[Full-disclosure] thc-ipv6 v2.0

2012-10-10 Thread Marc Heuse
Hi guys,

I released thc-ipv6 v2.0 yesterday.

Includes a new tool for alive scanning IPv6 networks (also see
https://conference.hitb.org/hitbsecconf2012kul/materials/D1T2%20-%20Marc%20Heuse%20-%20IPv6%20Insecurity%20Revolutions.pdf),
new tools for local network denial of service against Windows and BSD
based systems (not patched yet as it seems), inject into PPPoE and 6to4
tunnels and a lot more! Have fun :-)

available at www.thc.org/thc-ipv6

Greets,
Marc

--
Marc Heuse
www.mh-sec.de

PGP: FEDD 5B50 C087 F8DF 5CB9  876F 7FDD E533 BF4F 891A

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Last reminder for ClubHack 2012 : Call for Papers

2012-10-10 Thread Abhijeet Patil
Hello Everyone,

This is a Last Reminder for ClubHack 2012 Call for Papers.
CFP closes on 15th Oct, 2012. Send in you submission as soon as possible.

Call For Participation
==

See http://clubhack.com/2012
for details

In 2012, as ClubHack is focusing toward innovation & leadership, we invite
papers from enthusiast & seasoned professionals for ClubHack2012 with
emphasis on entrepreneurship in infosec and security innovation.

These presentations are expected to be of 40 minutes each. The schedule
time for each presenter would be 50 minutes out of which 40 minutes are for
the presentation & 10 for the question-answer sessions. We would request
you to submit the papers keeping the time constraint in mind.

:::Topics:::
Innovation knows no boundaries. Just to spark your thought process, here?s
a hint of topics which you may refer
* Entrepreneurship in infosec product development
* Research work in infosec
* Innovation in attack vectors
* Attacks on Cloud
* Mobile computing
* Malware & Botnets
* Privacy with social networks
* Telecom Security (3G/4G, SS7, GSM/CDMA, VoIP) and Phone Phreaking
* Hardware, Embedded Systems and other Electronic Devices Hacking
* War of handhelds & BYOD
* Cyber warfare & your role
* Open Source Intelligence (OSINT)
* Signal Intelligence (SIGINT) : COMINT, ELINT, etc
* Critical Infrastructure Protection
* Security aspects in SCADA and industrial environments and obscure networks
* & the general other infosec domains like web, network, tools & exploits
etc.

If you want to deliver a workshop at ClubHack2012, please write to us
separately and we will help in the same.

:::Submission Deadline:::
October 15, 2012

:::How to Submit:::
Please send us your entries to c...@clubhack.com

For more information regarding CFP please visit
http://clubhack.com/2012/cfp/


For conference related information please visit the conference web site -
http://clubhack.com/2012

OR
contact us via email - i...@clubhack.com

Hope to see your contribution and support for ClubHack2012.

--
Abhijeet Patil
ClubHack
http://clubhack.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] FileBound - Privilege Escalation Vulnerability - Security Advisory - SOS-12-010

2012-10-10 Thread Lists
Sense of Security - Security Advisory - SOS-12-010

Release Date.  10-Oct-2012
Last Update.   -  
Vendor Notification Date.  14-Aug-2012
Product.   FileBound On-Site
Platform.  Windows
Affected versions. All versions prior to 6.2
Severity Rating.   High
Impact.Privilege escalation
Attack Vector. From remote with authentication
Solution Status.   Vendor patch
CVE reference. CVE - not yet assigned

Details.
The FileBound On-Site document management application is 
vulnerable to a privilege escalation attack by sending a 
modified password request to the FileBound web service.
By modifying the UserID value you can reset the password 
of any local user in the application without requiring 
administrative privileges.

Proof of Concept.
Authenticate to FileBound via the following web service 
method and SOAP request:

http://www.company.com/Filebound.asmx?op=Login
   
  
 sosuser
 daisyp0p
  
   

After authentication a request can be sent to the following 
administrator's password reset web service method and 
SOAP request:

http://www.company.com/Filebound.asmx?op=SetPassword2
   
  
 32
 lightsouthern
 0
  
   

By modifying the UserID value the password can be reset for
any existing user in the system. A response code of -1 
confirms the password reset was successful.

Solution.
Install the latest vendor patch.

Discovered by.
Nathaniel Carew from Sense of Security Labs.

