Re: [Full-disclosure] OT What is happening with bitcoins?

2014-03-10 Thread coderman
On Thu, Mar 6, 2014 at 4:09 PM, Pedro Worcel pe...@worcel.com wrote:
 Bitcoins are doing great actually. =)

 Used to be worth 0 a few years back, useless, and now you can use them to
 buy some stuff.


also providing some awesome information for future uses, c.f.:


http://blog.magicaltux.net/wp-content/uploads/2014/03/MtGox2014Leak.zip
http://89.248.171.30/MtGox2014Leak.zip
https://mega.co.nz/#!0VliDQBA!4Ontdi2MsLD4J5dV1-sr7pAgEYTSMi8rNeEMBikEhAs
http://burnbit.com/download/280433/MtGox2014Leak_zip


let me know if you're still short a mirror...

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Hacking in Schools

2014-03-10 Thread coderman
i for one am moved by the selfless dedication to promoting a happy bit
it every horse's mouth.

may the hack-a-more live forevar!




On Wed, Feb 26, 2014 at 11:01 AM, Sanguinarious Rose
sanguiner...@occultusterra.com wrote:
 You have my Axe!

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [HTTPCS] ClanSphere 'where' Cross Site Scripting Vulnerability

2014-03-10 Thread HTTPCS
HTTPCS Advisory : HTTPCS127

Product : ClanSphere

Version : 2011.4

Date : 2014-03-07

Criticality level : Less Critical

Description : A vulnerability has been discovered in ClanSphere, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'where' parameter to '/index.php' is not properly sanitised
before being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an affected site.

Page : /index.php

Variables : sort=6action=listwhere=[VulnHTTPCS]mod=users

Type : XSS

Method : GET

Solution :

References : https://www.httpcs.com/advisory/httpcs127

Credit : HTTPCS [Web Vulnerability Scanner]

___
https://www.httpcs.com/en/advisories
___

Twitter : http://twitter.com/HTTPCS
Web vulnerability scanner HTTPCS : https://www.httpcs.com/___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] OXATIS 'EMSJ' Cross Site Scripting Vulnerability

2014-03-10 Thread HTTPCS
HTTPCS Advisory : HTTPCS125

Product : OXATIS

Version :

Date : 2014-03-07

Criticality level : Less Critical

Description : A vulnerability has been discovered in OXATIS, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'EMSJ' parameter to '/EmailPopupWnd.asp' is not properly
sanitised before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of an
affected site.

Page : /EmailPopupWnd.asp

Variables : EMSJ=[VulnHTTPCS]

Type : XSS

Method : GET

Solution :

References : https://www.httpcs.com/en/advisory/httpcs125

Credit : HTTPCS [Web Vulnerability Scanner]


___
https://www.httpcs.com/advisories
___

Twitter : http://twitter.com/HTTPCS_
Free web vulnerability scanner HTTPCS : https://www.httpcs.com/___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] OT What is happening with bitcoins?

2014-03-10 Thread Meaux, Kirk
More to the point, has the transaction malleability issue been fixed that 
caused Magic’s downfall?
Even though most exchanges just code around it, it’s still kind of a really big 
issue if it isn’t fixed. :d


From: Full-Disclosure [mailto:full-disclosure-boun...@lists.grok.org.uk] On 
Behalf Of Pedro Worcel
Sent: Thursday, March 06, 2014 6:09 PM
To: Georgi Guninski
Cc: full-disclosure
Subject: Re: [Full-disclosure] OT What is happening with bitcoins?

Bitcoins are doing great actually. =)
Used to be worth 0 a few years back, useless, and now you can use them to buy 
some stuff.


2014-03-07 4:06 GMT+13:00 Georgi Guninski 
gunin...@guninski.commailto:gunin...@guninski.com:
Read on theregister that bitcoins are in trouble.

Allegedly mtgox lost $400M maybe related to
transactions.

Are the bugs in bitcoin or just sufficiently
many ones got rooted?

Is bitcoin still alive?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



--
GPG: http://is.gd/droopehttp://is.gd/signature_
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] List Charter

2014-03-10 Thread John Cartwright

[Full-Disclosure] Mailing List Charter
John Cartwright jo...@grok.org.uk
 

- Introduction  Purpose -

This document serves as a charter for the [Full-Disclosure] mailing 
list hosted at lists.grok.org.uk.

