Re: [Full-disclosure] Forticlient VPN client credential interception vulnerability

2013-05-01 Thread Thierry Zoller



You got to be kidding me...


FORTICLIENT VPN CLIENT CREDENTIAL INTERCEPTION VULNERABILITY



When the FortiClient VPN client is tricked into connecting to a proxy
server rather than to the original firewall (e.g. through ARP or DNS
spoofing,) it detects the wrong SSL certificate but it only warns the
user _AFTER_ it has already sent the password to the proxy.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [Security-news] SA-CORE-2012-004 - Drupal core - Multiple vulnerabilities

2012-12-19 Thread Thierry Zoller

After reading through such an extensive credit list in form of, 
"Reported by", "Fixed by", "Coordinated by", one wonders when we'll see 
the "Introduced by" in the drupal patch announcements?

http://blog.zoller.lu

>  REPORTED BY
> --
>  FIXED BY
> --
>  COORDINATED BY
> --


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] GOOD for Enterprise (GMA) below 2.0.2 vulnerable to MITM

2012-11-13 Thread Thierry Zoller

RANT

The  world  of  mobile  applications  appear to have become one where 
vulnerability
disclosureand   awareness  are  not  necessary.  Until  there  are fully 
automated
updates  and  refusal  of  service for outdated applications I see the
need for disclosure.

Who will start monitoring "Appstores" updates for signs of vulnerabilities ?

Note  to  vulnerability  researches : GMA appears to be a nice fuzzing target 
and
in general for browser security assessments.(see below on rationale)

Description
---
GMA is known as "Good™ Mobile Access" and part of "Good for Enteprise"
"The secure browser is integrated into the Good for Enterprise application, 
delivering a safe,
intelligent user experience. Employees can launch Good’s browser directly from 
the Good launcher bar,
as well as through links included in emails. Links to public websites will 
automatically launch
the native browser."

Title : GOOD for Enterprise GMA below 2.0.2 vulnerable to MITM
URL : http://www-staging.good.com/products/good-mobile-access.php
Root Cause: GMA failed to validate server authenticity when connecting through 
HTTPS

I  spotted  what  appears  to  be  an  undisclosed vulnerability in an
enterprise mobile device management system.

https://itunes.apple.com/us/app/good-for-enterprise/id333202351?mt=8

Excerpt from above :

What's New in Version 2.0.2
This release addresses the following
[..]- GMA now validates server authenticity when connecting through HTTPS.
[..]

This would imply GMA to have been vulnerable to MITM prior to version 2.0.2

Disclosure Timeline :
=
- GOOD disclosed over iTunes on the 02.08.2012

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] TLS/SSL Compatibility Report 2011

2011-09-22 Thread Thierry Zoller

Hey,
I  though  it  would  be  worthwhile  to  let you know about my recent
updates to the "TLS/SSL Compatiblity Report". A Document that tries to
give a complete overview over  what  TLS/SSL protocols and  what  ciphers
are  available on different platforms and browsers.

The 2011 version was updated notably with the following items :

* Chrome moved away from SCHANNEL to NSS offering better
crypto on lower end systems (XP, 2003). Loosing however the
TLS 1.1 and TLS 1.2 capability of the latest Microsoft Operation
Systems.

Especially  with  the  release of the BEAST we might want to know what
platforms actually support TLS 1.1 (or 1.2).

The blog post and document is available here:
http://blog.g-sec.lu/2011/09/ssltls-hardening-and-compatibility.html

Should  you  be  aware  of any missing or wrong information, drop me a
mail.

Regards,
Thierry

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Binary Planting Goes "Any File Type"

2011-07-10 Thread Thierry Zoller

10  year  old bug classes are indeed fun to read, though the fun might
be directed at some one as opposed to something.

Even given it a cool name doesn't make that one a new weakness.

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] ISS Proventia Desktop

2010-08-09 Thread Thierry Zoller

Hi FD,

I'd  need  help  confirming a specific vulnerability, if you happen to
have ISS Proventia Desktop installed, please get in touch with me. You
don't need to expose anything - I will provide more information.


Regards,
Thierry



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Thierry Zoller
Hi Roland,

Was  not aware of the acronym - "BCP" is generally used for "Business 
continuity plan" in
the industry.



DR> On Jul 2, 2010, at 5:59 PM, Thierry Zoller wrote:

>> There it is again, BCP. Is this the new "IDS" ?


DR> BCP = Best Current Practice = iACLs, CoPP, et. al.

DR> ---
DR> Roland Dobbins  // <http://www.arbornetworks.com>

DR> Injustice is relatively easy to bear; what stings is justice.

DR> -- H.L. Mencken



DR> ___
DR> Full-Disclosure - We believe in it.
DR> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
DR> Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Thierry Zoller


Slippery Slopes everywhere :

DR> Again, causing the RP CPU to go to 100% due to punted
DR> management-plane traffic isn't a new phenomenon
1. Nobody claimed it to be a new phenomenon
2. He is not saturating anything.

DR> Of course PSIRT will ask for details, as they should; my point is
DR> that there's likely nothing new to see here,
Oh that's the point now? I thought your point was that it is not a security 
"bug".
I agree on the "nothing new"  here,  "new" however  is  not a relevant 
attribute to
decide on whether it is a vulnerability or not.

DR> Even if there is something new, here - which I doubt - it's
DR> important that folks understand that there are BCPs they can
We   heard   your  BCPs  and  XZY  clearly,  doesn't make it less of a
vulnerability.

DR> The original poster asked if this were a configuration issue -
DR> and the answer is, yes
Interesting, how do you know ?
1. you do not know what caused the problem
2. you do obviously do not know what packets caused the problems

If   it   is   a  default  configuration  and you can remotely cause a
denial of service condition  :  it  is a vulnerability.

If   it   is   a non standard configuration  and you can remotely cause a
denial of service condition  :  it  is a vulnerability.

DR> vulnerabilities - as opposed to merely saturating the RP of a
DR> given network device with management-plane traffic.  Some of them
Last  time  :  He appears to not be saturating anything. nmap -sV does
surely not create saturisation...

DR> And many of them could be mitigated via BCPs until such time as
DR> fixed code could be deployed, as well.
There it is again, BCP. Is this the new "IDS" ?



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-02 Thread Thierry Zoller



>> Those bugs might not be security-relevant, but they can be very annyoing 
>> nevertheless.
Three  letters, C I A - guess what property can be remotely triggered.
There is no discussion whether this is "security-relevant"




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-01 Thread Thierry Zoller
Hi Roland,

>o - what he's found is a network in which common infrastructure self-protection
> BCPs haven't been deployed, that's all.

Please pass  those  standing  inline at the Bullshit Bingo counter and
get in first place. How much does your "remote viewing" capability
costs per day ?

If a device crashes when being scanned - it's a vulnerability.

Bye

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Should nmap cause a DoS on cisco routers?

2010-07-01 Thread Thierry Zoller
Hi Shang,

If  this  is  possible  you  have  found  a  vulnerability. Any way to
remotely  cause  DoS  with  special  or  harmless  code  is  per  se a
vulnerability.

Instead  of  telling  somebody  to not scan with -sV you are better of
reporting the vulnerability (ies)

Regards,
Thierry

coc> During my training classes I always tell the -sV switch is
coc> dangerous and known to (sometimes) crash the target.  

coc> Usually a better tool to test open udp ports is unicornscan, but
coc> that doesn't have a switch like -iL. Since you are testing your
coc> own devices and you know the community string, you could insider
coc> to loop through the list of IP's and snmpget a value from the MIB.

coc> Cor

coc> sent from a mobile device 


coc> Origineel bericht
coc> Van: Shang Tsung
coc> Verzonden:  30-06-2010 13:03:32
coc> Onderw.:  Should nmap cause a DoS on cisco routers?

coc> Hello,

coc> Some days ago, I had the task to discover the SNMP version that our 
coc> servers and networking devices use. So I run nmap using the following 
coc> command:

coc> nmap -sU -sV -p 161-162 -iL target_file.txt

coc> This command was supposed to use UDP to probe ports 161 and 162, which
coc> are used for SNMP and SNMP Trap respectively, and return the SNMP 
coc> version.

coc> This "innocent" command caused most networking devices to crash and 
coc> reboot, causing a Denial of Service attack and bringing down the 
coc> network.

coc> Now my question is.. Should this had happened? Can nmap bring the whole
coc> network down from one single machine?

coc> Is this a configuration error of the networking devices?

coc> This is scary...

coc> Shang Tsung






coc>   

coc> 
coc> This list is sponsored by: Information Assurance Certification Review Board

coc> Prove to peers and potential employers without a doubt that you
coc> can actually do a proper penetration test. IACRB CPT and CEPT
coc> certs require a full practical examination in order to become certified.

coc> http://www.iacertification.org
coc> 


coc> ___
coc> Full-Disclosure - We believe in it.
coc> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
coc> Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Security contact Bluecoat

2010-05-07 Thread Thierry Zoller

Dear List,

Anybody aware of the security contact for Bluecoat.
secure@ bounces

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Vuln Disclosure summarized (TTBOMA)

2010-04-29 Thread Thierry Zoller

Hello,

Your missing legislative circumstances in your thoughts :

>- Releasing at a conference => Probable court time.
Under what legislation would that potentially be the case ?

>- Keeping it to yourself => Working under the assumption that your the
>only one that has found that same bug is still semi relevant due to
>the incredibly small size of the exploit dev community. However, as
>Dave said, they'll be toasting to their sleeping dead 0days some day.
Under  the  jurisdiction  I  personaly  am under I am responsbile if I
DON'T  disclose  vulnerabilities  (to  the  vendor)  -  this  includes
potential damages should the vulnerability be used. This is the law
over here if you have the PSF statute.


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] TLS/SSL Hardening & Compatibility Report 2010

2010-02-18 Thread Thierry Zoller
Dear List,

At  last.  What  started as an "I need an overview of best practise in
SSL/TLS configuration" type of idea, ended in a 3 month code, reverse
engineer and writing effort. I really hope this comes in handy for you
and was worth the effort. This is the "Release candidate" version of
the paper, should no errors be found it will be the final version.

This paper aims at answering the following questions :

* What SSL/TLS configuration is state of the art and considered secure 
(enough) for the next years?
* What SSL/TLS ciphers do modern browsers support ?
* What SSL/TLS settings do server and common SSL providers support ? 
* What are the cipher suites offering most compatibility and security ?
* Should we really disable SSLv2 ? What about legacy browsers ?
* How long does RSA still stand a chance ?
* What are the recommended hashes,ciphers for the next years to come

The paper includes two tools :

* SSL Audit (alpha) :
SSL scanner scanning remote hosts for SSL/TLS support (Video)
* Harden SSL/TLS (beta) :
Windows server and client SSL/TLS hardening tool (Video)

Without further ado here is the complete package
http://blog.g-sec.lu/2010/02/new-paper-ssltls-hardening-and.html

Other Tools and Papers - http://www.g-sec.lu/products.html

PS: In order to know whether this type of publication is useful
to some and whether I should spend time on such publications in
the future, I would appreciate a heads-up if you find this to
be interesting. Thierry

Regards,
Thierry ZOLLER


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Harden TLS/SSL - Tool release

2010-02-17 Thread Thierry Zoller


TOOL: Harden SSL/TLS beta
OS: Windows (2000,XP,Seven,2003,2008,2008R2)
Requirement : .NET Framework 2.0
Author : Thierry Zoller for G-SEC Ltd.


Developed as part of G-SEC's investigation into the
"Secure SSL/TLS configuration Report 2010" (to be
published) we developed this little tool.

"Harden SSL/TLS" hardens the default SSL/TLS settings of
Windows 2000,2003,2008,2008R2, XP,Vista,7. It allows to
remotely set SSL/TLS policies allowing or denying certain
ciphers/hashes or complete ciphersuites.

It took longer then I expected to create this tool, Windows
7 really strengthened the cryptosuites and introduced a new
way Windows handles SCHANNEL policies and required quite
some re-engineering. For instance, I had to create a mini
state engine just for the preferred cipher list.

Harden SSL/TLS allows setting policies with regards
to what ciphers and protocols are available to applications
that use SCHANNEL crypto interface. A lot of windows
applications do use this interface, for instance IIS, Google
Chrome as well as Apple Safari and many more.

By changing the settings you can indirectly control
what ciphers and protocols these applications are
allowed to use and stay compliant to whatever policies
you use.

Note: unfortunately neither chrome nor safari make use
of the new TLS 1.2 protocol that Windows 7 introduced
(hint hint). They both use SCHANNEL and just need to
add a parameter to the SCHANNEL initialization in
order to support it. (Let's see who is first)

It allows to allow or deny:
·  Hashes
·  Keyexchange algorithms
·  Protocols
·  Ciphers & Ciphersuites
·  Priority of preferred Ciphersuites

Advanced mode
· Re-enable ECC P521 mode on Windows7 and 2008R2
  (P521 mode was available on Vista and 2008 but removed in
  Windows7 and 2008R2)
· Enable TLS 1.2 support on IIS 7.5 (off by default)
· Set TLS Cache size and timeout

Download and Information:
http://blog.g-sec.lu/2010/02/harden-ssltls-tool-release.html

Documentation :
http://www.g-sec.lu/sslharden/documentation.pdf

Video :
http://www.g-sec.lu/sslharden/harde_ssl.swf



-- 
http://www.g-sec.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Announce - SSL Audit (alpha) [G-SEC Ltd.]

2010-02-10 Thread Thierry Zoller

Developed as part of G-SEC's investigation for the
"Secure SSL/TLS configuration Report 2010" (to be published)
we developed this little tool called SSL Audit.

It is in alpha stage and thought it has a little interesting
gimmick, don't expect too much.

It  implements  it's  own tiny SSL parsing engine and does not rely on
OpenSSL or any other SSL Engine - This implies that it can detect
ciphers suites not supported by OpenSSL and others.

Apart from scanning available ciphersuites it has an interesting tidbit
The Fingerprint mode (Experimental). Included is an experimental
fingerprint engine that tries to determine the SSL Engine used server
side. It does so by sending normal and malformed SSL packets that can
be interpreted in different ways.

SSL Audit is able to fingerprint :
· IIS7.5 (Schannel)
· IIS7.0 (Schannel)
· IIS 6.0 (Schannel)
· Apache (Openssl)
· Apache (NSS)
· Certicom
· RSA BSAFE

Blog Post :
http://blog.g-sec.lu/2010/02/ssltls-audit-alpha-tool-release.html

Documentation:
http://www.g-sec.lu/sslaudit/documentation.pdf

Regards,
Thierry Zoller




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread Thierry Zoller
Hi Paul,

Facts :
- Several distributions run with vulnerable settings per default
  if there is a "misconfiguration" it is part of the vendor.
- Your not supposed to be able to traverse dirs.

Consequence it is a vulnerability, whether you can mitigate it is
a different piece of cake.

Next time somebody creates an IE8 0day that relies on javascript,
will  you  scream  "misconfiguration!"  ?  Of course you could disable
javascript  but  is  it  by enabled default ? Yes.

The question for smb is who does restrict this setting?
My tests reveal - not many.

Congrats  Kingcope,  nice  bug. Directory traversal in major daemon in
2010.

Regards,
Thierry


pssea> Dear Kingcope,

pssea> The samba server follows symlinks by default. There are options
pssea> ("follow symlinks", "wide links") for turning it off:

pssea> 
http://www.samba.org/samba/docs/using_samba/ch08.html#samba2-CHP-8-SECT-1.2
pssea> 
http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#FOLLOWSYMLINKS
pssea> http://www.samba.org/samba/docs/man/manpages-3/smb.conf.5.html#WIDELINKS

pssea> The "problem" at your installation seems a mis-configuration of
pssea> your server: please ask the admin to set "secure" options.
pssea> (Some samba installations, like mine, wish to allow same access as a
pssea> UNIX login would allow. Some shares like [home] are provided for ease
pssea> of use, users are encouraged to create symlinks to other "interesting"
pssea> places e.g. NFS-mounted directories.)

pssea> Cheers, Paul

pssea> Paul Szabo   p...@maths.usyd.edu.au  
pssea> http://www.maths.usyd.edu.au/u/psz/
pssea> School of Mathematics and Statistics   University of SydneyAustralia

pssea> ___
pssea> Full-Disclosure - We believe in it.
pssea> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
pssea> Hosted and sponsored by Secunia - http://secunia.com/



-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Samba Remote Zero-Day Exploit

2010-02-06 Thread Thierry Zoller

http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] iAWACS 2010 : Rules of the PWN2KILL contest

2010-01-11 Thread Thierry Zoller
gt; distributed.

AD> Any participant is free to communicate later on about his test/code/attack
AD> performed during the contest. In this case, iAWACS organizers are not
AD> responsible for that communication.

AD> ___
AD> Full-Disclosure - We believe in it.
AD> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
AD> Hosted and sponsored by Secunia - http://secunia.com/



-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] TLS / SSLv3 vulnerability explained (New ways to leverage the vulnerability)

2009-12-11 Thread Thierry Zoller

BID 36935
ERRATA:  The  previous trace POC was renamed to 36935-3.c on securityfocus
and had a small error in it. It is now fixed and available here. I'd like
to ask repositories to update.

File available here:
http://www.g-sec.lu/ssl-trace-poc.c

Original Paper: http://www.g-sec.lu/practicaltls.pdf


Regards,
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] TLS / SSLv3 vulnerability explained (New ways to leverage the vulnerability)

2009-11-30 Thread Thierry Zoller

Dear List,

I  updated  the  whitepaper  with  a  lot  of  new  information,  some
leveraging  the  vulnerability  in  other  ways  that certainly increase
the effectiveness and impact of this vulnerability.

A brief warning to those that think they are safe because they
don't   accept   client-side   renegotiations   (server  + openssl). I
came across major websites where the SSL loadbalancer in front of the HTTPS
servers were vulnerable. Although the servers were patched it still was
possible   to  perform  the  attacks  (The  loadbalancer  merged  both
sessions and handed them as one to the webserver)

Updates :

- Added a simple s_client testcase
- Analysis of FTPS (vendors are encouraged to assess)
- HTTPS : Injecting arbritary _responses_ into the stream
- HTTPS : Downgrading HTTPS to HTTP and performing an active mitm
  (Discovered by Frank Heidt but details witheld,
  rediscovered by Thierry Zoller for this paper)

With this new information G-SEC encourages Vendors  and  customers
to reevaluate the impact of this vulnerability on their products.

Brief explanations :

HTTPS : Injecting arbritary _responses_ into the stream
---
The  attacker  injects  a  TRACE command, by doing so the attacker can
indirectly control the content that is send from the server to the
victim over HTTPS

Downgrading HTTPS to HTTP and performing an active mitm
---
This  attack  leverages  the  known  SSLStrip  attack  to also work on
establised  SSL  connections.  SSLstrip  had  the  limitation  that it
required a user to access over HTTP in order to rewrite the html code
to  perform  active  mitm.  This  attack  over  the  TLS renegotiation
vulnerability now allows (if certain conditions are met) to downgrade
EXISTING SSL connections to perform an SSLstrip attack.


Proof of concept files
^^
G-SEC provides 2 proof of concept files  :
- ssl-trace.c : using TRACE to inject (partialy) arbritary content
into the encrypted stream
- ssl-302.c : Injecting a GET command to a 302 page redirecting the
  client to HTTP

Whitepaper : 
http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html
POC files : http://www.g-sec.lu/tls-ssl-proof-of-concept.html



---


This paper explains the vulnerability for a broader audience and
summarizes the information that is currently available. The document
is prone to updates and is believed to be accurate by the time of
writing.

Post:
http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html

Direct Download
http://clicky.me/tlsvuln

Disclaimer
Information is believed to be accurate by the time of writing.
As this vulnerability has complex implications this document
is prone to revisions in the future.


Thierry ZOLLER - G-SEC
http://www.g-sec.lu
Principal Security Consultant



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] New Paper: MitM Attacks against the chipTAN comfort Online Banking System

2009-11-24 Thread Thierry Zoller
Hi,

Thank you for the information.

MITM  is  used  rather  vaguely  in  this  paper.  Are  the proposed
techniques  working in an MITM situation - where an attacker is in the
middle of a network stream ? Say on a network over arp cache poisening?

The  paper  afaik  applies  to  systems  that  are  already compromised
by an attacker, i.e where malware has been installed.

If this is the case what rights (Account acl) does the malware require
in order to perform the mentioned attacks ?

This  brings  me  to  an  interesting more general discussion,
can one define malware infected workstations  and the attacks they
perform locally as MITM ? Technically they inject themselves between
the client and the server, however they need to be installed prior to
be able to do so. Furthermore they have  access  to  a  lot  more
information  and possibilities then an attacker that is, say in the
middle of a network connection.

