[Full-disclosure] [ MDVSA-2010:219 ] mozilla-thunderbird

2010-11-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2010:219
 http://www.mandriva.com/security/
 ___

 Package : mozilla-thunderbird
 Date: November 1, 2010
 Affected: 2009.0, 2010.0, 2010.1
 ___

 Problem Description:

 A security issue was identified and fixed in mozilla-thunderbird:
 
 Unspecified vulnerability in Mozilla Firefox 3.5.x through 3.5.14
 and 3.6.x through 3.6.11, when JavaScript is enabled, allows remote
 attackers to execute arbitrary code via unknown vectors, as exploited
 in the wild in October 2010 by the Belmoo malware (CVE-2010-3765).
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149products_id=490
 
 Additionally, some packages which require so, have been rebuilt and
 are being provided as updates.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765
 http://www.mozillamessaging.com/en-US/thunderbird/3.0.11/releasenotes/
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 d115c2e133751a651edc708de79c5847  
2009.0/i586/beagle-0.3.8-13.29mdv2009.0.i586.rpm
 a153de02fa4e15aa74366d9645eb7e38  
2009.0/i586/beagle-crawl-system-0.3.8-13.29mdv2009.0.i586.rpm
 78f1c25062868c12ba455c2f4e7cc847  
2009.0/i586/beagle-doc-0.3.8-13.29mdv2009.0.i586.rpm
 17428c98fdf6a6389254bd6e6466c9cc  
2009.0/i586/beagle-epiphany-0.3.8-13.29mdv2009.0.i586.rpm
 f3e5556da3606db8cc1cdc22d045f9a5  
2009.0/i586/beagle-evolution-0.3.8-13.29mdv2009.0.i586.rpm
 1b22db288256525a0713d759f8e35fa5  
2009.0/i586/beagle-gui-0.3.8-13.29mdv2009.0.i586.rpm
 8205ce75661116b482c799c6290ff4a6  
2009.0/i586/beagle-gui-qt-0.3.8-13.29mdv2009.0.i586.rpm
 2511dfcc3d099d9124bd13172cef5ff1  
2009.0/i586/beagle-libs-0.3.8-13.29mdv2009.0.i586.rpm
 6d454a78c03f3e0b02e67b11662b510e  
2009.0/i586/firefox-ext-beagle-0.3.8-13.29mdv2009.0.i586.rpm
 630ac5eef37173ad4a072e4762958f62  
2009.0/i586/mozilla-thunderbird-3.0.10-0.1mdv2009.0.i586.rpm
 c4ce06de0d53e402f082b02adf6d4ec0  
2009.0/i586/mozilla-thunderbird-af-3.0.10-0.1mdv2009.0.i586.rpm
 2157225ead2337f377494840772af7ff  
2009.0/i586/mozilla-thunderbird-ar-3.0.10-0.1mdv2009.0.i586.rpm
 9a956c5616d8e646325dfa55cf7efcd1  
2009.0/i586/mozilla-thunderbird-be-3.0.10-0.1mdv2009.0.i586.rpm
 d98dda0ca6aee79c25de5f78833d49df  