The list was created on 9th July 2002 by Len Rose, and is primarily 
concerned with security issues and their discussion.  The list is 
administered by John Cartwright.

The Full-Disclosure list is hosted and sponsored by Secunia.


- Subscription Information -

Subscription/unsubscription may be performed via the HTTP interface 
located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure.

Alternatively, commands may be emailed to 
full-disclosure-requ...@lists.grok.org.uk, send the word 'help' in 
either the message subject or body for details.

 
- Moderation  Management -

The [Full-Disclosure] list is unmoderated. Typically posting will be
restricted to members only, however the administrators may choose to 
accept submissions from non-members based on individual merit and 
relevance.

It is expected that the list will be largely self-policing, however in
special circumstances (eg spamming, misappropriation) then offending 
members may be removed from the list by the management.

An archive of postings is available at 
http://lists.grok.org.uk/pipermail/full-disclosure/.
 

- Acceptable Content -

Any information pertaining to vulnerabilities is acceptable, for 
instance announcement and discussion thereof, exploit techniques and 
code, related tools and papers, and other useful information.

Gratuitous advertisement, product placement, or self-promotion is 
forbidden.  Disagreements, flames, arguments, and off-topic discussion 
should be taken off-list wherever possible.

Humour is acceptable in moderation, providing it is inoffensive. 
Politics should be avoided at all costs.

Members are reminded that due to the open nature of the list, they 
should use discretion in executing any tools or code distributed via
this list.
 

- Posting Guidelines -

The primary language of this list is English. Members are expected to 
maintain a reasonable standard of netiquette when posting to the list. 

Quoting should not exceed that which is necessary to convey context, 
this is especially relevant to members subscribed to the digested 
version of the list.

The use of HTML is discouraged, but not forbidden. Signatures will 
preferably be short and to the point, and those containing 
'disclaimers' should be avoided where possible.

Attachments may be included if relevant or necessary (e.g. PGP or 
S/MIME signatures, proof-of-concept code, etc) but must not be active 
(in the case of a worm, for example) or malicious to the recipient.

Vacation messages should be carefully configured to avoid replying to 
list postings. Offenders will be excluded from the mailing list until 
the problem is corrected.

Members may post to the list by emailing 
full-disclosure@lists.grok.org.uk. Do not send subscription/
unsubscription mails to this address, use the -request address 
mentioned above.


- Charter Additions/Changes -

The list charter will be published at 
http://lists.grok.org.uk/full-disclosure-charter.html.

In addition, the charter will be posted monthly to the list by the 
management.

Alterations will be made after consultation with list members and a 
consensus has been reached.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2014:048 ] gnutls

2014-03-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:048
 http://www.mandriva.com/en/support/security/
 ___

 Package : gnutls
 Date: March 10, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 ___

 Problem Description:

 Updated gnutls packages fix security vulnerability:
 