For  sake  of  allowing  proper risk  assessment by technically less
trained persons - one should coin a better term than classical mitm -
but maybe I am mistaken? what about MITMa (man in the machine)

All: What's your opinion ?

http://de.wikipedia.org/wiki/Man-in-the-middle-Angriff
http://technet.microsoft.com/en-us/library/cc722487.aspx#EJAA
#1 and #2

Regards,
Thierry

RPG> Abstract
RPG> 
RPG> ChipTAN comfort is a new system which is supposed to securely authorise 
online
RPG> banking transactions by means of a trusted device. It is assumed that 
chipTAN
RPG> comfort specifically protects against man-in-the-middle attacks. Such 
attacks are
RPG> currently putting bank customers who are using the iTAN system at risk. 
RedTeam
RPG> Pentesting examined chipTAN comfort and showed that even when using this 
sys-
RPG> tem, man-in-the-middle attacks can compromise online banking security.


RPG> The full paper is available in German and English at

RPG> http://www.redteam-pentesting.de/publications/MitM-chipTAN-comfort




-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] TLS / SSLv3 vulnerability explained (DRAFT)

2009-11-18 Thread Thierry Zoller

Dear List,

This paper explains the vulnerability for a broader audience and
summarizes the information that is currently available. The document
is prone to updates and is believed to be accurate by the time of
writing.

Post:
http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html

Direct Download
http://clicky.me/tlsvuln

Disclaimer
Information is believed to be accurate by the time of writing.
As this vulnerability has complex implications this document
is prone to revisions in the future.


Thierry ZOLLER - G-SEC
http://www.g-sec.lu
Principal Security Consultant



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [G-SEC 49-2009] McAfee generic PDF detection bypass

2009-10-27 Thread Thierry Zoller


  McAfee multiple products - Generic PDF detection bypass


***
Cheap plug :
If you are interested in client side vulnerabilities visit HACK.LU 
starting tomorrow 28-30 Oct with :

Workshop:
* Bypassing the Perimeter: Client Side Exploitation - Nitesh Dhanjani, 
  Billy K Rios
Talks :
* New advances in Office Malware analysis - Frank Boldewin
* PDF Penetration Document Format - Didier Stevens
* Ownage 2.0 - Saumil Shah (who else)
* Malicious PDF origamis strike back - Guillaume Delugré
   Frederic Raynal
***


Release mode  : Coordinated
Reference : [GSEC-05-2009] - MCafee generic PDF bypass
WWW   : http://www.g-sec.lu/mcafee-pdf-bypass.html
Vendor: http://www.mcafee.com
Status: Patched
CVE   : none attributed yet
Credit: https://kc.mcafee.com/corporate/index?page=content&id=SB10003
   (We disagree with the CVSS rating )
Discovered by : Thierry Zoller (G-SEC)


Affected products : 
~~~
All McAfee software that uses DATs including:
- McAfee GroupShield
- McAfee LinuxShield
- McAfee NetShield for NetWare
- McAfee PortalShield
- McAfee Total Protection Service (SaaS)
- McAfee Virex
- McAfee Total Protection™ 2009
- McAfee Internet Security
- McAfee VirusScan USB
- McAfee VirusScan Enterprise
- McAfee VirusScan Enterprise Linux
- McAfee VirusScan Enterprise for SAP
- McAfee VirusScan Enterprise for Storage
- McAfee VirusScan Commandline
- Mcafee SecurityShield for Microsoft ISA Server
- Mcafee Security for Microsoft Sharepoint
- Mcafee Security for Email Servers
- McAfee Email Gateyway
- McAfee Total Protection for Endpoint
- McAfee Active Virus Defense
- McAfee Active VirusScan

Patch availability :

Patches dsitributed through automatic updates

I. Background
~
Quote: "McAfee proactively secures systems and networks from known 
and as yet undiscovered threats worldwide. Home users, businesses, 
service providers, government agencies, and our partners all trust 
our unmatched security expertise and have confidence in our 
comprehensive and proven solutions to effectively block attacks
and prevent disruptions."

II. Description
~~~
Improper parsing of the PDF structure leads to evasion of detection of 
malicious PDF documents at scantime and runtime.
  
This has been tested with several malicious PDF files and represents
a generic evasion of all PDF signatures and heuristics.

General information about evasion/bypasses can be found at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

III. Impact
~~~
Known PDF exploits/malware may evade signature detection, 0day exploits
may evade heuristics.


IV. Disclosure timeline
~
DD.MM.
01.06.2009 - Reported 
20.10.2009 - McAfee informed us that they published the advisory on their 
website
< waiting for others vendors to patch >
27.10.2009 - G-SEC releases this advisory

About G-SEC
~~~
G-SEC™  is  a  vendor independent luxemburgish led IT security consulting
group. More information available at : http://www.g-sec.lu/












___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [G-SEC 48-2009] F-SECURE - Generic PDF detection bypass

2009-10-27 Thread Thierry Zoller


  F-SECURE multiple products - Generic PDF detection bypass


***
Cheap plug :
If you are interested in client-side vulnerabilities visit HACK.LU 
starting tomorrow [28-30 Oct] with :

Workshop:
* Bypassing the Perimeter: Client Side Exploitation - Nitesh Dhanjani,
  Billy K Rios
Talks :
* New advances in Office Malware analysis - Frank Boldewin
* PDF Penetration Document Format - Didier Stevens
* Ownage 2.0 - Saumil Shah (who else)
* Malicious PDF origamis strike back - Guillaume Delugré
   Frederic Raynal
***

Release mode  : Coordinated
Reference : [GSEC-48-2009] - F-Secure generic PDF bypass
WWW   : http://www.g-sec.lu/fsecure-pdf-bypass.html
Vendor: http://www.f-secure.com
Status: Patched
CVE   : none attributed yet
Credit: tba (probably FSC-2009-3)
Discovered by : Thierry Zoller (G-SEC)


Affected products : 
~~~
- F-Secure Internet Security 2009 and earlier
- F-Secure Anti-Virus 2009 and earlier
- F-Secure Home Server Security 2009
- Solutions based on F-Secure Protection Service for Consumers version 8.00 and 
earlier
- Solutions based on F-Secure Protection Service for Business -  Workstation 
security version 8.00 and earlier
- Solutions based on F-Secure Protection Service for Business -  E-mail and 
Server security version 8.00 and earlier
- F-Secure Client Security 8.01 and earlier
- F-Secure Anti-Virus for Workstations 8.0 and earlier
- F-Secure Anti-Virus for Windows Servers 8.00 and earlier
- F-Secure Linux Security 7.02 and earlier
- F-Secure Anti-Virus Linux Client Security 5.54 and earlier
- F-Secure Anti-Virus Linux Server Security 5.54 and earlier
- F-Secure Anti-Virus for Linux Servers 4.65
- F-Secure Anti-Virus for Microsoft Exchange 8.00 and earlier
- F-Secure Internet Gatekeeper for Windows 6.61 and earlier
- F-Secure Internet Gatekeeper for Linux 3.02 and earlier
- F-Secure Internet Gatekeeper for Linux Japanese 2.37 and earlier
- F-Secure Anti-Virus for Citrix Servers 7.00 and earlier
- F-Secure Anti-Virus for MIMEsweeper 5.61 and earlier


Patch availability :

Patches distributed through automatic updates

I. Background
~
Quote: "F-Secure offers a broad range of PC and internet security 
products made for your home or business, so you will 
always be protected. Our internet security, antivirus 
and anti-spyware software is trusted by more than 180
internet service providers around the world. Moreover, 
with 16 global offices and a presence within more than 
100 countries, F-Secure is sure to be there for you and
your security software needs."

II. Description
~~~
Improper parsing of the PDF structure leads to evasion of detection of 
malicious PDF documents at scantime and runtime.
  
This has been tested with several malicious PDF files and represents
a generic evasion of all PDF signatures and heuristics.

General information about evasion/bypasses can be found at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

III. Impact
~~~
Known PDF exploits/malware may evade signature detection, 0day exploits
may evade heuristics.


IV. Disclosure timeline
~
DD.MM.
15.05.2009 - Reported to F-Secure 
12.07.2009 - Patches deployed automatically, F-Secure waits to
 coordinate public disclosure
< waiting for others to patch >
27.10.2009 - G-SEC releases this advisory


About G-SEC
~~~
G-SEC™  is  a  vendor independent luxemburgish led IT security consulting
group. More information available at : http://www.g-sec.lu/








___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [G-SEC 47-2009] Symantec generic PDF detection bypass

2009-10-27 Thread Thierry Zoller


 Symantec multiple products - Generic PDF bypass


***
Cheap plug :
Speaking of PDF - If you are interested in client-side vulnerabilities
visit HACK.LU starting tomorrow [28-30 Oct] with :

Workshop:
* Bypassing the Perimeter: Client Side Exploitation - Nitesh Dhanjani, 
  Billy K Rios
Talks :
* New advances in Office Malware analysis - Frank Boldewin
* PDF Penetration Document Format - Didier Stevens
* Ownage 2.0 - Saumil Shah (who else)
* Malicious PDF origamis strike back - Guillaume Delugré
   Frederic Raynal
***

Release mode: Coordinated
Reference   : [GSEC-47-2009] - Symantec generic PDF bypass
WWW : http://www.g-sec.lu/symantec-pdf-bypass.html
Vendor  : http://www.symantec.com
Status  : Patched
CVE : none attributed yet
Credit  : http://tinyurl.com/ygqnlhs
Discovered by : Thierry Zoller (G-SEC)


Affected products : 
~~~
- Symantec Mail Security for Domino
- Symantec Mail Security for Microsoft Exchange
- Symantec Mail Security for SMTP
- Symantec Brightmail Gateway
- Symantec AntiVirus for Network Attached Storage
- Symantec AntiVirus for Caching
- Symantec AntiVirus for Messaging
- Symantec Protection for SharePoint Servers
- Symantec Protection Suite
- Symantec Scan Engine
- Symantec Client Security
- Symantec Endpoint Protection
- Symantec AntiVirus Corporate Edition
- Norton Internet Security
- Norton 360
- Norton AntiVirus
- Norton Systemworks

Patch availability :

Patches distributed through automatic updates

I. Background
~
Quote: "Symantec helps consumers and organizations secure and 
manage their information-driven world. Our software and services 
protect against more risks at more points, more completely and 
efficiently, enabling confidence wherever information is used or stored."

II. Description
~~~
Improper parsing of the PDF structure leads to evasion of detection of 
malicious PDF documents at scantime and runtime.
  
This has been tested with several malicious PDF files and represents
a generic evasion of all PDF signatures and heuristics.

General information about evasion/bypasses can be found at :
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

III. Impact
~~~
Known PDF exploits/malware may evade signature and heuristic detection, 0day 
exploits
may evade heuristics.


IV. Disclosure timeline
~
DD.MM.
01.06.2009 - Reported 
12.06.2009 - "This will be posted to our Symantec Product Security Advisory page
 though we are not identifying these issues as vulnerabilities, 
it's just
 the best method to disseminate this type of product information"
< waiting for others to patch >
27.10.2009 - G-SEC releases this advisory


About G-SEC
~~~
G-SEC™  is  a  vendor independent luxemburgish led IT security consulting
group. More information available at : http://www.g-sec.lu/












___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [G-SEC 46-2009] Computer Associates multiple products arbritary code execution

2009-10-13 Thread Thierry Zoller


   Computer Associates (CA) Anti-Virus
  Multiple products - arbitrary code execution


Release mode  : Coordinated
Reference : [GSEC-46-2009] - Computer Associates multiple products RCE
WWW   : 
http://blog.g-sec.lu/2009/10/computer-associates-multiple-products.html
Vendor: http://www.ca.com
Status: Patched
CVE   : CVE-2009-3587 & CVE-2009-3588
Credit: 
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878
Discovered by : Thierry Zoller (G-SEC)
Vendor reaction rating : near perfect*
*
Continous feedback on progress - CVE numbers - In depth investigation of the 
issues at hand


Affected products : 
~~~
CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1
CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8
CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) r8.1
CA Anti-Virus 2007 (v8)
CA Anti-Virus 2008
CA Anti-Virus 2009
CA Anti-Virus Plus 2009
eTrust EZ Antivirus r7.1
CA Internet Security Suite 2007 (v3)
CA Internet Security Suite 2008
CA Internet Security Suite Plus 2008
CA Internet Security Suite Plus 2009
CA Threat Manager for the Enterprise (formerly eTrust Integrated 
   Threat Management) r8
CA Threat Manager for the Enterprise (formerly eTrust Integrated 
   Threat Management) 8.1
CA Threat Manager Total Defense
CA Gateway Security r8.1
CA Protection Suites r2
CA Protection Suites r3
CA Protection Suites r3.1
CA Secure Content Manager (formerly eTrust Secure Content 
   Manager) 1.1
CA Secure Content Manager (formerly eTrust Secure Content 
   Manager) 8.0
CA Network and Systems Management (NSM) (formerly Unicenter 
   Network and Systems Management) r3.0
CA Network and Systems Management (NSM) (formerly Unicenter 
   Network and Systems Management) r3.1
CA Network and Systems Management (NSM) (formerly Unicenter 
   Network and Systems Management) r11
CA Network and Systems Management (NSM) (formerly Unicenter 
   Network and Systems Management) r11.1
CA ARCserve Backup r11.5 on Windows
CA ARCserve Backup r12 on Windows
CA ARCserve Backup r12.0 SP1 on Windows
CA ARCserve Backup r12.0 SP 2 on Windows
CA ARCserve Backup r12.5 on Windows
CA ARCserve Backup r11.1 Linux
CA ARCserve Backup r11.5 Linux
CA ARCserve for Windows Client Agent
CA ARCserve for Windows Server component
CA eTrust Intrusion Detection 2.0 SP1
CA eTrust Intrusion Detection 3.0
CA eTrust Intrusion Detection 3.0 SP1
CA Common Services (CCS) r3.1
CA Common Services (CCS) r11
CA Common Services (CCS) r11.1
CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK)
CA Anti-Virus Gateway (formerly eTrust Antivirus Gateway) 7.1

Affected Plattforms:
~~~
Windows
UNIX
Linux
Solaris
Mac OS X
Netware


Patch availability :

Patches have been available since the 09.10.2009 - Please follow the steps 
listed
here: https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878


I. Background
~
Quote: 
"CA is one of the world's largest IT management software providers.
We serve more than 99% of Fortune 1000 companies, as well as government 
entities, educational institutions and thousands of other companies 
in diverse industries worldwide" 

"CA Anti-Virus for the Enterprise is the next generation in comprehensive 
anti-virus security for business PCs, servers and PDAs. It combines 
proactive protection against malware with new, powerful management 
features that stop and remove malicious code before it enters your 
network, reducing system downtime"


II. Description
~~~
Improper handling of a specially crafted RAR archive file by the CA 
Anti-Virus engine arclib component leads to heap corruption and 
allows the attacker to cause a denial of service or possibly 
further compromise the system.

Attacker has control over EBX :

Basic Block:
6e4305b0 mov cl,byte ptr [ebx]
   Tainted Input Operands: ebx
6e4305b2 add edi,28h
6e4305b5 push edi
6e4305b6 lea edx,[esp+14h]
6e4305ba mov byte ptr [esp+14h],cl
   Tainted Input Operands: cl
6e4305be inc ebx
   Tainted Input Operands: ebx
6e4305bf push edx
6e4305c0 mov ecx,esi
6e4305c2 mov dword ptr [esp+1ch],ebx
   Tainted Input Operands: ebx
6e4305c6 call arclib!arctkopenarchive+0x283a0 (6e42f9f0)



III. Impact
~~~
The impact ranges from Denial of Service to potential remote arbitrary code 
execution.
Due to the nature of Anti-virus products, the attack vectors can be near 
endless. An attack
could be done over the way of an E-mail message carrying an RAR attachment (of 
a file
recognised as being RAR), USB, CD, Network data etc.

Please note that this is a general problem and not exclusive to Computer 
Associates.