2009.0/i586/mozilla-thunderbird-beagle-0.3.8-13.29mdv2009.0.i586.rpm
 d13b364ef6bd0171fdacb44dc810944f  
2009.0/i586/mozilla-thunderbird-bg-3.0.10-0.1mdv2009.0.i586.rpm
 8b9e92a9a41fea5930f69280809530c7  
2009.0/i586/mozilla-thunderbird-ca-3.0.10-0.1mdv2009.0.i586.rpm
 a9071994feefb423cd97f6c091259fb2  
2009.0/i586/mozilla-thunderbird-cs-3.0.10-0.1mdv2009.0.i586.rpm
 fd836317404e7594ed0e225813db8694  
2009.0/i586/mozilla-thunderbird-da-3.0.10-0.1mdv2009.0.i586.rpm
 92337be6f5648224402146d2e08f2d5a  
2009.0/i586/mozilla-thunderbird-de-3.0.10-0.1mdv2009.0.i586.rpm
 104c45867d60722d4a1ea58b0dbe6855  
2009.0/i586/mozilla-thunderbird-el-3.0.10-0.1mdv2009.0.i586.rpm
 ddbf1160191ebd8828db7d616f953b70  
2009.0/i586/mozilla-thunderbird-en_GB-3.0.10-0.1mdv2009.0.i586.rpm
 e02ff48bc8005b15fbda8db83ab92270  
2009.0/i586/mozilla-thunderbird-enigmail-3.0.10-0.1mdv2009.0.i586.rpm
 fcf963edfdff2162300c446f08bfe006  
2009.0/i586/mozilla-thunderbird-enigmail-ar-3.0.10-0.1mdv2009.0.i586.rpm
 9df6bbf7efa8a217c51d1bd090918cd7  
2009.0/i586/mozilla-thunderbird-enigmail-ca-3.0.10-0.1mdv2009.0.i586.rpm
 d1a80c4e49f6a410a449de4a35d6cafb  
2009.0/i586/mozilla-thunderbird-enigmail-cs-3.0.10-0.1mdv2009.0.i586.rpm
 6960a73aef12a1b9a6a60072478db4e0  
2009.0/i586/mozilla-thunderbird-enigmail-de-3.0.10-0.1mdv2009.0.i586.rpm
 7b5478719f85948be656778bacacbe19  
2009.0/i586/mozilla-thunderbird-enigmail-el-3.0.10-0.1mdv2009.0.i586.rpm
 330f73c9ac3044ce66a8e9a2a7663312  
2009.0/i586/mozilla-thunderbird-enigmail-es-3.0.10-0.1mdv2009.0.i586.rpm
 bb8edbed937d509e6500457bcbb36618  
2009.0/i586/mozilla-thunderbird-enigmail-fi-3.0.10-0.1mdv2009.0.i586.rpm
 12de4abdb0df7f4cd9590c50a742ee50  
2009.0/i586/mozilla-thunderbird-enigmail-fr-3.0.10-0.1mdv2009.0.i586.rpm
 57e09806aa6e9a82af04e9cce5911318  
2009.0/i586/mozilla-thunderbird-enigmail-hu-3.0.10-0.1mdv2009.0.i586.rpm
 7ee0f4812cf909d067d07be89ec04443  
2009.0/i586/mozilla-thunderbird-enigmail-it-3.0.10-0.1mdv2009.0.i586.rpm
 52ee8e787197f0b587b37a73a559caac  
2009.0/i586/mozilla-thunderbird-enigmail-ja-3.0.10-0.1mdv2009.0.i586.rpm
 3bded02c1e53533ae21853a31e5697b0  
2009.0/i586/mozilla-thunderbird-enigmail-ko-3.0.10-0.1mdv2009.0.i586.rpm
 ece94a45217464ec358e27405d6086d5  

