Re: [Full-disclosure] ZDI-10-191: Adobe Reader ICC Parsing Remote Code Execution Vulnerability

2010-10-06 Thread Dan Kaminsky
>
> Well, awesome. This sounds near-identical to some issues that the Sun JRE
> had a few years back[1]. I wonder if the code shares a common lineage? :)
>
>
No common lineage required; ICC's filled with 32 bit element counts.
 They're always int overflow bait.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ZDI-10-191: Adobe Reader ICC Parsing Remote Code Execution Vulnerability

2010-10-06 Thread Chris Evans
On Wed, Oct 6, 2010 at 11:28 AM, ZDI Disclosures <
zdi-disclosu...@tippingpoint.com> wrote:

> ZDI-10-191: Adobe Reader ICC Parsing Remote Code Execution Vulnerability
> http://www.zerodayinitiative.com/advisories/ZDI-10-191
> October 6, 2010
>
> -- CVE ID:
> CVE-2010-3621
>
> -- CVSS:
> 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)
>
> -- Affected Vendors:
> Adobe
>
> -- Affected Products:
> Adobe Reader
>
> -- Vulnerability Details:
> This vulnerability allows remote attackers to execute arbitrary code on
> vulnerable installations of Adobe Reader. User interaction is required
> in that a target must be coerced into opening a file or visiting a web
> page.
>
> The specific flaw exists within the ACE.dll module responsible for
> parsing ICC streams. When processing an ICC stream, the process performs
> math on two DWORD values from the input file. If these values wrap over
> the maximum integer value of 0x a mis-allocation can occur.
> Later, the process uses one of the original DWORD values as a size to a
> copy function. This can be abused by an attacker to overflow a stack
> buffer and subsequently execute code under the context of the user
> running the process.
>

Well, awesome. This sounds near-identical to some issues that the Sun JRE
had a few years back[1]. I wonder if the code shares a common lineage? :)


Cheers
Chris

[1] - http://scary.beasts.org/security/CESA-2006-004.html
http://scary.beasts.org/misc/jdk/badicc.jpg
(And additional integer problems not released at the time)
http://scary.beasts.org/misc/jdk/badicc2.jpg
http://scary.beasts.org/misc/jdk/badicc3.jpg
http://scary.beasts.org/misc/jdk/badicc4.jpg
http://scary.beasts.org/security/CESA-2007-005.html

In addition, there have been plenty of bugs against lcms[2] and Apple's ICC
profile parser.
So it seems like ICC profile parsing is hard ;-)

[2] - http://scary.beasts.org/security/CESA-2009-003.html


> -- Vendor Response:
> Adobe has issued an update to correct this vulnerability. More
> details can be found at:
>
> http://www.adobe.com/support/security/bulletins/apsb10-21.html
>
> -- Disclosure Timeline:
> 2010-06-23 - Vulnerability reported to vendor
> 2010-10-06 - Coordinated public release of advisory
>
> -- Credit:
> This vulnerability was discovered by:
>* Sebastian Apelt (www.siberas.de)
>
> -- About the Zero Day Initiative (ZDI):
> Established by TippingPoint, The Zero Day Initiative (ZDI) represents
> a best-of-breed model for rewarding security researchers for responsibly
> disclosing discovered vulnerabilities.
>
> Researchers interested in getting paid for their security research
> through the ZDI can find more information and sign-up at:
>
>http://www.zerodayinitiative.com
>
> The ZDI is unique in how the acquired vulnerability information is
> used. TippingPoint does not re-sell the vulnerability details or any
> exploit code. Instead, upon notifying the affected product vendor,
> TippingPoint provides its customers with zero day protection through
> its intrusion prevention technology. Explicit details regarding the
> specifics of the vulnerability are not exposed to any parties until
> an official vendor patch is publicly available. Furthermore, with the
> altruistic aim of helping to secure a broader user base, TippingPoint
> provides this vulnerability information confidentially to security
> vendors (including competitors) who have a vulnerability protection or
> mitigation product.
>
> Our vulnerability disclosure policy is available online at:
>
>http://www.zerodayinitiative.com/advisories/disclosure_policy/
>
> Follow the ZDI on Twitter:
>
>http://twitter.com/thezdi
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] WikiLeaks

2010-10-06 Thread Harry Behrens
  Two days ago I managed to find somebody ("Anny") on their web chat. 
She didn't say much, only that it's supposed to be up in a week or so 
and that the issues are technical vs. political.

