[Full-disclosure] BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested payload

2011-04-01 Thread Tavis Ormandy
BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested payload
---

Gruezi, this document describes CVE-2011-1547.

RFC3173 ip payload compression, henceforth ipcomp, is a protocol intended to
provide compression of ip datagrams, and is commonly used alongside IPSec
(although there is no requirement to do so).

An ipcomp datagram consists of an ip header with ip-ip_p set to 108, followed
by a 32 bit ipcomp header, described in C syntax below.

struct ipcomp {
uint8_t comp_nxt;   // Next Header
uint8_t comp_flags; // Reserved
uint16_tcomp_cpi;   // Compression Parameter Index
};

The Compression Parameter Index indicates which compression algorithm was used
to compress the ipcomp payload, which is expanded and then routed as requested.
Although the CPI field is 16 bits wide, in reality only 1 algorithm is widely
implemented, RFC1951 DEFLATE (cpi=2).

It's well documented that ipcomp can be used to traverse perimeter filtering,
however this document discusses potential implementation flaws observed in
popular stacks.

The IPComp implementation originating from NetBSD/KAME implements injection of
unpacked payloads like so:

algo = ipcomp_algorithm_lookup(cpi);

/* ... */

error = (*algo-decompress)(m, m-m_next, newlen);

/* ... */

if (nxt != IPPROTO_DONE) {
if ((inetsw[ip_protox[nxt]].pr_flags  PR_LASTHDR) != 0 
ipsec4_in_reject(m, NULL)) {
IPSEC_STATINC(IPSEC_STAT_IN_POLVIO);
goto fail;
}
(*inetsw[ip_protox[nxt]].pr_input)(m, off, nxt);
} else
m_freem(m);

/* ... */

Where inetsw[] contains definitions for supported protocols, and nxt is a
protocol number, usually associated with ip-ip_p (see
http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml), but in
this case from ipcomp-comp_nxt. m is the mbuf structure adjusted to point to
the unpacked payload.

The unpacked packet is dispatched to the appropriate protocol handler
directly from the ipcomp protocol handler. This recursive implementation fails
to check for stack overflow, and is therefore vulnerable to a remote
pre-authentication kernel memory corruption vulnerability.

The NetBSD/KAME network stack is used as basis for various other
operating systems, such as Xnu, FTOS, various embedded devices and
network appliances, and earlier versions of FreeBSD/OpenBSD (the code
has since been refactored, but see the NOTES section regarding IPComp
quines, which still permit remote, pre-authentication, single-packet,
spoofed-source DoS in the latest versions).

The Xnu port of this code is close to the original, where the decompressed
payload is recursively injected back into the toplevel ip dispatcher. The
implementation is otherwise similar, and some alterations to the testcase
provided for NetBSD should make it work. This is left as an exercise for the
interested reader.


Affected Software


Any NetBSD derived IPComp/IPSec stack may be vulnerable (Xnu, FTOS, etc.).

NetBSD is not distributed with IPSec support enabled by default, however Apple
OSX and various other derivatives are. There are so many NetBSD derived network
stacks that it is infeasible to check them all, concerned administrators are
advised to check with their vendor if there is any doubt.

Major vendors known to use network stacks derived from NetBSD were pre-notified
about this vulnerability. If I missed you, it is either not well known that you
use the BSD stack, you did not respond to security@ mail, or could not use pgp
properly.

Additionally, administrators of critical or major deployments of NetBSD (e.g.
dns root servers) were given advance notice in order to deploy appropriate
filter rules.

Exploitability of kernel stack overflows will vary by platform (n.b. a stack
overflow is not a stack buffer overflow, for a concise definition see
TAOCP3,V1,S2.2.2). Also note that a kernel stack overflow is very different
from a userland stack overflow.

For further discussion, including attacks on other operating systems,
see the notes section on ipcomp quines below.


Consequences
---

While exploitation of kernel stack overflows is a somewhat under researched
topic, the author feels a skilled attacker would be able to leverage this for
remote code execution. However, this is not a trivial task, and is highly
platform dependent.

I have verified kernel stack overflows on NetBSD are exploitable, I have looked
at the source code for xnu and do not see any obvious obstacles to prevent
exploitation (kernel stack segment limits, guard pages, etc. which would cause
the worst impact to be limited to remote denial of service), so have no reason
to believe it is different.

Thoughts on this topic from fellow researchers would be welcome.

Source code for a sample Linux program to 

Re: [Full-disclosure] itunes.apple.com owned by webapp malicious host

2011-04-01 Thread matador matador
Seems that Websense agree with me...

http://community.websense.com/blogs/securitylabs/archive/2011/03/29/lizamoon-mass-injection-28000-urls-including-itunes.aspx

... or better they copy and paste my trivial link ... LOL! :)))

2011/3/29 Cal Leeming c...@foxwhisper.co.uk

 Unconfirmed, seems to escape fine for me.

 On Tue, Mar 29, 2011 at 3:22 PM, matador matador m4t4d...@gmail.comwrote:

 Enjoy! :)

 http://www.google.com/search?q=lizamoon.com+site%3Aapple.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] itunes.apple.com owned by webapp malicious host

2011-04-01 Thread Benji
No they don't. All your link implies is that either a) someone
compromised the itunes account associated with that band and added the
script, or b) it was injected into place.

However at no point is the javascript executed.

Sigh, do you have a CSSIP aswell?

On 4/1/11, matador matador m4t4d...@gmail.com wrote:
 Seems that Websense agree with me...

 http://community.websense.com/blogs/securitylabs/archive/2011/03/29/lizamoon-mass-injection-28000-urls-including-itunes.aspx

 ... or better they copy and paste my trivial link ... LOL! :)))

 2011/3/29 Cal Leeming c...@foxwhisper.co.uk

 Unconfirmed, seems to escape fine for me.

 On Tue, Mar 29, 2011 at 3:22 PM, matador matador
 m4t4d...@gmail.comwrote:

 Enjoy! :)

 http://www.google.com/search?q=lizamoon.com+site%3Aapple.com

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] itunes.apple.com owned by webapp malicious host

2011-04-01 Thread matador matador
I am 15 years old :)

2011/4/1 Benji m...@b3nji.com

 No they don't. All your link implies is that either a) someone
 compromised the itunes account associated with that band and added the
 script, or b) it was injected into place.

 However at no point is the javascript executed.

 Sigh, do you have a CSSIP aswell?

 On 4/1/11, matador matador m4t4d...@gmail.com wrote:
  Seems that Websense agree with me...
 
 
 http://community.websense.com/blogs/securitylabs/archive/2011/03/29/lizamoon-mass-injection-28000-urls-including-itunes.aspx
 
  ... or better they copy and paste my trivial link ... LOL! :)))
 
  2011/3/29 Cal Leeming c...@foxwhisper.co.uk
 
  Unconfirmed, seems to escape fine for me.
 
  On Tue, Mar 29, 2011 at 3:22 PM, matador matador
  m4t4d...@gmail.comwrote:
 
  Enjoy! :)
 
  http://www.google.com/search?q=lizamoon.com+site%3Aapple.com
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] itunes.apple.com owned by webapp malicious host

2011-04-01 Thread Benji
Is that a yes or a no?

On 4/1/11, matador matador m4t4d...@gmail.com wrote:
 I am 15 years old :)

 2011/4/1 Benji m...@b3nji.com

 No they don't. All your link implies is that either a) someone
 compromised the itunes account associated with that band and added the
 script, or b) it was injected into place.

 However at no point is the javascript executed.

 Sigh, do you have a CSSIP aswell?

 On 4/1/11, matador matador m4t4d...@gmail.com wrote:
  Seems that Websense agree with me...
 
 
 http://community.websense.com/blogs/securitylabs/archive/2011/03/29/lizamoon-mass-injection-28000-urls-including-itunes.aspx
 
  ... or better they copy and paste my trivial link ... LOL! :)))
 
  2011/3/29 Cal Leeming c...@foxwhisper.co.uk
 
  Unconfirmed, seems to escape fine for me.
 
  On Tue, Mar 29, 2011 at 3:22 PM, matador matador
  m4t4d...@gmail.comwrote:
 
  Enjoy! :)
 
  http://www.google.com/search?q=lizamoon.com+site%3Aapple.com
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 
 
 



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] itunes.apple.com owned by webapp malicious host

2011-04-01 Thread matador matador
Anyway the main point that I was wondering before is:

What's happen if the sql inj bot was smarter? (For example: Using
obfuscation technique)

Probably nothing because iTunes sanitized the input.

2011/4/1 Benji m...@b3nji.com

 Is that a yes or a no?

 On 4/1/11, matador matador m4t4d...@gmail.com wrote:
  I am 15 years old :)
 
  2011/4/1 Benji m...@b3nji.com
 
  No they don't. All your link implies is that either a) someone
  compromised the itunes account associated with that band and added the
  script, or b) it was injected into place.
 
  However at no point is the javascript executed.
 
  Sigh, do you have a CSSIP aswell?
 
  On 4/1/11, matador matador m4t4d...@gmail.com wrote:
   Seems that Websense agree with me...
  
  
 
 http://community.websense.com/blogs/securitylabs/archive/2011/03/29/lizamoon-mass-injection-28000-urls-including-itunes.aspx
  
   ... or better they copy and paste my trivial link ... LOL! :)))
  
   2011/3/29 Cal Leeming c...@foxwhisper.co.uk
  
   Unconfirmed, seems to escape fine for me.
  
   On Tue, Mar 29, 2011 at 3:22 PM, matador matador
   m4t4d...@gmail.comwrote:
  
   Enjoy! :)
  
   http://www.google.com/search?q=lizamoon.com+site%3Aapple.com
  
   ___
   Full-Disclosure - We believe in it.
   Charter: http://lists.grok.org.uk/full-disclosure-charter.html
   Hosted and sponsored by Secunia - http://secunia.com/
  
  
  
  
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested payload

2011-04-01 Thread Jeffrey Walton
On Fri, Apr 1, 2011 at 4:00 AM, Tavis Ormandy tav...@cmpxchg8b.com wrote:
 BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested 
 payload
 ---

 Gruezi, this document describes CVE-2011-1547.

 RFC3173 ip payload compression, henceforth ipcomp, is a protocol intended to
 provide compression of ip datagrams, and is commonly used alongside IPSec
 (although there is no requirement to do so).

 An ipcomp datagram consists of an ip header with ip-ip_p set to 108, followed
 by a 32 bit ipcomp header, described in C syntax below.

 struct ipcomp {
    uint8_t     comp_nxt;       // Next Header
    uint8_t     comp_flags;     // Reserved
    uint16_t    comp_cpi;       // Compression Parameter Index
 };

 The Compression Parameter Index indicates which compression algorithm was used
 to compress the ipcomp payload, which is expanded and then routed as 
 requested.
 Although the CPI field is 16 bits wide, in reality only 1 algorithm is widely
 implemented, RFC1951 DEFLATE (cpi=2).

 It's well documented that ipcomp can be used to traverse perimeter filtering,
 however this document discusses potential implementation flaws observed in
 popular stacks.

