remote attackers to inject HTTP
headers and bypass the Same Origin Policy via a crafted HTML document, related
to cross-site scripting (XSS) attacks that depend on communication with
arbitrary web sites on the same server through use of XMLHttpRequest without a
Host header.


CVE-2009-1695

Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to
inject arbitrary web script or HTML via vectors involving access to frame
contents after completion of a page transition.


CVE-2009-1693

WebKit allows remote attackers to read images from arbitrary web sites via a
CANVAS element with an SVG image, related to a cross-site image capture issue.


CVE-2009-1694

WebKit does not properly handle redirects, which allows remote attackers to read
images from arbitrary web sites via vectors involving a CANVAS element and
redirection, related to a cross-site image capture issue.


CVE-2009-1681

WebKit does not prevent web sites from loading third-party content into a
subframe, which allows remote attackers to bypass the Same Origin Policy and
conduct clickjacking attacks via a crafted HTML document.


CVE-2009-1684

Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to
inject arbitrary web script or HTML via an event handler that triggers script
execution in the context of the next loaded document.


CVE-2009-1692

WebKit allows remote attackers to 

[Full-disclosure] [gif2png] long filename Buffer Overrun

2009-12-12 Thread Razuel Akaharnath
DESCRIPTION:
The gif2png program converts files from the obsolescent Graphic Interchange
Format to Portable Network Graphics http://www.libpng.org/pub/png/. The
conversion preserves all graphic information, including transparency,
perfectly. The gif2png program can even recover data from corrupted GIFs.

homepage: http://catb.org/~esr/gif2png/ http://catb.org/%7Eesr/gif2png/

VULNERABILITY:
gif2png does not perform proper bounds checking on the size of input
filename. The buffer (1025 in size) is easily overrun with a strcpy
function.

AFFECTED VERSION:
latest: 2.5.2

POC:
$ ./gif2png $(perl -e 'print A x 1053')


#Razuel
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] IE 0day for sale

2009-12-12 Thread Gregor Schneider
2009/12/12 Jeff Williams jeffwilli...@gmail.com:
 And the question is now:
 should the Mossad, NSA, etc be considered as bad guys ?

that is a definately YES

gregor
-- 
just because your paranoid, doesn't mean they're not after you...
gpgp-fp: 79A84FA526807026795E4209D3B3FE028B3170B2
gpgp-key available
@ http://pgpkeys.pca.dfn.de:11371
@ http://pgp.mit.edu:11371/
skype:rc46fi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread Sam Haldorf
You can't beat MI6 behavioural / psychological profiling.

...This is probably the last you'll see of the real n3td3v because there is 
sure to be a contract killer out to silence me...My last words to you is, don't 
let this matter rest, they have got rid of n3td3v, but there are bound to be 
people who will investigate what im saying, and I hope they do. Because my last 
request before I finish this rant is, don't forget the things ive been talking 
about and continue to investigate people while im gone. [Andrew Wallace as 
n3td3v, 1]

.. Silence. Ah. But according to his profile...

...Intelligence agency intrigue  innuendo is a classic manifestation, along 
with imaginary friends, martyr glamorizations, alternate personalities and 
repeated exclamations that they will curtail their behaviors, only to come 
back, roaringly, foisting themselves upon a group/friend circle with a 
different guise or mission. Some have said it resembles alcoholic behavior in 
the promises 'to quit...' [Anonymous profiler, 1]

.. Not even a month later:

Please don't give to Gadi Evron and/or The Mossad that would be a crime 
against humanity and the west... Insert rambling, paranoid bullshit [Andrew 
Wallace as n3td3v as CyberArmageddon, 3][4]

Andrew Wallace (n3td3v / cyberarmageddon / 
whatever-fuckin-alias-you-decide-to-troll-on-that-week), consider a regimen of 
antipsychotics.

Professor Halderf, iPsyD, CISSP

[1] http://lists.grok.org.uk/pipermail/full-disclosure/2009-November/071660.html
[2] http://lists.grok.org.uk/pipermail/full-disclosure/2009-November/071542.html
[3] http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/071991.html
[4] http://lists.grok.org.uk/pipermail/full-disclosure/2009-December/071994.html





Von: cyber armageddon cyberarmaged...@googlemail.com
An: Paul Schmehl pschmehl_li...@tx.rr.com; full-disclosure@lists.grok.org.uk
Gesendet: Samstag, den 12. Dezember 2009, 17:24:27 Uhr
Betreff: Re: [Full-disclosure] Gadi Evron's professional profile exposed

On Sat, Dec 12, 2009 at 5:08 PM, Paul Schmehl pschmehl_li...@tx.rr.com wrote:
 --On December 12, 2009 7:37:08 AM -0600 cyber armageddon
 cyberarmaged...@googlemail.com wrote:
 IDF, Military Intelligence

 (Government Agency; 10,001 or more employees; Defense  Space industry)

 2000 — 2003 (3 years )

^

 That was six years ago.  Do the math doofus.


Gadi Evron’s Specialties: I'm a campaign manager and an _agent_ of change.

http://il.linkedin.com/in/gadievron

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


__
Do You Yahoo!?
Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen 
Massenmails. 
http://mail.yahoo.com ___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Gadi Evron's professional profile exposed

2009-12-12 Thread Valdis . Kletnieks
On Sat, 12 Dec 2009 13:37:08 GMT, cyber armageddon said:
 Security Evangelist at Beyond Security
 
 IDF, Military Intelligence

Umm... You *do* realize that everybody in the security community who
didn't just fall out of a frikking tree *knows* all that already, so
it's hardly exposed.

Dood. Take your meds. Please. :)


pgpMKYK4Y6D8H.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/