I still believe it smells of fish.
And to kinda paraphrase: Just because J Assange is a raving paranoid 
doesn't mean they aren't out to get him...

 -h

Am 06.10.2010 20:06, schrieb Juha-Matti Laurio:
> It's the newest tweet still.
>
> Juha-Matti
>
> Jeffrey Walton [noloa...@gmail.com] kirjoitti:
>> The latest is kind of funny ("Latest smear attempt: Chinese spy agency
>> gave WikiLeaks $20M").
>>
>> Just call it a 'PAC Contribution' and everything will be fine.
>>
>> On Mon, Oct 4, 2010 at 7:05 AM, Juha-Matti Laurio
>>  wrote:
>> > And nothing related is not tweeted at
>> > http://twitter.com/wikileaks
>> >
>> > Juha-Matti
>> >
>> > Harry Behrens [ha...@behrens.com] kirjoitti:
>> >>   for 5 days and nothing about this to be found on google.
>> >>
>> >> Does anybody have an idea what is happening here - it does smell
>> >> slightly fishy...
>> >>
>> >>  -h
>
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WikiLeaks

2010-10-06 Thread Cal Leeming [Simplicity Media Ltd]
  I'm not sure why everyone is so fussed about this tbh..

And surely, full-disclosure is no place for such a discussion either..



On 06/10/2010 19:06, Juha-Matti Laurio wrote:
> It's the newest tweet still.
>
> Juha-Matti
>
> Jeffrey Walton [noloa...@gmail.com] kirjoitti:
>> The latest is kind of funny ("Latest smear attempt: Chinese spy agency
>> gave WikiLeaks $20M").
>>
>> Just call it a 'PAC Contribution' and everything will be fine.
>>
>> On Mon, Oct 4, 2010 at 7:05 AM, Juha-Matti Laurio
>>   wrote:
>>> And nothing related is not tweeted at
>>> http://twitter.com/wikileaks
>>>
>>> Juha-Matti
>>>
>>> Harry Behrens [ha...@behrens.com] kirjoitti:
for 5 days and nothing about this to be found on google.

 Does anybody have an idea what is happening here - it does smell
 slightly fishy...

   -h
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Massive Black Hat Seo Campaign in progress ?

2010-10-06 Thread exploit dev
Hi to all,

I posted something about a massive black hat seo campaign that seem in
progress. If you are interested check

http://extraexploit.blogspot.com/2010/10/dollars-javascript-code-yet-another_06.html

and

http://extraexploit.blogspot.com/2010/10/dollars-javascript-code-yet-another.html

Feedback are welcome.

Thank your very much to all for attention.



-- 
http://extraexploit.blogspot.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ZDI-10-193: Adobe Acrobat Reader Multimedia Playing Remote Code Execution Vulnerability

2010-10-06 Thread ZDI Disclosures
ZDI-10-193: Adobe Acrobat Reader Multimedia Playing Remote Code Execution 
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-193
October 6, 2010

-- CVE ID:
CVE-2010-3632

-- CVSS:
9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

-- Affected Vendors:
Adobe

-- Affected Products:
Adobe Acrobat

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 10538. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Adobe Acrobat Reader. User interaction is
required to exploit this vulnerability in that the target must visit a
malicious page or open a malicious file.

The specific flaw exists within the application explicitly trusting a
string's length embedded within a particular file format. The
application will duplicate an arbitrarily sized string into a statically
sized buffer located on the stack. This can lead to code execution under
the context of the application.