[Full-disclosure] Call for Papers -YSTS V - Security Conference, Brazil

2010-11-01 Thread Luiz Eduardo
Hello Full-Disclosure, the CFP for YSTS V is now open!

---

YSTS 5th Edition

Sao Paulo, Brazil

May 16th, 2011

Call for Papers Opens: November 1st 2010
Call for Papers Close: February 28th 2011
http://www.ysts.org
@ystscon

INTRODUCTION

Following the success of previous editions, the 5th edition of the you
Sh0t the Sheriff security conference will happen on May, 16th, 2011 in
Sao Paulo, Brazil. This is your chance to speak about that cool
research you’ve been working on, to those whom matter in the Brazilian
Information Security realm.

ABOUT THE CONFERENCE

you Sh0t the Sheriff is a very unique, one-day, event dedicated to
bringing cutting edge talks to the top-notch professionals of the
Information Security Community in Brazil.

The conference’s main goal is to bring the attendees to the most
up-to-date state of the information security world by mixing
professionals and topics from different Infosec segments of the
market.

yStS is a very exclusive, mostly invite-only security con. Getting a
talk accepted, will, not only get you to the event, but after you
successfully present your talk, you will receive a challenge-coin that
guarantees your entry to yStS for as long as the conference exists.

Due to the great success of the previous years' editions, yes, we're
keeping the same
format:

* YSTS 5 will be held at an almost secret location only announced to whom
it may concern a couple of weeks before the con
* the venue will be, most likely, a club or a bar
* cool environment to network with great security folks from Brazil and abroad
* since it’s a 1 day con with tons of talks, we provide coffee, lunch
and an open-bar in the afternoon


CONFERENCE FORMAT

Anything Information Security related is interesting for the
conference, although we do not accept commercial/ product-related
talks.

Just in case you need some ideas, some of the stuff that would be
interesting to us are:

 * Operating Systems
 * Career and Management topics
 * Mobile Devices/Embedded Systems
 * Information Security Audit and Control
 * Social Networking and Search Engine Hacks  Threats
 * Information Security Policies
 * Privacy
 * Messing with Network Protocols
 * Security from layer 1 through 7
 * 802.11 Wireless and any RF related stuff for that matter
 * Authentication
 * Crypto
 * Incident Response  other applicable (and useful) Infosec Policies
 * Information Warfare
 * Malware
 * Botnets
 * Secure Programming
 * Hacker Spaces
 * Application and Protocol Fuzzing
 * Physical Security
 * Virtualization
 * Webapp Security
 * DataBase Security
 * the Cloud
 * Cryptography
 * System Weaknesses
 * Infrastructure and Critical Systems
 * Social Engineering
 * Reverse Engineering
 * Social Reverse Engineering
 * Reversing Social Engineering
 * Caipirinha and Feijoada Hacks
 * and everything else information security related that our attendees
would enjoy

We do like shorter talks, so, please submit your talks and remember
they must be 30 minutes long. (yes, we do strictly enforce that)

We’re also opened to some 15-minute talks, some of the smart people
around might not need 30 minutes to deliver a message, or it might be
a project that has been just kicked-off.
15 minutes might be your thing and that's nothing to be ashamed about.

you Sh0t the Sheriff is the perfect conference to release your new
projects, trust us, other people have released cool stuff before they
presented it at the big cons.
And yes, we do prefer new hot-topics and, yes, first-time speakers
are more than welcome.
If you got good stuff to speak about, that's all that matters.

SPEAKER PRIVILEGES
(and, that applies only to the 30 minute-long talks)

* USD 1,000.00 to help covering travel expenses for international speakers
* Breakfast, lunch and dinner during conference
* Pre-and-post-conference official party (and the unofficial ones as well)
* Auditing products in traditional Brazilian barbecue restaurants
* Life-time free admission for all future yStS conferences (yes, if you 've
spoken before at yStS, you have your free-entry guaranteed, just buy us a
beer, ohh, wait, it's free anyways, isn't it?)


CFP IMPORTANT INFO

Each paper submission must include the following information:

 * Name, title, address, email and phone/contact number
 * Short biography and qualification
 * Speaking experience
 * Do you need or have a visa to come to Brasil?
 * Summary or abstract for your presentation
 * is it a 30 minute or a 15 minute talk?
 * Technical requirements (others than LCD Projector)
 * Other publications or conferences where this material has been or
   will be published/submitted.


VERY IMPORTANT DATES

Final CFP Submission - February 28th, 2011
Final Notification of Acceptance - March 20th, 2011
Final Material Submission for accepted presentations - May 5th, 2011


All submissions must be sent via email, in text format only to: cfp/at/ysts.org

IMPORTANT CONTACT INFORMATION

Paper Submissions:cfp/at/ysts.org
General Inquiries:

Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-11-01 Thread Mario Vilas
It would indeed be vulnerable to that, and you're also right about this
attack vector being quite small.