IV. Disclosure timeline
~~~

Re: [Full-disclosure] [-SPAM-] Re: When is it valid to claim that a vulnerability leads to a remote attack?

2009-10-12 Thread Thierry Zoller
Hi James,

Well, that  would explain why client side exploits are so fruity these
days. Probably  nobody  invests  into  protection  against  them , as the
risk assessment team tells them it is a local issue only ? Pun intended ;)

A  PDF/DOC exploit should be classified as remotely exploitable or else your
assessment suffers from lack of reality - sorry.

We  have  the following denominations in this thread, which
all mean different things, doesn't really help us here :
* "a remote bug"
* "a remote attack"
* "remotely exploitable"

"A remote attack"
= An action

"Remotely   exploitable"
= possibility that vulnerability is exploited  remotely

"A  remote  bug"=
a bug that is remotely triggerable (??) doesn't even imply it is exploitable.

I  only  perceive  one of these denominations to be worth being used in
risk assessment -that being "remotely exploitable"


JM> If you classify a remote bug (anything that can be exploited remotely) then
JM> you are classifying all bugs (you can use a privilege escalation exploit
JM> remotely)
Yes,  you actually  should  consider  you  can  use  these  types  of attacks
remotely,   but   "normally"   not   without   a  "first  degree  remote
vulnerability" (add that to the list of denominations).

JM> I agree with Thor, anything that exploits a remote service
JM> (HTTP,FTP Etc..) without any user interaction.

JM> On Sun, Oct 11, 2009 at 12:54 AM, Thor (Hammer of God) > wrote:

>>
>>
>> > I  think we can agree that yes, it is remotely exploitable and as such
>> > should be categorized as "remote" in Risk/Impactt scoring systems ?
>> >
>> > Does anybody disagree ? I'd be interested to hear your point of view.
>>
>> Hey Thierry - I hope all is well...
>>
>> I'm happy to include "user assisted remote exploitation" as a "remote"
>> vulnerability in academic conversations, but I don't categorize it as
>> "remote" when assessing overall risk to a particular threat in production
>> environments.  Like everyone else, my TMs include impact and skill required
>> to exploit a particular vulnerability; but they also include "likelihood of
>> exploitation."   While that may sound like a wildcard metric, I quantify it
>> by applying the internal controls in place that may mitigate a particular
>> attack.  In "my" networks (networks I control, design, or consult for) most
>> users couldn't execute [common] exploits even if they wanted to.  I won't
>> bore you with the controls I deploy as I'm confident you are well aware of
>> the options one has, but the fact they exist at all place "user assisted
>> remote exploits" in a different category for me when assessing risk.  When
>> the propensity for a vulnerability to be exploited lies in a particular
>> user's response to any given
>>  trigger, as opposed to any authoritative in-place controls to mitigate
>> exposure, then a model's relevant response options are greatly diminished
>> (IMO).
>>
>> As such, I choose to categorize "remote" exploits as those that may be
>> executed against a given host that is autonomously running a [vulnerable]
>> service that can be connected to by some (any) other network client, device,
>> or service for the purposes of ascertaining overall risk.
>>
>> t
>>
>> ___
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>






-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] When is it valid to claim that a vulnerability leads to a remote attack?

2009-10-10 Thread Thierry Zoller
Hi Dan,

DK> There are a substantial number of file formats that are code-execution
DK> equivalent with no exploits necessary -- .exe, .com, .bat, etc.  You thus
DK> can't say that an executed file must not execute code, because there's no
DK> way for the user to know whether a file on his desktop is an .exe or
DK> something else.

Maybe I misunderstand what you are saying but - Isn't the point in this
case is that  running  binary  files  mapped  as executables  is  not
exploiting  a  vulnerability  in  a  third party application ?

I understood that Jonathan  was  asking  whether the exploitation of a file 
format
vulnerabilityin   Product   X   can  be  categorized  as  remotely
exploitable - even  though  it  is not exposed to the outside and one can only 
reach
arbitrary control by indirect means.

I  think we can agree that yes, it is remotely exploitable and as such
should be categorized as "remote" in Risk/Impactt scoring systems ?

Does anybody disagree ? I'd be interested to hear your point of view.


DK> The key here is "escalation of privilege".  At the point you're launching
DK> formats, the privilege has already been granted.
If   you   could dive into this a bit more as I can't follow you here. I
frankly don't know any Access control logic where running  a  format leads
to the escalation of a privilege, per se.


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] When is it valid to claim that a vulnerability leads to a remote attack?

2009-10-09 Thread Thierry Zoller
Hi Jonathan,

IMHO  it  generally  is classified as remote. Some vendors call it
"user  assisted  remote arbitrary code execution" which, in my opinion
is just downplaying the issue - there are virtually unlimited means to
get  somebody  or something to open such a file some less assisted but
still exploiting the issue at hand.

If  you  want  to  find  common  ground  with said person, propose the
denomination above.

This   subject   is  indeed  interesting and worth discussing, not sure
FD is the best place though.

Regards,
Thierry

JL> A reputable security defect reporting organization is claiming that a
JL> Windows program is subject to a remote attack because:

JL> * The vulnerable program (call it 'pqrminder') is registered as the
JL> 'handler' for files with a specific extension (call it '.pqr').
JL> * If the user downloads a '.pqr' file (or is sent on in the mail and clicks
JL> on it), then 'pqrminder' is invoked.
JL> * If the file is malformed, then arbitrary code can be executed (buffer
JL> overflow).

JL> While recognizing that there is a bug here, that does not strike me as
JL> being what is normally meant by a 'remote attack'.

JL> --
JL> Jonathan Leffler (jleff...@us.ibm.com)
JL> STSM, Informix Database Engineering, IBM Information Management
JL> 4400 N First St, San Jose, CA 95134-1257
JL> Tel: +1 408-956-2436 Tieline: 475-2436
JL> "I don't suffer from insanity; I enjoy every minute of it!"


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Source for USB stick with hardware write-protect?

2009-10-08 Thread Thierry Zoller


Whileprobablynot   interesting  for  Forensic  usage  and  OS
dependant:
Windows  offers  a  simple  registry  key  to  block write requests to
removable storage such as USB keys,

Wrote  a small app that does exactly this, it's a nice gimmick to have
for various test cases.
http://blog.zoller.lu/2009/03/new-tool-usb-write-blocker.html

>> Meanwhile i'd like to enlarge the search - is there out any HDD sata
>> drive enclosures with hardware write protect switch?
>>   

MH> Google "Forensic write blocker". There's tons of products in a variety
MH> of interfaces designed to do this (for the forensics industry).

MH> Cheers,

MH> Michael Holstein
MH> Cleveland State University

MH> ___
MH> Full-Disclosure - We believe in it.
MH> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
MH> Hosted and sponsored by Secunia - http://secunia.com/



-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Source for USB stick with hardware write-protect?

2009-10-07 Thread Thierry Zoller
Hi K,

http://www.heise.de/ct/projekte/FAQ-406390.html#sticks


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft Internet Information Server ftpd zeroday

2009-09-08 Thread Thierry Zoller
Hi Kingcope,

Thanks to a hint by "Petar" on the G-SEC blog [1] it  appears
that the  very same bug was present in IIS3 and IIS4 and discovered
by eeye in 1999 :
http://research.eeye.com/html/advisories/published/AD19990124.html

"Microsoft  IIS  (Internet  Information Server) FTP service contains a
buffer overflow in the NLST command. This could be used to DoS a remote
machine and in some cases execute code remotely."

Is this the same bug andwas the bug re-introduced ? Has Microsoft
fixed  LS  but  not NLST?  "svn" mishap ?

Maybe Mudge and/or Dildog can comment - would certainly be interesting
to know whether and if HOW this bug was reintroduced.

[1] http://blog.g-sec.lu/2009/09/iis-5-iis-6-ftp-vulnerability.html

Regards,
Thierry ZOLLER

--
http://blog.zoller.lu



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft Internet Information Server ftpd zeroday

2009-08-31 Thread Thierry Zoller

Confirmed.

Ask  yourselves why your fuzzers haven't found that one - Combination of
MKDIR are required before reaching vuln code ?



-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Fwd: Re[2]: [Dailydave] Security people are leaches. [sic]

2009-08-11 Thread Thierry Zoller

As Dave seems to have his ongoing NZ filtering going on
again on the DailyDave list, I post it here..

Anybody wants create a list mirroring DD but letting replies through
even if those are against your views?

===8<=== Original Nachrichtentext ===
Hi Aaron,

>The 'shades of grey' only exist to security people.
Define  "security  poeple"  ?  A  complete  branch  of  corporate risk
management is formed of "security poeple". So does this make it "less
of a problem" ?

>To no one else is it important
>that a bug disclose information, allow invalid root access, or escalate 
>privileges.
You  obviously  have  not  worked with or within a company that has to
balance  all  sorts  of  risks.  If  a  kernel bug is slipped upstream
because  it  was  not  properly  marked  as a security issue, it means
potential  loss.  So  since  when is loosing money "only important" to
"security poeple". Security = Risk of loss, and Sir this is important
for everybody in the company.

I  am  astounded  how  narrow minded some developers have become. Some
apparently  never  see the complete picture of how a business operates
how  potential  risks/losses  are  mitigated  and how this impacts the
developers.  SDL  training  seems  to  need  an  intruduction  on  the
fundementals  of  security,  operational and others. A birds-eye view,
maybe  if the interconnections are understood some will understand why
it is important.

It's not a technical issue - at all.

PS.  Dave  -  I am not writing comments for you to sent to dev/null, I
consider my time more usefull.

-- 
http://blog.zoller.lu
Thierry Zoller

===8<== Ende des Original Nachrichtentextes =--- Begin Message ---
Hi Aaron,

>The 'shades of grey' only exist to security people.
Define  "security  poeple"  ?  A  complete  branch  of  corporate risk
management is formed of "security poeple". So does this make it "less
of a problem" ?

>To no one else is it important
>that a bug disclose information, allow invalid root access, or escalate 
>privileges.
You  obviously  have  not  worked with or within a company that has to
balance  all  sorts  of  risks.  If  a  kernel bug is slipped upstream
because  it  was  not  properly  marked  as a security issue, it means
potential  loss.  So  since  when is loosing money "only important" to
"security poeple". Security = Risk of loss, and Sir this is important
for everybody in the company.

I  am  astounded  how  narrow minded some developers have become. Some
apparently  never  see the complete picture of how a business operates
how  potential  risks/losses  are  mitigated  and how this impacts the
developers.  SDL  training  seems  to  need  an  intruduction  on  the
fundementals  of  security,  operational and others. A birds-eye view,
maybe  if the interconnections are understood some will understand why
it is important.

It's not a technical issue - at all.

PS.  Dave  -  I am not writing comments for you to sent to dev/null, I
consider my time more usefull.

-- 
http://blog.zoller.lu
Thierry Zoller
--- End Message ---
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] IE8 crashes with simple HTML

2009-08-05 Thread Thierry Zoller


Could reproduce, unhandled second chance read access violation in
mshtml!Ptls5::FsUpdateBottomlessPel+0x41d (FPO: [7,45,4])


Faulting Instruction:40af4234 cmp ecx,dword ptr [eax+18h]

Basic Block:
40af4234 cmp ecx,dword ptr [eax+18h]
   Tainted Input Operands: eax, ecx
40af4237 jne mshtml!ptls5::fsupdatebottomlesspel+0x47c (40af6cf7)
   Tainted Input Operands: ZeroFlag

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [GSEC-TZO-45-2009] iPhone remote code execution

2009-07-23 Thread Thierry Zoller

Fell quite behind on this one, here it is.
___

  Phone &iPod Touch - Remote arbritary code execution
___


Reference : [GSEC-TZO-45-2009] - iPhone remote arbritary code execution
WWW   : http://www.g-sec.lu/iphone-remote-code-exec.html
CVE   : CVE-2009-1698
BID   : 35318
Credit: http://support.apple.com/kb/HT3639
Discovered by : Thierry Zoller

Affected products :
- iPhone OS 1.x through 2.2.1
- iPhone OS for iPod touch 1.x through 2.2.1

I. Background
¨¨
Wikipedia quote: "Apple Inc. (NASDAQ: AAPL) is an American multinational 
corporation which designs and manufactures consumer electronics and software 
products. The company's best-known hardware products include "

II. Description

Calling the CSS attr() attribute with a large number leads to memory 
corruption, heap spraying allows execution of code. 

III. Impact
¨¨¨
Arbitrary remote code execution can be achieved by creating a special website 
and entice
the victim into visiting that site.

IV. Proof of concept

None will be released


VI. About
¨¨
G-SEC ltd. is an independent security consultancy group, founded to
address the growing need for allround (effective) security consultancy 
in Luxembourg.

By providing extensive security auditing, rigid policy design, and 
implementation of cutting-edge defensive/offensive systems, G-SEC 
ensures robust, thorough, and  uncompromising protection for 
organizations seeking enterprise wide data security.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-22 Thread Thierry Zoller
Hi Steven,

[Removing   a   few  addresses  in CC that surely do not care too much
about this discussion]

SMC> I strongly suspect that as we collectively try to figure out how to solve
SMC> resource-consumption issues for all kinds of software, we will quickly run
SMC> into lots of complexity that may well enter the realm of undecidable
SMC> problems
First,nobodyhasto  figure  out  how  to  "solve  [all] resource
consumption issues". That would be effort spent on a stupid idea.
Design your software expecting it to run into these
kind   of  problems  and  design  proper  generic  mitigations,  where
possible. You are set.

Has this been done before ? Yes, take google chrome as an example.

In Google chrome, tabs are separated in such a way that well, only
the  tab affected closes,  not  the  whole  browser  not
the  complete OS. So this is mitigating all these bugs by design and
reducing  the  impact  to a minimum, to a degree where I agree that it
could be ignored and not called a "vulnerability".

If someone designs software and claims that these problems cannot be mitigated
andhence   should   be ignored or seen as "normal", in my personal
opinion, should be looking for another job.

Secondly, I really  can't  find  anything related to the advisory in your 
posting.
The   bug   at  hand  was  an unclamped loop "within the  browser code
itself". NOT an loop feed by an  external  source.  Comparing  it  to  
downloading
huge  files  is comparing  apples  to  oranges.  Even  the impact is another
one, as that border case is accounted for.

SMC> Web browsers are basically mini-operating systems (which others may have
SMC> said before).
Surely Product managers and marketing departments have said so, surely
it can be designed to look like an OS. However comparing  the  current
existing  Browsers  to an Operation system is ludicrous at best.

SMC> Since they are very closely attached to their underlying
SMC> operating system,
Since when are browsers running Ring 0 ?

SMC> But if you think of the infinite number of algorithms you could write in
SMC> Javascript, then it becomes a recipe for the death of a thousand cuts.
Infinite  amount  of  possibilities  does not necessarily equal infinite 
amounts of
"defenses". - Browser  detects  loop  or  script  that doesn't exit, asks user 
if he
wants to stop it. Been there, done that.

SMC> If you try to load the full XML downloads from cve.mitre.org into your
SMC> browser, good luck with that - you get CPU and memory consumption very
SMC> quickly (last time I checked).
Apples and Oranges, nobody said CPU consumption is a vulnerability per
se.  The possible impact is what makes it a vulnerability or not, such as
browser crashes, OS reboots, etc pp.

I  still  have trouble to understand why some are not using the impact
of  a  bug to rate it. The resulting impact (what can be done with it,
what consequences this problem has for a user/system) is what defines
the security aspect, not necessarily the root cause.

SMC> But is that a vulnerability per se?  It
SMC> almost becomes a "laws-of-physics" vulnerability - if you send too much
SMC> data to an underpowered system with a small pipe, then a DoS is going to
SMC> occur because you can't violate the laws of physics.
If  you  have  not planed for that border case,for example the browser crashes 
or
the  OS  reboots and it creates "damage" as in Dataloss  - yes it is a 
vulnerability.
Sorry, but stupidity or lack  of  effort  has never protected somebody from
calling it what it is. Last time I checked, software code didn't respect the
laws of physics though. Pigs fly  regularly  in  my  "code".

SMC> At some point a line needs to be drawn, though I don't
SMC> know where that line is.  I agree with Michal that a holistic approach
SMC> could save a lot of people a lot of pain.
These are empty words to my ears. "holistic approach" sounds like "war
on terror". But maybe that's just me.

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

MZ> That was DOM Level 1 (1999). Even level 2 (2000) has this as read-write:
MZ> http://www.w3.org/TR/DOM-Level-2-HTML/html.html#ID-94282980

Ah, now that makes sense. So my theory goes right down the drain =X

MZ> Also keep in mind that with relatively few exceptions, W3C simply
MZ> trailed and struggled to capture status quo (or some compromise
MZ> representation thereof) back then.

Thanks for your insight!


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

Interesting,
http://www.w3.org/TR/REC-DOM-Level-1/level-one-html.html
--
 readonly attribute  long length;
--

MZ> Does not seem to be the case in HTML5 at least?
There must have been a change then between HTML4 and HTML5

MZ> It may or may not have any practical uses (dynamic resizing of SELECTs
MZ> without having to delete individual options).


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

MZ>  which does not seem to be that far
MZ> from creating an overly nested DOM tree, or drawing an oversized

Interesting tidbit:
The W3C DOM specifies the select.length attribute to be *read only*.
Yet   (all)  browsers  have  implemented  it  allowing to write to it. I
am not sure what use that has (?) but one thing is sure, they failed
to add a limit, the W3C didn't, but that's because it was never meant
to be written to in the first place.


-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Steven,
SMC>  we will quickly run
SMC> into lots of complexity that may well enter the realm of undecidable
SMC> problems,
Yeah,  security  is  too  complex.  Dude,  the  fix  was  to LIMIT the
the number of elements. This is not rocket science.

-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal,

Yes,  we  all  know  that.  The  flaw here was not looping on itself a
thousands  of  times,  wow.  It was a DOM implementation flaw. That's
what made it interesting. A border case that was not accounted for.

That's  all,  still  interesting.  I don't see how Javascripts endless
loops are similar at all - sorry.


MZ> There are literally thousands of HTML- and JavaScript-related denial
MZ> of service vectors in modern browsers. If you want a silly, ad hoc
MZ> example I just made up on the spot (and so could any reader of the
MZ> list), try:

MZ> foo = '';
MZ> for (i=0;i<7;i++) foo += foo;
MZ> for (i=0;i<1;i++) document.write(foo);





-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller


 One bug to rule them all
 IE5,IE6,IE7,IE8,Netscape,Firefox,Safari,Opera,Konqueror,
 Seamonkey,Wii,PS3,iPhone,iPod,Nokia,Siemens and more.



Update/Changes :


Backround :
~~~
+ I failed to include details about the nature of the bug (DOM), 
the root cause is a DOM flaw and not a Javascript flaw as the 
Backround info might have lead to think.

Thanks James Schend for the heads up.

+ The bug was present in a 9 year old version of Netscape - draw your own 
conclusions.

Patch availability :

+ Seamonkey 1.1.17 and SeaMonkey 2 (soon to be Beta) have been patched

Affected Products :

+ Blackberry 8800/probably all (null ptr exception, browser crash)
Thanks to "528-0444" for the Report.
+ Google G1 latest (Firmware 1.5, Kernel: 2.6.27-00393-g6607056, Build: CRB43)
(Browser crash) 
Thanks Scott Fraser for the Report.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Update: [TZO-06-2009] IBM Proventia - Generic bypass (Limited disclosure - see details)

2009-07-16 Thread Thierry Zoller
 to my terms and policy to be able
TZ>> to  republish  mails  that  happen  during  notification  in  full  or
TZ>> partially"

TZ>> 24.04.2009 - IBM states that
TZ>>  "Thierry,
TZ>> Changes you make should be effective for new issues going forward.  
Period."

TZ>> "We have reported to you that your issues DO NOT EVADE PRODUCTS.   That is
TZ>> unequivocable.   You have not proven an evasion of a product. "

TZ>> "We
TZ>> have conducted that research and the report is negative, your issues do not
TZ>> evade the product.   [..] Further, we do
TZ>> not for obvious reasons ever provide architectural details except in cases
TZ>> of NIAP review under Common Criteria for EAL 2 or Higher, then in only
TZ>> certain aspects.Your research does not attain that benchmark."

TZ>> 08.05.2009 - Sending a new POC evading proventia (CAB)
TZ>> no reply

TZ>> 11.05.2009 - Re-sending asking for an acknowledgement

TZ>> 15.05.2009 -
TZ>> "We are in the final stages of completing the write up on our review of all
TZ>> your reports.   It may take until early AM US EDT to complete or possibly
TZ>> early AM Central European Time."

TZ>> 22.05.2009 - IBM sends in the results, and *surprise* it DID evade 
proventia.
TZ>> Quote:"
TZ>> IBM Proventia Desktop Endpoint Security - susceptible
TZ>> IBM Proventia Network Multi-Function Security (MFS) - susceptible

TZ>> Multiple engines are susceptible to this evasion. We are working internally
TZ>> and with third-party OEM vendors to create a fix for this evasion. For our
TZ>> own engine, we have placed a fix on our long-term development roadmap, but
TZ>> this is a low priority for us because this engine runs in a desktop
TZ>> environment where malicious code in these archives will be detected upon
TZ>> extraction or execution. If and when an update addressing this issue is
TZ>> delivered for our engine, we will credit you."

TZ>> Ignoring that the end-point argument doesn't hold true for the network
TZ>> device, isn't this incredible?

TZ>> 22.05.2009 - I respond that 
TZ>> "[..] The files
TZ>> bypass your protection - to argue with client-side protection (if any)
TZ>> is reserved for the clients that use your products. You should rate it
TZ>> as what it is. A bypass of your AV detection"


TZ>> Heard, nothing back since the 23th may. I trust IBM to disclose and fix,
TZ>> and maybe credit, but I thought I let IBM customers know where your 
TZ>> millions license fees are spent on.









-- 
http://blog.zoller.lu
Thierry Zoller


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-15 Thread Thierry Zoller

Dear List,
To  all  those  sending in reports, thank you, *but* please read the patch
section.  It  is  normal  that  it doesn't work in Safari, Chrome, FF,
Opera any longer, they have been patched. Try IE for an example.

To stop the flood of mails, explaining that the POC doesn't work
on mozilla x.y, or safari x.y. Read the "PATCH" section. Please.


Regards,
Thierry



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Update: [TZO-06-2009] IBM Proventia - Generic bypass (Limited disclosure - see details)

2009-07-15 Thread Thierry Zoller


As I received a lot of feedback on this bug, I thought I'd update you. After 
not replying
to my notifications and subsequent forced partial disclosure, IBM stated
officially on their website that they where not affected and to my surprise
IBM got in contact immediately after disclosure to "coordinate"

If your read the Timeline till the end, the story has a nice swing.., Drama, 
insults,
everything. You could make a soap opera out of it. And you don't even have all 
the mails.

What happened during this "coordination" even surprised myself. I am used to 
discussions,
I am used to stupid answers. However what happened here bears no description.


Short Guerilla Version of the Timeline  (complete timeline below):
---
- Hey Thierry sorry, we did not get your report, we'll keep you updated!
We have IBM written on the proventia boxes but don't send reports to IBM!!

- Post official statement to IBM website that IBM is NOT affected and 
forgetting to inform Thierry

- Thierry, You cannot evade proventia, because we use special propretary
ingredients!

> What are these ingredients?

- We won't tell !! and by the way you suck! your test methods suck! You aren't 
even
EAL2 ! A test team costs too much to tests your POCs! Your mails suck! Learn 
from 
the big mighty IBM. 

> Sorry, the same poc evaded proventia last year! So you mus miss something!!

- Thierry, stop sending us POC files, YOU CANNOT EVADE PROVENTIA, IT is
IMPOSSIBLE, IRREVQUABLE, PERIOD 

>Silence

- Thierry here is our report, you DID evade all our proventia products, we will
credit you.



In the timeline below you find my summary
-
02.04.2009 - Forced partial disclose
02.04.2009 - An known contact at IBM asks for the POC
02.04.2009 - POC is resend
02.04.2009 - An third person is added to the coordination "list"
04.04.2009 - Sending another POC file (RAR)
06.04.2009 - POC is acknowledged and promise is made to get back
 once the material has been analysed.
10.04.2009 - Sending another POC file (ZIP)
10.04.2009 - The third person ergo the "Cyber
Incident & Vulnerability Handling PM" is taking over coorindation

14.04.2009 - A comment was made to my blog that indicated IBM did
answer the Bugtraq posting and negate my findings, having 
received no response from them personaly I ask
"Dear Peter, I was refered to this url in a comment posted to my blog:
http://iss.custhelp.com/cgi-bin/iss.cfg/php/enduser/std_adp.php?p_faqid=5417
can you confirm this ?"