 The IPComp implementation originating from NetBSD/KAME implements injection of
 unpacked payloads like so:

    algo = ipcomp_algorithm_lookup(cpi);

    /* ... */

    error = (*algo-decompress)(m, m-m_next, newlen);

    /* ... */

    if (nxt != IPPROTO_DONE) {
        if ((inetsw[ip_protox[nxt]].pr_flags  PR_LASTHDR) != 0 
            ipsec4_in_reject(m, NULL)) {
            IPSEC_STATINC(IPSEC_STAT_IN_POLVIO);
            goto fail;
        }
        (*inetsw[ip_protox[nxt]].pr_input)(m, off, nxt);
    } else
        m_freem(m);

    /* ... */

 Where inetsw[] contains definitions for supported protocols, and nxt is a
 protocol number, usually associated with ip-ip_p (see
 http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml), but in
 this case from ipcomp-comp_nxt. m is the mbuf structure adjusted to point to
 the unpacked payload.

 The unpacked packet is dispatched to the appropriate protocol handler
 directly from the ipcomp protocol handler. This recursive implementation fails
 to check for stack overflow, and is therefore vulnerable to a remote
 pre-authentication kernel memory corruption vulnerability.

 The NetBSD/KAME network stack is used as basis for various other
 operating systems, such as Xnu, FTOS, various embedded devices and
 network appliances, and earlier versions of FreeBSD/OpenBSD (the code
 has since been refactored, but see the NOTES section regarding IPComp
 quines, which still permit remote, pre-authentication, single-packet,
 spoofed-source DoS in the latest versions).

 The Xnu port of this code is close to the original, where the decompressed
 payload is recursively injected back into the toplevel ip dispatcher. The
 implementation is otherwise similar, and some alterations to the testcase
 provided for NetBSD should make it work. This is left as an exercise for the
 interested reader.

Isn't this OK as long as the evil bit (RFC 3514) is not set?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image for WordPress

2011-04-01 Thread John Belushae
Hello Mueslix !

I want to warm you about Insufficient Content Filtering on FD.


Timeline:


2005.12.24 - Mueslix got a computer
2005.12.31 - His friends didn't want to go out with him, so he read owasp
instead
2006.01.02 - Found his first FDP
2011.03.29 - Still spaming this list with FDP, and an horribly broken En.


On Thu, Mar 31, 2011 at 11:22 PM, MustLive mustl...@websecurity.com.uawrote:

 Hello list!

 I want to warn you about Insufficient Anti-automation vulnerability in
 MaxSite Anti Spam Image plugin for WordPress.

 This is modified version of original plugin Anti Spam Image, about
 vulnerability in which I wrote in 2007 in my project Month of Bugs in
 Captchas. This captcha is vulnerable to session reusing with constant
 captcha bypass method, like original Anti Spam Image, on which base this
 plugin is made.

 -
 Affected products:
 -

 Vulnerable are MaxSite Anti Spam Image 0.6 and potentially all other
 versions of this plugin.

 --
 Details:
 --

 Insufficient Anti-automation (WASC-21):

 Exploit:


 http://websecurity.com.ua/uploads/2011/MaxSite%20Anti%20Spam%20Image%20CAPTCHA%20bypass.html

 Vulnerability has place on old versions of PHP. It shows only in PHP 
 4.4.7, which has bug which leads to error in work of web application's
 algorithm, which leads to possibility of captcha bypass.

 
 Timeline:
 

 2007.12.01 - found vulnerability.
 2007.12.01 - informed developer.
 2011.03.29 - disclosed at my site.

 I mentioned about this vulnerability at my site
 (http://websecurity.com.ua/5045/).

 Best wishes  regards,
 MustLive
 Administrator of Websecurity web site
 http://websecurity.com.ua


 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] I got hacked

2011-04-01 Thread McGhee, Eddie
Nah, You really are a lemming.

From: Cal Leeming [mailto:c...@foxwhisper.co.uk]
Sent: 31 March 2011 13:03
To: McGhee, Eddie
Subject: Re: [Full-disclosure] I got hacked

Wow, and you're the 7th retarded person who can't spell my relatively easy last 
name.. congrats!

2011/3/31 McGhee, Eddie eddie.mcg...@ncr.commailto:eddie.mcg...@ncr.com
Says Mr Cal 7 Emails in a row Lemming


From: 
full-disclosure-boun...@lists.grok.org.ukmailto:full-disclosure-boun...@lists.grok.org.uk
 
[mailto:full-disclosure-boun...@lists.grok.org.ukmailto:full-disclosure-boun...@lists.grok.org.uk]
 On Behalf Of Cal Leeming
Sent: 31 March 2011 12:40
To: Rémon Schopmeijer
Cc: full-disclosure@lists.grok.org.ukmailto:full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] I got hacked

Spam?

On Wed, Mar 30, 2011 at 3:52 PM, Rémon Schopmeijer 
re...@anthraxmedia.commailto:re...@anthraxmedia.com wrote:
http://www.n-it.ro/


 ,
 [TBO] Security...  (The best of Security Team) ,
 ,
 ___,
 ,
 by tbo_pablo  Marian ,
 ,
 ,
 ,
 wWw.Tbo-S.comhttp://wWw.Tbo-S.com 


They hacked three of my websites.

What can you guys do for me?


Anthrax.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerabilities in *McAfee.com

2011-04-01 Thread Cal Leeming
+1.

I've come across countless companies who had idiotic technical directors who
didn't even want you speaking up in meetings about how bad their network
was, let alone in public.

A lot of it comes down to pride/image, if someone starts questioning their
job worth, they get all pissy about it, plus a lot of people find it
*extremely* difficult to take constructive criticism and/or advice
within their own remit.

Personally, I'm completely honest and open when I fuck something up. If a
clients network goes down cos I accidently plugged a 12v cable tester into
core switch gear causing a site wide telecoms outage for 20 minutes (lol),
I'll come right out and say Yeah, I did bad.. Where as most people try and
cover it up.

Different scenario, but same principle.

On Thu, Mar 31, 2011 at 1:13 PM, BlackHawk hawkgot...@gmail.com wrote:

 Nothing new under the sun.. i have done some security testing on _open
 source_ webapps, and most of the time
 if you allert the publisher of your founding ( most of the time remote
 code executions, not boring XSS ) the answer is tipically F*** off,
 we do not need your help / you are lying / you are a criminal /
 etc.etc. showing that bug founding is still looked with diffidence
 from many people;

 on the other side admins are so proud of themselfs that they do not
 want  other people to know they have bad coded something, look at
 this:
 http://forums.pligg.com/questions-comments/23065-pligg-1-1-3-security-vulnerabilities.html#post103328

 to close with a semi-serious joke: put all this together and you will
 know why black market selling of exploit is increasing his size: at
 least someone will appreciate your work and eventually recompensate
 you for it..

 On Wed, Mar 30, 2011 at 9:33 PM, Cal Leeming c...@foxwhisper.co.uk wrote:
 
 
 
  Like with most laws, the key point is intent. If your intention was
  clearly not malicious, then you are safe.



 --
 BlackHawk - hawkgot...@gmail.com

 Sent with Gmail

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-04-01 Thread Esteban Cañizal
Come on guys!! I think they are not trying to reinvent the wheel here!

As far as i can remember they never said they created a new product
better than msf (or the other tools you mentioned) they packed a bunch
of really good tools and made it easier to those who dont like using
console, or complicated things...  they also have some own native
exploits

BTW, do you guys always use your time for replying to all the threads
you dont like?? What a waste of time!

I tried it and i think it is really usefull, thumbs up for insect pro!!

Cheers :D

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] password.incleartext.com

2011-04-01 Thread Inc leartext
Hi FD,

Just launched a new website to keep a list of websites storing passwords in
clear text, so far the database is small but feel free to add some:
http://password.incleartext.com/

Cheers,
Inc Leartext
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-04-01 Thread rdsears
Well correct me if I'm wrong, but the whole premise of an un-regulated forum is 
for people to collaborate on opinions, even if they don't necessarily agree. 

You clearly didn't like the comments directed toward the INSECT devs, so aren't 
you 'wasting your time' by replying to them yourself? 

On Apr 1, 2011, at 6:12 AM, Esteban Cañizal este...@canizal.com.ar wrote:

 Come on guys!! I think they are not trying to reinvent the wheel here!
 
 As far as i can remember they never said they created a new product
 better than msf (or the other tools you mentioned) they packed a bunch
 of really good tools and made it easier to those who dont like using
 console, or complicated things...  they also have some own native
 exploits
 
 BTW, do you guys always use your time for replying to all the threads
 you dont like?? What a waste of time!
 
 I tried it and i think it is really usefull, thumbs up for insect pro!!
 
 Cheers :D
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] I got hacked

2011-04-01 Thread Valery Marchuk
Hi!
Are your websites commercial? If not, I can help you identify the 
vulnerabilities and fix them.


BR,
Valery Marchuk
www.SecurityLab.ru



- Original Message - 
From: McGhee, Eddie eddie.mcg...@ncr.com
To: Cal Leeming c...@foxwhisper.co.uk
Cc: full-disclosure@lists.grok.org.uk
Sent: Thursday, March 31, 2011 3:57 PM
Subject: Re: [Full-disclosure] I got hacked


Nah, You really are a lemming.

From: Cal Leeming [mailto:c...@foxwhisper.co.uk]
Sent: 31 March 2011 13:03
To: McGhee, Eddie
Subject: Re: [Full-disclosure] I got hacked

Wow, and you're the 7th retarded person who can't spell my relatively easy 
last name.. congrats!

2011/3/31 McGhee, Eddie eddie.mcg...@ncr.commailto:eddie.mcg...@ncr.com
Says Mr Cal 7 Emails in a row Lemming


From: 
full-disclosure-boun...@lists.grok.org.ukmailto:full-disclosure-boun...@lists.grok.org.uk
 
[mailto:full-disclosure-boun...@lists.grok.org.ukmailto:full-disclosure-boun...@lists.grok.org.uk]
 
On Behalf Of Cal Leeming
Sent: 31 March 2011 12:40
To: Rémon Schopmeijer
Cc: 
full-disclosure@lists.grok.org.ukmailto:full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] I got hacked

Spam?

On Wed, Mar 30, 2011 at 3:52 PM, Rémon Schopmeijer 
re...@anthraxmedia.commailto:re...@anthraxmedia.com wrote:
http://www.n-it.ro/


 ,
 [TBO] Security...  (The best of Security Team) ,
 ,
 ___,
 ,
 by tbo_pablo  Marian ,
 ,
 ,
 ,
 wWw.Tbo-S.comhttp://wWw.Tbo-S.com 


They hacked three of my websites.

What can you guys do for me?


Anthrax.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/








 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vulnerabilities in MyBB

2011-04-01 Thread MustLive
Hello list!

I want to warn you about Cross-Site Scripting and SQL DB Structure
Extraction vulnerabilities in MyBB.

-
Affected products:
-

Vulnerable are MyBB 1.6 and previous versions. In MyBB 1.6.1 these four
vulnerabilities were fixed (by turning SQL error messages off).

--
Details:
--

Vulnerabilities take place in scripts search.php and private.php.

XSS (WASC-08):

http://websecurity.com.ua/uploads/2011/MyBB%20XSS.html

http://websecurity.com.ua/uploads/2011/MyBB%20XSS-2.html

SQL DB Structure Extraction (WASC-13):

http://websecurity.com.ua/uploads/2011/MyBB%20SQL%20DB%20Structure%20Extraction.html

http://websecurity.com.ua/uploads/2011/MyBB%20SQL%20DB%20Structure%20Extraction-2.html


Timeline:


2011.02.10 - announced at my site.
2011.02.11 - informed developers.
2011.03.30 - disclosed at my site.