But IMHO an updates mechanism that signs it's packages it quite easy to
implement, so we're talking about getting a tangible benefit from a small
effort. Preventing the signing key from being stolen is a different matter
entirely - it has to do with the vendor's own network infrastructure
security. Unsigned updates, on the other hand, rely on the client network's
security, which cannot be controlled by the vendor.

In other words, a signed updates mechanism is clearly more secure than an
unsigned updates mechanism, even if none of both can be 100% secure, and it
comes at very little cost. Also, there's no such thing as a 100% secure
system. :)

BTW, I don't think the programmers of each application should be developing
their own signature code. Never code your own crypto, just use what's
available. Also, I believe the operating system should provide the
mechanism, not the application.

On Sun, Oct 31, 2010 at 3:36 PM, valdis.kletni...@vt.edu wrote:

 On Sun, 31 Oct 2010 13:09:27 BST, Mario Vilas said:

  Just signing the update packages prevents this attack, so it's not that
 hard
  to fix.

 Except if a signing key gets compromised, as happened to one Linux vendor
 recently, causing a lot of kerfluffle...  Setting up a proper signing
 system
 involves a certain amount of actual cost and effort.  And every
 organization
 that produces code, be it for-profit proprietary code or free open-source
 code,
 has to make resource tradeoffs.

 Is there any actual *evidence* that hijacking authorized updates is a big
 enough problem to be worth it?  If each year, 5 of their customers get
 pwned
 by the sort of attack that Evilgrade does, but 50,000 get pwned by click
 here
 popups that code signing won't do squat to prevent, is it really worth
 their
 time and effort?  Sure, sucks to be one of the 5, but if they instead spend
 the
 resources to do something *else* to make their customer's lives better that
 would
 benefit thousands rather than the 5




-- 
HONEY: I want to… put some powder on my nose.
GEORGE: Martha, won’t you show her where we keep the euphemism?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-11-01 Thread Jeffrey Walton
On Sun, Oct 31, 2010 at 10:36 AM,  valdis.kletni...@vt.edu wrote:
 On Sun, 31 Oct 2010 13:09:27 BST, Mario Vilas said:

 Just signing the update packages prevents this attack, so it's not that hard
 to fix.

 Except if a signing key gets compromised, as happened to one Linux vendor
 recently, causing a lot of kerfluffle...
??? Are you ptoposing to throw the baby out with the bath water ??? I
would not have expected that from *.edu.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-11-01 Thread Christian Sciberras
No, he's just saying that a bank might be accidentally broken and
robbedaccidentally.of course



On Mon, Nov 1, 2010 at 4:13 PM, Jeffrey Walton noloa...@gmail.com wrote:

 On Sun, Oct 31, 2010 at 10:36 AM,  valdis.kletni...@vt.edu wrote:
  On Sun, 31 Oct 2010 13:09:27 BST, Mario Vilas said:
 
  Just signing the update packages prevents this attack, so it's not that
 hard
  to fix.
 
  Except if a signing key gets compromised, as happened to one Linux vendor
  recently, causing a lot of kerfluffle...
 ??? Are you ptoposing to throw the baby out with the bath water ??? I
 would not have expected that from *.edu.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-11-01 Thread Jeffrey Walton
On Mon, Nov 1, 2010 at 12:26 PM, Jhfjjf Hfdsjj taser3...@yahoo.com wrote:


On Sun, Oct 31, 2010 at 10:36 AM,  valdis.kletni...@vt.edu wrote:
 On Sun, 31 Oct 2010 13:09:27 BST, Mario Vilas said:

 Just signing the update packages prevents this attack, so it's not that 
 hard
 to fix.

 Except if a signing key gets compromised, as happened to one Linux vendor
 recently, causing a lot of kerfluffle...

??? Are you ptoposing to throw the baby out with the bath water ??? I
would not have expected that from *.edu.

 I do not believe anyone is 'ptoposing' anything. All he said was that package
 signing should not be taken as a silver bullet, for experience has shown that
 the key's themselves are capable of being compromised if a vendor is
 successfully attacked.