 It was discovered that GnuTLS did not correctly handle certain errors
 that could occur during the verification of an X.509 certificate,
 causing it to incorrectly report a successful verification. An attacker
 could use this flaw to create a specially crafted certificate that
 could be accepted by GnuTLS as valid for a site chosen by the attacker
 (CVE-2014-0092).
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
 http://advisories.mageia.org/MGASA-2014-0117.html
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 102f795d8475e9c9d6df72aeffd9213b  mes5/i586/gnutls-2.4.1-2.10mdvmes5.2.i586.rpm
 1f87f8bce0222e4bad7f098e9ae04467  
mes5/i586/libgnutls26-2.4.1-2.10mdvmes5.2.i586.rpm
 c9bffc45aaddf198ccf185d130cd06c6  
mes5/i586/libgnutls-devel-2.4.1-2.10mdvmes5.2.i586.rpm 
 c713dc5b541177d7ad289853a6be2869  mes5/SRPMS/gnutls-2.4.1-2.10mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 74cf2ef8f62b6695fb7e0302bbd05f21  
mes5/x86_64/gnutls-2.4.1-2.10mdvmes5.2.x86_64.rpm
 1c915d2bfcadb6cb85ee2a80a3adf6ce  
mes5/x86_64/lib64gnutls26-2.4.1-2.10mdvmes5.2.x86_64.rpm
 62d52e05b82032c7952f2dbf8e60482f  
mes5/x86_64/lib64gnutls-devel-2.4.1-2.10mdvmes5.2.x86_64.rpm 
 c713dc5b541177d7ad289853a6be2869  mes5/SRPMS/gnutls-2.4.1-2.10mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 53bb1704d26e27aeeeddfdcf093c28a3  mbs1/x86_64/gnutls-3.0.28-1.2.mbs1.x86_64.rpm
 9d87ba4210c47fd889e311cfddcbc0eb  
mbs1/x86_64/lib64gnutls28-3.0.28-1.2.mbs1.x86_64.rpm
 3055076fd43b6a23e8ca36ca898e2378  
mbs1/x86_64/lib64gnutls-devel-3.0.28-1.2.mbs1.x86_64.rpm
 6c7adf3386ec46df821457f8ed0962f0  
mbs1/x86_64/lib64gnutls-ssl27-3.0.28-1.2.mbs1.x86_64.rpm 
 2399c9cd4b3b4eb1cd1ad82a2dbbc90e  mbs1/SRPMS/gnutls-3.0.28-1.2.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTHYuPmqjQ0CJFipgRAnO5AJ9UPgEWklfcapkAlRUrevDFRY5w1QCfUwqw
BPc793TFRj1+Ic7Ckur6Ahs=
=EexV
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2014:049 ] subversion

2014-03-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:049
 http://www.mandriva.com/en/support/security/
 ___

 Package : subversion
 Date: March 10, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been discovered and corrected in subversion:
 
 The get_resource function in repos.c in the mod_dav_svn module
 in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when
 SVNListParentPath is enabled, allows remote attackers to cause a
 denial of service (crash) via vectors related to the server root
 and request methods other than GET, as demonstrated by the svn ls
 http://svn.example.com command (CVE-2014-0032).
 