I mentioned about these vulnerabilities at my site
(http://websecurity.com.ua/4919/).

Best wishes  regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image for WordPress

2011-04-01 Thread Valdis . Kletnieks
On Thu, 31 Mar 2011 23:35:50 +1100, John Belushae said:

 I want to warm you about Insufficient Content Filtering on FD.

Dude, you missed by 24 minutes and 10 seconds...


pgp8IM0PwgKMF.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2011:058 ] quagga

2011-04-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:058
 http://www.mandriva.com/security/
 ___

 Package : quagga
 Date: April 1, 2011
 Affected: Corporate 4.0
 ___

 Problem Description:

 Multiple vulnerabilities has been identified and fixed in quagga:
 
 The extended-community parser in bgpd in Quagga before 0.99.18 allows
 remote attackers to cause a denial of service (NULL pointer dereference
 and application crash) via a malformed Extended Communities attribute
 (CVE-2010-1674).
 
 bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial
 of service (session reset) via a malformed AS_PATHLIMIT path attribute
 (CVE-2010-1675).
 
 Updated packages are available that bring Quagga to version 0.99.18
 which provides numerous bugfixes over the previous 0.99.17 version,
 and also corrects these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675
 ___

 Updated Packages:

 Corporate 4.0:
 87b588dee68e7b87d505e9d3953a279c  
corporate/4.0/i586/libquagga0-0.99.18-0.1.20060mlcs4.i586.rpm
 818e4b52aca03cb083aec7486630964c  
corporate/4.0/i586/libquagga0-devel-0.99.18-0.1.20060mlcs4.i586.rpm
 fb9f8c521a536d0b92cb8f070a80ad83  
corporate/4.0/i586/quagga-0.99.18-0.1.20060mlcs4.i586.rpm
 b62e56494540a8dc9de806e59150d3f3  
corporate/4.0/i586/quagga-contrib-0.99.18-0.1.20060mlcs4.i586.rpm 
 64b55fea4af3b02837266cc9e5162841  
corporate/4.0/SRPMS/quagga-0.99.18-0.1.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 130cac8e86e6bb41e8139ea53fb5bd35  
corporate/4.0/x86_64/lib64quagga0-0.99.18-0.1.20060mlcs4.x86_64.rpm
 f7074a145d6742523470aadc450eeda2  
corporate/4.0/x86_64/lib64quagga0-devel-0.99.18-0.1.20060mlcs4.x86_64.rpm
 d9e5ac8f09fc897d1f2fa113c4801b79  
corporate/4.0/x86_64/quagga-0.99.18-0.1.20060mlcs4.x86_64.rpm
 1ca735918f1126b00b64e1433d2dc85d  
corporate/4.0/x86_64/quagga-contrib-0.99.18-0.1.20060mlcs4.x86_64.rpm 
 64b55fea4af3b02837266cc9e5162841  
corporate/4.0/SRPMS/quagga-0.99.18-0.1.20060mlcs4.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNlaQ7mqjQ0CJFipgRAriUAKDLNRGlMvPdbPkgp0Wd0pxGixIzWwCfc38Q
svx+sURyhhcmOWk06baNRFE=
=Ii2a
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZDI-11-041: (0day) Multiple Browser Node Processing Stack Overflow Vulnerability

2011-04-01 Thread ZDI Disclosures
ZDI-11-041: (0day) Multiple Browser Node Processing Stack Overflow Vulnerability

http://www.zerodayinitiative.com/advisories/ZDI-11-911

April 1, 2011

-- CVE ID:
CVE-C000-00FD

-- CVSS:
9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

-- Affected Vendors:
Microsoft
Google
Mikul
Apple
ISC

-- Affected Products:
Microsoft Internet Explorer
Google Chrome
Mikul Links
Apple Safari
ISC Lynx

-- Vulnerability Details:
Multiple vulnerabilities allow remote attackers to remotely terminate
mission critical web applications on vulnerable installations of Apple
Safari, Microsoft Internet Explorer, Google Chrome, Mikul Links, and ISC
Lynx. User interaction is required to exploit this vulnerability in that
the target must visit a malicious page or open a malicious file.

The flaws exists within the handling of node attributes, specifically
nodes with large quantities of attributes or large values within such
nodes. When handling these objects, several functions are called
recursively for each value provided defined within. The functions use a
shared memory region referred to internally as the stack. The size of
the stack is not properly verified during processing which can result in
the consumption of all the its available address space. This process is
extremely exhausting for the application and it cannot continue
functioning. A remote attacker can exploit this vulnerability to
terminate web applications under the context of the Internet.

-- Vendor Response:
Vendors claimed to be unable to respond due to unexpected browser termination 
upon accessing web form.

-- Disclosure Timeline:
2011-04-01 - Vulnerability reported to vendor
2011-04-01 - Public release of advisory

-- Credit:
This vulnerability was discovered by:
* Spencer Pratt

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread McGhee, Eddie
Worst April fools troll evar? 

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Valery Marchuk
Sent: 01 April 2011 12:20
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] The US Government Officially Confirms the Existence 
of Extraterrestrial Civilizations

Hi!
Tremendous news have recently been published on the official websites of NASA 
and NATO. President of the USA Barak Obama revealed to all mankind that the 
government of the USA along with governments of many other countries have been 
cooperating with extraterrestrial civilizations for almost 40 years. Owing to 
this cooperation, the people on Earth were granted the access to new 
technologies, cures for many diseases and the means to reach the outer space.

Right now, the US government possesses 5 cruisers that can travel in subspace 
and reach other galaxies millions light-years away. Barak Obama himself assures 
that that there is no danger coming from the extraterrestrial civilizations.

More information with prooflinks on SecurityLab.ru:

Russian: http://www.securitylab.ru/news/405274.php

English: http://www.securitylab.ru/news/405276.php



BR,

Valery Marchuk

www.SecurityLab.ru



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread McGhee, Eddie
...And surely you meant President Martinez, not this Obama character =)


Eddie McGhee
Retail TSS GB114/GB115/GB116 
eddie.mcg...@ncr.com | www.ncr.com 

-Original Message-
From: McGhee, Eddie 
Sent: 01 April 2011 12:31
To: 'Valery Marchuk'; full-disclosure@lists.grok.org.uk
Subject: RE: [Full-disclosure] The US Government Officially Confirms the 
Existence of Extraterrestrial Civilizations

Worst April fools troll evar? 

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Valery Marchuk
Sent: 01 April 2011 12:20
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] The US Government Officially Confirms the Existence 
of Extraterrestrial Civilizations

Hi!
Tremendous news have recently been published on the official websites of NASA 
and NATO. President of the USA Barak Obama revealed to all mankind that the 
government of the USA along with governments of many other countries have been 
cooperating with extraterrestrial civilizations for almost 40 years. Owing to 
this cooperation, the people on Earth were granted the access to new 
technologies, cures for many diseases and the means to reach the outer space.

Right now, the US government possesses 5 cruisers that can travel in subspace 
and reach other galaxies millions light-years away. Barak Obama himself assures 
that that there is no danger coming from the extraterrestrial civilizations.

More information with prooflinks on SecurityLab.ru:

Russian: http://www.securitylab.ru/news/405274.php

English: http://www.securitylab.ru/news/405276.php



BR,

Valery Marchuk

www.SecurityLab.ru



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread Maksim . Filenko
Happy All fools' day? ;-)

full-disclosure-boun...@lists.grok.org.uk wrote on 01.04.2011 14:19:48:

 Valery Marchuk teckl...@securitylab.ru 
 Sent by: full-disclosure-boun...@lists.grok.org.uk
 
 01.04.2011 14:20
 
 To
 
 full-disclosure@lists.grok.org.uk
 
 cc
 
 Subject
 
 [Full-disclosure] The US Government Officially Confirms the 
 Existence of Extraterrestrial Civilizations
 
 Hi!
 Tremendous news have recently been published on the official websites of
 NASA and NATO. President of the USA Barak Obama revealed to all mankind 
that
 the government of the USA along with governments of many other countries
 have been cooperating with extraterrestrial civilizations for almost 40
 years. Owing to this cooperation, the people on Earth were granted the
 access to new technologies, cures for many diseases and the means to 
reach
 the outer space.
 
 Right now, the US government possesses 5 cruisers that can travel in
 subspace and reach other galaxies millions light-years away. Barak Obama
 himself assures that that there is no danger coming from the
 extraterrestrial civilizations.
 
 More information with prooflinks on SecurityLab.ru:
 
 Russian: http://www.securitylab.ru/news/405274.php
 
 English: http://www.securitylab.ru/news/405276.php
 
 
 
 BR,
 
 Valery Marchuk
 
 www.SecurityLab.ru
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread Cal Leeming
F, I fell for it.

On Fri, Apr 1, 2011 at 12:19 PM, Valery Marchuk teckl...@securitylab.ruwrote:

 Hi!
 Tremendous news have recently been published on the official websites of
 NASA and NATO. President of the USA Barak Obama revealed to all mankind
 that
 the government of the USA along with governments of many other countries
 have been cooperating with extraterrestrial civilizations for almost 40
 years. Owing to this cooperation, the people on Earth were granted the
 access to new technologies, cures for many diseases and the means to reach
 the outer space.

 Right now, the US government possesses 5 cruisers that can travel in
 subspace and reach other galaxies millions light-years away. Barak Obama
 himself assures that that there is no danger coming from the
 extraterrestrial civilizations.

 More information with prooflinks on SecurityLab.ru:

 Russian: http://www.securitylab.ru/news/405274.php

 English: http://www.securitylab.ru/news/405276.php



 BR,

 Valery Marchuk

 www.SecurityLab.ru



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Plumber Injection Attack in Bowser's Castle

2011-04-01 Thread Nelson Elhage
Advisory Name: Plumber Injection Attack in Bowser's Castle
 Release Date: 2011-04-01
  Application: Bowser's Castle
 Versions: Super Mario Bros., Super Mario Bros.: The Lost Levels
   Identifier: SMB-1985-0001
 Advisory: http://blog.ksplice.com/2011/04/smb-1985-0001-advisory/

---

Vulnerability Overview
--

  Multiple versions of Bowser's Castle are vulnerable to a plumber injection
  attack. An Italian plumber could exploit this bug to bypass security measures
  (walk through walls) in order to rescue Peach, to defeat Bowser, or for
  unspecified other impact.

Exploit
---

  http://www.youtube.com/watch?v=rGshxZ1dYjA

  This vulnerability is demonstrated by
  happylee-supermariobros,warped.fm2 [1]. Attacks using this
  exploit have been observed in the wild, and multiple other exploits
  are publicly available.

Affected Versions
-

  Versions of Bowser's Castle as shipped in Super Mario Bros. [2] and Super
  Mario Bros.: The Lost Levels [3] are affected.

Solution


  http://www.youtube.com/watch?v=nacFU7ozeZA

  An independently developed patch [4] is available.

  A binary hot patch [5] to apply the update to an existing version is also
  available.

  All users are advised to upgrade.

Mitigations
---

  For users unable to apply the recommended fix, a number of
  mitigations are possible to reduce the impact of the vulnerability.