 Exactly what I would expect from *.edu
I read differently,

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-11-01 Thread Jhfjjf Hfdsjj


On Sun, Oct 31, 2010 at 10:36 AM,  valdis.kletni...@vt.edu wrote:
 On Sun, 31 Oct 2010 13:09:27 BST, Mario Vilas said:

 Just signing the update packages prevents this attack, so it's not that hard
 to fix.

 Except if a signing key gets compromised, as happened to one Linux vendor
 recently, causing a lot of kerfluffle...

??? Are you ptoposing to throw the baby out with the bath water ??? I
would not have expected that from *.edu.

I do not believe anyone is 'ptoposing' anything. All he said was that package 
signing should not be taken as a silver bullet, for experience has shown that 
the key's themselves are capable of being compromised if a vendor is 
successfully attacked.

Exactly what I would expect from *.edu


  

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-11-01 Thread Jhfjjf Hfdsjj


 I do not believe anyone is 'ptoposing' anything. All he said was that package
 signing should not be taken as a silver bullet, for experience has shown that
 the key's themselves are capable of being compromised if a vendor is
 successfully attacked.

 Exactly what I would expect from *.edu

I read differently,

Then by all means, elaborate.



  

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2123-1] New NSS packages fix cryptographic weaknesses

2010-11-01 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-2123-1  secur...@debian.org
http://www.debian.org/security/   Florian Weimer
November 01, 2010 http://www.debian.org/security/faq
- 

Package: nss
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2010-3170 CVE-2010-3173

Several vulnerabilities have been discovered in Mozilla's Network
Security Services (NSS) library.  The Common Vulnerabilities and
Exposures project identifies the following problems:

CVE-2010-3170
NSS recognizes a wildcard IP address in the subject's Common
Name field of an X.509 certificate, which might allow
man-in-the-middle attackers to spoof arbitrary SSL servers via
a crafted certificate issued by a legitimate Certification
Authority.

CVE-2010-3173
NSS does not properly set the minimum key length for
Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for
remote attackers to defeat cryptographic protection mechanisms
via a brute-force attack.

For the stable distribution (lenny), these problems have been fixed in
version 3.12.3.1-0lenny2.

For the unstable distribution (sid) and the upcoming stable
distribution (squeeze), these problems have been fixed in version
3.12.8-1.

We recommend that you upgrade your NSS packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- 

Source archives:

  http://security.debian.org/pool/updates/main/n/nss/nss_3.12.3.1-0lenny2.dsc
Size/MD5 checksum: 1394 908a5e77c32e84069883a3cfb836eb24
  
http://security.debian.org/pool/updates/main/n/nss/nss_3.12.3.1-0lenny2.diff.gz
Size/MD5 checksum:53696 3d064b2d08ccc6a8ae11e1771379f1c7
  http://security.debian.org/pool/updates/main/n/nss/nss_3.12.3.1.orig.tar.gz
Size/MD5 checksum:  5320607 750839c9c018a0984fd94f7a9cc3dd7f

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/n/nss/libnss3-dev_3.12.3.1-0lenny2_alpha.deb
Size/MD5 checksum:   273438 6a97ce0db5683e1b87c2a3debd4f0a2f
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d-dbg_3.12.3.1-0lenny2_alpha.deb
Size/MD5 checksum:  3049536 4eaec5fabcab56b1fe06c2d6e0fa8574
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-tools_3.12.3.1-0lenny2_alpha.deb
Size/MD5 checksum:   342354 6bb6d7334e986265f9a1f6f0d6778d98
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d_3.12.3.1-0lenny2_alpha.deb
Size/MD5 checksum:  1207870 d84910b4354cdb1796dd3d5787cdcee8

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d-dbg_3.12.3.1-0lenny2_amd64.deb
Size/MD5 checksum:  3101238 6350cb985ded4fbc6fb4c65127f586da
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-tools_3.12.3.1-0lenny2_amd64.deb
Size/MD5 checksum:   320840 7cc70e973254a99a76834a7febbadc67
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d_3.12.3.1-0lenny2_amd64.deb
Size/MD5 checksum:  1071354 1fb1921a73e16bfd2a4dc6925bdb8a7e
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-dev_3.12.3.1-0lenny2_amd64.deb
Size/MD5 checksum:   262634 799e5eb80cf076fe34c9643b8078bb43