About us.
Sense of Security is a leading provider of information security and
risk management solutions. Our team has expert skills in assessment 
and assurance, strategy and architecture, and deployment through to
ongoing management. We are Australia's premier application penetration
testing firm and trusted IT security advisor to many of the country's
largest organisations.


Sense of Security Pty Ltd 
Level 8, 66 King St
Sydney NSW 2000
AUSTRALIA

T: +61 (0)2 9290 
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au/consulting/penetration-testing
E: i...@senseofsecurity.com.au
Twitter: @ITsecurityAU

The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-12-010.pdf

Other Sense of Security advisories can be found at:
http://www.senseofsecurity.com.au/research/it-security-advisories.php

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Multiple 0-days in Dark Comet RAT

2012-10-10 Thread Thor (Hammer of God)
It's InfoSec. Nothing has any meaning anymore.  Or, better stated, things means 
whatever people want them to mean in order to forward their agenda.  When we 
talked about full disclosure a while back, somebody said I was "jaded" as if it 
meant I had "clouded judgement."  They were actually right though, as jaded" 
means "negative by way of experience."  

I remember when people started using metrics like "moderately critical" to 
describe their [what they called] 0-day XSS vulnerability for some ancient CRM 
package. That way they get to say they published 14,000 0-days on their 
marketing material. 

Some dude recently posted on a professional list how he routinely cracks the 
NTLMv2 hashes for 10,000 users in 36 hours with rainbow tables.  Of course 
every single part of the statement is complete BS but no one (except me) even 
blinked. 

People talk about how stupid users are, but I think the people in the industry 
are far worse. 

Sent from whatever device will keep us from debating which one is better.

On Oct 9, 2012, at 9:59 AM, Philip Whitehouse  wrote:

> Does 0-day have any meaning any more? It used to mean there were exploits in 
> the wild used to cause damage before the vendor patched it not merely that a 
> security researcher found it and disclosed it to the public before the vendor 
> did.
> 
> If a 0 day is everything found by a security team before a vendor then the 
> term will loose all purpose and meaning because almost all work done by such 
> researchers is finding vulns. before the vendor.
> 
> End rant.
> 
> Philip Whitehouse
> 
> On 8 Oct 2012, at 21:33, "Hertz, Jesse"  wrote:
> 
>> SQL Injection and Arbitrary File Access present in Command and Control 
>> server of DarkComet RAT
>> 
>> for more info see:
>> http://matasano.com/research/PEST-CONTROL.pdf
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] binfmt_script kernel stack data disclosure during exec

2012-10-10 Thread halfdog
Linux kernel binfmt_script handling in combination with CONFIG_MODULES
can lead to disclosure of kernel stack data during execve via copy of
data from dangling pointer to stack to growing argv list. Apart from
that, the BINPRM_MAX_RECURSION can be exceeded: the maximum of 4
recursions is ignored, instead a maximum of roughly 2^6 recursions is
in place.

A patch draft is available, but not accepted by upstream and might not
have been checked thoroughly enough for production use. Since the issue
is somehow public anyway, but upstream fixing may still take longer, I'm
putting it here so that anyone with need can evaluate or optimize the
patch by himself.

See [1] for extended description and POC.

hd

[1]
http://www.halfdog.net/Security/2012/LinuxKernelBinfmtScriptStackDataDisclosure/

-- 
http://www.halfdog.net/
PGP: 156A AE98 B91F 0114 FE88  2BD8 C459 9386 feed a bee

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Security-news] SA-CONTRIB-2012-155 - ShareThis - Cross Site Scripting (XSS)

2012-10-10 Thread security-news
View online: http://drupal.org/node/1808856

  * Advisory ID: DRUPAL-SA-CONTRIB-2012-155
  * Project: ShareThis [1] (third-party module)
  * Version: 7.x
  * Date: 2012-October-10
  * Security risk: Moderately critical [2]
  * Exploitable from: Remote
  * Vulnerability: Cross Site Scripting

 DESCRIPTION  
-

This module enables integration with the ShareThis [3] web service to allow
social bookmarking amongst your users.
The module doesn't sufficiently filter JavaScript settings before outputting
them.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer sharethis".

CVE: Requested

 VERSIONS AFFECTED  
---

  * ShareThis 7.x-2.x versions prior to 7.x-2.5.

Drupal core is not affected. If you do not use the contributed ShareThis [4]
module, there is nothing you need to do.