  NOTE THAT NO MITIGATION IS BELIEVED TO BE COMPLETELY EFFECTIVE.

  Potential mitigations include:

  - Employing standard defense-in-depth strategies incorporating
multiple layers of defense, including Goombas [6], Koopa Troopas [7],
Bullet Bills [8], and others.
  - Installing poison mushrooms outside your castle [9].
  - Installing a firewall to limit access to affected systems. [10]
  - Frequently moving your princess between different castles [11].

Credit
--

  The vulnerability was originally discovered by Mario and Luigi, of Mario
  Bros. Security Research.

  The provided patch and this advisory were prepared by Lakitu Cloud
  Security, Inc. The hot patch was developed in collaboration with
  Ksplice, Inc. [12]

Product Overview


  Bowser's Castle is King Bowser's home and the base of operations
  for the Koopa Troop. Bowser's Castle is the final defense against
  assaults by Mario to kidnap Princess Peach, and is guarded by
  Bowser's most powerful minions. [13]

References
--

 [1] http://tasvideos.org/1715M.html
 [2] http://en.wikipedia.org/wiki/Super_Mario_Bros.
 [3] http://en.wikipedia.org/wiki/Super_Mario_Bros.:_The_Lost_Levels
 [4] http://blog.ksplice.com/wp-content/uploads/2011/04/smb-1985-0001.patch
 [5] http://blog.ksplice.com/wp-content/uploads/2011/04/patch-smb-1985-0001.sh
 [6] http://www.mariowiki.com/Goomba
 [7] http://www.mariowiki.com/Koopa_Troopa
 [8] http://www.mariowiki.com/Bullet_Bill
 [9] http://www.mariowiki.com/Firebar
 [10] http://tvtropes.org/pmwiki/pmwiki.php/Main/YourPrincessIsInAnotherCastle
 [11] http://www.mariowiki.com/Poison_Mushrooms
 [12] http://www.ksplice.com/
 [13] http://www.mariowiki.com/Bowser%27s_Castle

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Whitepaper: Assessing Cloud Node Security

2011-04-01 Thread Context IS - Disclosure
Context Information Security have released a whitepaper on Assessing Cloud Node 
Security.

Synopsis:
Some major Cloud providers currently expose their clients’ data to the risk of 
compromise as a result of serious flaws in the implementation of their 
technologies. This is the key finding of a major new survey of the security of 
Cloud nodes completed by Context Information Security.

The growing trend in migrating systems to use Cloud infrastructure to take 
advantage of the cost savings and flexibility that this form of IT provision 
can offer has caused concern within the security community, because this 
virtual and dynamic environment creates a new threat landscape.

This whitepaper is the result of research undertaken by Context into the 
technical risks associated with Cloud computing infrastructure nodes. Context 
rented a range of Cloud nodes currently offered by the major providers and 
performed a review of their security, including the limitations imposed by 
providers on the types of technical security testing allowed to be performed.

The methodology, results, challenges and recommended mitigations are detailed 
in this whitepaper, which sets out best practices for securing Cloud nodes as 
an end user and will help end users to assess and reduce any associated risk to 
their systems. Information about the general security issues discovered in 
actual Cloud nodes has also been fed back to the providers to enable them to 
resolve these issues. 

Read the whitepaper in full at:
http://www.contextis.co.uk/resources/white-papers/assessing-cloud-node-security/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] WWWroot spring cleaning of neglected files

2011-04-01 Thread TOR

[ Tl;dr: do a cleanup, help create a web-scan jackpot DB ]


Ever temporarily uploaded/moved/created files in a directory accessible from 
the web? How many times have you left them there? Have you ever used a wwwroot 
to transfer DB's (even if through https) from one place to another? Ever used 
short filenames that you thought were kind-of-random for anyone to scan for? 
Read on.

I realize there are many 'web vulnerability scanners' out there with thousands 
of different variations of possibly interesting web queries and such. The 
reason I'm asking you all to contribute with ideas is that...

1) In practice, I found less usable results - especially in a plaintext dump - 
than I expected (including dozens of weblogs).
2) Many of these 'lists' contain too much obsolete junk that makes it 
unrealistic to use in a mass-scan on a larger local network (or the internet, 
which is not my aim by the way).
3) I hope to compile a list of neat locations that do not yet appear in any web 
scanner databases, but are still worth mentioning and looking for.

The best way to contribute would be - after anything valid that comes to mind - 
to go and check out your wwwroots, do a spring cleaning and share whatever file 
or directory name you found and removed that is likely used on other servers 
and could be of interest to an 'attacker'.

Mainly looking for:
- test, backup scripts
- DB/www backups
- source code in general
- temporary dirs for file sharing

Leave out obvious and application-specific stuff (already out there in all 
scanners)
- /admin
- /phpmyadmin
- /robots.txt
- /cgi-bin
- /scripts

Leave out generic ones (that will generate 'false positives' too often)
- /help
- /info
- /stat
- /doc
- /list
- /upload

A few ideas off the top of my head (I expect better from you guys :))
- /intranet
- /backup
- /backup(s).asp/php/py
- /database, /dbase, /dbs, /db, /_db, /save
- /backup.tgz, /backup.tar.gz, /backup.zip, /backup.rar
- /www.tgz, /www.tar.gz, /www.zip, /www.rar
- /db.tgz, /db.tar.gz, /db.zip, /db.rar
- /sql.tgz, /sql.tar.gz, /sql.zip, /sql.rar
- /user.sql, /users.sql, /customer.sql, /db.sql, /data.sql, /dump.sql
- /dump /dump.tgz, /dump.tar.gz, /dump.tgz, /dump.rar
- [hostname].tgz, [hostname].tar.gz, [hostname].zip, [hostname].rar
- /sql, /sqlbackup
- /inc, /include, /includes
- /a, /b, /c etc...
- /1, /2, /3, /4 etc...
- /2000, /2001, /2002, /2003, etc...
- /log.txt, /log, /logs, /weblog, /weblogs
- /zip, /zipfiles
- /htaccess.txt, /htpasswd.txt
- /manage
- /tmp
- /uploads
- /tmp
- /beta
- /test
- /excel, /xls
- /xml
- /www-sql
- /prv, /priv, /privat, /private
- /config, /configs
- /accounts
- /config.inc
- /index.phps
- /moderator, /moderators
- /useradmin, /dbadmin
- /dynamic
- /api
- /employees
- /fileadmin
- /hidden, /secret
- /shadow, /master.passwd, /pwd.db
- /.bash_history, /.history, /.mc, /.ssh
- /work
- /billing
- /auth.txt, /login.txt

After a few good replies and ideas, I would like to see anyone with access to a 
larger network with many webservers to do a scan (legally, of course) and 
provide statistics on success and false positives. I will do the same (unless 
this ends in a big FAIL / trollfest / flamewar - which is no doubt a 
possibility). I am also interested to hear what programs (out of the many) you 
use to scan webservers and why.

My apologies if such a thread has been posted here already or if I'm missing 
something obvious (in any case, links and resources are welcome of course).

Kind regards,
http://tor.hu



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-04-01 Thread Esteban Cañizal
Yes i do agree with you! everybody can comment and disagree as much as
they wish what I am trying to say is that there is a bunch of
people that always complains about the same things that have been
already answered, if you decided you don't like the tool just don't
use it and find a better one, at least that is what i usually do. I
read the same people saying the same things that have been said when
the tool was released (1.0)

-- 
Esteban Cañizal

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ZDI-11-041: (0day) Multiple Browser Node Processing Stack Overflow Vulnerability

2011-04-01 Thread Christian Sciberras
Hahahah.





On Fri, Apr 1, 2011 at 5:28 PM, ZDI Disclosures 
zdi-disclosu...@tippingpoint.com wrote:

 ZDI-11-041: (0day) Multiple Browser Node Processing Stack Overflow
 Vulnerability

 http://www.zerodayinitiative.com/advisories/ZDI-11-911

 April 1, 2011

 -- CVE ID:
 CVE-C000-00FD

 -- CVSS:
 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

 -- Affected Vendors:
 Microsoft
 Google
 Mikul
 Apple
 ISC

 -- Affected Products:
 Microsoft Internet Explorer
 Google Chrome
 Mikul Links
 Apple Safari
 ISC Lynx

 -- Vulnerability Details:
 Multiple vulnerabilities allow remote attackers to remotely terminate
 mission critical web applications on vulnerable installations of Apple
 Safari, Microsoft Internet Explorer, Google Chrome, Mikul Links, and ISC
 Lynx. User interaction is required to exploit this vulnerability in that
 the target must visit a malicious page or open a malicious file.

 The flaws exists within the handling of node attributes, specifically
 nodes with large quantities of attributes or large values within such
 nodes. When handling these objects, several functions are called
 recursively for each value provided defined within. The functions use a
 shared memory region referred to internally as the stack. The size of
 the stack is not properly verified during processing which can result in
 the consumption of all the its available address space. This process is
 extremely exhausting for the application and it cannot continue
 functioning. A remote attacker can exploit this vulnerability to
 terminate web applications under the context of the Internet.

 -- Vendor Response:
 Vendors claimed to be unable to respond due to unexpected browser
 termination upon accessing web form.

 -- Disclosure Timeline:
 2011-04-01 - Vulnerability reported to vendor
 2011-04-01 - Public release of advisory

 -- Credit:
 This vulnerability was discovered by:
* Spencer Pratt

 -- About the Zero Day Initiative (ZDI):
 Established by TippingPoint, The Zero Day Initiative (ZDI) represents
 a best-of-breed model for rewarding security researchers for responsibly
 disclosing discovered vulnerabilities.

 Researchers interested in getting paid for their security research
 through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

 The ZDI is unique in how the acquired vulnerability information is
 used. TippingPoint does not re-sell the vulnerability details or any
 exploit code. Instead, upon notifying the affected product vendor,
 TippingPoint provides its customers with zero day protection through
 its intrusion prevention technology. Explicit details regarding the
 specifics of the vulnerability are not exposed to any parties until
 an official vendor patch is publicly available. Furthermore, with the
 altruistic aim of helping to secure a broader user base, TippingPoint
 provides this vulnerability information confidentially to security
 vendors (including competitors) who have a vulnerability protection or
 mitigation product.

 Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

 Follow the ZDI on Twitter:

http://twitter.com/thezdi

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image for WordPress

2011-04-01 Thread MustLive
Hello Valdis!

The one thing which John didn't missed for sure it's to get into my
blacklist. As I already informed him earlier this day.

Because it's what I always do with e-mails of not serious people. And I drew
attention to it many times last year, but maybe John missed it or just
forgot :-). But from today he'll be certainly know it.

From other side, it's possible that he's celebrating April Fools' Day all
year long ;-). In any case we'll wish him good luck in celebrating the 1st
of April - his favorite and professional holiday.

Best wishes  regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

- Original Message - 
From: valdis.kletni...@vt.edu
To: John Belushae john.belus...@gmail.com
Cc: MustLive mustl...@websecurity.com.ua;
full-disclosure@lists.grok.org.uk
Sent: Friday, April 01, 2011 4:04 PM
Subject: Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image
for WordPress


On Thu, 31 Mar 2011 23:35:50 +1100, John Belushae said:

 I want to warm you about Insufficient Content Filtering on FD.

Dude, you missed by 24 minutes and 10 seconds...