 This advisory provides the latest version of subversion (1.7.16)
 which is not vulnerable to this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032
 http://subversion.apache.org/security/CVE-2014-0032-advisory.txt
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 25a0792c0644c3469694b1aed87920c4  
mes5/i586/apache-mod_dav_svn-1.7.16-0.1mdvmes5.2.i586.rpm
 5c4a0db4d471323f53b1062f495cc4d7  
mes5/i586/libsvn0-1.7.16-0.1mdvmes5.2.i586.rpm
 cf1185d10113c2ba5bfa5be6bc2c0c47  
mes5/i586/libsvnjavahl1-1.7.16-0.1mdvmes5.2.i586.rpm
 e3cc87ab3d41b46bf520bb292c12526f  
mes5/i586/perl-SVN-1.7.16-0.1mdvmes5.2.i586.rpm
 27b585a2d79689d73233463841f2bc80  
mes5/i586/perl-svn-devel-1.7.16-0.1mdvmes5.2.i586.rpm
 0039001ca9d125bfb557cffcc2f5b8c5  
mes5/i586/python-svn-1.7.16-0.1mdvmes5.2.i586.rpm
 4776c4ae660efbbc357c3c35fc9bd01f  
mes5/i586/python-svn-devel-1.7.16-0.1mdvmes5.2.i586.rpm
 6708ceca95968af6a53b6181278f8252  
mes5/i586/ruby-svn-1.7.16-0.1mdvmes5.2.i586.rpm
 261064f1e40912db8c0a863e0b907a6f  
mes5/i586/ruby-svn-devel-1.7.16-0.1mdvmes5.2.i586.rpm
 a115aab61321b6fa8180c0debfc2ebe2  
mes5/i586/subversion-1.7.16-0.1mdvmes5.2.i586.rpm
 942c99bfabaf203e5e10ac3ef394e63b  
mes5/i586/subversion-devel-1.7.16-0.1mdvmes5.2.i586.rpm
 32096c5120feb2ea6ece0675ef24412a  
mes5/i586/subversion-doc-1.7.16-0.1mdvmes5.2.i586.rpm
 35943db397129b7b6ab1ec48014356e8  
mes5/i586/subversion-server-1.7.16-0.1mdvmes5.2.i586.rpm
 377718f8801578a0a02afd21daa9d96d  
mes5/i586/subversion-tools-1.7.16-0.1mdvmes5.2.i586.rpm
 be6f8cc3ef11f7219f6a07824795ed41  
mes5/i586/svn-javahl-1.7.16-0.1mdvmes5.2.i586.rpm 
 f9511b3a764f7f5c0297b5c6478a05d5  
mes5/SRPMS/subversion-1.7.16-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 fe630b13878ebd2eef2301836d42a833  
mes5/x86_64/apache-mod_dav_svn-1.7.16-0.1mdvmes5.2.x86_64.rpm
 34ea50c0238c1a71a0fb518ae81441a6  
mes5/x86_64/lib64svn0-1.7.16-0.1mdvmes5.2.x86_64.rpm
 a18979e9ea94488d2862e725b91ac995  
mes5/x86_64/lib64svnjavahl1-1.7.16-0.1mdvmes5.2.x86_64.rpm
 d186d26bf20b5b9cd6b6727f794b0747  
mes5/x86_64/perl-SVN-1.7.16-0.1mdvmes5.2.x86_64.rpm
 ba6923c0cb1f53ac8c96b682df7e5711  
mes5/x86_64/perl-svn-devel-1.7.16-0.1mdvmes5.2.x86_64.rpm
 18ef94dc37d3f7c4b161fdb71cb1900e  
mes5/x86_64/python-svn-1.7.16-0.1mdvmes5.2.x86_64.rpm
 e0615817d08e9bdc3151d8de7b6f88da  
mes5/x86_64/python-svn-devel-1.7.16-0.1mdvmes5.2.x86_64.rpm
 8f3f546f4b57e2e6fe2d951e02eafde1  
mes5/x86_64/ruby-svn-1.7.16-0.1mdvmes5.2.x86_64.rpm
 0dd7b95e42ebe58bc5a3a368142f7de6  
mes5/x86_64/ruby-svn-devel-1.7.16-0.1mdvmes5.2.x86_64.rpm
 da5acbb29a65970a911fdfd44e39e9d6  
mes5/x86_64/subversion-1.7.16-0.1mdvmes5.2.x86_64.rpm
 e4ccfd66a649b933ecc7bfd1fdba686d  
mes5/x86_64/subversion-devel-1.7.16-0.1mdvmes5.2.x86_64.rpm
 074511092d7547f4c01f7820c4a00cab  
mes5/x86_64/subversion-doc-1.7.16-0.1mdvmes5.2.x86_64.rpm
 2cada523fcd8673de0fb2f99de60dad6  
mes5/x86_64/subversion-server-1.7.16-0.1mdvmes5.2.x86_64.rpm
 0f435f9026b9460c5be686a4d8218350  
mes5/x86_64/subversion-tools-1.7.16-0.1mdvmes5.2.x86_64.rpm
 933d8dfd42cdd71c6d43b7bec209a5e7  
mes5/x86_64/svn-javahl-1.7.16-0.1mdvmes5.2.x86_64.rpm 
 f9511b3a764f7f5c0297b5c6478a05d5  
mes5/SRPMS/subversion-1.7.16-0.1mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 5095fc2f7b63d2374ba366051a873b58  
mbs1/x86_64/apache-mod_dav_svn-1.7.16-0.1.mbs1.x86_64.rpm
 633a46f34b6da14ddcab055dcc7b43c6  
mbs1/x86_64/lib64svn0-1.7.16-0.1.mbs1.x86_64.rpm
 1ca8f4e33ce81302d36912ed217f80b3  
mbs1/x86_64/lib64svn-gnome-keyring0-1.7.16-0.1.mbs1.x86_64.rpm
 f70f985409153583212517dbada5ab0b  
mbs1/x86_64/lib64svnjavahl1-1.7.16-0.1.mbs1.x86_64.rpm
 ed488e73c53881ada31cba91eab5b086  
mbs1/x86_64/perl-SVN-1.7.16-0.1.mbs1.x86_64.rpm
 ed510f571e41eb525e342ec597d1cfbe  
mbs1/x86_64/perl-svn-devel-1.7.16-0.1.mbs1.x86_64.rpm
 6d4359f416b2a54ea9bb54275bc9cff2  