-- Vendor Response:
Adobe has issued an update to correct this vulnerability. More
details can be found at:

http://www.adobe.com/support/security/bulletins/apsb10-21.html

-- Disclosure Timeline:
2010-08-25 - Vulnerability reported to vendor
2010-10-06 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Anonymous

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZDI-10-192: Adobe Acrobat Reader ICC mluc Remote Code Execution Vulnerability

2010-10-06 Thread ZDI Disclosures
ZDI-10-192: Adobe Acrobat Reader ICC mluc Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-192
October 6, 2010

-- CVE ID:
CVE-2010-3622

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
Adobe

-- Affected Products:
Adobe Reader

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Adobe Reader. User interaction is required
in that a target must be coerced into opening a file or visiting a web
page.

The specific flaw exists within the ACE.dll module responsible for
parsing ICC streams. Within the 'desc' tag there exists an embedded
'mluc' data structure. The code within ACE performs arithmetic on the
second DWORD from the mluc structure and a value from the desc
structure. The resulting integer is used for an allocation of a
heap-based buffer. An attacker can forge these values to force the
process to under-allocate this buffer and later overflow it during a
copy operation. This leads to remote code execution under the context of
the user running the application.

-- Vendor Response:
Adobe has issued an update to correct this vulnerability. More
details can be found at:

http://www.adobe.com/support/security/bulletins/apsb10-21.html

-- Disclosure Timeline:
2010-06-23 - Vulnerability reported to vendor
2010-10-06 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Sebastian Apelt  (www.siberas.de)

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZDI-10-191: Adobe Reader ICC Parsing Remote Code Execution Vulnerability

2010-10-06 Thread ZDI Disclosures
ZDI-10-191: Adobe Reader ICC Parsing Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-191
October 6, 2010

-- CVE ID:
CVE-2010-3621

-- CVSS:
9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

-- Affected Vendors:
Adobe

-- Affected Products:
Adobe Reader

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Adobe Reader. User interaction is required
in that a target must be coerced into opening a file or visiting a web
page.

The specific flaw exists within the ACE.dll module responsible for
parsing ICC streams. When processing an ICC stream, the process performs
math on two DWORD values from the input file. If these values wrap over
the maximum integer value of 0x a mis-allocation can occur.
Later, the process uses one of the original DWORD values as a size to a
copy function. This can be abused by an attacker to overflow a stack
buffer and subsequently execute code under the context of the user
running the process.

-- Vendor Response:
Adobe has issued an update to correct this vulnerability. More
details can be found at:

http://www.adobe.com/support/security/bulletins/apsb10-21.html

-- Disclosure Timeline:
2010-06-23 - Vulnerability reported to vendor
2010-10-06 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Sebastian Apelt (www.siberas.de)

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] WikiLeaks

2010-10-06 Thread Juha-Matti Laurio
It's the newest tweet still.

Juha-Matti

Jeffrey Walton [noloa...@gmail.com] kirjoitti: 
> The latest is kind of funny ("Latest smear attempt: Chinese spy agency
> gave WikiLeaks $20M").
> 
> Just call it a 'PAC Contribution' and everything will be fine.
> 
> On Mon, Oct 4, 2010 at 7:05 AM, Juha-Matti Laurio
>  wrote:
> > And nothing related is not tweeted at
> > http://twitter.com/wikileaks
> >
> > Juha-Matti
> >
> > Harry Behrens [ha...@behrens.com] kirjoitti:
> >>   for 5 days and nothing about this to be found on google.
> >>
> >> Does anybody have an idea what is happening here - it does smell
> >> slightly fishy...
> >>
> >>      -h

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] (CORE-2010-0701) Adobe Acrobat Reader Acrord32.dll Use After Free Vulnerability

2010-10-06 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

  Core Security Technologies - CoreLabs Advisory
   http://corelabs.coresecurity.com/

Adobe Acrobat Reader Acrord32.dll Use After Free Vulnerability



1. *Advisory Information*

Title: Adobe Acrobat Reader Acrord32.dll Use After Free Vulnerability
Advisory Id: CORE-2010-0701
Advisory URL:
[http://www.coresecurity.com/content/adobe-acrobat-acrord23-reader-use-after-free]
Date published: 2010-10-05
Date of last update: 2010-10-05
Vendors contacted: Adobe
Release mode: Coordinated release



2. *Vulnerability Information*

Class: Use after free [CWE-416]
Impact: Code execution
Remotely Exploitable: Yes (client-side)
Locally Exploitable: No
CVE Name: CVE-2010-3627
Bugtraq ID: N/A



3. *Vulnerability Description*

Adobe Acrobat Reader is prone to a use-after-free vulnerability due to
an invalid usage of a released memory chunk. This vulnerability could be
used by a remote attacker to execute arbitrary code, by enticing the
user of Adobe Acrobat Reader to open a specially crafted file and click
on PAGES thumbnails.