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread Cal Leeming
Yeah, but I still fell for it.. April fools was one of those things that I
kinda grew out of lol, yet the rest of the world still seems to do it..  :S

On Fri, Apr 1, 2011 at 12:30 PM, McGhee, Eddie eddie.mcg...@ncr.com wrote:

 Worst April fools troll evar?

 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk [mailto:
 full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Valery Marchuk
 Sent: 01 April 2011 12:20
 To: full-disclosure@lists.grok.org.uk
 Subject: [Full-disclosure] The US Government Officially Confirms the
 Existence of Extraterrestrial Civilizations

 Hi!
 Tremendous news have recently been published on the official websites of
 NASA and NATO. President of the USA Barak Obama revealed to all mankind that
 the government of the USA along with governments of many other countries
 have been cooperating with extraterrestrial civilizations for almost 40
 years. Owing to this cooperation, the people on Earth were granted the
 access to new technologies, cures for many diseases and the means to reach
 the outer space.

 Right now, the US government possesses 5 cruisers that can travel in
 subspace and reach other galaxies millions light-years away. Barak Obama
 himself assures that that there is no danger coming from the
 extraterrestrial civilizations.

 More information with prooflinks on SecurityLab.ru:

 Russian: http://www.securitylab.ru/news/405274.php

 English: http://www.securitylab.ru/news/405276.php



 BR,

 Valery Marchuk

 www.SecurityLab.ru



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested payload

2011-04-01 Thread Tavis Ormandy
On Fri, Apr 01, 2011 at 05:34:18AM -0400, Jeffrey Walton wrote:
 On Fri, Apr 1, 2011 at 4:00 AM, Tavis Ormandy tav...@cmpxchg8b.com wrote:
  BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested 
  payload
  ---
 
 Isn't this OK as long as the evil bit (RFC 3514) is not set?

I get the joke, but to be clear, this is not an april fools prank :-)

Tavis.

-- 
-
tav...@cmpxchg8b.com | pgp encrypted mail preferred
---

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image for WordPress

2011-04-01 Thread Thor (Hammer of God)
MustLive - just for the record, no one cares about who you blacklist or not.  
No one cares who anyone blacklists.   If you blacklist someone, but then go out 
of your way to publically tell everyone else that you've blacklisted them, you 
sound like a 12 year old yelling last words at someone from behind their 
mommy's door before they slam it. 

Just add them and be done with it...

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of MustLive
Sent: Friday, April 01, 2011 8:54 AM
To: valdis.kletni...@vt.edu
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image for 
WordPress

Hello Valdis!

The one thing which John didn't missed for sure it's to get into my blacklist. 
As I already informed him earlier this day.

Because it's what I always do with e-mails of not serious people. And I drew 
attention to it many times last year, but maybe John missed it or just forgot 
:-). But from today he'll be certainly know it.

From other side, it's possible that he's celebrating April Fools' Day 
all
year long ;-). In any case we'll wish him good luck in celebrating the 1st of 
April - his favorite and professional holiday.

Best wishes  regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

- Original Message -
From: valdis.kletni...@vt.edu
To: John Belushae john.belus...@gmail.com
Cc: MustLive mustl...@websecurity.com.ua; 
full-disclosure@lists.grok.org.uk
Sent: Friday, April 01, 2011 4:04 PM
Subject: Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image for 
WordPress


On Thu, 31 Mar 2011 23:35:50 +1100, John Belushae said:

 I want to warm you about Insufficient Content Filtering on FD.

Dude, you missed by 24 minutes and 10 seconds...


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Plumber Injection Attack in Bowser's Castle

2011-04-01 Thread Dan Kaminsky
Super Mario Brothers 2 is not vulnerable to this exploit, as it does not
ship with a Bowser.

It is possible to use the Plumber to inject Wart, but only during sleep(3).

On Fri, Apr 1, 2011 at 6:59 AM, Nelson Elhage nelh...@ksplice.com wrote:

 Advisory Name: Plumber Injection Attack in Bowser's Castle
  Release Date: 2011-04-01
  Application: Bowser's Castle
 Versions: Super Mario Bros., Super Mario Bros.: The Lost Levels
   Identifier: SMB-1985-0001
 Advisory: http://blog.ksplice.com/2011/04/smb-1985-0001-advisory/

 ---

 Vulnerability Overview
 --

  Multiple versions of Bowser's Castle are vulnerable to a plumber injection
  attack. An Italian plumber could exploit this bug to bypass security
 measures
  (walk through walls) in order to rescue Peach, to defeat Bowser, or for
  unspecified other impact.

 Exploit
 ---

  http://www.youtube.com/watch?v=rGshxZ1dYjA

  This vulnerability is demonstrated by
  happylee-supermariobros,warped.fm2 [1]. Attacks using this
  exploit have been observed in the wild, and multiple other exploits
  are publicly available.

 Affected Versions
 -

  Versions of Bowser's Castle as shipped in Super Mario Bros. [2] and Super
  Mario Bros.: The Lost Levels [3] are affected.

 Solution
 

  http://www.youtube.com/watch?v=nacFU7ozeZA

  An independently developed patch [4] is available.

  A binary hot patch [5] to apply the update to an existing version is also
  available.

  All users are advised to upgrade.

 Mitigations
 ---

  For users unable to apply the recommended fix, a number of
  mitigations are possible to reduce the impact of the vulnerability.

  NOTE THAT NO MITIGATION IS BELIEVED TO BE COMPLETELY EFFECTIVE.

  Potential mitigations include:

  - Employing standard defense-in-depth strategies incorporating
multiple layers of defense, including Goombas [6], Koopa Troopas [7],
Bullet Bills [8], and others.
  - Installing poison mushrooms outside your castle [9].
  - Installing a firewall to limit access to affected systems. [10]
  - Frequently moving your princess between different castles [11].

 Credit
 --

  The vulnerability was originally discovered by Mario and Luigi, of Mario
  Bros. Security Research.

  The provided patch and this advisory were prepared by Lakitu Cloud
  Security, Inc. The hot patch was developed in collaboration with
  Ksplice, Inc. [12]

 Product Overview
 

  Bowser's Castle is King Bowser's home and the base of operations
  for the Koopa Troop. Bowser's Castle is the final defense against
  assaults by Mario to kidnap Princess Peach, and is guarded by
  Bowser's most powerful minions. [13]

 References
 --

  [1] http://tasvideos.org/1715M.html
  [2] http://en.wikipedia.org/wiki/Super_Mario_Bros.
  [3] http://en.wikipedia.org/wiki/Super_Mario_Bros.:_The_Lost_Levels
  [4]
 http://blog.ksplice.com/wp-content/uploads/2011/04/smb-1985-0001.patch
  [5]
 http://blog.ksplice.com/wp-content/uploads/2011/04/patch-smb-1985-0001.sh
  [6] http://www.mariowiki.com/Goomba
  [7] http://www.mariowiki.com/Koopa_Troopa
  [8] http://www.mariowiki.com/Bullet_Bill
  [9] http://www.mariowiki.com/Firebar
  [10]
 http://tvtropes.org/pmwiki/pmwiki.php/Main/YourPrincessIsInAnotherCastle
  [11] http://www.mariowiki.com/Poison_Mushrooms
  [12] http://www.ksplice.com/
  [13] http://www.mariowiki.com/Bowser%27s_Castle

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Vulnerabilities in MaxSite Anti Spam Image for WordPress

2011-04-01 Thread Григорий Братислава
  Is hello full disclosure!!

  Is you see ! is call explanation mark is mean that I is mean
business!! I is like to warn you about blacklisting. Blacklisting is
really racialist!! In is early America, we is make fun of is people
like Snoop Dogg. Is was talk down to them: nigger go is clean up that
shit and is American paint face to mimic this and is call is this
Blackface. (http://en.wikipedia.org/wiki/Blackface) Is blacklist
originally is start from list of blackies in is written down. Meaning,
whities is say: is you see that nigger Nobama right there. Blacklist
is his ass and make is him clean the toilets. Then is go paint your
face and is act like him. Just is make sure is that is blacklisted.

  Is no polite to blacklist. Apologies to Thor, Valdis and others is
for Must Live. Must Live: Не мудак повинні жити

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Plumber Injection Attack in Bowser's Castle

2011-04-01 Thread Zach C.
Lakitu Cloud Security, Inc. Heh. That is an awesome company name actually.

On Apr 1, 2011 8:46 AM, Nelson Elhage nelh...@ksplice.com wrote:
 Advisory Name: Plumber Injection Attack in Bowser's Castle
 Release Date: 2011-04-01
 Application: Bowser's Castle
 Versions: Super Mario Bros., Super Mario Bros.: The Lost Levels
 Identifier: SMB-1985-0001
 Advisory: http://blog.ksplice.com/2011/04/smb-1985-0001-advisory/

 ---

 Vulnerability Overview
 --

 Multiple versions of Bowser's Castle are vulnerable to a plumber injection
 attack. An Italian plumber could exploit this bug to bypass security
measures
 (walk through walls) in order to rescue Peach, to defeat Bowser, or for
 unspecified other impact.

 Exploit
 ---

 http://www.youtube.com/watch?v=rGshxZ1dYjA

 This vulnerability is demonstrated by
 happylee-supermariobros,warped.fm2 [1]. Attacks using this
 exploit have been observed in the wild, and multiple other exploits
 are publicly available.

 Affected Versions
 -

 Versions of Bowser's Castle as shipped in Super Mario Bros. [2] and Super
 Mario Bros.: The Lost Levels [3] are affected.

 Solution
 

 http://www.youtube.com/watch?v=nacFU7ozeZA

 An independently developed patch [4] is available.

 A binary hot patch [5] to apply the update to an existing version is also
 available.

 All users are advised to upgrade.

 Mitigations
 ---

 For users unable to apply the recommended fix, a number of
 mitigations are possible to reduce the impact of the vulnerability.

 NOTE THAT NO MITIGATION IS BELIEVED TO BE COMPLETELY EFFECTIVE.

 Potential mitigations include:

 - Employing standard defense-in-depth strategies incorporating
 multiple layers of defense, including Goombas [6], Koopa Troopas [7],
 Bullet Bills [8], and others.
 - Installing poison mushrooms outside your castle [9].
 - Installing a firewall to limit access to affected systems. [10]
 - Frequently moving your princess between different castles [11].

 Credit
 --

 The vulnerability was originally discovered by Mario and Luigi, of Mario
 Bros. Security Research.