 SOLUTION  


Install the latest version:

  * If you use the ShareThis module for Drupal 7.x, upgrade to ShareThis
7.x-2.5 [5]

Also see the ShareThis [6] project page.

 REPORTED BY  
-

  * Jake Bell [7]

 FIXED BY  


  * Rob Loach [8], the module maintainer

 COORDINATED BY  
--

  * David Stoline [9] provisional member of the Drupal Security Team
  * Ben Jeavons [10] of the Drupal Security Team
  * Greg Knaddison [11] of the Drupal Security Team

 CONTACT AND MORE INFORMATION  


The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].


[1] http://drupal.org/project/sharethis
[2] http://drupal.org/security-team/risk-levels
[3] http://sharethis.com/
[4] http://drupal.org/project/sharethis
[5] http://drupal.org/node/1808760
[6] http://drupal.org/project/sharethis
[7] http://drupal.org/user/71548
[8] http://drupal.org/user/61114
[9] http://drupal.org/user/329570
[10] http://drupal.org/user/91990
[11] http://drupal.org/user/36762
[12] http://drupal.org/contact
[13] http://drupal.org/security-team
[14] http://drupal.org/writing-secure-code
[15] http://drupal.org/security/secure-configuration

___
Security-news mailing list
security-n...@drupal.org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Security-news] SA-CONTRIB-2012-154 - Basic webmail - Multiple vulnerabilities

2012-10-10 Thread security-news
View online: http://drupal.org/node/1808852

  * Advisory ID: DRUPAL-SA-CONTRIB-2012-154
  * Project: Basic webmail [1] (third-party module)
  * Version: 6.x
  * Date: 2012-October-10
  * Security risk: Moderately critical [2]
  * Exploitable from: Remote
  * Vulnerability: Cross Site Scripting, Information Disclosure, Multiple
vulnerabilities

 DESCRIPTION  
-

This module allows site users to read and write e-mail through an IMAP mail
server.

There are four issues being addressed by this security advisory:

  * The module doesn't sufficiently sanitize data when setting page title.
  * The module may store Drupal login IDs and passwords in plain text in the
data column of the users table.
  * The module doesn't sufficiently sanitize data displayed from email
messages.
  * The module allows users who have the 'access basic_webmail' permission to
view the e-mail addressof other site users.

CVE: Requested

 VERSIONS AFFECTED  
---

  * Basic webmail 6.x-1.x versions prior to 6.x-1.2.

Drupal core is not affected. If you do not use the contributed Basic webmail
[3] module, there is nothing you need to do.

 SOLUTION  


Install the latest version:

  * If you use the Basic webmail module for Drupal 6.x, upgrade to Basic
webmail 6.x-1.2 [4]

Also see the Basic webmail [5] project page.

 REPORTED BY  
-

  * Hunter Fox [6] provisional member of the Drupal Security Team

 FIXED BY  


  * Jason Flatt [7] the module maintainer
  * Hunter Fox [8] provisional member of the Drupal Security Team

 COORDINATED BY  
--

  * Hunter Fox [9] provisional member of the Drupal Security Team
  * Ben Jeavons [10] of the Drupal Security Team
  * Greg Knaddison [11] of the Drupal Security Team

 CONTACT AND MORE INFORMATION  


The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].


[1] http://drupal.org/project/basic_webmail
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/project/basic_webmail
[4] https://drupal.org/node/1808616
[5] http://drupal.org/project/basic_webmail
[6] http://drupal.org/user/426416
[7] http://drupal.org/user/4649
[8] http://drupal.org/user/426416
[9] http://drupal.org/user/426416
[10] http://drupal.org/user/91990
[11] http://drupal.org/user/36762
[12] http://drupal.org/contact
[13] http://drupal.org/security-team
[14] http://drupal.org/writing-secure-code
[15] http://drupal.org/security/secure-configuration

___
Security-news mailing list
security-n...@drupal.org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Security-news] SA-CONTRIB-2012-153 - Mandrill - Information Disclosure

2012-10-10 Thread security-news
View online: http://drupal.org/node/1808846

  * Advisory ID: DRUPAL-SA-CONTRIB-2012-153
  * Project: Mandrill [1] (third-party module)
  * Version: 7.x
  * Date: 2012-October-10
  * Security risk: Moderately critical [2]
  * Exploitable from: Remote
  * Vulnerability: Information Disclosure

 DESCRIPTION  
-

This module enables you to send emails using an external gateway and by
default logs the contents of the messages. An attacker who gains access to
the Mandrill dashboard can trigger password reset emails from the Drupal
site, get the reset links from the Mandrill logs, and take over an account.