[Full-disclosure] [SECURITY] [DSA 2871-1] wireshark security update

2014-03-10 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2871-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
March 10, 2014 http://www.debian.org/security/faq
- -

Package: wireshark
CVE ID : CVE-2014-2281 CVE-2014-2283 CVE-2014-2299

Multiple vulnerabilities were discovered in Wireshark:

CVE-2014-2281

Moshe Kaplan discovered that the NFS dissector could be crashed,
resulting in denial of service.

CVE-2014-2283

It was discovered that the RLC dissector could be crashed, resulting 
in denial of service.

CVE-2014-2299

Wesley Neelen discovered a buffer overflow in the MPEG file parser,
which could lead to the execution of arbitrary code.

For the oldstable distribution (squeeze), these problems have been fixed in
version 1.2.11-6+squeeze14.

For the stable distribution (wheezy), these problems have been fixed in
version 1.8.2-5wheezy10.

For the unstable distribution (sid), these problems have been fixed in
version 1.10.6-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org



-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=HE9d
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2872-1] udisks security update

2014-03-10 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2872-1   secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
March 10, 2014 http://www.debian.org/security/faq
- -

Package: udisks
CVE ID : CVE-2014-0004

Florian Weimer discovered a buffer overflow in udisks's mount path 
parsing code which may result in privilege escalation.

For the oldstable distribution (squeeze), this problem has been fixed in
version 1.0.1+git20100614-3squeeze1.

For the stable distribution (wheezy), this problem has been fixed in
version 1.0.4-7wheezy1.

For the unstable distribution (sid), this problem has been fixed in
version 1.0.5-1.

We recommend that you upgrade your udisks packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=xZKX
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ MDVSA-2014:050 ] wireshark

2014-03-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:050
 http://www.mandriva.com/en/support/security/
 ___

 Package : wireshark
 Date: March 10, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities was found and corrected in Wireshark:
 
 * The NFS dissector could crash. Discovered by Moshe Kaplan
 (CVE-2014-2281).
 
 * The RLC dissector could crash (CVE-2014-2283).
 
 * The MPEG file parser could overflow a buffer. Discovered by Wesley
 Neelen (CVE-2014-2299).
 