15.04.2009 -  IBM responds:
"[..] we
apologize that the path of communicating the disclosure was somewhat
confusing.  [..]  The IBM contact address in the
OSVDB is typically used for software products that are in another division
of IBM, and thus, your report was not routed to us in a timely manner.  In
the future, we'd prefer that you contact myself directly"

"We have now investigated the TZO-04-2009-IBM incident you reported and have
found that we are not susceptible to this evasion."
"[..]in  this  case,  there  are  other  components in our Proventia
products that prevent this evasion from occurring"
"Testing our production products, rather than testing this one
piece of our technology, then you would have been able to see the same
results"

16.04.2009 - As my tests indicate otherwise I ask "Could you please  
specify which >components< would prevent the evasion, as it is
hard  to see how to prevent it when the unarchiver code cannot extract
the code itself" and
"I  would  be  glad  to do so [Red:test production products] : 
Please send the respective appliances to "


16.04.2009 - IBM answers
[..] "We are not an open source company, so the internal workings of 
our proprietary software is not something we publicly disclose.  
We do not provide our products for free to all of the independent 
testers that might be interested in our product lines--the number 
of requests simply would not be scalable or manageable if
we did"

17.04.2009 - As I have no way to reproduce and IBM gives no details
about their OH-SO Secret propretary software I state that 
"I  cannot  verify  nor  reproduce your statements as such I will leave
this CVE entry as disputed." "Please provide tangible proof that 
you detect the samples. Screenshots, logs, outputs."
AND
"My  worktime  is not open source either[..] Yet I
am currently working for your interests and customers, for free. I can
stop reporting responsibly  if this is what you are trying to achieve."

21.04.2009 - As their was no reply, I resend the previous mail

22.04.2009 - IBM acks receipt and promises to reply soon.

==
In the mean time, as I thanked AV-TEST gmbh in my advisory, 
somebody complains directly at AV-TEST Gmbh as force them to 
no longer give me access to their test clusters. AV-TEST Gmbh 
subsequently asks me to stop testing using their systems.
As a note: Anybody spots a paralel to the mob?
==

23.04.2009 - I inform IBM that 
"In

[Full-disclosure] [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-15 Thread Thierry Zoller


 One bug to rule them all
   IE5,IE6,IE7,IE8,Netscape,Firefox,Safari,Opera,Konqueror,
   Seamonkey,Wii,PS3,iPhone,iPod,Nokia,Siemens and more.
   Don't wet your pants - it's DoS only


Release mode: Tried hard to coordinate - gave up
Reference   : [GSEC-TZO-26-2009] - One bug to rule them all
WWW : http://www.g-sec.lu/one-bug-to-rule-them-all.html
Vendors : 
http://www.firefox.com   
http://www.apple.com
http://www.opera.com
http://www.sony.com
http://www.nintendo.com
http://www.nokia.com
http://www.siemens.com
others..
Status  : Varies
CVE : CVE-2009-1692 (created by apple same root cause)
Credit  : Except Apple - nobody

Affected products : 
~~~
- Internet Explorer 5, 6, 7, 8 (all versions)
- Chrome (limited)
- Opera 
- Seamonkey
- Midbrowser
- Netscape 6 & 8 (9 years ago)
- Konqueror (all versions)
- Apple iPhone + iPod 
- Apple Safari
- Thunderbird
- Nokia Phones : Nokia N95 (Symbian OS v.9.2),Nokia N82, Nokia N810 Internet 
Tablet
- Aigo P8860 (Browser hangs and cannot be restarted)  
- Siemens phones
- Google T-Mobile G1 TC4-RC30
- Ubuntu (Operating system sometimes reboots, memory management failure)
- possibly more devices and products that support Javascript,
try it yourselves. POC here : http://www.crashthisthing.com/select.html

Patch availability :

- Mozilla : Fixed in Firefox 3.0.5 and 2.0.0.19 
https://bugzilla.mozilla.org/show_bug.cgi?id=460713
- Apple iPhone&iPod : patched
- IE : No patch for IE5, IE6, IE7, IE8 until IE9
- Webkit : Patched in r41741 - https://bugs.webkit.org/show_bug.cgi?id=23319
- Chrome : Patched, unknown which version)
- Opera : Patched after version 9.64
- Thunderbird (unknown)
- Konqueror : unknown (did not respond)
- Nokia : unknown, opened a case but never came back
- Aigo P8860 : unknown
- Siemens : unknown
- Others ? Find out by visiting the POC at
http://crashthisthing.com/select.html


I. Background
~
Quoting Wikipedia "ECMAScript is a scripting language, standardized by Ecma 
International in the ECMA-262 specification and ISO/IEC 16262. The language 
is widely used on the web, especially in the form of its three best-known 
dialects, JavaScript, ActionScript, and JScript."


II. Description
~~~
Calling the select() method with a large integer, results in continuos
allocation of x+n bytes of memory  exhausting memory after a while. 
The impact varies from null pointer dereference (no more memory,hence 
crashing the browser) to the reboot of the complete Operation System 
(Konqueror&Ubuntu)

There had never been a limit specified as to how many html elements the select
call should handle, after the report of this Bug, vendors apparently agreed to 
a 
limit of 10.000 elements : "Talked to some Apple and Opera guys at the 
WHATWG social, and we decided this was a good number"

III. Impact
~~~
The Impact varies from Browser to Browser and from OS to OS. 

Here is a small excerpt:
- Konqueror (Ubuntu)- allocates 2GB of memory then either crashes 
the Browser or (most often) the OS reboots. Ubuntu's memory
management system appears to be configured as to NOT stop the process
that consumes too much memory, but a random process.
This sometimes leads to processes that are vital for the OS to
be killed, hence the reboot. I am not kidding. Thanks to
'FX' for Memory management hint.

- Chrome :  allocates 2GB of memory then crashes tab with a null pointer

- Firefox : allocates 2GB of memory then the Browser crashes

- IE5,6,7,8 : allocates 2GB of memory then the Browser crashes

- Opera : Allocated and commits as much memory as available, 
will not crash but other applications will become unstable 

- Nintento WII (Opera) : Console hangs, needs hard reset
Video: http://vimeo.com/2937101 (Thanks to David Raison)

- Sony PS3 - Console hangs, needs hard reset 
Video: http://vimeo.com/2937101 (Thanks to Chris Gates)

- iPhone - iPhone hangs and needs hard reset
Video: http://vimeo.com/2873339 (Thanks to g0tcha)

- Aigo P8860 (Browser hangs and cannot be restarted)  


IV. Proof of concept 
~~~

function poc(o) {
e = document.createElement("select");
e.length=2147483647;
}

function go() {
poc(0);
}


URL: http://www.crashthisthing.com/select.html

Some have not understood what this code does, it does NOT loop as some vendors
claimed, it just calls select.lenght() ONCE with a huge integer. One might 
wonder
if over the 9 last years that this bug existed, nobody ever entered a large 
number in a select.lenght() call.

IV. Disclosure timeline
~
Nothing particular to note, except the usual discussion about availability being
a security issue.

V. Thanks
~
Chris Gates, David Raison, Fahem A

[Full-disclosure] Update: [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)

2009-07-10 Thread Thierry Zoller

Update:
---
Patch was ineffective,  Length2 was fixed and both
SVGNumber and SVGNumber2, but no SVGLength.

Affected products :
- All firefox versions below 3.5



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Update: [TZO-27-2009] Firefox Denial of Service (Keygen)

2009-07-09 Thread Thierry Zoller

Update
--
Unfortunately the Denial of Service condition has not been fixed
with the new versions/builds and according to tickets filled
under the bugzilla ID the impact of this bug has changed since
version 3.5. [1]

Hence the list of affected products now is :
- All versions below Firefox 3.5

[1]
--- Comment #28 from PBForeman   2009-07-08 09:14:00 PDT ---
When FF3.5 is open, cpu eventually runs 99%, using over 100,000K of memory.
Closing FF does not stop the cpu or memory usage. Closing with Task Manager is
the only way to exit FF.  Previous versions of FF all ran stable, problem
started with 3.5.  Closing and restarting does not solve the problem. Removing
program and reinstalling clean does not solve anything. Same settings were used
from previous version to install FF3.5. Once cpu maxes out, FF ties up entire 
computer.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-43-2009] - Clamav generic evasion (CAB)

2009-06-18 Thread Thierry Zoller


From the low-hanging-fruit-department
Clamav generic evasion (CAB)


Shameless plug :

You are invited to join the 2009 edition of HACK.LU, a small but 
concentrated luxemburgish security conference.
More information : http://www.hack.lu - CFP is open, sponsorship is
still possible and warmly welcomed.


Release mode: Coordinated but limited disclosure.
Ref : [TZO-43-2009] - Clamav generic evasion (CAB)
WWW : 
http://blog.zoller.lu/2009/05/advisory-clamav-generic-evasion-cab.html 
Vendor  : http://www.clamav.net &
  http://www.sourcefire.com/products/clamav
Status  : Patched (in version 0.95.2)
CVE : none provided
Security notification reaction rating : good


Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- ClamAV below 0.96

Affected systems:
- MACOSX server,
- IBM Secure E-mail Express Solution for System
Others : http://www.clamav.net/about/who-use-clamav/

I. Background
~
Quote: "Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX, 
designed especially for e-mail scanning on mail gateways. It provides 
a number of utilities including a flexible and scalable multi-threaded
daemon, a command line scanner and advanced tool for automatic 
database updates. The core of the package is an anti-virus engine 
available in a form of shared library. "

II. Description
~~~
The parsing engine can be bypassed by manipulating CAB (Filesize) archives 
in a "certain way" that the Clamav engine cannot extract the content but
the end user is able to. 

III. Impact
~~~
To know more about the impact and type of "evasion", I updated the 
description at http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

IV. Disclosure timeline
~
DD/MM/

Nothing particular too note.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-34-2009] Frisk FPROT generic evasion (RAR, ARJ, LHA)

2009-06-18 Thread Thierry Zoller


From the low-hanging-fruit-department
 F-prot generic bypass (RAR,ARJ,LHA)


Shameless plug :

You are invited to join the 2009 edition of HACK.LU, a small but 
concentrated luxemburgish security conference. 
More information : http://www.hack.lu - CFP is open, sponsorship is still 
possible and warmly welcomed.


Release mode: Coordinated but limited disclosure.
Ref : [TZO-34-2009] - F-prot RAR,ARJ,LHA bypass
WWW : 
http://blog.zoller.lu/2009/05/advisory-f-prot-generic-evasion-rar.html
Vendor  : http://www.f-prot.com
Status  : Current version not patched, next engine version will be patched
CVE : none provided
Credit  : Given in the history file
OSVDB vendor entry: none [1]
Security notification reaction rating : good
Notification to patch window : n+1 (no patch for current build)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products (all versions below 4.5.0 ) 
- F-PROT AVES (High: complete bypass of engine)
- F-PROT Antivirus for Windows (unknown)
- F-PROT Antivirus for Windows on Mail Servers : (High: complete bypass of 
engine) 
- F-PROT Antivirus for Exchange (High: complete bypass of engine)
- F-PROT Antivirus for Linux x86 Mail Servers : (High: complete bypass of 
engine)
- F-PROT Antivirus for Linux x86 File Servers : (High: complete bypass of 
engine)
- F-PROT Antivirus for Solaris SPARC / Solaris x86 Mail Servers (High: complete 
bypass of engine)
- F-PROT Milter - for example sendmail (High: complete bypass of engine)
- F-PROT Antivirus for Linux on IBM zSeries (S/390) (High: complete bypass of 
engine)
- F-Prot Antivirus for Linux x86 Workstations (unknown)

OEM Partners affected :
- Autentium  (all versions)

OEM Partners with unknown status :
- Sendmail, Inc.
- G-Data


I. Background
~
Quote: "FRISK Software International, established in 1993, is one of the 
world's leading companies in antivirus research and product development.

FRISK Software produces the hugely popular F-Prot Antivirus products range 
offering unrivalled heuristic detection capabilities. In addition to this, 
the F-Prot AVES managed online e-mail security service filters away the 
nuisance of spam e-mail as well as viruses, worms and other malware that 
increasingly clog up inboxes and threaten data security."


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
RAR archive. 

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within RAR archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
07/05/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date.

 No reply

09/05/2009 : Resending PoC file asking to please acknowledge receipt

19/05/2009 : Frisk acks receipt and states that 
 "I have confirmed that this issue is indeed 
  present in F-Prot engine versions 4.4.4 and earlier.  It is not 
present
  in the 4.5.0 engine, which is the current development version, 
and is
  scheduled for release in the near future"
 
20/05/2009 : Ask for patch timeline

22/05/2009 : Frisk states that there will be no patch for versions below 4.5.0
 and that the next version 4.5.0 is not affected (dev build)
 
 "As a side note, F-PROT 4.4 and older also had a similar issue
 with ARJ and LHA/LZH files - failing to detect the archive if
 it was not at the beginning of the file"

10/06/2009 : Ask Frisk whether 4.5.0 has been released now
 
 no reply
 
18/06/2009 : Release of this advisory.

[1]
F-prot is encouraged to leave their security contact details at
http://osvdb.org/vendor/1/Frisk%20Software%20International
to facilate communication and reduce lost reports.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-40-2009] Clamav generic bypass (RAR, CAB, ZIP)

2009-06-16 Thread Thierry Zoller


From the low-hanging-fruit-department
   Clamav generic evasion (RAR,CAB,ZIP)


Shameless plug :

You are invited to join the 2009 edition of HACK.LU, a small but 
concentrated luxemburgish security conference. 
More information : http://www.hack.lu - CFP is open, sponsorship is still 
possible and warmly welcomed.


Release mode: Coordinated but limited disclosure.
Ref : [TZO-40-2009] - Clamav generic evasion (RAR,CAB,ZIP)
WWW : http://blog.zoller.lu/2009/05/advisory-clamav-generic-bypass.html
Vendor  : http://www.clamav.net &
  http://www.sourcefire.com/products/clamav
Status  : Patched (in version 0.95.2)
CVE : none provided
Credit  : Discovered - froggz 2005, Zoller 2007, ROGER Mickael 2009
Security notification reaction rating : good


Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- ClamAV below 0.95.2


Affected systems:
- MACOSX server,
- IBM Secure E-mail Express Solution for System
http://www.clamav.net/about/who-use-clamav/

I. Background
~
Quote: "Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX, 
designed especially for e-mail scanning on mail gateways. It provides 
a number of utilities including a flexible and scalable multi-threaded
daemon, a command line scanner and advanced tool for automatic 
database updates. The core of the package is an anti-virus engine 
available in a form of shared library. "

II. Description
~~~
The parsing engine can be bypassed by manipulating RAR,ZIP archives 
in a "certain way" that the Clamav engine cannot extract the content but
the end user is able to. 

III. Impact
~~~
To know more about the impact and type of "evasion", I updated the 
description at http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

IV. Disclosure timeline
~
DD/MM/

No timeline, nothing particular to note.





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-33-2009] Fprot generic bypass (TAR)

2009-06-16 Thread Thierry Zoller


From the low-hanging-fruit-department
 F-prot generic TAR bypass / evasion


Shameless plug :

You are invited to join the 2009 edition of HACK.LU, a small but 
concentrated luxemburgish security conference. 
More information : http://www.hack.lu - CFP is open, sponsorship is still 
possible and warmly welcomed.


Release mode: Coordinated but limited disclosure.
Ref : [TZO-33-2009] - F-prot TAR bypass / evasion
WWW : 
http://blog.zoller.lu/2009/06/advisory-frisk-f-prot-evasion-tar.html
Vendor  : http://www.f-prot.com
Status  : Current version not patched, next engine version will be patched
  in version 4.5.0. Vendor didn't reply if said version is
  now in ciculation.
CVE : none provided
Credit  : Given in the History file 
OSVDB vendor entry: none [1]
Security notification reaction rating : better than last time
Notification to patch window : n+1 (no patch for current build)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products (all versions up to 4.5.0 which is not released yet) 
- F-PROT AVES (High: complete bypass of engine)
- F-PROT Antivirus for Windows (unknown)
- F-PROT Antivirus for Windows on Mail Servers : (High: complete bypass of 
engine) 
- F-PROT Antivirus for Exchange (High: complete bypass of engine)
- F-PROT Antivirus for Linux x86 Mail Servers : (High: complete bypass of 
engine)
- F-PROT Antivirus for Linux x86 File Servers : (High: complete bypass of 
engine)
- F-PROT Antivirus for Solaris SPARC / Solaris x86 Mail Servers (High: complete 
bypass of engine)
- F-PROT Milter - for example sendmail (High: complete bypass of engine)
- F-PROT Antivirus for Linux on IBM zSeries (S/390) (High: complete bypass of 
engine)
- F-Prot Antivirus for Linux x86 Workstations (unknown)

OEM Partners affected :
- Autentium  (all versions)

OEM Partners with unknown status :
- Sendmail, Inc.
- G-Data


I. Background
~
Quote: "FRISK Software International, established in 1993, is one of the 
world's leading companies in antivirus research and product development.

FRISK Software produces the hugely popular F-Prot Antivirus products range 
offering unrivalled heuristic detection capabilities. In addition to this, 
the F-Prot AVES managed online e-mail security service filters away the 
nuisance of spam e-mail as well as viruses, worms and other malware that 
increasingly clog up inboxes and threaten data security."


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
TAR archive. 

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within TAR archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
28/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date.

 No reply
 
11/05/2009 : Resending PoC file asking to please reply

20/05/2009 : Frisk replies that it was unable to extract the PoC file with
 "tar" and hence see no bypass.
 
20/05/2009 : Inform Frisk that the PoC extracts fine with Winzip
 

22/05/2009 : Frisk send a lenghty e-mail re-discussing bypasses/evasions

22/05/2009 : I state that I will not discuss this topic any further, everything
 has been said and written multiple times. Either Frisk patches
 or they do not.
 
22/05/2009 : Frisk states that the changes to the parsing code are minor
 i.e not relying on the checksum. The patch will be included
 in the next releaes candidate 4.5.0 and credit will be given
 in the History file

Comment: I give it some time to 4.5.0 to be released.
 
10/06/2009 : Ask Frisk if 4.5.0 has been released now

 no reply
 
14/06/2009 : Release of this advisory

[1] F-prot is encouraged to leave their security contact details at
http://osvdb.org/vendor/1/Frisk%20Software%20International
to facilate communication and reduce lost reports.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-37-2009] Apple Safari

2009-06-14 Thread Thierry Zoller


  Apple Safari Remote code execution (CSS:Attr)


Shameless plug :

You are invited to join the 2009 edition of HACK.LU, a small but 
concentrated luxemburgish security conference. 
More information : http://www.hack.lu - CFP is open, sponsorship is still 
possible and warmly welcomed.


Release mode: ZDI (see previous timelines to know why this went to ZDI)
Ref : [TZO-37-2009] - Apple Safari Remote code execution (CSS)
Vendor  : http://www.apple.com
WWW : 
http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html
Status  : Patched (http://support.apple.com/kb/HT3613)
Credit  : http://support.apple.com/kb/HT3613
CVE : CVE-2009-1698

Affected products :
- Apple Safari versions prior to 4.0


I. Background
~
Wikipedia quote: "Apple Inc. (NASDAQ: AAPL) is an American multinational 
corporation which designs and manufactures consumer electronics and 
software products. The company's best-known hardware products include 
Macintosh computers, the iPod and the iPhone."

II. Description
~~~
Calling a CSS attr attribute with a large number leads to memory corruption

III. Impact
~~~
Viewing a maliciously crafted web page may lead to an unexpected application 
termination or arbitrary code execution.

IV. Proof of concept 

You can build one with above information

V. Disclosure time-line
~
No time-line available


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-36-2009] Apple Safari & Quicktime Denial of Service

2009-06-14 Thread Thierry Zoller


   Apple Safari & Quicktime Denial of Service


Shameless plug :

You are invited to join the 2009 edition of HACK.LU, a small but 
concentrated luxemburgish security conference. 
More information : http://www.hack.lu - CFP is open, sponsorship is still 
possible and warmly welcomed.


Release mode: Coordinated
Ref : [TZO-36-2009] - Apple Safari & Quicktime DoS
Vendor  : http://www.apple.com
WWW : 
http://blog.zoller.lu/2009/05/advisory-apple-safari-quicktime-dos.html
Status  : Not patched
Credit  : none given (Apple can't find a place to credit)
Discovered  : 18.11.2008 Zoller, 19.06.2009 Alexios Fakos (probably plenty
  of others)
Security notification reaction rating : good
Notification to patch window : n+1 

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products  
- Apple Safari (all)
- Quicktime (all)


I. Background
~
Wikipedia quote: "Apple Inc. (NASDAQ: AAPL) is an American multinational 
corporation which designs and manufactures consumer electronics and 
software products. The company's best-known hardware products include 
Macintosh computers, the iPod and the iPhone."

II. Description
~~~
A null pointer is being dereference when CFRelease() is called on NULL.

III. Impact
~~~
The browser will crash, your data might be lost.

IV. Proof of concept (hold your breath)


Video


V. Disclosure timeline
~
DD/MM/
18/11/2008 : Send proof of concept file and a description that failed to
 give the correct impact.