CVE: Requested

 VERSIONS AFFECTED  
---

  * Mandrill 7.x-1.x versions prior to 7.x-1.2.

Drupal core is not affected. If you do not use the contributed Mandrill [3]
module, there is nothing you need to do.

 SOLUTION  


Install the latest version:

  * If you use the Mandrill module for Drupal 7.x, upgrade to Mandrill 7.x-1.2
[4]

Also see the Mandrill [5] project page.

 REPORTED BY  
-

  * Patrick Dawkins [6]

 FIXED BY  


  * Lev Tsypin [7] the module maintainer
  * Ned McClain [8] provisional member of the Drupal Security Team

 COORDINATED BY  
--

  * Ned McClain [9] provisional member of the Drupal Security Team
  * Ben Jeavons [10] of the Drupal Security Team
  * Greg Knaddison [11] of the Drupal Security Team

 CONTACT AND MORE INFORMATION  


The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [12].

Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].


[1] http://drupal.org/project/mandrill
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/project/mandrill
[4] http://drupal.org/node/1807894
[5] http://drupal.org/project/mandrill
[6] http://drupal.org/user/1025236
[7] http://drupal.org/user/54135
[8] http://drupal.org/user/798324
[9] http://drupal.org/user/798324
[10] http://drupal.org/user/91990
[11] http://drupal.org/user/36762
[12] http://drupal.org/contact
[13] http://drupal.org/security-team
[14] http://drupal.org/writing-secure-code
[15] http://drupal.org/security/secure-configuration

___
Security-news mailing list
security-n...@drupal.org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [Security-news] SA-CONTRIB-2012-152 - Feeds - Access bypass

2012-10-10 Thread security-news
View online: https://drupal.org/node/1808832

  * Advisory ID: DRUPAL-SA-CONTRIB-2012-152
  * Project: Feeds [1] (third-party module)
  * Version: 7.x
  * Date: 2012-October-10
  * Security risk: Not critical [2]
  * Exploitable from: Remote
  * Vulnerability: Access bypass

 DESCRIPTION  
-

The feeds module enables you to import or aggregate data as nodes, users,
taxonomy terms or simple database records.
The module doesn't sufficiently check permissions when creating nodes on
behalf of a user.
This vulnerability is mitigated by the fact that an attacker must have
control over the source feed, and the Feeds importer must have a field from
that feed mapped to the node's author.

/Note: the Feeds module doesn't have a stable release and therefore a
Security Advisory would not normally be issued, per the Drupal Security Team
policy [3]. However, this issue affects the Mailhandler [4] module, which
does have a stable release. For modules with dependencies, maintainers are
encouraged to create stable releases only for those modules dependent on
stable releases./

CVE: Requested

 VERSIONS AFFECTED  
---

  * Feeds 7.x-2.x versions prior to 7.x-2.0-alpha6.

Drupal core is not affected. If you do not use the contributed Feeds [5]
module, there is nothing you need to do.

 SOLUTION  


Install the latest version:

  * If you use the Feeds module for Drupal 7.x, upgrade to Feeds
7.x-2.0-alpha6 [6].

Also see the Feeds [7] project page.

 REPORTED BY  
-

  * Iñaki Lopez [8]

 FIXED BY  


  * Chris Leppanen [9] the module maintainer
  * Lee Rowlands [10] provisional member of the Drupal Security Team

 CONTACT AND MORE INFORMATION  


The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [11].

Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].


[1] http://drupal.org/project/feeds
[2] http://drupal.org/security-team/risk-levels
[3] http://drupal.org/security-advisory-policy
[4] http://drupal.org/project/mailhandler
[5] http://drupal.org/project/feeds
[6] https://drupal.org/node/1808282
[7] http://drupal.org/project/feeds
[8] http://drupal.org/user/118449
[9] http://drupal.org/user/473738
[10] http://drupal.org/user/395439
[11] http://drupal.org/contact
[12] http://drupal.org/security-team
[13] http://drupal.org/writing-secure-code
[14] http://drupal.org/security/secure-configuration

___
Security-news mailing list
security-n...@drupal.org
Unsubscribe at http://lists.drupal.org/mailman/listinfo/security-news
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] List Charter

2012-10-10 Thread John Cartwright

[Full-Disclosure] Mailing List Charter
John Cartwright 
 

- Introduction & Purpose -

This document serves as a charter for the [Full-Disclosure] mailing 
list hosted at lists.grok.org.uk.