4. *Vulnerable packages*

   . Adobe Acrobat Reader 9.x


5. *Non-vulnerable packages*

   . Adobe Acrobat Reader 8.x


6. *Solutions and Workarounds*

For further information about this issue look at the Adobe Security
Bulletin and security blogs:

   . Adobe Security Bulletins and Advisories:
[http://www.adobe.com/support/security].
   . PSIRT blog: [http://blogs.adobe.com/psirt].


7. *Credits*

This vulnerability was discovered and researched by Ricardo Narvaja,
from Core Security Technologies. This publication was coordinated by
Fernando Russ.


8. *Technical Description*

Adobe Acrobat Reader is prone to a use-after-free vulnerability due to
an invalid usage of a released memory chunk. A specially crafted '.pdf'
file containing special flash code triggers an 'ACCESS_VIOLATION'
reading at address 0x0030.

A more careful analysis of that code indicates that ESI points to a
released chunk of memory. Exploitation is feasible forcing the
allocation process of Adobe Acrobat Reader to reuse the chunk pointed by
ESI with specially controlled data.

/-
00EE10F8MOV ECX,DWORD PTR DS:[ESI+1C]  <-- ESI points to a
previously released memory chunk.
00EE10FBMOV DWORD PTR SS:[EBP+78],EAX
00EE10FEMOV EAX,DWORD PTR DS:[ESI+18]
00EE1101PUSH EAX
00EE1102CALL DWORD PTR DS:[ECX+30] <-- The execution flow
depends on the content of ECX. (ECX dependes on ESI)

- -/
 The content of the CPU register while an 'ACCESS_VIOLATION' reading was
triggered at 0x00EE1102,

/-

EAX 
ECX 
EDX 014D0A40
EBX 
ESP 0013F1BC
EBP 0013F24C
ESI 02D5782C
EDI 10A7C3D0
EIP 00EE1102

- -/
 This vulnerability could result in arbitrary code execution, although
it was not verified.


9. *Report Timeline*

. 2010-07-05:
Core Security Technologies notifies the Adobe team of the vulnerability
and announces its initial plan to publish the advisory on July 26th,
2010. A Proof of Concept (PoC) was sent to Adobe team.

. 2010-07-06:
Adobe team acknowledges Core Security Technologies' e-mail. Vendor also
notifies that their world-wide offices will be shut down from July 5th
to July 11th, and it may take a bit longer than usual to investigate
this issue.

. 2010-07-22:
Core asks for a status update about this issue.

. 2010-07-22:
Adobe team notifies that they have reproduced the issue and expect the
fix to be available in the next quarterly security update for Acrobat
and Adobe Reader. These fixes are currently scheduled for an October
patch Tuesday release.

. 2010-07-26:
Core notifies that the publication date for this advisory was
re-scheduled to October 12th, 2010.

. 2010-07-27:
Core notifies that the publication date of October 12th, 2010 should be
considered as final. If Adobe team does not release a patch on that day,
Core will be forced to release this advisory in user-release mode.

. 2010-09-28:
Core notifies that the publication date of October 12th, 2010 is still
valid and asks for a status update.

. 2010-09-29:
Adobe acknowledges the communication by informing that the publication
date was re-scheduled to October 5th, 2010.

. 2010-10-04:
Core asks if the Adobe team has an assigned CVE identifier for this
vulnerability and which are the affected versions of Adobe Reader.

. 2010-10-04:
Adobe notifies that:

   . This issue affects Reader 9.x, but not Reader 8.x.
   . The assigned identifier for this vulnerability is CVE-2010-3627.

. 2010-10-05:
Core publishes advisory CORE-2010-0701.