25/11/2009 : Apple acknowledges receipt and reproducability :  
 "After investigating this issue further, we've determined 
 that the crash your test case triggers is caused by
 dereferencing a null pointer and not from a format string issue"
 
20/01/2009 : Ask for an update   
 
23/01/2009 : Apple sends an encrypted and signed PGP mail, fine, however the 
mail
 is encrypted with their own key

23/01/2009 : Ask for the mail to be resend as I don't have Apple's private key

24/01/2009 : Apple states that "Regarding the QuickTime null dereference you 
 reported, this bug is still being worked on by our engineers 
 and is not addressed in QuickTime 7.6"
 
26/01/2009 : Ask apple for a fix timeline as this is an ridiculouly easy to fix
 vulnerability   
 
27/01/2009 : Apple statest "Regarding the QuickTime null deref issue, it is 
 currently set to be part of the next QuickTime update.  [..] 
 Additionally, we do not intend to describe this crasher in our
 security advisory.
 
 Note: No Security advisory = no credit, should have published here.
 
28/01/2009: Apple states "Given that we are handling this as a crasher and 
not as a security exposure, it stands to reason that you may 
want to disclose it without waiting for the update that
addresses it and without further coordination with Apple.
We do appreciate the fact that you reported it to us and are
intending to address it in the next available update"

[..]
[Several discussion about CIA, why a DoS against the iPhone is worth a security
advisory, when it isn't against safari.. etc. I spare you the details]  

[..]

29/01/2009 : Ask why I should hold disclosure for a DoS in a particular
 portable apple product but disclose DoS in other apple products.
 Asked apple to make a choice, either DoS is a security issue and
 I won't disclose or it isn't and I disclose all of them,
 including the one in the very portable apple product
  
30/01/2009  : Apple answers that
 "Your QuickTime and Safari issues constitute denial of service.
 We consider any denial of service issue to be security related,
 and they are important to fix.  We plan to fix the ones you
 reported in the next available updates."

 "I believe we can put credit in an appropriate place for the
 WebKit/Safari change.  I was not able to locate a suitable place
 for crediting the QuickTime crasher"
  
Fast forward 5 months, and apple releases a stream of code execution bug fixes
for Quicktime.

01/06/2009 : 

[Full-disclosure] [TZO-33-2009] Frisk F-prot evasion (TAR)

2009-06-14 Thread Thierry Zoller


  From the low-hanging-fruit-department
   F-prot generic evasion (TAR)


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Coordinated but limited disclosure.
Ref : [TZO-33-2009] - F-prot TAR bypass / evasion
WWW : 
http://blog.zoller.lu/2009/06/advisory-frisk-f-prot-evasion-tar.html
Vendor  : http://www.f-prot.com
Status  : Current version not patched, next engine version will be patched
CVE : none provided
Credit  : Given in the History file 
OSVDB vendor entry: none [1]
Security notification reaction rating : better than last time
Notification to patch window : n+1 (no patch for current build)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products (all versions up to 4.5.0 which is not released yet) 
- F-PROT AVES (High: complete bypass of engine)
- F-PROT Antivirus for Windows (unknown)
- F-PROT Antivirus for Windows on Mail Servers : (High: complete bypass of 
engine) 
- F-PROT Antivirus for Exchange (High: complete bypass of engine)
- F-PROT Antivirus for Linux x86 Mail Servers : (High: complete bypass of 
engine)
- F-PROT Antivirus for Linux x86 File Servers : (High: complete bypass of 
engine)
- F-PROT Antivirus for Solaris SPARC / Solaris x86 Mail Servers (High: complete 
bypass of engine)
- F-PROT Milter - for example sendmail (High: complete bypass of engine)
- F-PROT Antivirus for Linux on IBM zSeries (S/390) (High: complete bypass of 
engine)
- F-Prot Antivirus for Linux x86 Workstations (unknown)

OEM Partners affected :
- Autentium  (all versions)

OEM Partners with unknown status :
- Sendmail, Inc.
- G-Data


I. Background
~
Quote: "FRISK Software International, established in 1993, is one of the 
world's leading companies in antivirus research and product development.

FRISK Software produces the hugely popular F-Prot Antivirus products range 
offering unrivalled heuristic detection capabilities. In addition to this, 
the F-Prot AVES managed online e-mail security service filters away the 
nuisance of spam e-mail as well as viruses, worms and other malware that 
increasingly clog up inboxes and threaten data security."


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
TAR archive. 

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within TAR archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
28/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date.

 No reply
 
11/05/2009 : Resending PoC file asking to please reply

20/05/2009 : Frisk replies that it was unable to extract the PoC file with
 "tar" and hence see no bypass.
 
20/05/2009 : Inform Frisk that the PoC extracts fine with Winzip
 

22/05/2009 : Frisk send a lenghty e-mail re-discussing bypasses/evasions

22/05/2009 : I state that I will not discuss this topic any further, everything
 has been said and written multiple times. Either Frisk patches
 or they do not.
 
22/05/2009 : Frisk states that the changes to the parsing code are minor
 i.e not relying on the checksum. The patch will be included
 in the next releaes candidate 4.5.0 and credit will be given
 in the History file

 Comment: I give it some time to 4.5.0 to be released.
 
10/06/2009 : Ask Frisk if 4.5.0 has been released now

 no reply
 
14/06/2009 : Release of this advisory

[1]
F-prot is encouraged to leave their security contact details at 
http://osvdb.org/vendor/1/Frisk%20Software%20International
to facilate communication and reduce lost reports.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-32-2009] Norman generic bypass (RAR)

2009-06-14 Thread Thierry Zoller


 From the low-hanging-fruit-department
  Norman generic evasion (RAR)


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed


Release mode: Coordinated but limited disclosure.
Ref : [TZO-32-2009] - Norman generic evasion (RAR)
WWW : 
http://blog.zoller.lu/2009/06/advisory-norman-generic-evasion-rar.html
Vendor  : http://www.norman.com
Status  : Patched (with decompression engine version 5.99.07)
CVE : none provided
Credit  : http://www.norman.com/support/security_bulletins/69333/en
OSVDB vendor entry: Norman is not listed as a vendor in OSVDB
Security notification reaction rating : ok
Notification to patch window : 77 days

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
The vulnerabilities have been fixed in Norman's compression library (NCL) 
5.99.07, 
relased on Norman's Internet update servers as an automatic update 03 June 
2009. 
This solves the vulnerability for all updated Norman's products except for 
Norman Network Protection

 - Norman Virus Control single user and corporate versions
 - Norman Internet Control
 - Norman Virus Control E-mail plugins
 - Norman Endpoint Protection
 - Norman Secuirty Suite
 - Norman Network Protection
 - Norman Virus Control for Lotus Domino
 - Norman Virus Control for Exchange
 - Norman Virus Control for Linux
 - Norman Virus Control for Novell Netware (FireBreak) 
 - Norman Email Protection
 - Norman Email Protection Appliance
 - Norman Online Protection
 - Norman Virus Control for AMaViS 
 - Norman Virus Control for MIMEsweeper  

 - Third party vendors that use the Engine 
 
 OEM vendors known to use the Norman engine :
 - eeye
 
 

I. Background
~
Quote: "Norman ASA is a world leading company within the field of data 
security, 
internet protection and analysis tools. Through its SandBox technology 
Norman offers a unique and proactive protection unlike any other 
competitor"


II. Description
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the RAR archive. There is no inspection of the content
at all.

III. Impact
~~~
The bug results in denying the engine the possibility to inspect
code within the RAR archives. There is no inspection of content
at all.

A general description of the impact and nature of AV Bypasses/evasions
can be read at :  
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html


IV. Disclosure time-line
~
DD/MM/
05/03/2009 : Send proof of concept (RAR Size), description the terms under 
which 
 I cooperate and the planned disclosure date.
 
 No reply
 
13/03/2009 : Re-Send proof of concept (RAR Size), indicating this is the last 
attempt
 to responsible disclose.
 
14/03/2009 : Norman acknowledges receipt

23/03/2009 : Send proof of concept (RAR Method)

23/03/2009 : Asking for an update for the RAR Size sample

02/04/2009 : Norman confirms reproduction of RAR Method PoC and that they will 
release
 the patch a.s.a.p
 
02/04/2009 : Norman promises to get back with release dates/advisory 
information as soon 
 as they have some firm dates
 
06/04/2009 : Norman confirms reproduction of RAR Headflags PoC  
 

20/04/2009 : Norman confirms reproduction of the CAB PoC and that all reported 
 vulnerabilities have been patched internaly.

22/04/2009 : Ask for a list of affected versions/products   
 
 no answer

27/04/2009 : Norman sends in the patched decompression DLL for me to if the 
patch
 is correct.

28/04/2009 : Send TAR PoC file
 
 no acknowledgement
 
07/05/2009 : Ask for an update to all reported bugs
  
 no reply

08/05/2009 : Inform Norman that as I no longer receive any replies I assume 
that 
 the patch is deployed and set that the final disclosure date to 
 the 1.06.2009
 
09/05/2009 : Norman states they probably can't make the 1/06/2009

09/05/2009 : Propose to postpone disclosure upon request

28/05/2009 : Ask for an update as 01.06.2009 still is set   
 

30/05/2009 : Norman asks to postpone the disclosure by a week as they 
  

[Full-disclosure] [TZO-31-2009] Ikarus multiple generic evasions (CAB, ZIP, RAR)

2009-06-13 Thread Thierry Zoller


 From the low-hanging-fruit-department
 Ikarus multiple generic evasions (CAB,RAR,ZIP)


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed


Release mode: Coordinated but limited disclosure.
Ref : [TZO-31-2009] - Ikarus multiple evasions through CAB,RAR,ZIP
WWW : 
http://blog.zoller.lu/2009/06/subscribe-to-rss-feed-in-case-you-are.html (sorry)
Vendor  : http://www.ikarus.at
Status  : Patched (after engine version 1.1.58)
CVE : none provided
Credit  : t.b.a
OSVDB vendor entry: Ikarus is not listed as a vendor in OSVDB
Security notification reaction rating : good
Notification to patch window : 77 days
Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html


Affected products : 
-  IKARUS virus utilities  (scan-time)
-  IKARUS m...@ilwall
-  IKARUS Content Wall
-  IKARUS security.proxy

I. Background
~
Ikarus Software GMBH is an Anti-virus company based in Austria.

II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
RAR (Headflags and Packsize),ZIP (Filelenght) and CAB (Filesize) archive.

III. Impact
~~~
The bug results in denying the engine the possibility to inspect
code within the CAb,RAR,ZIP archives. There is no inspection of content
at all.

A general description of the impact and nature of AV Bypasses/evasions
can be read at :  
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html


IV. Disclosure time-line
~
DD/MM/
23/03/2009 : Send proof of concept (ZIP), description the terms under which 
 I cooperate and the planned disclosure date.
 
04/04/2009 : Send proof of concept (RAR)
 
07/04/2009 : Ikarus acknowledges receipt, patching Dev builds has begun

10/04/2009 : Resending ZIP PoC

13/04/2009 : Submitting CAB PoC

17/04/2009 : Ikarus demands to delay disclosure

01/05/2009 : Ikarus states that it has started Q&A for the new builds

03/06/2009 : Ikarus informs me that they started deploying the patches/updates
 Credit will be given on a website to come.
 
09/06/2009 : Release of this advisory.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-30-2009] Kaspersky and the silent patch that wasn't (PDF evasion, forced full disclosure)

2009-06-13 Thread Thierry Zoller


From the facepalm department
  Kaspersky and the silent fix that wasn't
PDF Evasion


Release mode: Forced disclosure
Ref : [TZO-30-2009] - Kaspersky PDF evasion (Forced disclosure)
WWW : 
http://blog.zoller.lu/2009/05/advisory-kaspersky-generic-pdf-evasion.html
Vendor  : http://www.kaspersky.com
Status  : Silent fix that doesn't work - No appropriate patch 
CVE : none provided
Credit  : none given
OSVDB vendor entry: No [1]

Security notification reaction rating : Catastropic

Not only did the headquarter not answer, they (tried) to patch this
vulnerability silently, only to fail at it. See Timeline.

This is not the first time that Kaspersky did not answer but patched
bugs without credit, advisory or anything. This is however the last 
time I will not disclose, I am no longer part of an entity that tolerates
irresponsible non-disclosure. 

A professional reaction to a vulnerability notification is a way to measure 
the maturity of a vendor in terms of security. Kaspersky is given a grace 
period of two (2) weeks to reply to my notifications. Failure to do so will 
result in details of all the other reported bugs be released in two (2) weeks. 

Notification to patch window : x+n 
Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products (all versions) :
- Kaspersky Internet Security
- Kaspersky Anti-Virus
- Kaspersky Mobile Security
- Kaspersky Small Office Security
- Kaspersky Open Space Security
  - Kaspersky Business Space Security
  - Kaspersky Work Space Security
  - Kaspersky Enterprise Space Security
- Kaspersky Targeted Security
- Kaspersky® Anti-Virus for Microsoft ISA Server
- Kaspersky® Anti-Virus for Proxy Server
- Kaspersky® Anti-Virus for Check Point Firewall-1 
- Kaspersky® Anti-Virus for Windows Server
- Kaspersky® Anti-Virus for Windows Server Enterprise Edition
- Kaspersky® Anti-Virus for Novell NetWare
- Kaspersky® Anti-Virus for Linux File Server
- Kaspersky® Anti-Virus for Samba Server 
- Kaspersky® Security for Microsoft Exchange 2007
- Kaspersky® Security for Microsoft Exchange 2003
- Kaspersky® Anti-Virus for Lotus Notes/Domino 
- Kaspersky® Anti-Virus for Windows Workstation
- Kaspersky® Anti-Virus for Linux Workstation 
- Kaspersky® Anti-Virus for Linux Mail Server
- Kaspersky® Mail Gateway
- Kaspersky® Anti-virus for MIMEsweeper 

See notification and disclosure terms for details about this list.

I. Background
~
Quote: "We develop, produce and distribute information security solutions that 
protect our customers from IT threats and allow enterprises to manage risk. 
We provide products that protect information from viruses, hackers and spam 
for home users and enterprises and offer consulting services and technical 
support. "


II. Description
~~~
The PDF files are not parsed correctly, a PDF file starts with the magic
byte "%PDF" and ends with the magic byte "%%EOF", everything in between
those markers is parsed and interpreted. Furthermore PDF files are read from
the bottom to the top. 

Adobe Acrobat nor the FoxitReader care too much about the data that 
comes prior the magic byte, the kaspersky engine does, not only does
it care, it fails to detect the malware inside the PDF file.

I will spare you the details, a PDF file is bascialy a container that 
starts with %PDF and ends with %%EOF.

What follows are the details of this evasion, note this one is generic
and the easiest one, there are plenty more. What you read below is true
as amazing as it might seem, you can't have it more simple.

Example of a malicious PDF file [2]+[3] :

  %PDF
  Malicious content here
  %%EOF

Doing :

  Enter stuff here, like random text.
  %PDF
  Malicious content here
  %%EOF
  
This has the result that the malware is no longer being detected. 
Note: Not a single byte of the malware itself been altered, and strictly 
speaking
the content that represent a PDF file hasn't been changed at all.

This has been tested with several malicious PDF files and represents
a generic evasion of all PDF signatures and heuristics.

Kaspersky was given the PoC file directly through myself and F-Secure,  they
went ahead an patched this by adding a signature for the POC file, adding 
a PE header in front of a PDF file (with a PDF extension) still evades detection
and the exploit still triggers when opening the file with Adobe. Thus the
patch is flawed by design.

III. Impact
~~~
The heuristics can be bypassed by a special formated PDF "container", this
leads to the bypass of malicious PDF files, old or new. This is not a 
bypass that relies on archive structures but relies on evading certain 
code paths in the av engine "through various means".

A general description of the impact and nature

Re: [Full-disclosure] [WEB SECURITY] Unicode Left/Right Pointing Double Angel Quotation Mark bypass?

2009-06-05 Thread Thierry Zoller
Hi,

AJE> We have seen 44 sites in the last year at WhiteHat Security that were
AJE> vulnerable to Fullwidth unicode-encoded attacks. This one tends to be
AJE> more ubiquitous than others when you find it. In the applications weak
AJE> to this -- we found roughly 200 locations vulnerable to attack in
AJE> those 44 applications, and each location would have multiple inputs,
AJE> so you are probably talking 1,000+ inputs vulnerable to attack using
AJE> this encoding.

The   discussion   of   how  many  inputs  are  vulnerable  is kind of
ludicrous isn't it? As it nearly always boils down to the same set of impacts
even if you have a trillion of inputs vulnerable, per domain.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] TPTI-09-03: Apple iTunes Multiple Protocol Handler Buffer Overflow Vulnerabilities

2009-06-03 Thread Thierry Zoller
Hi Will,

WD> Here's the (mac) exploit module to go along with my simul-report to
WD> apple:  http://static.dataspill.org/releases/itunes/itms_overflow.rb

OMFG, you must by kidding, are we 1999 again ?? Classical Stack buffer
overflow in URL request ?! ..o m f g =) Nice find!

itms_base_url = "itms://:"
itms_base_url << "A"*268  # Fill up the real buffer
itms_base_url << ""  # $ebx, $esi, $edi, $ebp
itms_base_url << target['Addr']  # hullo there, jmp *%ecx!


-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Is FFSpy a hoax?

2009-05-30 Thread Thierry Zoller

Relatively old discussion, log into bugzilla and search - or read :
http://lhs.loria.fr/index.php?option=com_content&view=article&id=62:malicious-firefox-extensions&catid=36:news&Itemid=54
http://indefinitestudies.files.wordpress.com/2008/08/beaucamps-reynaud-maliciousextensions-en.pdf



-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [TZO-27-2009] Firefox Denial of Service (Keygen)

2009-05-28 Thread Thierry Zoller
Hi Travis,

With all due respect:

>A memory leak in an interactive program that requires you to view a hostile
>page for 9hours is clearly of negligible security impact.
Ok I will take the strawman :

The impact is Denial of Service.

Ignoring  that  this  discussion is of *any* interest to anybody
or even for this overly stupid problem :
- 9 hours for 300+ megabytes
- x minutes for x bytes

Only a few bytes of "k" leads to the compromises of the private key.
(DSA).  Does  this  matter,  not  really.  It's your key anyways. Does
something  "leak" to somewhere were it's not supposed to be, no. Memory
is just not correctly freed.

---
I'm sure that if you were to familiarise yourself with the some of the
rudimentary concepts involved in dynamic memory allocation you will
understand their decision.
---
Yep,   I  am  an  ignorant  idiot,  can  we move on now ? If *you* can't
imagine a setup or extreme border case where (as example) entropy that
is being collected is indirectly affected, be it in quality of entropy
or size, then clearly *I*  must  be  the idiot that doesn't understand the
concept of memory allocations.

---
Rest assured, there is zero possibility that a memory leak can result in
"reduced entropy, weak key material etc" as you mentioned in email.

If you want to discuss further I'd recommend to take it off list.

General comment: I am  interesting  to  see  the  kind  of feedback I
get  when  posting an Firefox bug as opposed to bugs of other vendors.
It's almost like you hit a little boy and everybody steps into for
his defence.

Anyways, too much noise for such a stupid, near irrelevant but.



-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-27-2009] Firefox Denial of Service (Keygen)

2009-05-27 Thread Thierry Zoller


  From the very-low-hanging-fruit-department
   Firefox Denial of Service (KEYGEN)



Release mode: Forced release.
Ref : [TZO-27-2009] - Firefox Denial of Service (KEYGEN)
WWW : 
http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html
Vendor  : http://www.firefox.com
Status  : No patch
CVE : none provided
Credit  : none 
Bugzilla entry: https://bugzilla.mozilla.org/show_bug.cgi?id=469565

Security notification reaction rating : There wasn't any appropriate reaction. 
Notification to patch window : x+n

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Firefox 3.0.10 (Windows)
- Likely : All Firefox versions supporting the KEYGEN tag.

I. Background
~
Firefox is a popular Internet browser from the Mozilla Corporation. In 2007 the
Mozilla Corporation had a revenue of over 75 million dollars [1], out of 
which 68 million where made with a search advertising deal, in other words with
the search box in Firefox that defaults to Google.

I envy the spirit of everyone that works on Firefox code in their spare time, 
for free. 