The list was created on 9th July 2002 by Len Rose, and is primarily 
concerned with security issues and their discussion.  The list is 
administered by John Cartwright.

The Full-Disclosure list is hosted and sponsored by Secunia.


- Subscription Information -

Subscription/unsubscription may be performed via the HTTP interface 
located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure.

Alternatively, commands may be emailed to 
full-disclosure-requ...@lists.grok.org.uk, send the word 'help' in 
either the message subject or body for details.

 
- Moderation & Management -

The [Full-Disclosure] list is unmoderated. Typically posting will be
restricted to members only, however the administrators may choose to 
accept submissions from non-members based on individual merit and 
relevance.

It is expected that the list will be largely self-policing, however in
special circumstances (eg spamming, misappropriation) then offending 
members may be removed from the list by the management.

An archive of postings is available at 
http://lists.grok.org.uk/pipermail/full-disclosure/.
 

- Acceptable Content -

Any information pertaining to vulnerabilities is acceptable, for 
instance announcement and discussion thereof, exploit techniques and 
code, related tools and papers, and other useful information.

Gratuitous advertisement, product placement, or self-promotion is 
forbidden.  Disagreements, flames, arguments, and off-topic discussion 
should be taken off-list wherever possible.

Humour is acceptable in moderation, providing it is inoffensive. 
Politics should be avoided at all costs.

Members are reminded that due to the open nature of the list, they 
should use discretion in executing any tools or code distributed via
this list.
 

- Posting Guidelines -

The primary language of this list is English. Members are expected to 
maintain a reasonable standard of netiquette when posting to the list. 

Quoting should not exceed that which is necessary to convey context, 
this is especially relevant to members subscribed to the digested 
version of the list.

The use of HTML is discouraged, but not forbidden. Signatures will 
preferably be short and to the point, and those containing 
'disclaimers' should be avoided where possible.

Attachments may be included if relevant or necessary (e.g. PGP or 
S/MIME signatures, proof-of-concept code, etc) but must not be active 
(in the case of a worm, for example) or malicious to the recipient.

Vacation messages should be carefully configured to avoid replying to 
list postings. Offenders will be excluded from the mailing list until 
the problem is corrected.

Members may post to the list by emailing 
full-disclosure@lists.grok.org.uk. Do not send subscription/
unsubscription mails to this address, use the -request address 
mentioned above.


- Charter Additions/Changes -

The list charter will be published at 
http://lists.grok.org.uk/full-disclosure-charter.html.

In addition, the charter will be posted monthly to the list by the 
management.

Alterations will be made after consultation with list members and a 
consensus has been reached.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in the Cisco WebEx Recording Format Player

2012-10-10 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Multiple Vulnerabilities in the Cisco WebEx Recording Format Player

Advisory ID: cisco-sa-20121010-webex

Revision 1.0

For Public Release 2012 October 10 16:00  UTC (GMT)
- --

Summary
===

The Cisco WebEx Recording Format (WRF) player contains six buffer
overflow vulnerabilities. In some cases, exploitation of the
vulnerabilities could allow a remote attacker to execute arbitrary
code on the system with the privileges of a targeted user. 

The Cisco WebEx WRF Player is an application used to play back WRF
WebEx meeting recordings that have been recorded on a WebEx meeting
site or on the computer of an online meeting attendee. The Cisco WebEx
WRF Player can be automatically installed when the user accesses a
recording file that is hosted on a WebEx meeting site. The Cisco WebEx
WRF Player can also be manually installed for offline playback after
downloading the application from:
http://www.webex.com/play-webex-recording.html.

If the Cisco WebEx WRF Player was automatically installed, it will be
automatically upgraded to the latest, nonvulnerable version when users
access a recording file that is hosted on a WebEx meeting site. If the
Cisco WebEx WRF Player was manually installed, users will need to
manually install a new version of the Cisco WebEx WRF Player after
downloading the latest version from:
http://www.webex.com/play-webex-recording.html.

Cisco has updated affected versions of the WebEx meeting sites and
Cisco WebEx WRF Player to address these vulnerabilities. 