10. *About CoreLabs*

CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vu

[Full-disclosure] [USN-1001-1] LVM2 vulnerability

2010-10-06 Thread Marc Deslauriers
===
Ubuntu Security Notice USN-1001-1   October 06, 2010
lvm2 vulnerability
CVE-2010-2526
===

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  clvm2.02.02-1ubuntu1.6

Ubuntu 8.04 LTS:
  clvm2.02.26-1ubuntu9.1

Ubuntu 9.04:
  clvm2.02.39-0ubuntu9.1

Ubuntu 9.10:
  clvm2.02.39-0ubuntu11.1

Ubuntu 10.04 LTS:
  clvm2.02.54-1ubuntu4.1

In general, a standard system update will make all the necessary changes.
In a clustering environment, you need to restart clvmd after the update.

Details follow:

The cluster logical volume manager daemon (clvmd) in LVM2 did not correctly
validate credentials. A local user could use this flaw to manipulate
logical volumes without root privileges and cause a denial of service in
the cluster.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.02-1ubuntu1.6.diff.gz
  Size/MD5:23084 0b3f64de96c9b259a6ef2769946f1e23

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.02-1ubuntu1.6.dsc
  Size/MD5:  798 2005fade3f0eab833f8dc298dff25dc4
http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.02.orig.tar.gz
  Size/MD5:   477665 e5dfc205aaf673fecb3c1c15164d718c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/clvm_2.02.02-1ubuntu1.6_amd64.deb
  Size/MD5:   193890 fc1605c8d8358720167cc587b4c6e750

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2-udeb_2.02.02-1ubuntu1.6_amd64.udeb
  Size/MD5:   198688 b34a16e5e6d7132690bc795b4462db6a

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.02-1ubuntu1.6_amd64.deb
  Size/MD5:   302348 afc947cfd64a2cf764ac824df3aa6714

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/clvm_2.02.02-1ubuntu1.6_i386.deb
  Size/MD5:   173624 2b7808f8cf8c3d04510514cac0e1e32a

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2-udeb_2.02.02-1ubuntu1.6_i386.udeb
  Size/MD5:   171898 6ff8ce5077fc3ffa52facd8327ff8c30

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.02-1ubuntu1.6_i386.deb
  Size/MD5:   279694 ee0be92486aad4c98655ffeabb9066e6

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/clvm_2.02.02-1ubuntu1.6_powerpc.deb
  Size/MD5:   197078 bf2848d3a77e6fdef5bf3fd72ce4c97d

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2-udeb_2.02.02-1ubuntu1.6_powerpc.udeb
  Size/MD5:   189558 43368dbc246f5ccf7bbe5f837ff607d4

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.02-1ubuntu1.6_powerpc.deb
  Size/MD5:   305146 2bf0804f159411ebd16ece0e1f4c3e88

  sparc architecture (Sun SPARC/UltraSPARC):


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/clvm_2.02.02-1ubuntu1.6_sparc.deb
  Size/MD5:   192050 7bfe11bf05d122ace63b13bc097d02b1

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2-udeb_2.02.02-1ubuntu1.6_sparc.udeb
  Size/MD5:   195832 0d0fc85a2db41997003d64ee2b97c11f

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.02-1ubuntu1.6_sparc.deb
  Size/MD5:   301914 08c3ec1d2b497c0ea7dacbf60e8bd00a

Updated packages for Ubuntu 8.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.26-1ubuntu9.1.diff.gz
  Size/MD5:17226 7ad064c5e17a791ea9ff7138a8b43b8b

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.26-1ubuntu9.1.dsc
  Size/MD5:  875 19693df12de08471c95d38b7125ddb52
http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.26.orig.tar.gz
  Size/MD5:   532355 caa50b5ebd4f27ba57836a805f49e6da

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/clvm_2.02.26-1ubuntu9.1_amd64.deb
  Size/MD5:   212496 fdbd428da1cc23930edb747344f1e614

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2-udeb_2.02.26-1ubuntu9.1_amd64.udeb
  Size/MD5:   219252 913d218ec8a6f69b2fec929819eb3ef5

http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/lvm2_2.02.26-1ubuntu9.1_amd64.deb
  Size/MD5:   333082 6ba529db36ba122830ea7ef38b59110d