 The provided patch and this advisory were prepared by Lakitu Cloud
 Security, Inc. The hot patch was developed in collaboration with
 Ksplice, Inc. [12]

 Product Overview
 

 Bowser's Castle is King Bowser's home and the base of operations
 for the Koopa Troop. Bowser's Castle is the final defense against
 assaults by Mario to kidnap Princess Peach, and is guarded by
 Bowser's most powerful minions. [13]

 References
 --

 [1] http://tasvideos.org/1715M.html
 [2] http://en.wikipedia.org/wiki/Super_Mario_Bros.
 [3] http://en.wikipedia.org/wiki/Super_Mario_Bros.:_The_Lost_Levels
 [4] http://blog.ksplice.com/wp-content/uploads/2011/04/smb-1985-0001.patch
 [5]
http://blog.ksplice.com/wp-content/uploads/2011/04/patch-smb-1985-0001.sh
 [6] http://www.mariowiki.com/Goomba
 [7] http://www.mariowiki.com/Koopa_Troopa
 [8] http://www.mariowiki.com/Bullet_Bill
 [9] http://www.mariowiki.com/Firebar
 [10]
http://tvtropes.org/pmwiki/pmwiki.php/Main/YourPrincessIsInAnotherCastle
 [11] http://www.mariowiki.com/Poison_Mushrooms
 [12] http://www.ksplice.com/
 [13] http://www.mariowiki.com/Bowser%27s_Castle

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] INSECT Pro 2.5 Release - Web scanner tool

2011-04-01 Thread Mario Vilas
Actually, when the tool was originally released it wasn't free (strings
attached or not), but they tried to charge $500 per license as a closed
source product.

http://seclists.org/fulldisclosure/2010/Sep/283

So at any rate some people have been complaining over and over for the use
of the word free since version 2.0.

http://seclists.org/fulldisclosure/2011/Jan/504

BTW I do not mind people making yet another UI for Metasploit, but this
free but not free thing creates a dishonest image that could have easily
been avoided by following the same practice every other donationware
follows: let users download it freely and decide whether to donate or not
based on their experience with the software.

On Fri, Apr 1, 2011 at 12:36 PM, Esteban Cañizal este...@canizal.com.arwrote:

 Yes i do agree with you! everybody can comment and disagree as much as
 they wish what I am trying to say is that there is a bunch of
 people that always complains about the same things that have been
 already answered, if you decided you don't like the tool just don't
 use it and find a better one, at least that is what i usually do. I
 read the same people saying the same things that have been said when
 the tool was released (1.0)

 --
 Esteban Cañizal

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
“My daughter was asked by a little old lady in a London hotel restaurant
what her daddy did - she answered, ‘He’s a pirate.’ I was very proud of that
answer.”
- *Johnny Depp*
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Microsoft VISTA TCP/IP heap buffer underflow

2011-04-01 Thread J. Oquendo

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Microsoft VISTA TCP/IP heap buffer underflow

Summary
- -
Microsoft Device IO Control wrapped by an API shipping with Windows
Vista 32 bit and 64 bit contains a possibly exploitable, buffer
underflow corrupting kernel memory.


Affected Systems
- -

Using the sample proof of concept, it was possible to verify this
issue on following operating systems and configurations:

* Microsoft Windows Vista Ultimate 32 bit

It is very likely that other versions of Windows Vista are affected by
this issue.

This issue did not occur on Windows XP, Windows 2003 Advanced Server,
Windows 2008 Server nor Windows Millenium Edition

Re-installation of Service Pack 1 and/or upgrading to SP2 had any
effect in regards to resolve the random crashes.

To execute either the sample program or any other system command, the
user has to be either the admin, in the admin group or the
Administrators group.

Since this buffer underflow never makes it to kernel memory, it could
be possible that propping up the underflow will make it overflow and
take control over the operating system without any restriction.

Remedy
- 
No remedy available at this time.

Reported
- 
This vulnerability is being reported now


Relevant
- 
934b7a5c 85aa6fe4  934b7ac4 837100ee
tcpip!IppCreateUnicastRoute+0xf0
934b7ae8 85a5d121 0001 858b6278 84d74ce8
tcpip!IppValidateSetAllRouteParameters+0x217
934b7b64 85a18a29 836c134c  92a84a70
tcpip!Ipv4SetAllRouteParameters+0x1d1
934b7ba4 8a844551 0001 92a326b4 
NETIO!NsiSetAllParametersEx+0xbd
934b7bf0 8a844eb8  836c1330 836c1378
nsiproxy!NsippSetAllParameters+0x1b1
934b7c14 8a844f91 92a32601  8371d290
nsiproxy!NsippDispatchDeviceControl+0x88
934b7c2c 818f0053 8590b448 92a32698 92a32698 nsiproxy!NsippDispatch+0x33
934b7c44 81a80515 8371d290 92a32698 92a32708 nt!IofCallDriver+0x63
934b7c64 81a80cba 8590b448 8371d290 0027f700
nt!IopSynchronousServiceTail+0x1d9
934b7d00 81a6a98e 8590b448 92a32698  nt!IopXxxControlFile+0x6b7
934b7d34 8188ba7a 0044 0048  nt!NtDeviceIoControlFile+0x2a
934b7d34 77529a94 0044 0048  nt!KiFastCallEntry+0x12a
0027f68c 77528444 777214b9 0044 0048 ntdll!KiFastSystemCallRet
0027f690 777214b9 0044 0048 
ntdll!ZwDeviceIoControlFile+0xc

 Disassembly with commands 

mov edi,edi
push ebp
mov ebp,esp
push edi
mov edi,dword ptr [ebp+8]
lea eax,[ebp+8]
push eax
push dword ptr [edi+4]
push 18h
call NOMNOM!RtlULongAdd (85a1675d)
test eax,eax
jl OMNOM!PtpCreateNOM+0x1b
push esi
push 74704D4Eh
push dword ptr [ebp+8] ; = 0x0020
push 0
call ExAllocatePoolWithTag ; eax = ExAllocatePoolWithTag(0, 0x20,
0x74704D4E, esi);
mov esi,eax ; = 0x83716380 allocated buffer address
test esi,esi
je NOM!CreateOMNOM+0x6d
push dword ptr [ebp+8] ; = 0x0020
push 0
push esi ; 0x83716380 allocated buffer address
call NOM!memset (85a10543) ; memset((char*)0x83716380, 0, 0x20)
mov eax,dword ptr [ebp+14h]
mov dword ptr [esi],eax
mov eax,dword ptr [ebp+18h]
mov dword ptr [esi+0Ch],eax
mov dword ptr [eax],esi
mov eax,dword ptr [ebp+0Ch]
and word ptr [esi+14h],0
add esp,0Ch
push eax ; = 0x837100ee
lea eax,[esi+18h] ; esi unchanged, holds the alloc. buffer address
(=0x83716380)
push eax ; = 0x83716398 add offset of 0x18 bytes to the allocated buffer
inc dword ptr [edi+8]
mov eax,esi
pop esi
pop edi
pop ebp
ret 14h
nop
nop
nop
om
nom
nom


- -- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 
iD8DBQFNlhDEK/fYPyEKla8RAnWXAJ0XaB/D0Cd0eYt+6Vd00Tx6RYsRmQCfWwGk
QGt6mpCUiDKXxhCdg5xpi7M=
=pjws
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft VISTA TCP/IP heap buffer underflow

2011-04-01 Thread Thor (Hammer of God)
Just so that I understand correctly, are you reporting that if one is logged on 
as the administrator, it may be possible to execute this exploit in order to 
take over the machine?

t

-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of J. Oquendo
Sent: Friday, April 01, 2011 10:52 AM
To: bugt...@securityfocus.com
Cc: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] Microsoft VISTA TCP/IP heap buffer underflow


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Microsoft VISTA TCP/IP heap buffer underflow

Summary
- -
Microsoft Device IO Control wrapped by an API shipping with Windows Vista 32 
bit and 64 bit contains a possibly exploitable, buffer underflow corrupting 
kernel memory.


Affected Systems
- -

Using the sample proof of concept, it was possible to verify this issue on 
following operating systems and configurations:

* Microsoft Windows Vista Ultimate 32 bit

It is very likely that other versions of Windows Vista are affected by this 
issue.

This issue did not occur on Windows XP, Windows 2003 Advanced Server, Windows 
2008 Server nor Windows Millenium Edition

Re-installation of Service Pack 1 and/or upgrading to SP2 had any effect in 
regards to resolve the random crashes.

To execute either the sample program or any other system command, the user has 
to be either the admin, in the admin group or the Administrators group.

Since this buffer underflow never makes it to kernel memory, it could be 
possible that propping up the underflow will make it overflow and take control 
over the operating system without any restriction.

Remedy
- 
No remedy available at this time.

Reported
- 
This vulnerability is being reported now


Relevant
- 
934b7a5c 85aa6fe4  934b7ac4 837100ee
tcpip!IppCreateUnicastRoute+0xf0
934b7ae8 85a5d121 0001 858b6278 84d74ce8
tcpip!IppValidateSetAllRouteParameters+0x217
934b7b64 85a18a29 836c134c  92a84a70
tcpip!Ipv4SetAllRouteParameters+0x1d1
934b7ba4 8a844551 0001 92a326b4  NETIO!NsiSetAllParametersEx+0xbd
934b7bf0 8a844eb8  836c1330 836c1378
nsiproxy!NsippSetAllParameters+0x1b1
934b7c14 8a844f91 92a32601  8371d290
nsiproxy!NsippDispatchDeviceControl+0x88
934b7c2c 818f0053 8590b448 92a32698 92a32698 nsiproxy!NsippDispatch+0x33
934b7c44 81a80515 8371d290 92a32698 92a32708 nt!IofCallDriver+0x63
934b7c64 81a80cba 8590b448 8371d290 0027f700
nt!IopSynchronousServiceTail+0x1d9
934b7d00 81a6a98e 8590b448 92a32698  nt!IopXxxControlFile+0x6b7
934b7d34 8188ba7a 0044 0048  nt!NtDeviceIoControlFile+0x2a
934b7d34 77529a94 0044 0048  nt!KiFastCallEntry+0x12a 0027f68c 
77528444 777214b9 0044 0048 ntdll!KiFastSystemCallRet
0027f690 777214b9 0044 0048  ntdll!ZwDeviceIoControlFile+0xc

 Disassembly with commands 

mov edi,edi
push ebp
mov ebp,esp
push edi
mov edi,dword ptr [ebp+8]
lea eax,[ebp+8]
push eax
push dword ptr [edi+4]
push 18h
call NOMNOM!RtlULongAdd (85a1675d)
test eax,eax
jl OMNOM!PtpCreateNOM+0x1b
push esi
push 74704D4Eh
push dword ptr [ebp+8] ; = 0x0020
push 0
call ExAllocatePoolWithTag ; eax = ExAllocatePoolWithTag(0, 0x20, 0x74704D4E, 
esi); mov esi,eax ; = 0x83716380 allocated buffer address test esi,esi je 
NOM!CreateOMNOM+0x6d push dword ptr [ebp+8] ; = 0x0020 push 0 push esi ; 
0x83716380 allocated buffer address call NOM!memset (85a10543) ; 
memset((char*)0x83716380, 0, 0x20) mov eax,dword ptr [ebp+14h] mov dword ptr 
[esi],eax mov eax,dword ptr [ebp+18h] mov dword ptr [esi+0Ch],eax mov dword ptr 
[eax],esi mov eax,dword ptr [ebp+0Ch] and word ptr [esi+14h],0 add esp,0Ch push 
eax ; = 0x837100ee lea eax,[esi+18h] ; esi unchanged, holds the alloc. buffer 
address
(=0x83716380)
push eax ; = 0x83716398 add offset of 0x18 bytes to the allocated buffer inc 
dword ptr [edi+8] mov eax,esi pop esi pop edi pop ebp ret 14h nop nop nop om 
nom nom


- -- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT, RWSP

It takes 20 years to build a reputation and five minutes to ruin it. If you 
think about that, you'll do things differently. - Warren Buffett