 This advisory provides the latest version of Wireshark (1.8.13)
 which is not vulnerable to these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299
 http://www.wireshark.org/security/wnpa-sec-2014-01.html
 http://www.wireshark.org/security/wnpa-sec-2014-03.html
 http://www.wireshark.org/security/wnpa-sec-2014-04.html
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 4f641d05af87e5a053edd599e23975c7  
mes5/i586/dumpcap-1.8.13-0.1mdvmes5.2.i586.rpm
 b1a8a82298dd88bde7f9e41b1a73b47d  
mes5/i586/libwireshark2-1.8.13-0.1mdvmes5.2.i586.rpm
 896c658c6ddacc562a0d70366c64aefd  
mes5/i586/libwireshark-devel-1.8.13-0.1mdvmes5.2.i586.rpm
 b3287396b309bd0ec077ec03647356ac  
mes5/i586/rawshark-1.8.13-0.1mdvmes5.2.i586.rpm
 b05f181a687aee422bcc9d2a0dbedecc  mes5/i586/tshark-1.8.13-0.1mdvmes5.2.i586.rpm
 a3c609066ee5c522f735160b791b3d1d  
mes5/i586/wireshark-1.8.13-0.1mdvmes5.2.i586.rpm
 8e3d5cddff1cf5b3de28e6fd6298a412  
mes5/i586/wireshark-tools-1.8.13-0.1mdvmes5.2.i586.rpm 
 104a5965c230eba36b23945ea4d378e6  
mes5/SRPMS/wireshark-1.8.13-0.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 bf3e734f58c22f4a7d4cb9a92c723e6b  
mes5/x86_64/dumpcap-1.8.13-0.1mdvmes5.2.x86_64.rpm
 f3f2f97f4a0dab273fe6821f9b3dcda2  
mes5/x86_64/lib64wireshark2-1.8.13-0.1mdvmes5.2.x86_64.rpm
 d7182aa64192b2b4856ce1deb25da35d  
mes5/x86_64/lib64wireshark-devel-1.8.13-0.1mdvmes5.2.x86_64.rpm
 ce9a49108e3e37385b1ecd1aec0818b5  
mes5/x86_64/rawshark-1.8.13-0.1mdvmes5.2.x86_64.rpm
 345d1066d8dda18a06b0f9b0f34b12ff  
mes5/x86_64/tshark-1.8.13-0.1mdvmes5.2.x86_64.rpm
 49cf7c4dbec20d065ff535f5bc500d3b  
mes5/x86_64/wireshark-1.8.13-0.1mdvmes5.2.x86_64.rpm
 79c290d0a6934440a3989e696f6e3a2d  
mes5/x86_64/wireshark-tools-1.8.13-0.1mdvmes5.2.x86_64.rpm 
 104a5965c230eba36b23945ea4d378e6  
mes5/SRPMS/wireshark-1.8.13-0.1mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 919616ad2d26713c2d0a4148d06cc671  mbs1/x86_64/dumpcap-1.8.13-1.mbs1.x86_64.rpm
 32bc98bd5e9d2e19043d77ba944413fb  
mbs1/x86_64/lib64wireshark2-1.8.13-1.mbs1.x86_64.rpm
 e966a54884894738c89859f3768aed5c  
mbs1/x86_64/lib64wireshark-devel-1.8.13-1.mbs1.x86_64.rpm
 b96bbb6c34d1bf867e7409392b82817a  mbs1/x86_64/rawshark-1.8.13-1.mbs1.x86_64.rpm
 a803b639bdf2ffa9d905bae772d19498  mbs1/x86_64/tshark-1.8.13-1.mbs1.x86_64.rpm
 ba694e53492db08cb4db43ae181b519f  
mbs1/x86_64/wireshark-1.8.13-1.mbs1.x86_64.rpm
 c24508e134fd8be7216f4a165dc3f71c  
mbs1/x86_64/wireshark-tools-1.8.13-1.mbs1.x86_64.rpm 
 bc9586d2a42a3b7f52a02843905c7f59  mbs1/SRPMS/wireshark-1.8.13-1.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTHcXMmqjQ0CJFipgRApA3AJ9dlqu6qQiutinpvBDtprtQHoIKIQCeM396
03x4Ft2ynLHpeO4UFnID4QM=
=F8Lb
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] OT What is happening with bitcoins?

2014-03-10 Thread chedder
Well, from my understanding. the transaction malleability issue,
 isn't a problem with the protocol itself.
but the specific exchanges implementation of it.
not all exchanges where even effected by it to begin with.
and with japans decision to keep bitcoins completely unregulated.
it's unclear if mtgox stole the coins and used all this as an excuse.  or
what.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] AST-2014-001: Stack Overflow in HTTP Processing of Cookie Headers.

2014-03-10 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2014-001

 ProductAsterisk  
 SummaryStack Overflow in HTTP Processing of Cookie Headers.  
Nature of Advisory  Denial Of Service 
  SusceptibilityRemote Unauthenticated Sessions   
 Severity   Moderate  
  Exploits KnownNo
   Reported On  February 21, 2014 
   Reported By  Lucas Molas, researcher at Programa STIC, Fundacion   
  
Dr. Manuel Sadosky, Buenos Aires, Argentina   
Posted On   March 10, 2014
 Last Updated OnMarch 10, 2014
 Advisory Contact   Richard Mudgett rmudgett AT digium DOT com  
 CVE Name   CVE-2014-2286 

Description  Sending a HTTP request that is handled by Asterisk with a
 large number of Cookie headers could overflow the stack. 
 You could even exhaust memory if you sent an unlimited   
 number of headers in the request.

Resolution  The patched versions now handle headers in a fashion that 
prevents a stack overflow. Users should upgrade to a  
corrected version, apply the released patches, or disable 
HTTP support. 