II. Description
~~~
This bug is a simple design bug that results in an endless loop (and interesting
memory leaks).

Once upon a time Netscape thought it would be a great idea to add the keygen tag
() as a feature to their Browser. The keygen tag offers a simple way
of automatically generating key material using various algorithms. For instance
it is possible to generate RSA, DSA and EC key material.

"The public key and challenge string are DER encoded as PublicKeyAndChallenge 
and 
then digitally signed with the private key to produce a 
SignedPublicKeyAndChallenge. 
The SignedPublicKeyAndChallenge is base64 encoded, and the ASCII data is 
finally 
submitted to the server as the value of a name-value pair, where the name is 
specified by the NAME attribute of the KEYGEN tag." 

More information: 
https://developer.mozilla.org/En/HTML/HTML_Extensions/KEYGEN_Tag

This feature includes the automatic submission of the public part to a script, 
the crux. The Keygen tag reloads the document by submitting the public key as 
an argument
to the current URI. Combining this with a javascript body onload() call
(or meta refresh) results in an neat endless loop blocking access to the UI.

Furthermore memory is leaked during the process.
 
III. Impact
~~~
The browser doesn't respond any longer to any user input, tabs are no 
longer accessible, your work if any might be lost. Restarting the
Firefox process and restoring the previous Firefox session will
re-spawn the tab and start the loop again.

According to a Bugzilla entry memory is also leaked during the process.

So let's recap, we have a function that generates key material and looping
causes memory to leak. One might think this should be important enough 
to investigate, especially if you know that for DSA for instance, only
a few bits of k can reveal an entire private key. [3] 

Note: I am not saying the memory leaks include key material, seeing the lack
of interest this bugzilla ticket triggered, I have not considered investigating 
further.  What  I  am  saying  is  that if security is taken seriously
memory leaks that directly or indirectly happen during key generation
need to be investigated thoroughly.


IV. Proof of concept (hold your breath)
~~~








Live : http://secdev.zoller.lu/ff_dos_keygen.html


IV. Disclosure timeline
~
DD/MM/
14/12/2008 : Created bugzilla entry (security) with (the wrong) proof of concept
 file.

14/12/2008 : Attached the correct POC file (mea culpa) and a stack trace and 
details
 of memory corruption that repeatedly occurred during testing the 
POC

24/12/2008 : dved...@mozilla.com comments : "I can definitely confirm the 
denial 
 of service aspect, and there's a very minor memory leak (after 9 
 hours of CPU time memory use went from 60MB to 360MB). Haven't been
 able to reproduce a crash."
 
27/05/2009 : The 4 month grace period [2] given is reached. Release of this 
advisory.


[1] 
http://www.mozilla.org/foundation/documents/mf-2007-audited-financial-statement.pdf
http://www.guidestar.org/FinDocuments//2007/200/097/2007-200097189-047bbaa9-9.pdf
[2] http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html
[3] http://rdist.root.org/?s=dsa

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)

2009-05-27 Thread Thierry Zoller
Hi Michal,

Yep, positive, welcome to the world of rediscovery, sad that the bugs seems
to  been  known  since  2007. Speak about Mozilla being the fastest to
patch. Ticket has now been marked as duplicate of that one.




-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Addendum : [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)

2009-05-27 Thread Thierry Zoller
Hi Jim,

Read again:
Affected : All Firefox versions that support SVG.

Then think about what version of Firefox you are using.

JP> If I understand the process, saving the text at [IV. Proof of
JP> concept] (following the "~~~..." to an .XHTML file, and launch the
JP> file using Firefox, I should lose functionality ("Browser doesn't
JP> respond any longer to any user input, all tabs are no longer
JP> accessible, your work if any  (hail to the web 2.0) might be lost.")

JP> Using FF2.0.0.20 and the file does not result in loss of use. All
JP> tabs are functional. All JAVA links continue function.  Same
JP> result for naming the POC file to .HTML, .HTM.

>>>> Thierry Zoller  05/26/2009 13:13 >>>


JP> For  those that failed to reproduce, try naming the POC file with an XHTML
JP> extension.


JP> ___
JP> Full-Disclosure - We believe in it.
JP> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
JP> Hosted and sponsored by Secunia - http://secunia.com/



-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Addendum : [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)

2009-05-26 Thread Thierry Zoller


For  those that failed to reproduce, try naming the POC file with an XHTML
extension.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)

2009-05-26 Thread Thierry Zoller
Hi Sub,

S> does not work on firefox 3.0.10, tested
Reproduced the bug on 3.0.10 prior to posting.



-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)

2009-05-26 Thread Thierry Zoller


   From the low-hanging-fruit-department 
 Firefox et al. Denial of Service - All versions supporting SVG


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Forced release.
Ref : [TZO-26-2009] - Firefox DoS (unclamped loop) SVG
WWW : http://blog.zoller.lu/2009/04/advisory-firefox-dos-condition.html
Vendor  : http://www.firefox.com
Status  : No patch
CVE : none provided
Credit  : none 
Bugzilla entry: https://bugzilla.mozilla.org/show_bug.cgi?id=465615

Security notification reaction rating : There wasn't any reaction. OSS Security 
notification FTW
Notification to patch window : x+n

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Firefox all supporting SVG (didn't care to investigate which, task of the 
vendor)
- all software packages using mozilla engine and allowing SVG

I. Background
~
Firefox is a popular internet browser.

II. Description
~~~
This bug is a typical result of what we call unclamped loop. An "attacker"
will give the Radius value of the Circle attribute a very big value. That
is leetness. 

Stack trace : 
ntkrnlpa.exe+0x6e9ab
ntkrnlpa.exe!MmIsDriverVerifying+0xbb0
hal.dll+0x2ef2
xul.dll!NS_InvokeByIndex_P+0x30c36
xul.dll!NS_InvokeByIndex_P+0x30e8a
xul.dll!NS_InvokeByIndex_P+0x30e02
xul.dll!NS_InvokeByIndex_P+0x30f5e
xul.dll!XRE_InitEmbedding+0x7858
xul.dll!XRE_InitEmbedding+0xf4ee
xul.dll!XRE_TermEmbedding+0x11411
xul.dll!gfxTextRun::Draw+0xdd4d
xul.dll!gfxTextRun::Draw+0xe1ca
xul.dll!gfxWindowsPlatform::PrefChangedCallback+0x1495
xul.dll!gfxTextRun::SetSpaceGlyph+0x2678
xul.dll!gfxFont::NotifyLineBreaksChanged+0xf1d3
xul.dll!gfxWindowsPlatform::RunLoader+0xa9f6
xul.dll!NS_StringCopy_P+0x9942
xul.dll!gfxImageSurface::gfxImageSurface+0x3188
xul.dll!gfxImageSurface::gfxImageSurface+0x2ed8


Also produces exceptions in MOZCRT19...
MOZCRT19!modf+0x2570:
600715e0 660f122550450960 movlpd  xmm4,qword ptr 
[MOZCRT19!exception::`vftable'+0x1a3d8 (60094550)] 
ds:0023:60094550=3fe62e42fefa39ef

III. Impact
~~~
Browser doesn't respond any longer to any user input, all tabs are no 
longer accessible, your work if any  (hail to the web 2.0) might be lost.

IV. Proof of concept (hold your breath)
~~~







IV. Disclosure timeline
~
DD/MM/
18/11/2008 : Created bugzilla entry (security) with proof of concept, 
 description the terms under which ooperate and the planned 
disclosure date.

24/22/2008 : Daniel Veditz comments : "Might be a cairo bug rather than SVG 
 (seems to be looping in libthebes), but I can definitely confirm 
 the DoS.
  
14/12/2008 : Ask for any action plan and my assessement of considering it low 
risk

 No reply.

28/12/2008 : "Timeless" comments [..] personally, i intend to open this bug 
 to the public [..] a bug like this is more likely to be fixed 
 by being visible to more people than by leaving it in 
a closet.
 
26/05/2009 : In 2009 I agree; release of this advisory. 





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] PAPER: Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs

2009-05-25 Thread Thierry Zoller

Hi,

>> - RL!unpack
>>  http://ap0x.jezgra.net/unpackers.html
Second download entry on that page : RL!Unpack







-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] PAPER: Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs

2009-05-25 Thread Thierry Zoller
Hi Piotr,

Any information with regards to how MMMBoB performs when trying to
unpack a bit more obfuscated/aggressive packers like Themida / VMprotect ?



On a side note:
I  see  often that some generic unpackers are rarely cited/referenced,
although they are interesting and perform astonishingly well.

Here are two generic unpackers I think deserve some exposure too :

- RL!unpack
  http://ap0x.jezgra.net/unpackers.html
  (tested against 101+ packers/mods)

- Quickunpack
   http://rapidshare.com/files/104264619/qunpack21.zip







-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-25-2009] Panda generic evasion (TAR)

2009-05-22 Thread Thierry Zoller


  From the low-hanging-fruit-department
   Panda generic evasion (TAR)


Why are there two panda advisories instead of one ? See
http://blog.zoller.lu/2009/05/100th-post-what-about-big-guys.html


You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Coordinated but limited disclosure.
Ref : TZO-25-2009 - Panda generic evasion (TAR)
WWW : 
http://blog.zoller.lu/2009/04/advisory-panda-generic-evasion-tar.html
Vendor  : http://www.pandasecurity.com
Status  : Patched (Through hotfix and automatic update)
CVE : none provided
OSVDB listing: No [1]
Credit :
http://www.pandasecurity.com/homeusers/support/card?id=80060&idIdioma=2
http://www.pandasecurity.com/homeusers/support/card?id=60039&idIdioma=2
http://www.pandasecurity.com/homeusers/support/card?id=70025&idIdioma=2

Security notification reaction rating : Good
Notification to patch window : +-22 days 

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Global Protection 2009 (Hotifx)
- Internet Security 2009 (Hotifx)
- Panda Antivirus Pro 2009 (Hotfix)
- Panda Security for Business with Exchange
- Panda Security for Business
- Panda Security for Enterprise
- Panda GateDefender Integra (patched through automatic updates)
- Panda GateDefender Performa (patched through automatic updates) 
- Panda AdminSecure (patched thorugh automatic updates)

SaaS
- Panda Managed Office Protection
- TrustLayer Mail
Quote : "What virus protection guarantees does TrustLayer offer?
With respect to the antivirus filtering service, TrustLayer 
offers a 100% virus-free contractual guarantee."

I. Background
~
Quote: "Panda Security is one of the world's leading creators 
and developers of technologies, products and services for 
keeping clients' IT resources free from viruses and other 
computer threats at the lowest possible Total Cost of Ownership."

II. Description
~~~
The parsing engine can be bypassed by a specially crafted RAR
archive.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within TAR archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.

IV. Disclosure timeline
~
DD/MM/
28/04/2009 : Sent proof of concept TAR, description the terms under which 
 I cooperate and the planned disclosure date
 
07/05/2009 : Resent POC, description and terms

11/05/2009 : Inform Panda that his is my last attempt to contact them and
 that I will publish the information on the 20th of Mai.

11/05/2009 : Panda informes me that they are still evaluating and fixing
 release dates and asks for more time.

11/05/2009 : Panda states that they send me a fix for the TAR bug in
 order to cross check it fixes the problem.
 
21/05/2009 : Panda informs me of the release of hotfixes and affected
 Products.
 
22/05/2009 : Ask for clarification on affected products

22/05/2009 : Release of this advisory.   
 

[1]
Panda is invited to leave their security contact e-mail address at
http://osvdb.org/vendor/1/Panda%20Software .



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-24-2009] Panda generic evasion (CAB)

2009-05-22 Thread Thierry Zoller


   From the low-hanging-fruit-department
   Panda generic evasion (CAB)


Why are there two panda advisories instead of one ? See
http://blog.zoller.lu/2009/05/100th-post-what-about-big-guys.html

CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Coordinated but limited disclosure.
Ref : TZO-24-2009 - Panda generic evasion (CAB)
WWW : 
http://blog.zoller.lu/2009/04/why-are-there-two-panda-advisories.html
Vendor  : http://www.pandasecurity.com
Status  : Patched (Through hotfix and automatic update)
CVE : none provided
OSVDB listing: No [1]
Credit :
http://www.pandasecurity.com/homeusers/support/card?id=80060&idIdioma=2
http://www.pandasecurity.com/homeusers/support/card?id=60039&idIdioma=2
http://www.pandasecurity.com/homeusers/support/card?id=70025&idIdioma=2

Security notification reaction rating : Good
Notification to patch window : +-32 days

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Global Protection 2009 (Hotifx)
- Internet Security 2009 (Hotifx)
- Panda Antivirus Pro 2009 (Hotfix)
- Panda Security for Business with Exchange
- Panda Security for Business
- Panda Security for Enterprise
- Panda GateDefender Integra (patched through automatic updates)
- Panda GateDefender Performa (patched through automatic updates) 
- Panda AdminSecure (patched thorugh automatic updates)

SaaS
- Panda Managed Office Protection
- TrustLayer Mail
Quote : "What virus protection guarantees does TrustLayer offer?
With respect to the antivirus filtering service, TrustLayer 
offers a 100% virus-free contractual guarantee."

I. Background
~
Quote: "Panda Security is one of the world's leading creators 
and developers of technologies, products and services for 
keeping clients' IT resources free from viruses and other 
computer threats at the lowest possible Total Cost of Ownership."

II. Description
~~~
The parsing engine can be bypassed by a specially crafted CAB
archive.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within CAB archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.

IV. Disclosure timeline
~
DD/MM/
13/04/2009 : Send proof of concept CAB, description the terms under which 
 I cooperate and the planned disclosure date
 
13/04/2009 : Panda acks receipt and starts investigating 
 
15/04/2009 : Panda denies DoS and bypass condition and considers the bug a 
reporting
 issue as a MAX Size rule blocks the sample.
 
16/04/2009 : Ask if the Gatedefender product ranges, detects, flags or
 blocks the POC file. 

17/04/2009 : Provide a new POC file to Panda that aims at evading
 the Max Size rule and detection.
 
17/04/2009 : Panda acks receipt and will investigate.

20/04/2009 : Inform Panda that I sent the wrong POC on the 17/04/2009
 and attached the correct one.

28/04/2009 : Ping Panda for updates

28/04/2009 : Panda states that they are planning the patch timeline 
 and will inform me asap.

21/05/2009 : Panda informs me of the release of hotfixes and affected
 Products.
 
22/05/2009 : Ask for clarification on affected products

22/05/2009 : Release of this advisory.   
 


[1]
Panda is invited to leave their security contact e-mail address at
http://osvdb.org/vendor/1/Panda%20Software .




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-22-2009] Bitdefender generic evasion of heuristics (for PDF)

2009-05-18 Thread Thierry Zoller


 From the low-hanging-fruit-department
 Bitdefender generic evasion of heuristics (for PDF)


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Coordinated but limited disclosure.
Ref : [TZO-23-2009] - Bitdefender generic PDF evasion (heuristics)
WWW : 
http://blog.zoller.lu/2009/04/advisory-bitdefender-generic-evasion.html
Vendor  : http://www.bitdefender.com
Status  : Patched (with sig update after 13.05.2009)
CVE : none provided
Credit  : none 
OSVDB vendor entry: none [1]
Security notification reaction rating : good
Notification to patch window : 5 days

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Bitdefender Antivirus 2009 
- Bitdefender Internet Security 2009 
- Bitdefender Total Security 2009 
- Bitdefender Small Office Security 
- Bitdefender for Fileservers 
- Bitdefender for Samba
- Bitdefender for Sharepoint 
- Bitdefender Security for Exchange 
- Bitdefender Security for Mailservers 
- Bitdefender for ISA Servers 
- Bitdefender Client security 

Bundles:
- BitDefender Business Security 
- Bitdefender Antivirus for Unices 
- Bitdefender Corporate Security 
- Bitdefender SBS Security 

I. Background
~
Quote: "BitDefender™ provides security solutions to satisfy the protection 
requirements 
of today's computing environment, delivering effective threat management for 
over 41 million home and corporate users in more than 100 countries. 
BitDefender, 
a division of SOFTWIN, is headquartered in Bucharest, Romania and has offices 
in 
Tettnang, Germany, Barcelona, United Kingdom, Denmark, Spain and 
Fort Lauderdale (FL), USA."


II. Description
~~~
The heuristics can be bypassed by a special formatted PDF "container", this
leads to the bypass of malicious PDF files, old or new. This is not a 
bypass that relies on archive structures but relies on evading certain 
code paths in the AV engine "through various means".


III. Impact
~~~
To know more about the impact and type of "evasion", I updated the 
description at http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

Interestingly this opens the possibility to evade at scan time and
run-time.


IV. Disclosure timeline
~
DD/MM/
08/05/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date.
 
13/05/2009 : Bitdefender notifies my that the patch was deployed.


[1]
Bitdefender is encouraged to leave their security contact details at
http://osvdb.org/vendor/1/SOFTWIN to facilate communication and reduce lost 
reports.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [TZO-23-2009] Avira antivir generic evasion of heuristics (for PDF)

2009-05-18 Thread Thierry Zoller


   From the low-hanging-fruit-department 
Avira Antivir generic PDF evasion of heuristics


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Coordinated but limited disclosure.
Ref : [TZO-22-2009] - Avira Antivir generic PDF evasion (heuristics)
WWW : 
http://blog.zoller.lu/2009/04/advisory-avira-antivir-generic-evasion.html
Vendor  : http://www.avira.com
Status  : Patched (Engine-Version: AV7 7.9.0.168 / AV8/9: 8.2.0.168)
CVE : none provided
Credit  : t.b.a
OSVDB vendor entry: none [1]
Security notification reaction rating : good
Notification to patch window : 10 days

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Avira AntiVir Free 
- Avira AntiVir Premium 
- Avira AntiVir Premium Security Suite 
- Avira AntiVir Professional (Desktop)
- Avira AntiVir Server 
- Avira AntiVir Exchange 
- Avira AntiVir SharePoint
- Avira AntiVir ISA Server
- Avira AntiVir MIMEsweeper 
- Avira AntiVir for KEN! 4 
- Avira AntiVir Virus Scan Adapter for SAP NetWeaver®
- Avira AntiVir Professional (Unix) 
- Avira AntiVir Server (Unix) 
- Avira AntiVir MailGate 
- Avira AntiVir WebGate 

I. Background
~
Quote: "Avira AntiVir is a reliable free antivirus solution, that constantly 
and rapidly scans your computer for malicious programs such as viruses, 
Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors 
every action executed by the user or the operating system and reacts 
promptly when a malicious program is detected.

The protection experts have numerous company locations throughout 
Germany and cultivate partnerships in Europe, Asia and America. 
Avira has more than 180 employees at their main office in Tettnang 
near Lake Constance and is one of the largest employers in the region. 

AV-Comparatives e.V. have chosen Avira AntiVir Premium as the 
best anti-virus solution of 2008"


II. Description
~~~
The heuristics can be bypassed by a special formated PDF "container", this
leads to the bypass of malicious PDF files, old or new. This is not a 
bypass that relies on archive structures but relies on evading certain 
code paths in the av engine "through various means".


III. Impact
~~~

To know more about the impact and type of "evasion", I updated the 
description at http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

Interestingly this opens the possibility to evade at scan time and
run-time.


IV. Disclosure timeline
~
DD/MM/
08/05/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date.
 
10/05/2009 : Avira acknowledges receipt.

11/05/2009 : Avira states that the internal development build has been
 patched and that the public updates are to be rolled out
 end of the week.

18/05/2009 : Avira informs me that "we already released the fixed engine 
 to the public on friday, 15th May, 17:59 pm CET: 
 Engine-Version: AV7 7.9.0.168 / AV8/9: 8.2.0.168
 
18/05/2009 : Release of this advisory.
 

[1]
Avira is encouraged to leave their security contact details at
http://osvdb.org/vendor/1/AVIRA%20GmbH to facilate communication and reduce 
lost reports.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IIS6 + webdav and unicode rides again in 2009

2009-05-15 Thread Thierry Zoller

FYI: IIS7 + Webdav seems not to be affected
I can't stress enough that this is not a simple auth bypass only -
You can _upload_ arbritary data to the server.

http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html



-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] IIS6 + webdav and unicode rides again in 2009

2009-05-15 Thread Thierry Zoller
Hi,

PDF as image:
http://view.samurajdata.se/psview.php?id=023287d6&page=1


-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-21-2009] Fprot CAB bypass / evasion

2009-05-09 Thread Thierry Zoller


  From the low-hanging-fruit-department
  F-prot generic CAB bypass / evasion


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Coordinated but limited disclosure.
Ref : [TZO-21-2009] - F-prot CAB bypass / evasion
WWW : 
http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html
Vendor  : http://www.f-prot.com
Status  : Current version not patched, next engine version patched
  Date unknown, vendor doesn't answer any longer.
CVE : none provided
Credit  : none prodided
OSVDB vendor entry: none [1]
Security notification reaction rating : better thn last time
Notification to patch window : n+1 (no patch for current build)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
# F-PROT AVES (High: complete bypass of engine)
# F-PROT Antivirus for Windows (unknown)
# F-PROT Antivirus for Windows on Mail Servers : (High: complete bypass of 
engine) 
# F-PROT Antivirus for Exchange (High: complete bypass of engine)
# F-PROT Antivirus for Linux x86 Mail Servers : (High: complete bypass of 
engine)
# F-PROT Antivirus for Linux x86 File Servers : (High: complete bypass of 
engine)
# F-PROT Antivirus for Solaris SPARC / Solaris x86 Mail Servers (High: complete 
bypass of engine)
# F-PROT Milter - for example sendmail (High: complete bypass of engine)
# F-PROT Antivirus for Linux on IBM zSeries (S/390) (High: complete bypass of 
engine)
# F-Prot Antivirus for Linux x86 Workstations (unknown)

OEM Partners affected :
- Autentium  (all)
Command Software Systems, an Authentium company, has been developing and 
selling an antivirus solution utilizing the powerful F-PROT Antivirus 
engine since 1991. 