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-webex

-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlB1h6AACgkQUddfH3/BbTrjWAD/Xo3bSaXFymHXWKgoGNJQTRcp
MFilgSgS+0Hp09ncDC0A/R+0E3BmJFwMukJw6IPAQkp+AjYus1naLVDcQMjh7svJ
=tuKg
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Firewall Services Module

2012-10-10 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Multiple Vulnerabilities in Cisco Firewall Services Module

Advisory ID: cisco-sa-20121010-fwsm

Revision 1.0

For Public Release 2012 October 10 16:00  UTC (GMT)
- --

Summary
===

The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500
Series Switches and Cisco 7600 Series Routers is affected by the
following vulnerabilities:

DCERPC Inspection Buffer Overflow Vulnerability
DCERPC Inspection
Denial Of Service Vulnerabilities

These vulnerabilities are not interdependent; a release that is
affected by one vulnerability is not necessarily affected by the other.

Exploitation of these vulnerabilities could allow an unauthenticated,
remote attacker to trigger a reload of the affected device, or to
execute arbitrary commands.  Repeated exploitation could result in a
denial of service (DoS) condition.

Cisco has released free software updates that address these
vulnerabilities. There are no workarounds that mitigate these
vulnerabilities.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm

Note: The Cisco Catalyst 6500 Series ASA Services Module, and the
Cisco ASA 5500 Series Adaptive Security Appliance may also be affected
by these vulnerabilities.

The vulnerabilities affecting the Cisco Catalyst 6500 Series ASA
Services Module and Cisco ASA 5500 Series Adaptive Security Appliance
have been disclosed in a separate Cisco Security Advisory. The
Advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlB1h6AACgkQUddfH3/BbTrdbQD/WPf0vA8pJbKyFgfDQ0rol2r4
AAAdCeOQlELptysCaYsBAIZP/vuW1jX43H6pLgx9xBum9wcNBvhzG1m9Bip+nGbH
=e0NQ
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module

2012-10-10 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security
Appliances and Cisco Catalyst 6500 Series ASA Services Module

Advisory ID: cisco-sa-20121010-asa

Revision 1.0

For Public Release 2012 October 10 16:00  UTC (GMT)
- --

Summary
===

Cisco ASA 5500 Series Adaptive Security Appliances (ASA) and Cisco
Catalyst 6500 Series ASA Services Module (ASASM) may be affected by
the following vulnerabilities:

DHCP Memory Allocation Denial of Service Vulnerability
SSL VPN Authentication Denial of Service Vulnerability
SIP Inspection Media Update Denial of Service Vulnerability
DCERPC Inspection Buffer Overflow Vulnerability
Two DCERPC Inspection Denial Of Service Vulnerabilities

These vulnerabilities are independent of each other; a release that is
affected by one of the vulnerabilities may not be affected by the
others.

Successful exploitation of any of these vulnerabilities could allow an
unauthenticated remote attacker to trigger a reload of the affected
device. Exploitation of the DCERPC Inspection Buffer Overflow
Vulnerability could additionally cause a stack overflow and possibly
the execution of arbitrary commands.

Cisco has released free software updates that address these
vulnerabilities. Workarounds are available for some of these
vulnerabilities. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-asa

Note: The Cisco Firewall Services Module for Cisco Catalyst 6500 and
Cisco 7600 Series (FWSM) may be affected by some of the
vulnerabilities listed above. A separate Cisco Security Advisory has
been published to disclose the vulnerabilities that affect the Cisco
FWSM. This advisory is available at:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121010-fwsm

The Cisco ASA 1000V Cloud Firewall and Cisco ASA-CX Context-Aware
Security are not affected by any of these vulnerabilities.
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlB1jRsACgkQUddfH3/BbTo1RwD+NHNKsAkrc/dZ+XAhDtqAyVIY
xaVp6BpwmKAnBbDtwVQA/jXPlWJbmNmSOiHTAI30KkXahf9Bi9+bIvnQyeUI6aUM
=Ncu5
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2012:162 ] bind

2012-10-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2012:162
 http://www.mandriva.com/security/
 ___

 Package : bind
 Date: October 10, 2012
 Affected: 2011., Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability was discovered and corrected in bind:
 
 A certain combination of records in the RBT could cause named to hang
 while populating the additional section of a response. [RT #31090]
 (CVE-2012-5166).
 