   Affected Versions
Product  Release Series  
 Asterisk Open Source1.8.x   All versions 
 Asterisk Open Source 11.x   All versions 
 Asterisk Open Source 12.x   All versions 
  Certified Asterisk 1.8.x   All versions 
  Certified Asterisk  11.x   All versions 

  Corrected In
 Product  Release 
  Asterisk Open Source   1.8.26.1, 11.8.1, 12.1.1 
   Certified Asterisk1.8.15-cert5, 11.6-cert2 

  Patches  
 SVN URL   Revision 
 
   http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.diffAsterisk 
 
   1.8  
 
   http://downloads.asterisk.org/pub/security/AST-2014-001-11.diff Asterisk 
 
   11   
 
   http://downloads.asterisk.org/pub/security/AST-2014-001-12.diff Asterisk 
 
   12   
 
   http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.15.diff 
Certified 
   Asterisk 
 
   1.8.15   
 
   http://downloads.asterisk.org/pub/security/AST-2014-001-11.6.diff   
Certified 
   Asterisk 
 
   11.6 
 

   Links https://issues.asterisk.org/jira/browse/ASTERISK-23340   

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2014-001.pdf and 
http://downloads.digium.com/pub/security/AST-2014-001.html

Revision History
  Date  Editor Revisions Made 
03/10/14   Richard Mudgett   Initial Revision.

   Asterisk Project Security Advisory - AST-2014-001
  Copyright (c) 2014 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
   original, unaltered form.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html

[Full-disclosure] AST-2014-003: Remote Crash Vulnerability in PJSIP channel driver

2014-03-10 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2014-003

  ProductAsterisk 
  SummaryRemote Crash Vulnerability in PJSIP channel driver   
Nature of Advisory   Denial of Service
  Susceptibility Remote Unauthenticated Sessions  
 SeverityModerate 
  Exploits Known No   
Reported On  January 29, 2014 
Reported By  Joshua Colp jcolp AT digium DOT com
 Posted On   March 10, 2014   
  Last Updated OnMarch 10, 2014   
 Advisory ContactJoshua Colp jcolp AT digium DOT com
 CVE NameCVE-2014-2288

Description  A remotely exploitable crash vulnerability exists in the 
 PJSIP channel driver if the qualify_frequency  
 configuration option is enabled on an AOR and the remote 
 SIP server challenges for authentication of the resulting
 OPTIONS request. The response handling code wrongly assumes  
 that a PJSIP endpoint will always be associated with an  
 outgoing request which is incorrect. 

Resolution  This patch adds a check when handling responses challenging   
for authentication. If no endpoint is associated with the 
request no retry with authentication will occur.  

   Affected Versions
 Product   Release Series  
  Asterisk Open Source  12.x   All

  Corrected In
  Product  Release
 Asterisk Open Source 12.x  12.1.1

Patches
   SVN URL  Revision  
   http://downloads.asterisk.org/pub/security/AST-2014-003-12.diff Asterisk   
   12 

   Links https://issues.asterisk.org/jira/browse/ASTERISK-23210   

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2014-003.pdf and 
http://downloads.digium.com/pub/security/AST-2014-003.html

Revision History
  Date Editor  Revisions Made 
03/05/14   Joshua Colp  Document Creation 

   Asterisk Project Security Advisory - AST-2014-003
  Copyright (c) 2014 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
   original, unaltered form.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] AST-2014-002: Denial of Service Through File Descriptor Exhaustion with chan_sip Session-Timers

2014-03-10 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2014-002

 ProductAsterisk  
 SummaryDenial of Service Through File Descriptor Exhaustion  
with chan_sip Session-Timers  
Nature of Advisory  Denial of Service 
  SusceptibilityRemote Authenticated or Anonymous Sessions
 Severity   Moderate  
  Exploits KnownNo
   Reported On  2014/02/25
   Reported By  Corey Farrell 
Posted On   March 10, 2014
 Last Updated OnMarch 10, 2014
 Advisory Contact   Kinsey Moore kmoore AT digium DOT com   
 CVE Name   CVE-2014-2287 

Description  An attacker can use all available file descriptors using 
 SIP INVITE requests. 
  