42B0 5A53 6505 6638 44BB  3943 2BF7 D83F 210A 95AF 
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x2BF7D83F210A95AF
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 
iD8DBQFNlhDEK/fYPyEKla8RAnWXAJ0XaB/D0Cd0eYt+6Vd00Tx6RYsRmQCfWwGk
QGt6mpCUiDKXxhCdg5xpi7M=
=pjws
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in 

[Full-disclosure] [ MDVSA-2011:059 ] ffmpeg

2011-04-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:059
 http://www.mandriva.com/security/
 ___

 Package : ffmpeg
 Date: April 1, 2011
 Affected: Corporate 4.0
 ___

 Problem Description:

 Multiple vulnerabilities has been identified and fixed in ffmpeg:
 
 Multiple integer underflows in FFmpeg 0.5 allow remote attackers to
 cause a denial of service and possibly execute arbitrary code via a
 crafted file that (1) bypasses a validation check in vorbis_dec.c
 and triggers a wraparound of the stack pointer, or (2) access a
 pointer from out-of-bounds memory in mov.c, related to an elst tag
 that appears before a tag that creates a stream. (CVE-2009-4634)
 
 FFmpeg 0.5 allows remote attackers to cause a denial of service and
 possibly execute arbitrary code via a crafted MOV container with
 improperly ordered tags that cause (1) mov.c and (2) utils.c to use
 inconsistent codec types and identifiers, which causes the mp3 decoder
 to process a pointer for a video structure, leading to a stack-based
 buffer overflow. (CVE-2009-4635)
 
 The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows
 remote attackers to cause a denial of service (crash) via a crafted
 AVI file that triggers a divide-by-zero error. (CVE-2009-4639)
 
 And several additional vulnerabilites originally discovered by Google
 Chrome developers were also fixed with this advisory.
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4634
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4635
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4639
 ___

 Updated Packages:

 Corporate 4.0:
 91862db1638f9bf513cba7b9896255f7  
corporate/4.0/i586/ffmpeg-0.4.9-0.pre1.5.5.20060mlcs4.i586.rpm
 db9ae743d2044534563de66c42f78682  
corporate/4.0/i586/libffmpeg0-0.4.9-0.pre1.5.5.20060mlcs4.i586.rpm
 22c09e614168dc4f18ca7bfc2a47a01d  
corporate/4.0/i586/libffmpeg0-devel-0.4.9-0.pre1.5.5.20060mlcs4.i586.rpm 
 9a07a4bbf39f8d290bf3b3525fc6c3a5  
corporate/4.0/SRPMS/ffmpeg-0.4.9-0.pre1.5.5.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 0446e21fde8d89c0da889306c462908a  
corporate/4.0/x86_64/ffmpeg-0.4.9-0.pre1.5.5.20060mlcs4.x86_64.rpm
 56242d230f030635f231d25f74ee8e10  
corporate/4.0/x86_64/lib64ffmpeg0-0.4.9-0.pre1.5.5.20060mlcs4.x86_64.rpm
 baf11eccdec3db1aab931626d4bf1ef8  
corporate/4.0/x86_64/lib64ffmpeg0-devel-0.4.9-0.pre1.5.5.20060mlcs4.x86_64.rpm 
 9a07a4bbf39f8d290bf3b3525fc6c3a5  
corporate/4.0/SRPMS/ffmpeg-0.4.9-0.pre1.5.5.20060mlcs4.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNlfE7mqjQ0CJFipgRAjShAJ9+WFp0MtozRAP8nICGyv0wIwlrxwCgtHtq
uF+AD+fmE89UMwnzAiWiSkE=
=pNTn
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ZDI-11-041: (0day) Multiple Browser Node Processing Stack Overflow Vulnerability

2011-04-01 Thread McGhee, Eddie
I bet heidi did all the LEG work.. heh
Eddie McGhee
Retail TSS GB114/GB115/GB116
NCR Corporation
phone: +44 (0) 1698 838068
eddie.mcg...@ncr.commailto:eddie.mcg...@ncr.com | 
www.ncr.comhttp://www.ncr.com/



From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Christian 
Sciberras
Sent: 01 April 2011 16:43
To: ZDI Disclosures
Cc: full-disclosure@lists.grok.org.uk; bugt...@securityfocus.com
Subject: Re: [Full-disclosure] ZDI-11-041: (0day) Multiple Browser Node 
Processing Stack Overflow Vulnerability

Hahahah.





On Fri, Apr 1, 2011 at 5:28 PM, ZDI Disclosures 
zdi-disclosu...@tippingpoint.commailto:zdi-disclosu...@tippingpoint.com 
wrote:
ZDI-11-041: (0day) Multiple Browser Node Processing Stack Overflow Vulnerability

http://www.zerodayinitiative.com/advisories/ZDI-11-911

April 1, 2011

-- CVE ID:
CVE-C000-00FD

-- CVSS:
9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

-- Affected Vendors:
Microsoft
Google
Mikul
Apple
ISC

-- Affected Products:
Microsoft Internet Explorer
Google Chrome
Mikul Links
Apple Safari
ISC Lynx

-- Vulnerability Details:
Multiple vulnerabilities allow remote attackers to remotely terminate
mission critical web applications on vulnerable installations of Apple
Safari, Microsoft Internet Explorer, Google Chrome, Mikul Links, and ISC
Lynx. User interaction is required to exploit this vulnerability in that
the target must visit a malicious page or open a malicious file.

The flaws exists within the handling of node attributes, specifically
nodes with large quantities of attributes or large values within such
nodes. When handling these objects, several functions are called
recursively for each value provided defined within. The functions use a
shared memory region referred to internally as the stack. The size of
the stack is not properly verified during processing which can result in
the consumption of all the its available address space. This process is
extremely exhausting for the application and it cannot continue
functioning. A remote attacker can exploit this vulnerability to
terminate web applications under the context of the Internet.

-- Vendor Response:
Vendors claimed to be unable to respond due to unexpected browser termination 
upon accessing web form.

-- Disclosure Timeline:
2011-04-01 - Vulnerability reported to vendor
2011-04-01 - Public release of advisory

-- Credit:
This vulnerability was discovered by:
   * Spencer Pratt

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

   http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

   http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

   http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread Dan Becker
Talk about food for the birthers

- Message from teckl...@securitylab.ru -
 Date: Fri, 1 Apr 2011 13:50:13 +0300
 From: Valery Marchuk teckl...@securitylab.ru
  Subject: [Full-disclosure] The US Government Officially Confirms the  
Existence of Extraterrestrial Civilizations
   To: full-disclosure@lists.grok.org.uk


 Hi!
 Tremendous news have recently been published on the official websites of
 NASA and NATO. President of the USA Barak Obama revealed to all mankind that
 the government of the USA along with governments of many other countries
 have been cooperating with extraterrestrial civilizations for almost 40
 years. Owing to this cooperation, the people on Earth were granted the
 access to new technologies, cures for many diseases and the means to reach
 the outer space.

 Right now, the US government possesses 5 cruisers that can travel in
 subspace and reach other galaxies millions light-years away. Barak Obama
 himself assures that that there is no danger coming from the
 extraterrestrial civilizations.

 More information with prooflinks on SecurityLab.ru:

 Russian: http://www.securitylab.ru/news/405274.php

 English: http://www.securitylab.ru/news/405276.php



 BR,

 Valery Marchuk

 www.SecurityLab.ru



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



- End message from teckl...@securitylab.ru -



--Dan

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2011:060 ] ffmpeg

2011-04-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:060
 http://www.mandriva.com/security/
 ___

 Package : ffmpeg
 Date: April 1, 2011
 Affected: 2009.0, Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities has been identified and fixed in ffmpeg:
 
 oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain
 pointer arithmetic, which might allow remote attackers to obtain
 sensitive memory contents and cause a denial of service via a crafted
 file that triggers an out-of-bounds read. (CVE-2009-4632)
 
 vorbis_dec.c in FFmpeg 0.5 uses an assignment operator when a
 comparison operator was intended, which might allow remote attackers
 to cause a denial of service and possibly execute arbitrary code via
 a crafted file that modifies a loop counter and triggers a heap-based
 buffer overflow. (CVE-2009-4633)
 
 Multiple integer underflows in FFmpeg 0.5 allow remote attackers to
 cause a denial of service and possibly execute arbitrary code via a
 crafted file that (1) bypasses a validation check in vorbis_dec.c
 and triggers a wraparound of the stack pointer, or (2) access a
 pointer from out-of-bounds memory in mov.c, related to an elst tag
 that appears before a tag that creates a stream. (CVE-2009-4634)
 
 FFmpeg 0.5 allows remote attackers to cause a denial of service and
 possibly execute arbitrary code via a crafted MOV container with
 improperly ordered tags that cause (1) mov.c and (2) utils.c to use
 inconsistent codec types and identifiers, which causes the mp3 decoder
 to process a pointer for a video structure, leading to a stack-based
 buffer overflow. (CVE-2009-4635)
 
 The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows
 remote attackers to cause a denial of service (crash) via a crafted
 AVI file that triggers a divide-by-zero error. (CVE-2009-4639)
 
 Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote
 attackers to cause a denial of service and possibly execute arbitrary
 code via a crafted Vorbis file that triggers an out-of-bounds
 read. (CVE-2009-4640)
 
 flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer
 and other products, allows remote attackers to execute arbitrary code
 via a crafted flic file, related to an arbitrary offset dereference
 vulnerability. (CVE-2010-3429)
 
 libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg 0.6.1
 and earlier allows remote attackers to cause a denial of service
 (application crash) via a crafted .ogg file, related to the
 vorbis_floor0_decode function. (CVE-2010-4704)
 
 And several additional vulnerabilites originally discovered by Google
 Chrome developers were also fixed with this advisory.
 