 The updated packages have been upgraded to bind 9.7.6-P4 and 9.8.3-P4
 which is not vulnerable to this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166
 https://kb.isc.org/article/AA-00801
 ftp://ftp.isc.org/isc/bind9/9.7.6-P4/CHANGES
 ftp://ftp.isc.org/isc/bind9/9.8.3-P4/CHANGES
 ___

 Updated Packages:

 Mandriva Linux 2011:
 674904bbe6055bbce6addee9df404492  
2011/i586/bind-9.8.3-0.0.P4.0.1-mdv2011.0.i586.rpm
 a04233b14f792b187f52bb12975d6616  
2011/i586/bind-devel-9.8.3-0.0.P4.0.1-mdv2011.0.i586.rpm
 c8f5d3ceb296f04eb7b09ec3a4f72ee9  
2011/i586/bind-doc-9.8.3-0.0.P4.0.1-mdv2011.0.i586.rpm
 0dae4f49ec8626b2d985f38cc206410e  
2011/i586/bind-utils-9.8.3-0.0.P4.0.1-mdv2011.0.i586.rpm 
 c614ce64e6fbf4610ca67ff37bc57d28  2011/SRPMS/bind-9.8.3-0.0.P4.0.1.src.rpm

 Mandriva Linux 2011/X86_64:
 a40a739988c6d0277ea2ff9862956bae  
2011/x86_64/bind-9.8.3-0.0.P4.0.1-mdv2011.0.x86_64.rpm
 4136bd8e81216d03ccd5b389f208250d  
2011/x86_64/bind-devel-9.8.3-0.0.P4.0.1-mdv2011.0.x86_64.rpm
 84ff9042691182668122ece8d7f67a20  
2011/x86_64/bind-doc-9.8.3-0.0.P4.0.1-mdv2011.0.x86_64.rpm
 39439c8b0e3b9f89f17bbf9e4c8b088d  
2011/x86_64/bind-utils-9.8.3-0.0.P4.0.1-mdv2011.0.x86_64.rpm 
 c614ce64e6fbf4610ca67ff37bc57d28  2011/SRPMS/bind-9.8.3-0.0.P4.0.1.src.rpm

 Mandriva Enterprise Server 5:
 c37fb5666ee6ac7d83dc2fbeceebd39f  
mes5/i586/bind-9.7.6-0.0.P4.0.1mdvmes5.2.i586.rpm
 f60d20d6870bf103f24d41a50d8b7c2e  
mes5/i586/bind-devel-9.7.6-0.0.P4.0.1mdvmes5.2.i586.rpm
 59e509a6e0a72a178bf80f237000ef7e  
mes5/i586/bind-doc-9.7.6-0.0.P4.0.1mdvmes5.2.i586.rpm
 6db1bd8c47448801f8f0f163046bb4f7  
mes5/i586/bind-utils-9.7.6-0.0.P4.0.1mdvmes5.2.i586.rpm 
 0e32cc1eb2b98495c828990ad3fe868d  
mes5/SRPMS/bind-9.7.6-0.0.P4.0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 bb6806ee598c72bc218098eefc6fafa4  
mes5/x86_64/bind-9.7.6-0.0.P4.0.1mdvmes5.2.x86_64.rpm
 83c8197a29ee75ccf9396b0773aada77  
mes5/x86_64/bind-devel-9.7.6-0.0.P4.0.1mdvmes5.2.x86_64.rpm
 0cb5d1455f341f27601104e45395308b  
mes5/x86_64/bind-doc-9.7.6-0.0.P4.0.1mdvmes5.2.x86_64.rpm
 1ec00fc2d8bcb0eb7d8aec80535b589b  
mes5/x86_64/bind-utils-9.7.6-0.0.P4.0.1mdvmes5.2.x86_64.rpm 
 0e32cc1eb2b98495c828990ad3fe868d  
mes5/SRPMS/bind-9.7.6-0.0.P4.0.1mdvmes5.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQdULemqjQ0CJFipgRAqmHAKDZVAV8OmU7wk0ieb0RhgXhjp1/hQCgwfW7
zf2hK/iuE08rZtMXpzK6bIs=
=JF6q
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Cookie stealing and XSS vulnerable in Zenphoto version 1.4.3.2

2012-10-10 Thread Malte Müller
Hi Scott,

thanks, we always appreciate notes about unfixed issues. We did fix the actual 
issue reported in the function printPublishIconLink() last time:
> Sanitize the $_GET super global on lines 1637 through 1641 in
> zenpage-admin-functions.php file
We also fixed a few other similar finds in 1.4.3.3. This one is the same issue 
type indeed but a different find actually we probably somehow missed searching.