OEM Partner unknown status :
- Sendmail, Inc.
- G-Data
- 

I. Background
~
Quote: "FRISK Software International, established in 1993, is one of the 
world's leading companies in antivirus research and product development.

FRISK Software produces the hugely popular F-Prot Antivirus products range 
offering unrivalled heuristic detection capabilities. In addition to this, 
the F-Prot AVES managed online e-mail security service filters away the 
nuisance of spam e-mail as well as viruses, worms and other malware that 
increasingly clog up inboxes and threaten data security."


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
CAB (Filesize) archive. 

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within CAB archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
10/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date.
 
15/04/2009 : FRISK responds that they were unable to find any archive 
 program that is able to extract the file and that some
 archive programs tested suffer from an integer overflow
 extracting the file.
 
15/04/2009 : Inform FRISK that the sample should extract fine.  
 
 
20/04/2009 : FRISK responds that they were unable to find any archive 
 program that is able to extract the file.
 
20/04/2009 : Inform FRISK that the sample should extract fine.

22/04/2009 : FRISK responds that they were unable to find any archive 
 program that is able to extract the file. However it will
 be patched nonetheless "being low-priority, it will not be
 added to the 4.4 branch. In other words, the fix will be
 included in the next engine released."

22/04/2009 : Sending FRISK a slightly modified POC (same field, different
 value) that extracts fine and still bypasses the engine. Ask
 vendor to confirm that the new engine catches the POC.
 
 No Reply
 
27/04/2009 : Resending previous mail asking to check whether the patch has
 been effectively closed
 
 No Reply
 
08/05/2009 : Release of this advisory.


[1]
F-prot is encouraged to leave their security contact details 

[Full-disclosure] [TZO-20-2009] AVG ZIP evasion / bypass

2009-05-09 Thread Thierry Zoller


>From the low-hanging-fruit-department - AVG generic ZIP bypass / evasion


CHEAP Plug :

You are invited to participate in HACK.LU 2009, a small but concentrated
luxemburgish security conference. More information : http://www.hack.lu
CFP is open, sponsorship is still possible and warmly welcomed!


Release mode: Coordinated but limited disclosure.
Ref : [TZO-20-2009] - AVG generic ZIP bypass / evasion
WWW : http://blog.zoller.lu/2009/04/avg-zip-evasion-bypass.html
Vendor  : http://www.AVG.com
Status  : Patched (with engine build 8.5 323)
CVE : none provided
Credit  : t.b.a
OSVDB vendor entry: none [1]
Security notification reaction rating : good
Notification to patch window : +-28 days 

Comment:
Interestingly at AVG, the support department handles the security
notification response, which strangely seemed to work out this time. I guess 
when
procedures and awareness are in place it doesn't matter that much. 
(You loose the "bouncer effect" for irrelevant reports though). I'd recommend
to designate one person to be responsible to security related issues, and 
"train"
the others to forward to that person (even in case of doubt if security or not)
if you choose to have support department handle security notifications.



Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- AVG Anti-Virus Network Edition (prior to engine build 8.5 323)
- AVG Internet Security Netzwerk Edition (prior to engine build 8.5 323)
- AVG Server Edition für Linux/FreeBSD (prior to engine build 8.5 323)
- AVG eMail Server Edition (prior to engine build 8.5 323)
- AVG File Server Edition (prior to engine build 8.5 323)
- AVG Internet Security SBS Edition (prior to engine build 8.5 323)
- AVG Anti-Virus SBS Edition (prior to engine build 8.5 323)
- AVG Anti-Virus plus Firewall (prior to engine build 8.5 323)
- AVG Anti-Virus (prior to engine build 8.5 323)

I. Background
~
Quote: "Founded in 1991, with corporate offices in Europe, the US 
and the UK, AVG is focused on providing home and business computer
users with the most comprehensive and proactive protection against
computer security threats.

With more than 80 million active users around the world, the AVG 
family of security software products is distributed globally through 
resellers and through the Web and supports all major operating 
systems and platforms."


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
ZIP (Filelenght) archive.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within RAR and ZIP archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
10/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date.
 
14/04/2009 : AVG acknowledges reproducibility 

14/04/2009 : I inform AVG that this is a security notification not a simple
 bug report.

15/04/2009 : AVG acknowledges through a second channel

15/04/2009 : AVG informs me that the fix has been made and the code is 
 currently being tested prior to being deployed. 

15/04/2009 : Ask second channel AVG contact what versions and products 
 are affected.   
 
 no reply
 
07/05/2009 : Ask AVG wether the patches have now been deployed

08/05/2009 : AVG answers that the patches have been deployed

08/05/2009 : Ask AVG what versions have been affected

08/05/2009 : AVG states that "[..]AVG 8.5 build 285 are affected by this 
 issue but the latest release of AVG 8.5 build 323 has 
 resolved the reported issue.[..]"   
 
08/05/2009 : Release of this advisory.


[1]
Grisoft (AVG) is encouraged to leave their security contact details at
http://osvdb.org/vendor/1/Grisoft to facilate communication and reduce
lost reports.




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Changes : [TZO-17-2009]Trendmicro multiple bypass/evasions

2009-05-09 Thread Thierry Zoller
__

   UPDATE : Trendmicro RAR / CAB bypass evasion
__


CHANGES to original advisory [TZO-172009] Trendmicro : 
--

Status : RAR / CAB  issue WILL be patched on June 17

Quoting vendor : 
"This vulnerability is capable of allowing attackers to send RAR files 
with corrupted RAR headers through our gateway products, which bypass 
the compressed files without scanning them."


Comment:
This   just  goes  to  proove  that  publishing changes perception, as
customers   read,   react   and  complain.  (Trend  previously  denied
patching). In other words, always publish even if the vendor denies
patching.

In  the  name  of all TrendMicro customers I would like to thank those
customers that reacted and complained. Wihtout publication there is no
change, without those reacting to advisories there is neither.

Prooves #2 and #5 at 
http://blog.zoller.lu/2009/04/dear-thierry-why-are-you-such-arrogant.html
to be valid.

Regards,
Thierry Zoller




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Request : Microsoft Forefront (all) anybody?

2009-05-09 Thread Thierry Zoller

Hi,

If  you  are  running Microsoft Forefront (especially server side)
and are willing to help out, please get in touch with me.



-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Update: [TZO-15-2009] Aladdin eSafe generic bypass - Forced release

2009-05-07 Thread Thierry Zoller


Update:
Aladdin responded and posted a blog post, please read the timeline and
then the blog post.
http://www.aladdin.com/AircBlog/post/2009/05/Archive-Bypass-Issue-and-eSafe.aspx

It is said that :
-
"This means that in case a customer receives such a specially crafted
archive file, he will not be able to extract it."

This is wrong. Winrar for example extracts the PoC files fine.

"We have acted on the issue after two days since its first coming
into view."
Please see the timeline below and draw your conclusions

"The  eSafe  products affected by this vulnerability are 7.1, 7.0, and
6."
I  was  not communicated this information and had to find a referer in
my log files in order to know.


Full update to be published after more discussions...

-

IV. Disclosure timeline
~
DD/MM/
04/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date. There is
 no security adress listed at [1] and hence took previously
 known security contacts that are known to exist.
 
 No reply.
 
13/04/2009 : Resending. Copied secur...@aladdin.de, secur...@aladdin.com
 sec...@aladdin.com, sec...@aladdin.de,supp...@aladdin.com,
 supp...@aladdin.de in CC.
 
 No reply.
 
16/04/2009 : Resending specifying this is the last attempt to disclose
 reponsibly.

 No reply.
 
18/04/2009 : Online virus scan service offered to gap the bridge between
 vendors that don't reply and myself. Aladin was contacted 
 through third party.

 No reaction

19/04/2009 : Aladdin visited the blog entry that explains the bypasses
 and impacts. 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html 
 
 No reaction
 
27/04/2009 : Release of this limited advisory.   


[1] http://osvdb.org/vendor/1/Aladdin%20Knowledge%20Systems


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-18-2009] Mcafee multiple evasions/bypasses (RAR, ZIP)

2009-04-29 Thread Thierry Zoller


From the low-hanging-fruit-department - Mcafee multiple generic evasions


Release mode: Coordinated but limited disclosure.
Ref : TZO-182009 - Mcafee multiple generic evasions
WWW : 
http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html
Vendor  : http://www.mcafee.com
Status  : Patched
CVE : CVE-2009-1348 (provided by mcafee)
https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT

Security notification reaction rating : very good
Notification to patch window : +-27 days (Eastern holidays in between)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- McAfee VirusScan® Plus 2009
- McAfee Total Protection™ 2009
- McAfee Internet Security
- McAfee VirusScan USB
- McAfee VirusScan Enterprise
- McAfee VirusScan Enterprise Linux
- McAfee VirusScan Enterprise for SAP
- McAfee VirusScan Enterprise for Storage
- McAfee VirusScan Commandline
- Mcafee SecurityShield for Microsoft ISA Server
- Mcafee Security for Microsoft Sharepoint
- Mcafee Security for Email Servers
- McAfee Email Gateyway
- McAfee Total Protection for Endpoint
- McAfee Active Virus Defense
- McAfee Active VirusScan
 
It is unkown whether SaaS were affected (tough likely) :
- McAfee Email Security Service
- McAfee Total Protection Service Advanced


I. Background
~
Quote: "McAfee proactively secures systems and networks from known 
and as yet undiscovered threats worldwide. Home users, businesses, 
service providers, government agencies, and our partners all trust 
our unmatched security expertise and have confidence in our 
comprehensive and proven solutions to effectively block attacks
and prevent disruptions."


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
RAR (Headflags and Packsize),ZIP (Filelenght) archive.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within RAR and ZIP archives. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
04/04/2009 : Send proof of concept RAR I, description the terms under which 
 I cooperate and the planned disclosure date
 
06/04/2009 : Send proof of concept RAR II, description the terms under which 
 I cooperate and the planned disclosure date
 
06/04/2009 : Mcafee acknowledges receipt and reproduction of RAR I, ack
 acknowledges receipt of RARII   
 
10/04/2009 : Send proof of concept ZIP I, description the terms under which 
 I cooperate and the planned disclosure date

21/04/2009 : Mcafee provides CVE number CVE-2009-1348 
 
28/04/2009 : Mcafee informs me that the patch might be released on the 29th
29/04/2009 : Mcafee confirms patch release and provides URL
 
https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT
 
29/04/2009 : Ask for affected versions

29/04/2009 : Mcafee replies " This issue does affect all vs engine products, 
including 
 both gateway and endpoint"





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Addendum: [TZO-17-2009]Trendmicro multiple bypass/evasions

2009-04-29 Thread Thierry Zoller

[Snip]
I. Background
~
ESET develops software solutions that deliver instant, comprehensive protection 
against evolving computer security threats. ESET NOD32® Antivirus, is the 
flagship
product, consistently achieves the highest accolades in all types of 
comparative testing and is the foundational product that builds 
out the ESET product line to include ESET Smart Security.

http://www.eset.com/products/eset_performance_advantages.php

[Snip..]

I. Background
~
I. Background
Quote:"Trend Micro Incorporated is a global leader in network antivirus and 
Internet content security software and services. Founded in 1988, Trend Micro 
was a pioneer in secure content and threat management, leading the migration of 
early virus protection from the desktop to the network server and the Internet 
gateway. Today, the company continues to advance its comprehensive approach to 
management of content security threats into the Internet cloud, encompassing 
information flow beyond the boundaries of the network. With its 24x7 global 
support operations and dedication to innovative technologies and methodologies, 
Trend Micro is well positioned to protect its customers against an expanding 
range of threats that silently endanger business operations, personal 
information, and property."



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-17-2009]Trendmicro multiple bypass/evasions

2009-04-29 Thread Thierry Zoller
__

   Trendmicro RAR,CAB,ZIP bypass/evasions
__

Release mode: Coordinated but limited disclosure.
Ref : TZO-172009 - Trendmicro RAR,CAB,ZIP bypass/evasion
WWW : 
http://blog.zoller.lu/2009/04/trendmicro-multiple-evasion-and-bypass.html
Status  : No patch, but mitigation recommendations for certain
  products (see below)
Vendor  : http://www.trendmicro.com/
Security notification reaction rating : Good
Notification to patch time window : n+1 days (no patch)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 

Client-side products
-
These will not be patched, trends reason is that 
malware will be detected up on extraction. While this is true for end-user
setups this is not the case if you use such products to scan Fileservers, 
Database servers or any server where an enduser does not actively extract 
content. The detection is still completely bypassed. In other words you 
can no longer assume that RAR,ZIP,CAB (or any other archive) is safe/clean 
after 
a Trendmicro scan with these products . 

Hence I can no longer recommend these products for such uses and hence my 
recommendation to trend to offer patches, if you use the products in such
environment please contact Trend and ask for a patch.

I applaud Trend however for the time and effort spent with communicating 
with me and the transparency presented.

Client-side Impact : Low for usage in End-user scenarios
Client-side Impact : High for usage in fileserver, database scenarios.

1. OfficeScan product suites (All of OfficeScan products)
2. ServerProtect product suite (All products of Server protect)
   -ServerProtect for Microsoft Windows/Novell NetWare
   -ServerProtect for EMC Celerra
   -ServerProtect for NetApp
   -Server Protect for Linux
   -ServerProtect for Network Appliance Filers
   
3. Trend Micro Internet Security product suites 
   (Internet Security Pro, Internet Security, Antivirus+AntiSpyware)
4. Client / Server / Messaging Suite ( The OfficeScan component )
5. Worry Free Business Security - Standard 
6. Worry Free Business Security - Advanced ( The security agent component )
7. Worry Free Business Security Hosted 
8. Housecall

Gateway products
-
InterScan Web Security Suite product lines and 
InterScan Web Protect for ISA 
Impact: Detection is evaded but files are quarantined by default 
,residual risk of an administrator deblocking a file as there is 
no detection of malicious code.

InterScan Messaging Security Appliance  
Impact: Detection is evaded but files are quarantined by default 
,residual risk of an administrator deblocking a file as there is 
no detection of malicious code.

Neatsuite Advanced (combination of InterScan Messaging Security Suite,
InterScan Web Security Suite, ScanMail Suite for Domino or Exchange, and All)

   Please see, specific product recommendation

ScanMail for Exchange 
Impact: Protection is bypassed by default 
After mitigation: Residual risk of an administrator deblocking a
file as there is no detection of malicious code.

Mitigation recommendations from Trend:
1. Set the "Virus Scan > Action > Files outside of scan restriction
   Criteria" to any of the secured options. Quarantined entire message
   and set to Notify
2. The CAB file will be blocked and the Administrator will
receive the email notification.

ScanMail for Domino Suites
Impact: Protection is bypassed by default, detection is also bypassed after 
mitigation
but file is quarantined as "non extractable".
After mitigation: Residual risk of an administrator deblocking a
file as there is no detection of malicious code.

Mitigation recommendations from Trend:
1. Open the ScanMail for Domino Configuration database
2. Go to Configurations > Policies
3. Double click on Default Mail Scan
4. Click on Scan Options Tab > Scan Restrictions
5. Put a mark on Exceed extracted file size and set this to either of the 
much secured action
a. Quarantine
b. Delete
6. Put any of the preferred value to maximum extracted file size
7. Click on Save & Closed

 

I. Background
~
ESET develops software solutions that deliver instant, comprehensive protection 
against evolving computer security threats. ESET NOD32® Antivirus, is the 
flagship
product, consistently achieves the highest accolades in all types of 
comparative testing and is the foundational product that builds 
out the ESET product line to include ESET Smart Security.