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/l/lvm2/clvm_2.02.26-1ubuntu9.1_i386.deb
  Size/MD5:   202906 6f5d873b18820bce3d709b97fef42e8d

http://security.ubuntu.com/ubuntu/p

Re: [Full-disclosure] Webserver-Security and Virtualization

2010-10-06 Thread Claudio Criscione
In data mercoledì 6 ottobre 2010 13:40:49, Marcel Grabher (sallas) ha scritto:
> i m working on a paper about Webserver-Security (free).
> Objective: One should know about the risks and what can be done to mitigate
> them.
> http://webservsec.blogspot.com/2010/10/threats.html

I'm missing the virtualization part here. BTW, I'm not sure a simple box model 
can capture all the complex threats involved...

@paradoxengine

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2010:197 ] postgresql

2010-10-06 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:197
 http://www.mandriva.com/security/
 ___

 Package : postgresql
 Date: October 6, 2010
 Affected: 2008.0, 2009.0, 2009.1, 2010.0, 2010.1, Corporate 4.0,
   Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities was discovered and corrected in postgresql:
 
 An authenticated database user can manipulate modules and tied
 variables in some external procedural languages to execute code with
 enhanced privileges (CVE-2010-3433).
 
 Packages for 2008.0 and 2009.0 are provided as of the Extended
 Maintenance Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149&products_id=490
 
 This update provides a solution to these vulnerabilities.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433
 ___

 Updated Packages:

 Mandriva Linux 2008.0:
 732b926f0654f432eb9520fc4b4d3f63  
2008.0/i586/libecpg5-8.2.18-0.1mdv2008.0.i586.rpm
 584ad08b4fd7e237172a90837fcf3dc5  
2008.0/i586/libecpg-devel-8.2.18-0.1mdv2008.0.i586.rpm
 340e166ffca9a8758c6512959f770571  
2008.0/i586/libpq5-8.2.18-0.1mdv2008.0.i586.rpm
 c95169706bc5d0dd7520bdece5354e0a  
2008.0/i586/libpq-devel-8.2.18-0.1mdv2008.0.i586.rpm
 01e463f712ca216306d56e77a3a9bd12  
2008.0/i586/postgresql-8.2.18-0.1mdv2008.0.i586.rpm
 e7e9dcf8fcc7cb691066b0e1c8e84b08  
2008.0/i586/postgresql8.2-8.2.18-0.1mdv2008.0.i586.rpm
 5061d2dd0192413f6538400719906225  
2008.0/i586/postgresql8.2-contrib-8.2.18-0.1mdv2008.0.i586.rpm
 e31e99d6cf860d3362c10845014a12fa  
2008.0/i586/postgresql8.2-devel-8.2.18-0.1mdv2008.0.i586.rpm
 769ec11c6555dedd93012a1b92ebce68  
2008.0/i586/postgresql8.2-docs-8.2.18-0.1mdv2008.0.i586.rpm
 c8ac9f1032f924bee487d368b73a7f5f  
2008.0/i586/postgresql8.2-pl-8.2.18-0.1mdv2008.0.i586.rpm
 b67bcbc72ae5807430cdcbc355c1b185  
2008.0/i586/postgresql8.2-plperl-8.2.18-0.1mdv2008.0.i586.rpm
 ac8c444bddb034a172cce9490edf4f81  
2008.0/i586/postgresql8.2-plpgsql-8.2.18-0.1mdv2008.0.i586.rpm
 30223c2e6a478f2b02331541a9d56b0c  
2008.0/i586/postgresql8.2-plpython-8.2.18-0.1mdv2008.0.i586.rpm
 7ee4f67b04d3f4859a4d098a882894d2  
2008.0/i586/postgresql8.2-pltcl-8.2.18-0.1mdv2008.0.i586.rpm
 edf93c75a046749a0f74b900eb11bc3c  
2008.0/i586/postgresql8.2-server-8.2.18-0.1mdv2008.0.i586.rpm
 e3428e4a188bf6861c259b06deaee4ae  
2008.0/i586/postgresql8.2-test-8.2.18-0.1mdv2008.0.i586.rpm
 148d3cf6d7fd17b537574bf161595eb8  
2008.0/i586/postgresql-devel-8.2.18-0.1mdv2008.0.i586.rpm 
 8235eaa37082469e5dd9146010eb2b3b  
2008.0/SRPMS/postgresql8.2-8.2.18-0.1mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 8e005a4499089d4be1633c2767fceb3e  
2008.0/x86_64/lib64ecpg5-8.2.18-0.1mdv2008.0.x86_64.rpm
 5a5ed7202e7878652e2bc098b34acb51  
2008.0/x86_64/lib64ecpg-devel-8.2.18-0.1mdv2008.0.x86_64.rpm
 13de1a6c3c00123fd7dddfbe1d43cc27  
2008.0/x86_64/lib64pq5-8.2.18-0.1mdv2008.0.x86_64.rpm
 36e4c6537d3fa79a9358bd9e215928aa  
2008.0/x86_64/lib64pq-devel-8.2.18-0.1mdv2008.0.x86_64.rpm
 385d12eec49ef02c6cb80df69eb56d33  
2008.0/x86_64/postgresql-8.2.18-0.1mdv2008.0.x86_64.rpm
 62c87aa7c1d7c1f3cbf1bb2ae7f4501d  
2008.0/x86_64/postgresql8.2-8.2.18-0.1mdv2008.0.x86_64.rpm
 fba961f1816631c00de3a5d28c661520  
2008.0/x86_64/postgresql8.2-contrib-8.2.18-0.1mdv2008.0.x86_64.rpm
 41fd6f6e5787eb24bd40e4a01b8e9bca  
2008.0/x86_64/postgresql8.2-devel-8.2.18-0.1mdv2008.0.x86_64.rpm
 22fa656db75da6a9c8405eddc1b92c60  
2008.0/x86_64/postgresql8.2-docs-8.2.18-0.1mdv2008.0.x86_64.rpm
 df1364c07ff56a61d022d9074c15ae89  
2008.0/x86_64/postgresql8.2-pl-8.2.18-0.1mdv2008.0.x86_64.rpm
 f2bcaf5a19ab9fb09073254ad02b7fac  
2008.0/x86_64/postgresql8.2-plperl-8.2.18-0.1mdv2008.0.x86_64.rpm
 4e46a8cc010467e5e0c874f5033a7dbb  
2008.0/x86_64/postgresql8.2-plpgsql-8.2.18-0.1mdv2008.0.x86_64.rpm
 93d79de66e75dc93d7d537b32609d8d1  
2008.0/x86_64/postgresql8.2-plpython-8.2.18-0.1mdv2008.0.x86_64.rpm
 383b49120038dd7fdd159eb539001aa7  
2008.0/x86_64/postgresql8.2-pltcl-8.2.18-0.1mdv2008.0.x86_64.rpm
 abb559451cca4510884b42b443af75d7  
2008.0/x86_64/postgresql8.2-server-8.2.18-0.1mdv2008.0.x86_64.rpm
 54fd4dd2f83fa0ce9f10e8ae826fa935  
2008.0/x86_64/postgresql8.2-test-8.2.18-0.1mdv2008.0.x86_64.rpm
 6e9f4cbe5d4a73e599c8f255828f94c7  
2008.0/x86_64/postgresql-devel-8.2.18-0.1mdv2008.0.x86_64.rpm 
 8235eaa37082469e5dd9146010eb2b3b  
2008.0/SRPMS/postgresql8.2-8.2.18-0.1mdv2008.0.src.rpm

 Mandriva Linux 2009.0:
 d9c0f389520424306586d57c36eb875e  
2009.0/i586/libecpg8.3_6-8.3.12-0.1mdv2009.0.i586.rpm
 467f9f37e156f2a03d2e4ba55b75ee51  
2009.0/i586/libpq8.3_5-8.3.12-0.1mdv2009.0.i58

[Full-disclosure] Webserver-Security and Virtualization

2010-10-06 Thread Marcel Grabher (sallas)
Hi,

i m working on a paper about Webserver-Security (free).
Objective: One should know about the risks and what can be done to mitigate
them.