Please try the current trunk nightly build and let us know if you find any more 
issues. The actual official fix will probably have to wait until the next 
bugfix release beginning November. Note that our chief developer Stephen - I 
copied him on this mail - is currently unavailable until some time next week.

Best regards,
Malte Müller (acrylian)

Zenphoto team
www.zenphoto.org

Am 08.10.2012 um 21:52 schrieb Scott Herbert:

> Well chalk this one up to another learning experience for a novice bug
> hunter, I took the vendors word that it was fixed and didn't check myself.
> 
> I've BCC'ed in my contact with zenphoto, so they are aware.
> 
> And to my knowledge this issue doesn't currently have a CVE.
> 
> Bugger!
> 
>> -Original Message-
>> From: Henri Salo [mailto:he...@nerv.fi]
>> Sent: 08 October 2012 15:42
>> To: Scott Herbert; secur...@zenphoto.org
>> Cc: full-disclosure@lists.grok.org.uk
>> Subject: Re: [Full-disclosure] Cookie stealing and XSS vulnerable in
> Zenphoto
>> version 1.4.3.2
>> 
>> On Tue, Oct 02, 2012 at 07:16:11AM +0100, Scott Herbert wrote:
>>> -
>>> Affected products:
>>> -
>>> 
>>> Product :   Zenphoto 1.4.3.2 (and maybe older) fixed in 1.4.3.3
>>> Affected function:  printPublishIconLink
>>> 
>>> --
>>> Details:
>>> --
>>> 
>>> The file admin-news-articles.php calls the function printPublishIconLink
>>> which generates HTML from data stored in the $_GET super global, this
> can
>> be
>>> used to generate a XSS attack or more seriously, as a admin user need to
>> be
>>> logged in to access the page admin-news-articles.php, a cookie stealing
>>> script.
>>> 
>>> Example code:
>>> http://127.0.0.1/zenphoto/zp-core/zp-extensions/zenpage/admin-news-
>> articles.
>>> 
>> php?date=%22%3E%3Cscript%3Ealert%28%27Cookie%20sealing%20Javascrip
>> t%27%29;%3
>>> C/script%3E%3C>
>>> 
>>> 
>>> Suggested fix:
>>> 
>>> 
>>> Sanitize the $_GET super global on lines 1637 through 1641 in
>>> zenpage-admin-functions.php file
>>> 
>>> 
>>> Timeline:
>>> 
>>> 
>>> 12-Sept-2012  Zenphoto and UK-CERT informed
>>> 18-Sept-2012 Zenphoto confirmed and fixed (see
>>> http://www.zenphoto.org/trac/changeset/10836).
>>> 1-Oct-2012 Zenphoto 1.4.3.3 released fixing hole.
>>> 
>>> --
>>> Scott Herbert Cert Web Apps (Open)
>>> http://blog.scott-herbert.com/
>>> Twitter @Scott_Herbert
>> 
>> Hello list,
>> 
>> Zenphoto 1.4.3.3 (tar.gz 3fe44951e33e726d2bba229880885075) is still
>> affected by this vulnerability. Please notice "OSVDB is not aware of a
> solution
>> for this vulnerability. The original disclosure states that the vendor
> claimed to
>> have fixed this issue in version 1.4.3.3, but Secunia has confirmed it to
> still be
>> vulnerable." from http://osvdb.org/85899 and I verified this manually.
> Does
>> this vulnerability have CVE-identifier?
>> 
>> - Henri Salo
> 
> 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Multiple 0-days in Dark Comet RAT

2012-10-10 Thread Philip Whitehouse
Does 0-day have any meaning any more? It used to mean there were exploits in 
the wild used to cause damage before the vendor patched it not merely that a 
security researcher found it and disclosed it to the public before the vendor 
did.

If a 0 day is everything found by a security team before a vendor then the term 
will loose all purpose and meaning because almost all work done by such 
researchers is finding vulns. before the vendor.

End rant.

Philip Whitehouse

On 8 Oct 2012, at 21:33, "Hertz, Jesse"  wrote:

> SQL Injection and Arbitrary File Access present in Command and Control server 
> of DarkComet RAT
> 
> for more info see:
> http://matasano.com/research/PEST-CONTROL.pdf
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/