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/n/nss/libnss3-dev_3.12.3.1-0lenny2_arm.deb
Size/MD5 checksum:   254618 0d553164d3d303e096efbac3ab2dcabe
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-tools_3.12.3.1-0lenny2_arm.deb
Size/MD5 checksum:   309000 edc68fa74a8b939293ca23f7aa3a6efd
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d_3.12.3.1-0lenny2_arm.deb
Size/MD5 checksum:  1011704 9b9e1459b833922e31510cefab0594c0
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d-dbg_3.12.3.1-0lenny2_arm.deb
Size/MD5 checksum:  2901632 4ad15a531cdf51ef146f3337148a71d2

armel architecture (ARM EABI)

  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d-dbg_3.12.3.1-0lenny2_armel.deb
Size/MD5 checksum:  2924760 f06d340c4aa9f4044d5a00df6617e624
  
http://security.debian.org/pool/updates/main/n/nss/libnss3-1d_3.12.3.1-0lenny2_armel.deb
Size/MD5 checksum:  1017348 3f72c2cb4d1d39d0fed98acd9d4409c3
  

[Full-disclosure] [SECURITY] [DSA 2124-1] New Xulrunner packages fix several vulnerabilities

2010-11-01 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- 
Debian Security Advisory DSA-2124-1  secur...@debian.org
http://www.debian.org/security/   Florian Weimer
November 01, 2010 http://www.debian.org/security/faq
- 

Package: xulrunner
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no
CVE Id(s)  : CVE-2010-3765 CVE-2010-3174 CVE-2010-3176 CVE-2010-3177 
CVE-2010-3178 CVE-2010-3179 CVE-2010-3180 CVE-2010-3183

Several vulnerabilities have been discovered in Xulrunner, the
component that provides the core functionality of Iceweasel, Debian's
variant of Mozilla's browser technology.

The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2010-3765
Xulrunner allows remote attackers to execute arbitrary code
via vectors related to nsCSSFrameConstructor::ContentAppended,
the appendChild method, incorrect index tracking, and the
creation of multiple frames, which triggers memory corruption.

CVE-2010-3174
CVE-2010-3176
Multiple unspecified vulnerabilities in the browser engine in
Xulrunner allow remote attackers to cause a denial of service
(memory corruption and application crash) or possibly execute
arbitrary code via unknown vectors.

CVE-2010-3177
Multiple cross-site scripting (XSS) vulnerabilities in the
Gopher parser in Xulrunner allow remote attackers to inject
arbitrary web script or HTML via a crafted name of a (1) file
or (2) directory on a Gopher server.

CVE-2010-3178
Xulrunner does not properly handle certain modal calls made by
javascript: URLs in circumstances related to opening a new
window and performing cross-domain navigation, which allows
remote attackers to bypass the Same Origin Policy via a
crafted HTML document.

CVE-2010-3179
Stack-based buffer overflow in the text-rendering
functionality in Xulrunner allows remote attackers to execute
arbitrary code or cause a denial of service (memory corruption
and application crash) via a long argument to the
document.write method.

CVE-2010-3180
Use-after-free vulnerability in the nsBarProp function in
Xulrunner allows remote attackers to execute arbitrary code by
accessing the locationbar property of a closed window.

CVE-2010-3183
The LookupGetterOrSetter function in Xulrunner does not
properly support window.__lookupGetter__ function calls that
lack arguments, which allows remote attackers to execute
arbitrary code or cause a denial of service (incorrect pointer
dereference and application crash) via a crafted HTML
document.

In addition, this security update includes corrections for regressions
caused by the fixes for CVE-2010-0654 and CVE-2010-2769 in DSA-2075-1
and DSA-2106-1.

For the stable distribution (lenny), these problems have been fixed in
version 1.9.0.19-6.