 Knowledge required to achieve the attack:
  
 * Valid account credentials or anonymous dial in 
  
 * A valid extension that can be dialed from the SIP account  
  
 Trigger conditions:  
  
 * chan_sip configured with session-timers set to   
 originate or accept  
  
 ** The INVITE request must contain either a Session-Expires  
 or a Min-SE header with malformed values or values   
 disallowed by the system's configuration.
  
 * chan_sip configured with session-timers set to refuse  
  
 ** The INVITE request must offer timer in the Supported  
 header   
  
 Asterisk will respond with code 400, 420, or 422 for 
 INVITEs meeting this criteria. Each INVITE meeting these 
 conditions will leak a channel and several file  
 descriptors. The file descriptors cannot be released 
 without restarting Asterisk which may allow intrusion
 detection systems to be bypassed by sending the requests 
 slowly.  

Resolution  Upgrade to a version with the patch integrated or apply the   
appropriate patch.

   Affected Versions
 Product   Release Series  
  Asterisk Open Source 1.8.x   All
  Asterisk Open Source  11.x   All
  Asterisk Open Source  12.x   All
   Certified Asterisk  1.8.15  All
   Certified Asterisk   11.6   All

  Corrected In  
 Product  Release 
Asterisk Open Source 1.8.x1.8.26.1
Asterisk Open Source 11.x  11.8.1 
Asterisk Open Source 12.x  12.1.1 
Certified Asterisk 1.8.15   1.8.15-cert5  
 Certified Asterisk 11.6 11.6-cert2   

  Patches  
 SVN URL   Revision 
 
   http://downloads.asterisk.org/pub/security/AST-2014-002-1.8.diffAsterisk 
 
   1.8  
 
   

[Full-disclosure] AST-2014-004: Remote Crash Vulnerability in PJSIP Channel Driver Subscription Handling

2014-03-10 Thread Asterisk Security Team
   Asterisk Project Security Advisory - AST-2014-004

 ProductAsterisk  
 SummaryRemote Crash Vulnerability in PJSIP Channel Driver
Subscription Handling 
Nature of Advisory  Denial of Service 
  SusceptibilityRemote Authenticated Sessions 
 Severity   Moderate  
  Exploits KnownNo
   Reported On  January 14th, 2014
   Reported By  Mark Michelson
Posted On   March 10, 2014
 Last Updated OnMarch 10, 2014
 Advisory Contact   Matt Jordan mjordan AT digium DOT com   
 CVE Name   CVE-2014-2289 

Description  A remotely exploitable crash vulnerability exists in the 
 PJSIP channel driver's handling of SUBSCRIBE requests. If a  
 SUBSCRIBE request is received for the presence Event, and
 that request has no Accept headers, Asterisk will attempt
 to access an invalid pointer to the header location. 
  
 Note that this issue was fixed during a re-architecture of   
 the res_pjsip_pubsub module in Asterisk 12.1.0. As such, 
 this issue has already been resolved in a released version   
 of Asterisk. This notification is being released for users   
 of Asterisk 12.0.0.  

Resolution  Upgrade to Asterisk 12.1.0, or apply the patch noted below
to Asterisk 12.0.0.   

   Affected Versions
 Product   Release Series  
  Asterisk Open Source  12.x   12.0.0 

  Corrected In  
 Product  Release 
   Asterisk Open Source12.1.0 

Patches
   SVN URL  Revision  
   http://downloads.asterisk.org/pub/security/AST-2014-004-12.diff Asterisk   
   12 

   Links https://issues.asterisk.org/jira/browse/ASTERISK-23139   

Asterisk Project Security Advisories are posted at
http://www.asterisk.org/security  
  
This document may be superseded by later versions; if so, the latest  
version will be posted at 
http://downloads.digium.com/pub/security/AST-2014-004.pdf and 
http://downloads.digium.com/pub/security/AST-2014-004.html

Revision History
  Date Editor  Revisions Made 
03/05/14   Matt Jordan  Initial Revision  

   Asterisk Project Security Advisory - AST-2014-004
  Copyright (c) 2014 Digium, Inc. All Rights Reserved.
  Permission is hereby granted to distribute and publish this advisory in its
   original, unaltered form.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/