 Packages for 2009.0 are provided as of the Extended Maintenance
 Program. Please visit this link to learn more:
 http://store.mandriva.com/product_info.php?cPath=149amp;products_id=490
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4632
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4633
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4634
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4635
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4639
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4640
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3429
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4704
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 35b8598a8ba305854c81884350072070  
2009.0/i586/ffmpeg-0.4.9-3.pre1.14161.1.4mdv2009.0.i586.rpm
 537c6ed300c14bd4c6dac8b9ea98349a  
2009.0/i586/libavformats52-0.4.9-3.pre1.14161.1.4mdv2009.0.i586.rpm
 847b11c0bb86959f9712cb2beced7648  
2009.0/i586/libavutil49-0.4.9-3.pre1.14161.1.4mdv2009.0.i586.rpm
 6bad47923019bdd3e17209956955919e  
2009.0/i586/libffmpeg51-0.4.9-3.pre1.14161.1.4mdv2009.0.i586.rpm
 c49eeeda4be62fdcc57b0b42eff2005b  
2009.0/i586/libffmpeg-devel-0.4.9-3.pre1.14161.1.4mdv2009.0.i586.rpm
 c06661882ab8613b23712898751856af  
2009.0/i586/libffmpeg-static-devel-0.4.9-3.pre1.14161.1.4mdv2009.0.i586.rpm
 a9ef39faaa7a3054c846471ed95510a1  
2009.0/i586/libswscaler0-0.4.9-3.pre1.14161.1.4mdv2009.0.i586.rpm 
 c8cf3cef711e1a6d51bcb666030e1f42  
2009.0/SRPMS/ffmpeg-0.4.9-3.pre1.14161.1.4mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 03d2549605505e1c22ebb95d83b2657b  
2009.0/x86_64/ffmpeg-0.4.9-3.pre1.14161.1.4mdv2009.0.x86_64.rpm
 b4e51f531b91947b68224adb0b7da78b  
2009.0/x86_64/lib64avformats52-0.4.9-3.pre1.14161.1.4mdv2009.0.x86_64.rpm
 304a2ba3024d20e6c61d499d9d77daa0  

[Full-disclosure] [ MDVSA-2011:061 ] ffmpeg

2011-04-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:061
 http://www.mandriva.com/security/
 ___

 Package : ffmpeg
 Date: April 1, 2011
 Affected: 2010.0
 ___

 Problem Description:

 Multiple vulnerabilities has been identified and fixed in ffmpeg:
 
 oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain
 pointer arithmetic, which might allow remote attackers to obtain
 sensitive memory contents and cause a denial of service via a crafted
 file that triggers an out-of-bounds read. (CVE-2009-4632)
 
 vorbis_dec.c in FFmpeg 0.5 uses an assignment operator when a
 comparison operator was intended, which might allow remote attackers
 to cause a denial of service and possibly execute arbitrary code via
 a crafted file that modifies a loop counter and triggers a heap-based
 buffer overflow. (CVE-2009-4633)
 
 Multiple integer underflows in FFmpeg 0.5 allow remote attackers to
 cause a denial of service and possibly execute arbitrary code via a
 crafted file that (1) bypasses a validation check in vorbis_dec.c
 and triggers a wraparound of the stack pointer, or (2) access a
 pointer from out-of-bounds memory in mov.c, related to an elst tag
 that appears before a tag that creates a stream. (CVE-2009-4634)
 
 FFmpeg 0.5 allows remote attackers to cause a denial of service and
 possibly execute arbitrary code via a crafted MOV container with
 improperly ordered tags that cause (1) mov.c and (2) utils.c to use
 inconsistent codec types and identifiers, which causes the mp3 decoder
 to process a pointer for a video structure, leading to a stack-based
 buffer overflow. (CVE-2009-4635)
 
 FFmpeg 0.5 allows remote attackers to cause a denial of service (hang)
 via a crafted file that triggers an infinite loop. (CVE-2009-4636)
 
 The av_rescale_rnd function in the AVI demuxer in FFmpeg 0.5 allows
 remote attackers to cause a denial of service (crash) via a crafted
 AVI file that triggers a divide-by-zero error. (CVE-2009-4639)
 
 Array index error in vorbis_dec.c in FFmpeg 0.5 allows remote
 attackers to cause a denial of service and possibly execute arbitrary
 code via a crafted Vorbis file that triggers an out-of-bounds
 read. (CVE-2009-4640)
 
 flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer
 and other products, allows remote attackers to execute arbitrary code
 via a crafted flic file, related to an arbitrary offset dereference
 vulnerability. (CVE-2010-3429)
 
 Fix memory corruption in WMV parsing (CVE-2010-3908)
 
 libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg 0.6.1
 and earlier allows remote attackers to cause a denial of service
 (application crash) via a crafted .ogg file, related to the
 vorbis_floor0_decode function. (CVE-2010-4704)
 
 Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder
 in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome
 OS before 8.0.552.344, allow remote attackers to cause a denial of
 service (memory corruption and application crash) or possibly have
 unspecified other impact via a crafted WebM file, related to buffers
 for (1) the channel floor and (2) the channel residue. (CVE-2011-0480)
 
 Fix heap corruption crashes (CVE-2011-0722)
 
 Fix invalid reads in VC-1 decoding (CVE-2011-0723)
 
 And several additional vulnerabilites originally discovered by Google
 Chrome developers were also fixed with this advisory.
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4632
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4633
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4634
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4635
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4636
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4639
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4640
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3429
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3908
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4704
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0480
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0722
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0723
 ___

 Updated Packages:

 Mandriva Linux 2010.0:
 6b1e936c3c14b4ecdfb8760cfde7ce11  
2010.0/i586/ffmpeg-0.5.4-0.1mdv2010.0.i586.rpm
 92fd61671352949e0cb90931fa8addd8  
2010.0/i586/libavformats52-0.5.4-0.1mdv2010.0.i586.rpm
 aa5eff0402855d3702e3fda5f0c38d13  
2010.0/i586/libavutil49-0.5.4-0.1mdv2010.0.i586.rpm
 

[Full-disclosure] [ MDVSA-2011:062 ] ffmpeg

2011-04-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:062
 http://www.mandriva.com/security/
 ___

 Package : ffmpeg
 Date: April 1, 2011
 Affected: 2010.1
 ___

 Problem Description:

 Multiple vulnerabilities has been identified and fixed in ffmpeg:
 
 FFmpeg 0.5 allows remote attackers to cause a denial of service (hang)
 via a crafted file that triggers an infinite loop. (CVE-2009-4636)
 
 flicvideo.c in libavcodec 0.6 and earlier in FFmpeg, as used in MPlayer
 and other products, allows remote attackers to execute arbitrary code
 via a crafted flic file, related to an arbitrary offset dereference
 vulnerability. (CVE-2010-3429)
 
 libavcodec/vorbis_dec.c in the Vorbis decoder in FFmpeg 0.6.1
 and earlier allows remote attackers to cause a denial of service
 (application crash) via a crafted .ogg file, related to the
 vorbis_floor0_decode function. (CVE-2010-4704)
 
 Fix heap corruption crashes (CVE-2011-0722)
 
 Fix invalid reads in VC-1 decoding (CVE-2011-0723)
 
 And several additional vulnerabilites originally discovered by Google
 Chrome developers were also fixed with this advisory.
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4636
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3429
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4704
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0722
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0723
 ___

 Updated Packages:

 Mandriva Linux 2010.1:
 b4db9e819fe581e61ad59225fe630a25  
2010.1/i586/ffmpeg-0.6-0.22960.5.1mdv2010.2.i586.rpm
 b2ba7998b8549d1a0434d51ff76ddfed  
2010.1/i586/libavformats52-0.6-0.22960.5.1mdv2010.2.i586.rpm
 ce8964529073304413e3591f8d0de20b  
2010.1/i586/libavutil50-0.6-0.22960.5.1mdv2010.2.i586.rpm
 da9b5200a498933bd3a1e5e000937a90  
2010.1/i586/libffmpeg52-0.6-0.22960.5.1mdv2010.2.i586.rpm
 64a5a0c59fba081b54f7538fd658f66f  
2010.1/i586/libffmpeg-devel-0.6-0.22960.5.1mdv2010.2.i586.rpm
 e6fa096ebf765e1258a13bd578a8de68  
2010.1/i586/libffmpeg-static-devel-0.6-0.22960.5.1mdv2010.2.i586.rpm
 4cc7830f9684161826518db3077ca207  
2010.1/i586/libpostproc51-0.6-0.22960.5.1mdv2010.2.i586.rpm
 be1e63a9da0a1b48308390ce48dc30cb  
2010.1/i586/libswscaler0-0.6-0.22960.5.1mdv2010.2.i586.rpm 
 87155585e9ad3413d3210489a539a62f  
2010.1/SRPMS/ffmpeg-0.6-0.22960.5.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 f26e9389ab90769c9d41379063b44052  
2010.1/x86_64/ffmpeg-0.6-0.22960.5.1mdv2010.2.x86_64.rpm
 c1f7175cad48f46cfdd2b0d57c5f1d82  
2010.1/x86_64/lib64avformats52-0.6-0.22960.5.1mdv2010.2.x86_64.rpm
 da8802f10ae716e344a85d27061716e2  
2010.1/x86_64/lib64avutil50-0.6-0.22960.5.1mdv2010.2.x86_64.rpm
 abe637a5f54bf30b8738bc77d3a505cd  
2010.1/x86_64/lib64ffmpeg52-0.6-0.22960.5.1mdv2010.2.x86_64.rpm
 528f1d86498f7c6d975aaa58c30715d6  
2010.1/x86_64/lib64ffmpeg-devel-0.6-0.22960.5.1mdv2010.2.x86_64.rpm
 c77efb105b06ee700d1094e0f468bc6d  
2010.1/x86_64/lib64ffmpeg-static-devel-0.6-0.22960.5.1mdv2010.2.x86_64.rpm
 2b46dcebe1a563aed2e9949f5869be8b  
2010.1/x86_64/lib64postproc51-0.6-0.22960.5.1mdv2010.2.x86_64.rpm
 e1f77931ce1aa23bbc8f1b8f607548ff  
2010.1/x86_64/lib64swscaler0-0.6-0.22960.5.1mdv2010.2.x86_64.rpm 
 87155585e9ad3413d3210489a539a62f  
2010.1/SRPMS/ffmpeg-0.6-0.22960.5.1mdv2010.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFNlhb3mqjQ0CJFipgRAn9IAJ9Yxk/y7oQNkzbAf0CXuET3XPRYYwCdF7V6
mAdlwouwYl64jARlHgI/M2w=
=AyKF
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZDI-11-114: RealNetworks Helix Server x-wap-profile Format String Remote Code Execution Vulnerability

2011-04-01 Thread Fly, Kate
ZDI-11-114: RealNetworks Helix Server x-wap-profile Format String Remote Code 
Execution Vulnerability

http://www.zerodayinitiative.com/advisories/ZDI-11-114

April 1, 2011

-- CVE ID:
CVE-2010-4235

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
RealNetworks

-- Affected Products:
RealNetworks Helix Server

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 10863. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Helix Server products. Authentication is not
required to exploit this vulnerability.

The specific flaw exists within the rmserver.exe process. This process
is active by default on all Helix Server installations. Due to a failure
to properly sanitize the contents of the 'x-wap-profile' header, it is
possible to provide malicious data that is passed directly to a format
string function. Remote attackers could leverage this vulnerability to
execute arbitrary code under the context of the SYSTEM user.

-- Vendor Response:
RealNetworks has issued an update to correct this vulnerability. More
details can be found at:

http://www.realnetworks.com/helix-support/security-updates.aspx

-- Disclosure Timeline:
2010-10-02 - Vulnerability reported to vendor
2011-04-01 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* defrost

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ZDI-11-115: IBM solidDB solid.exe Authentication Bypass Remote Code Execution Vulnerability

2011-04-01 Thread ZDI Disclosures
ZDI-11-115: IBM solidDB solid.exe Authentication Bypass Remote Code Execution 
Vulnerability

http://www.zerodayinitiative.com/advisories/ZDI-11-115

April 1, 2011

-- CVSS:
9.3, (AV:N/AC:M/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
IBM

-- Affected Products:
IBM solidDB

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 10984. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of IBM solidDB. Authentication is not required
to exploit this vulnerability. 

The specific flaw exists within the solid.exe process which listens by
default on TCP ports 1315, 1964 and 2315. The authentication protocol
allows a remote attacker to specify the length of a password hash. By
specifying a minimum length the attacker can force the process to
validate only the first several bytes of the password hash. This can be
abused to bypass authentication to the database.

-- Vendor Response:
IBM has issued an update to correct this vulnerability. More
details can be found at:

https://www-304.ibm.com/support/docview.wss?uid=swg21474552

-- Disclosure Timeline:
2010-09-29 - Vulnerability reported to vendor
2011-04-01 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Tenable Network Security

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/