For the unstable distribution (sid) and the upcoming stable
distribution (squeeze), these problems have been fixed in version
3.5.15-1 of the iceweasel package.

We recommend that you upgrade your Xulrunner packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- 

Source archives:

  
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19-6.dsc
Size/MD5 checksum: 1755 e07e9c6f05d92caf3c5a068b8cf249e1
  
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19.orig.tar.gz
Size/MD5 checksum: 44174623 83667df1e46399960593fdd8832e958e
  
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner_1.9.0.19-6.diff.gz
Size/MD5 checksum:   176924 9ac56cbdededbd37f30b2fbf85724ba1

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/x/xulrunner/libmozillainterfaces-java_1.9.0.19-6_all.deb
Size/MD5 checksum:  1466740 4db5a3cb380642680fc8584bbd559c1c

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/x/xulrunner/libmozjs-dev_1.9.0.19-6_alpha.deb
Size/MD5 checksum:   223584 461a28c6405acd4f9bb0576e2982da4e
  
http://security.debian.org/pool/updates/main/x/xulrunner/xulrunner-1.9_1.9.0.19-6_alpha.deb
Size/MD5 checksum:  9491974 d636e29b64c83a2a43d7cf50231ef343
  

[Full-disclosure] Security-Assessment.com Advisory: BroadWorks Call Detail Record Disclosure Vulnerability

2010-11-01 Thread Nick Freeman

   (, ) (,
  .   `.' ) ('.',
   ). , ('.   ( ) (
  (_,) .`), ) _ _,
 /  _/  / _  \     _  
 \  \==/ /_\  \ _/ ___\/  _ \ / \
 /   \/   |\\  \__(  _ )  Y Y  \
/__  /\___|__  / \___  /|__|_|  /
\/ \/.-.\/ \/:wq
(x.0)
  '=.|w|.='
  _='```=.

presents..


Name : BroadWorks Call Detail Record Disclosure Vulnerability
Vendor Website   : http://broadsoft.com/products/broadworks/
Date Released: November 2, 2010
Affected Software: BroadWorks = R16
Researcher   : Nick Freeman (nick.free...@security-assessment.com)


PDF:
http://security-assessment.com/files/advisories/BroadWorks_Call_Detail_Record_Disclosure_Vulnerability.pdf
TXT:
http://security-assessment.com/files/advisories/BroadWorks_Call_Detail_Record_Disclosure_Vulnerability.txt


+---+
|Description|
+---+

Security-Assessment.com discovered an issue regarding privilege
separation between different enterprise groups within BroadWorks.
This issue allows a user with Attendant Console privileges to
view and record live call detail records for any user of the
system, including users from other organisations.


++
|Exploitation|
++


Eavesdropping of call detail records requires knowledge of the target
user’s BroadWorks username, e.g. 098765...@serviceprovider.com.
BroadWorks uses Client Application Protocol (CAP) XML messages to
communicate between client applications and the BroadWorks platform. One
of the messages, monitoringUsersRequest, is transmitted by the Attendant
Console to BroadWorks during the logon procedure. This command includes
a list of usernames that the Attendant Console can monitor for incoming
and outgoing calls. A malicious user can replay this message with
usernames from other enterprises, and once this operation has completed,
all incoming and outgoing calls for the target user(s) will be visible to
the Attendant.


A basic proxy is available at
http://www.security-assessment.com/files/advisories/bwe.py which can
intercept and modify the XML stream, allowing the injection of
monitoringUsersRequest packets.


++
|Solution|
++

A patch is available from Broadsoft for this vulnerability.


+--+
|Credit|
+--+

Discovered and advised to Broadworks June 2010 by Nick Freeman of
Security-Assessment.com.


+-+
|About Security-Assessment.com|
+-+

Security-Assessment.com is a New Zealand based world leader in web
application testing,
network security and penetration testing. Security-Assessment.com
services organisations
across New Zealand, Australia, Asia Pacific, the United States and the
United Kingdom.





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/