The pictured topics are Threats and Countermeasures structured in Network,
OS, Service, App

http://webservsec.blogspot.com/2010/10/threats.html

http://webservsec.blogspot.com/2010/10/countermeasures.html

I would really appreciate some comments to the graphics
Probably I forgot about something.

BG
MG
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] nSense-2010-001: Adobe Reader for Macintosh

2010-10-06 Thread Henri Lindberg
   nSense Vulnerability Research Security Advisory NSENSE-2010-001
   ---

   Affected Vendor:Adobe
   Affected Product:   Adobe Reader 9.3.4 for Macintosh
   Platform:   OS X
   Impact: User assisted code execution
   Vendor response:Patch
   Credit: Knud / nSense

   Technical details
   ---

   terminal 1:
   $ gdb --waitfor=AdobeReader

   terminal 2:
   $ open acrobat://`perl -e 'print "A" x 12000'`

   terminal 1:
   (gdb) cont
   [snip]
   Program received signal EXC_BAD_ACCESS, Could not access memory.
   Reason: KERN_INVALID_ADDRESS at address: 0xc00013d2
   0x7ffa0d6a in AcroBundleThreadQuitProc ()
   (gdb) set disassembly-flavor intel
   (gdb) x/i $pc
   0x7ffa0d6a : movBYTE PTR
   [ebp+eax-0x420],0x0
   (gdb) i r ebp eax
   ebp0xbfffe908   0xbfffe908
   eax0x2eea   12010
   (gdb)

   As can be seen from the above, we control the value in eax (in
   this case 12010, the length of the acrobat:// + the 12000 A's).

   This allows us to write the null byte anywhere in memory between
   ebp-0x420 (0xBFFFE4E8) and the end of the stack.

   The behaviour may be leveraged to modify the frame pointer,
   changing the execution flow and thus permitting arbitrary code
   execution in the context of the user running the program.

   Timeline:
   Aug 10th Contacted vendor PSIRT
   Aug 10th Vendor response. Vulnerability reproduced.
   Aug 16th Status update request sent to vendor
   Aug 17th Vendor response, still investigating
   Sep 2nd  Status update request sent to vendor
   Sep 3rd  Vendor response. Working on fix
   Sep 22nd Contacted vendor regarding patch date
   Sep 22nd Vendor response. Confirmed patch date.
   Sep 23rd Corrected researcher name
   Oct 1st  Vendor sent CVE identifier CVE-2010-3631
   Oct 5th  Vendor releases the patch
   Oct 6th  Advisory published

   http://www.nsense.fi   http://www.nsense.dk



   $$ss.   ,ss   ,S$s.  $$ss.   ,ss   ,S$s.
   $$$  `$$$  ($$(   $$$  `$$$  $$$  `$$$  ($$(   $$$  `$$$
   $$$   $$$`^$$s.   $  $$$   $$$`^$$s.   $
   $$$   $$$   )$$)  $$$$$$   $$$   )$$)  $$$
   $$$   $$$  ^$$7`7$P  $$$   $$$  ^$$7   `7$P

  D r i v e n   b y   t h e   c h a l l e n g e _
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] JNEXT vulnerability

2010-10-06 Thread Sherwyn
I say just release it and the will contact you in the future :). On a serious 
note check the archives maybe the last 4 or so shows back on www.pauldotcom.com.

The had a guess on that Developed a free disclosure model to help take these 
type of stress off of you.  
Infolookup
http://infolookup.securegossip.com
www.twitter.com/infolookup


-Original Message-
From: Blue Bird 
Sender: full-disclosure-boun...@lists.grok.org.uk
Date: Tue, 5 Oct 2010 13:25:37 
To: 
Subject: [Full-disclosure] JNEXT vulnerability

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] JNEXT vulnerability

2010-10-06 Thread Blue Bird
Hi all -

I've been trying to reach the developer of JNEXT for some time now to report
a security vulnerability, anyone have contact info for Amnon David other
than the webform on his website?  http://www.jnext.org/sphp501/contact.php



Thanks.



BB
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/