http://www.eset.com/products/eset_performance_advantages.php


II. Description
~~~
The parsing engine can be bypassed by a specially 

[Full-disclosure] [TZO-16-2009] Nod32 CAB bypass/evasion

2009-04-29 Thread Thierry Zoller
__

From the low-hanging-fruit-department - Nod32 CAB bypass/evasion
__

Release mode: Coordinated but limited disclosure.
Ref : TZO-162009 - Nod32 CAB bypass/evasion
WWW : 
http://blog.zoller.lu/2009/04/nod32-eset-cab-generic-evasion-limited.html
Status  : No patch, but mitigation recommendations (see below)
Vendor  : http://www.trendmicro.com/   
Security notification reaction rating : Good
Notification to patch time window : 14 days

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- ESET Smart Security 4 (update #4036)
- ESET NOD32 Antivirus 4 (update #4036)
- ESET Smart Security 4 Business Edition (update #4036)
- ESET NOD32 Antivirus 4 Business Edition (update #4036)
- ESET NOD32 Antivirus for Exchange Server (update #4036)
- ESET Mail Security  (update #4036)
- ESET NOD32 Antivirus for Lotus Domino Server (update #4036)
- ESET File Security (update #4036)
- ESET Novell Netware (update #4036)
- ESET DELL STORAGE SERVERS (update #4036)
- ESET NOD32 Antivirus for Linux gateway devices (update #4036)


I. Background
~
ESET develops software solutions that deliver instant, comprehensive protection 
against evolving computer security threats. ESET NOD32® Antivirus, is the 
flagship
product, consistently achieves the highest accolades in all types of 
comparative testing and is the foundational product that builds 
out the ESET product line to include ESET Smart Security.

http://www.eset.com/products/eset_performance_advantages.php


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
CAB archive. Details are currently witheld due to other vendors that are 
in process of deploying patches.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the CAB archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~

13/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date
 
 No reply
 
17/04/2009 : Resend notification with an indication this will be the last
 attempt to responsibly disclose.
 
 
17/04/2009 : Eset acknowledges receipt and previous receipt 

29/04/2009 : Eset informs me that the bug was fixed on the 27th of April
 through and auotmatic update (update #4036)
 
29/04/2009 : Release of this advisory







___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Errata: [TZO-13-2009] Avira Antivir generic CAB evasion / bypass

2009-04-28 Thread Thierry Zoller

Errata:
BID/CVE : The issue was in ZIP and not CAB archive handling.

Thank you for your understanding.

Regards,
Thierry


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-15-2009] Aladdin eSafe generic bypass - Forced release

2009-04-27 Thread Thierry Zoller
__

  From the low-hanging-fruit-department - Aladdin eSafe bypass/evasion
__

Release mode: Forced relaese, vendor has not replied.
Ref : TZO-152009 - Aladdin eSafe Generic Evasion 
WWW : 
http://blog.zoller.lu/2009/04/aladdin-esafe-generic-evasion-bypass.html
Status  : Not patched
Vendor  : http://www.aladdin.com
Security notification reaction rating : Catastrophic
(vendor visited specific url at my website but has not reacted)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

If   you  wonder  the  about  the  reasons behind such forced releases please
visit:
http://blog.zoller.lu/2009/04/dear-thierry-why-are-you-such-arrogant.html

Affected products : 
- t.b.a (Vendor has not reacted, please see below)
- probably all versions including gateway solutions

As this bug has not been reproduced by the vendor, this limited advisory 
relies on the assumption that my tests were conclusive and that the test
environment mimics the production environment.

I. Background
~
Quote: "Aladdin is dedicated to being the leading provider of security 
services and solutions used to protect digital assets, enable secure 
business, and maximize the benefits from creating, selling, 
distributing and using digital content."


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
archive file. Details are currently witheld due to other vendors that are 
in process of deploying patches.

A professional reaction to a vulnerability notification is a way to 
measure the maturity of a vendor in terms of security. Aladdin is given 
a grace period of two (2) weeks to reply to my notification. Failure 
to do so will result in POC being released in two (2) weeks. 

Aladdin is advised to leave a specific security contact
at [1] in order to simplify getting in contact with them.

As this bug has not been reproduced by the vendor, this limited advisory 
relies on the assumption that my tests were conclusive.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~
DD/MM/
04/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date. There is
 no security adress listed at [1] and hence took previously
 known security contacts that are known to exist.
 
 No reply.
 
13/04/2009 : Resending. Copied secur...@aladdin.de, secur...@aladdin.com
 sec...@aladdin.com, sec...@aladdin.de,supp...@aladdin.com,
 supp...@aladdin.de in CC.
 
 No reply.
 
16/04/2009 : Resending specifying this is the last attempt to disclose
 reponsibly.

 No reply.
 
18/04/2009 : Online virus scan service offered to gap the bridge between
 vendors that don't reply and myself. Aladin was contacted 
 through third party.

 No reaction

19/04/2009 : Aladdin visited the blog entry that explains the bypasses
 and impacts. 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html 
 
 No reaction
 
27/04/2009 : Release of this limited advisory.   


[1] http://osvdb.org/vendor/1/Aladdin%20Knowledge%20Systems


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-14-2009] Comodo Antivirus RAR evasion

2009-04-27 Thread Thierry Zoller
__

  From the low-hanging-fruit-department - Comodo antivir bypass/evasion
__

Release mode: Coordinated but limited disclosure.
Ref : TZO-142009 - Comodo evasion RAR
WWW : http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html
Vendor  : http://www.comodo.com
Status  : Patched
Security notification reaction rating : Good 
Notification to patch window : 41 days

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Comodo Internet Security 3.5.x and 3.8.x (Impact low due to on access scan)
- Comodo Anti-Virus (Impact low due to on access scan)


I. Background
~
Quote: "Comodo's range of solutions gives businesses the ability 
to create online trust through proprietary technology that help 
e-businesses convert more customers, retain more customers and 
increase lifetime value."

II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
RAR archive. Details are currently witheld due to other vendors that are 
in process of deploying patches.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the RAR archive. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
14/03/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date
 
 No reply
 
16/03/2009 : Resend notification
 
23/03/2009 : Comodo answers that the bug has been fixed and will be deployed
 in version 3.9 due in end of April.

02/04/2009 : Ask for affected versions.
 
02/04/2009 : Comodo answers that the ranges 3.5.x and 3.8.x have been affected 
 and that the sheduled release date is the 25th of April. Credit
 will be given in the release notes.

27/04/2009 : Notify comodo that I plan to release the advisory today and assume
 the production code has been released in the 25.04.2009

27/04/2009 : Release of this advisory





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-13-2009] Avira Antivir generic CAB evasion / bypass

2009-04-27 Thread Thierry Zoller
__

  From the low-hanging-fruit-department - Avira antivir bypass/evasion
__

Release mode: Coordinated but limited disclosure.
Ref : TZO-132009 - Avira Antivir evasion CAB
WWW : 
http://blog.zoller.lu/2009/04/avira-antivir-generic-cab-bypass.html
Vendor  : http://www.avira.com
Status  : Patched
Security notification reaction rating : Good
Notification to patch window : 7 days (Eastern holidays in between)

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Avira AntiVir Free (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir Premium (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir Premium Security Suite (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir Professional (Desktop) (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir Server (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir Exchange (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir SharePoint (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir ISA Server (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir MIMEsweeper (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir for KEN! 4 (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir Virus Scan Adapter for SAP NetWeaver®
- Avira AntiVir Professional (Unix) (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir Server (Unix)  (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir MailGate (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)
- Avira AntiVir WebGate (pre AV7 7.9.0.148 / AV8/9: 8.2.0.148)

I. Background
~
Quote: "Avira AntiVir is a reliable free antivirus solution, that constantly 
and rapidly scans your computer for malicious programs such as viruses, 
Trojans, backdoor programs, hoaxes, worms, dialers etc. Monitors 
every action executed by the user or the operating system and reacts 
promptly when a malicious program is detected.

The protection experts have numerous company locations throughout 
Germany and cultivate partnerships in Europe, Asia and America. 
Avira has more than 180 employees at their main office in Tettnang 
near Lake Constance and is one of
the largest employers in the region. There are around 250 people 
employed worldwide whose commitment is continually being confirmed 
by awards. A significant contribution to protection is the Avira 
AntiVir Personal which is being used by private users a million 
times over.

AV-Comparatives e.V. have chosen Avira AntiVir Premium as the 
best anti-virus solution of 2008"


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
CAB archive. Details are currently witheld due to other vendors that are 
in process of deploying patches.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the CAB archive. There is no inspection of the content
at all and hence the impossibility to detect malicious code.


IV. Disclosure timeline
~
DD/MM/
10/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date
 
10/04/2009 : Avira acknowledges receipt and informs me of the eastern 
 holidays in Germany.
 
16/04/2009 : Asked for update  

17/04/2009 : Avira replies the problem is fixed in "AVPack >= 8.1.3.14
 7.6.1.19", changes have been made to the sdk in order to 
 allow 3rd party AV vendors that use the engine to reveive
 more details about the file.
 
18/04/2009 : Avira informs me that the patch is in production since the
 17th of April. AV7 7.9.0.148 / AV8/9: 8.2.0.148
 
18/04/2009 : Ask for more details about the impact of gateway appliances

23/04/2009 : Avira states that the archive effectively evade the default
 configuration of  Avira AntiVir MailGate and
 Avira AntiVir WebGate (prior to patch). Future evasions
 can be blocked by setting "BlockSuspiciousArchive" to yes
 however this is not enabled by default.

27/04/2009 : Release of this advisory





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-12-2009] SUN / Oracle JVM Remote code execution

2009-04-22 Thread Thierry Zoller
__

  SUN/ORACLE JAVA VM Remote code execution 
__

Release mode: Coordinated.
Ref : TZO-122009- SUN Java remote code execution
WWW : 
http://blog.zoller.lu/2009/04/sunoracle-java-vm-remote-code-execution.html
Vendor  : http://www.sun.com
Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html


Affected Products:
- JVM Version 6 Update 1
- JVM Version 6 Update 2

I. Background
~
Dictionary.com : "The Java Virtual Machine (JVM) is software that converts 
the Java intermediate language (bytecode) into machine language and executes it.
The original JVM came from the JavaSoft division of Sun. Subsequently,
other vendors developed their own; for example, the Microsoft Virtual 
Machine is Microsoft's Java interpreter. A JVM is incorporated into 
a Web browser in order to execute Java applets. A JVM is also installed in a 
Web server to execute server-side Java programs. A JVM can also be installed 
in a client machine to run stand-alone Java applications."

II. Description
~~~
Please understand that no details will be given, too many bad guys
would use it for drive-by attacks. At this point in time (old + 
fixed) there is really no need to.


III. Impact
~~~
Memory corruption due to a write attempt to a user controlable offset.
i.e exploitable. The Java VM is reachable through every major browser.


IV. Disclosure timeline
~

19/11/2008 : Send proof of concept, description to Microsoft (sic), 
 as bug was triggered through IE. 

20/11/2008 : Microsoft asks for clarification 

21/11/2008 : Clarification sent.
 
12/12/2008 : Microsoft replicated the memory corruption in Version 6
 update 1 and recommends getting in contact with SUN 
 
12/12/2008 : Send proof of concept and description to SUN

16/12/2008 : Sun acknwoledges receipt. PGP keys are exchanged.

13/01/2009 : Asked for update from SUN

17/01/2009 : Asked for update and indicate this is the last request 
 prior to release if no answer is given.
 
12/03/2009 : SUN asks for more specific details

12/03/2009 : Details given

24/04/2009 : Notify SUN that I am drafting the advisory and would
 require feedback and details

24/04/2009 : SUN asks for a copy of the advisory and explains the 
 engineering team is still working on the case

07/04/2009 : Asks SUN for an update

08/04/2009 : Sun responds that the team is still working on the case

20/04/2009 : Asking for an update and details

20/04/2009 : SUN responds that the engineers could not reproduce in 
 Update 11 and 12

20/04/2009 : I test the new updates and can no longer reproduce the 
 issue

22/04/2009 : Release of this advisory 




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Addendum :[TZO-09-2009] Avast bypass / evasion (Limited details)

2009-04-20 Thread Thierry Zoller

URL:
http://blog.zoller.lu/2009/04/release-mode-forced-release-vendor-has.html

Update : After the reaction from avast, it is now clear that all versions
and  products  are  affected,  however  there is no plan to patch, the
patch will come or will not come - sometime in the future.

You are encouraged to read the time line and draw your own conclusions.

Desktop Protection

* avast! 4 Professional (impact low, reason real-time protection)
* avast! 4 Home Edition (impact low, reason real-time protection)
* avast! Pro Family pack (impact low, reason real-time protection)
* avast! WHS Edition (impact low, reason real-time protection)
* avast! Mac Edition (impact unknown)
* avast! Linux Home Edition (impact unknown)
* avast! U3 Edition (impact unknown)
* avast! 4 BART CD (impact unknown)
* avast! for PDA (impact unknown)

Corporate Protection

* avast! 4 Server Edition(impact high, complete bypass)
* avast! 4 Server Edition Plug-ins
* avast! 4 Exchange Server Edition (impact high, complete bypass)
* avast! 4 ISA Server Edition (impact high, complete bypass)
* avast! 4 SharePoint Server Edition (impact high, complete bypass)
* avast! 4 SMTP Server Edition (impact high, complete bypass)
* avast! 4 Lotus Domino Edition (impact high, complete bypass)
* avast! Distributed Network Manager (impact high, complete bypass)
* avast! 4 Professional (impact unknown)
* avast! 4 BART CD (impact unknown)
* avast! for Linux/Unix Server (impact high, complete bypass)
* avast! for PDA (impact unknown)
* Net.Purum (impact unknown)

OEM

* Copperfasten - Mail Firewall Appliance
* TN North Software - Interner Anywhere eMailServer
* IceWarp Software - Merak Email Server
* SmartMax Software, Inc. - MailMax Server
* NetWin Software - SurgeMail Email Server
* Hexamail Ltd. - Hexamail Guard - Antivirus option
* Bains Digital - Defender MX


Time line
''
* 14/03/2009 : Send proof of concept, description the terms under which I 
cooperate and the planned disclosure date. There is no security adress listed 
at [1] and hence took the industry standard security contacts addresses secure@ 
and secur...@. sec...@avast.de, sec...@alwil.com, secur...@alwil.com 
secur...@avast.de

  No reply.

* 10/04/2009 : Resending specifying this is the last attempt to disclose 
reponsibly. This time two known contact adresses that were previously used to 
report vulnerabilities were used: secal...@avast.com, v...@avast.com

  No reply.

* 17/04/2009 : Release of this advisory and begin of grace period.

* 17/04/2009 : Avast replies quoting the mail sent on the 14/03/2009 and 
claims that this is a non issue because the POC would not correctly decompress.

* 17/04/2009: Reply that the POC works as expected and asked why there has 
been no reaction to previous notifications.

  No reply.

* 20/04/2009: Asked for patch timeline and affected version

* 20/04/2009: Avast replies that all versions and all product ranges are 
affected, however "There's currently no plan to release a special patch for 
this as our risk assessment makes it a very low priority issue."

* 20/04/2009: Replied that Avast can assesses the risk to loose customers 
and money; not the entire cumulated risk their customers run in specific 
environments.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-11-2009] Fortinet bypass / evasion (Limited details)

2009-04-17 Thread Thierry Zoller
__

  From the low-hanging-fruit-department - Fortinet bypass/evasion
__

Release mode: Forced release, vendor has not replied.
Ref : TZO-112009 - Fortinet Generic Evasion 
WWW : 
http://blog.zoller.lu/2005/04/fortinet-evasion-bypass-limited-details.html
Vendor  : http://www.fortinet.com
Security notification reaction rating : Catastrophic

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- t.b.a (Vendor has not reacted, please see below)

As this bug has not been reproduced by the vendor, this limited advisory 
relies on the assumption that my tests were conclusive and that the test
environment mimics the production environment.

I. Background
~
Quote: "Fortinet is a leading provider of network security appliances and the 
leader of the unified threat management (UTM) market worldwide. 
Fortinet's award-winning portfolio of security gateways, 
subscription services, and complementary products delivers 
the highest level of network, content, and application 
security for enterprises of all sizes, managed service providers, 
and telecommunications carriers, while reducing total cost of 
ownership and providing a flexible, scalable path for expansion.  "


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
archive file. Details are currently witheld due to other vendors that are 
in process of deploying patches.

A professional reaction to a vulnerability notification is a way to 
measure the maturity of a vendor in terms of security. Fortinet is given 
a grace period of two (2) weeks to reply to my notification. Failure 
to do so will result in POC being released in two (2) weeks. 

Fortinet (aswell as others) is advised to leave a specific security contact
at [1] in order to simplify getting in contact with them.

As this bug has not been reproduced by the vendor, this limited advisory 
relies on the assumption that my tests were conclusive.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~
09/03/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date. There is
 no security adress listed at [1] and hence took the industry
 tandard security contacts addresses secure@ and secur...@.
 
 No reply.
 
14/03/2009 : Resending specifying this is the last attempt to disclose
 reponsibly.
 
 No reply.
 
15/04/2009 : Fortinet published advisories for third party vendors with
 the adress dontreply-secresea...@fortinet.com, used 
secresea...@fortinet.com
 to resend advirory.

 No reply.
 
17/04/2009 : Last attempt to contact, information sent to i...@foritnet.com

 no reply, as of time of publishing

17/04/2009 : Release of this advisory and begin of grace period.


[1] http://osvdb.org/vendor/1/Fortinet%20Inc_


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-09-2009] NOD32 (Eset) bypass / evasion (Limited details)

2009-04-17 Thread Thierry Zoller
__

From the low-hanging-fruit-department - Nod32 bypass/evasion
__

Release mode: Coordinated but limited disclosure.
Ref : TZO-092009 - Nod32 Evasion RAR
WWW : 
http://blog.zoller.lu/2005/04/nod32-eset-generic-evasion-limited.html
Vendor  : http://www.eset.com/
Security notification reaction rating : Good enough
Notification to patch window : 14 days

Intersting backround statistics:
Time required to coordinate disclosure and write the advisory: 2,5 hours
Time required to find the bug : 25 minutes

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- ESET Smart Security 4 (before 15/04/2009)
- ESET NOD32 Antivirus 4 (before 15/04/2009)
- ESET Smart Security 4 Business Edition (before 15/04/2009)
- ESET NOD32 Antivirus 4 Business Edition (before 15/04/2009)
- ESET NOD32 Antivirus for Exchange Server (before 15/04/2009)
- ESET Mail Security  (before 15/04/2009)
- ESET NOD32 Antivirus for Lotus Domino Server (before 15/04/2009)
- ESET File Security (before 15/04/2009)
- ESET Novell Netware (before 15/04/2009)
- ESET DELL STORAGE SERVERS (before 15/04/2009)
- ESET NOD32 Antivirus for Linux gateway devices (before 15/04/2009)
- Command line version : NOD32 prior to 3.0.677


I. Background
~
ESET develops software solutions that deliver instant, comprehensive protection 
against evolving computer security threats. ESET NOD32® Antivirus, is the 
flagship
product, consistently achieves the highest accolades in all types of 
comparative testing and is the foundational product that builds 
out the ESET product line to include ESET Smart Security.

http://www.eset.com/products/eset_performance_advantages.php


II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
RAR archive. Details are currently witheld due to other vendors that are 
in process of deploying patches.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the RAR archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~

04/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date
 
 No reply
 
09/04/2009 : Resend notification with an indication this will be the last
 attempt to responsibly disclose.
 
09/04/2009 : Eset acknowledges receipt and previous receipt and apologises 
 for not being able to answer due to an internal
 miscommunication. Patch will be deployed on the 15th 
of April.

09/04/2009 : Ask where changelog/advisory will be posted to

09/04/2009 : Eset responds that credit will be included in changelogs
 http://www.eset.com/support/updates.php?pageno=3
 
17/04/2009 : Release of this advisory







___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TZO-08-2009] Bitdefender generic bypass/evasion

2009-04-17 Thread Thierry Zoller
__

  From the low-hanging-fruit-department - Bitdefender bypass/evasion
__

Release mode: Coordinated but limited disclosure.
Ref : TZO-082009 - Bitdefender Evasion CAB
WWW : 
http://blog.zoller.lu/2009/04/bitdefender-generic-bypassevasion-cab.html
Vendor  : http://www.bitdefender.com
Security notification reaction rating : Good
Notification to patch window : 1 day (!)

Intersting backround statistics:
Time required to coordinate disclosure and write the advisory: 2 hours
Time required to find the bug : 10 minutes

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- Bitdefender Antivirus 2009 (pre update 13/04/2009)
- Bitdefender Internet Security 2009 (pre update 13/04/2009)
- Bitdefender Total Security 2009 (pre update 13/04/2009)
- Bitdefender Small Office Security (pre update 13/04/2009)
- Bitdefender for Fileservers (pre update 13/04/2009)
- Bitdefender for Samba (pre update 13/04/2009)
- Bitdefender for Sharepoint (pre update 13/04/2009)
- Bitdefender Security for Exchange (pre update 13/04/2009)
- Bitdefender Security for Mailservers (pre update 13/04/2009)
- Bitdefender for ISA Servers (pre update 13/04/2009)
- Bitdefender Client security (pre update 13/04/2009)

Bundles:
- BitDefender Business Security (pre update 13/04/2009)
- Bitdefender Antivirus for Unices (pre update 13/04/2009)
- Bitdefender Corporate Security (pre update 13/04/2009)
- Bitdefender SBS Security (pre update 13/04/2009)

I. Background
~
BitDefender™  provides  security  solutions  to  satisfy  theprotection
requirements  of  today's  computing  environment,   delivering   effective
threat management for over 41 million home  and  corporate  users  in  more
than 100 countries. BitDefender, a division of SOFTWIN,   is  headquartered
in Bucharest, Romania and has offices in  Tettnang,   Germany,   Barcelona,
United  Kingdom,   Denmark,   Spain  and  Fort  Lauderdale  (FL),  USA.



II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
CAB archive. Details are currently witheld due to other vendors that are 
in process of deploying patches.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the CAB archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~
13/04/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date
 
14/04/2009 : Bitdefender responds that the problem was fixed by an 
 automatic update on the 13/04/2009
 
16/04/2009 : Asked what product line and version has been affected and
 a CVE number.   

15/04/2009 : Bitdefender states that "All  our  products are affected 
 by this problem. We don't have a CVE number".

17/04/2009 : Release of this advisory

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [TZO-09-2009] Avast bypass / evasion (Limited details)

2009-04-17 Thread Thierry Zoller
__

From the low-hanging-fruit-department - AVAST bypass/evasion
__

Release mode: Forced release, vendor has not replied.
Ref : TZO-092009 - AVAST Generic Evasion 
WWW : 
http://blog.zoller.lu/2009/04/release-mode-forced-release-vendor-has.html
Vendor  : http://www.avast.com
Security notification reaction rating : Catastrophic

Disclosure Policy : 
http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Affected products : 
- List t.b.a when vendor cooperates (probably all versions)
- Known engine version to be affected - prior and post VPS:090409-0  

As this bug has not been reproduced by the vendor, this limited advisory
relies on the assumption that my tests were conclusive and that the test
environment mimics the production environment.


I. Background
~
Quote: "Comprehensive network security solution for corporate customers 
certified and tested by ICSA and Checkmark. It provides complete 
server and desktop virus protection."

II. Description
~~~
The parsing engine can be bypassed by a specially crafted and formated
RAR archive. Details are currently witheld :

A professional reaction to a vulnerability notification is a way to 
measure the maturity of a vendor in terms of security. AVAST is given 
a grace period of two (2) weeks to reply to my notification. Failure 
to do so will result in POC being released in two (2) weeks. 

AVAST (aswell as others) is advised to leave a specific security contact
at [1] in order to simplify getting in contact with them.

III. Impact
~~~
A general description of the impact and nature of AV Bypasses/evasions
can be read at : 
http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

The bug results in denying the engine the possibility to inspect
code within the RAR archive. There is no inspection of the content
at all.


IV. Disclosure timeline
~

14/03/2009 : Send proof of concept, description the terms under which 
 I cooperate and the planned disclosure date. There is
 no security adress listed at [1] and hence took the industry
 standard security contacts addresses secure@ and secur...@.
 sec...@avast.de, sec...@alwil.com, secur...@alwil.com
 secur...@avast.de

 No reply.
 
10/04/2009 : Resending specifying this is the last attempt to disclose
 reponsibly. This time two known contact adresses that were
 previously used to report vulnerabilities were used:
 secal...@avast.com, v...@avast.com
 
 No reply.
 
17/04/2009 : Release of this advisory and begin of grace period.


[1] http://osvdb.org/vendor/1/ALWIL%20Software






___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Linux Kernel CIFS Vulnerability

2009-04-10 Thread Thierry Zoller
Hi Marcus,

MM> I think we have brought this up to the kernel guys often already
MM> without much effect ...  and I am aware of above posts.
I am a bystander that is bewildered by the situation and have not been
following this "situation" from the beginning.

MM> This is Opensource, if the original authors don't provide security
MM> guidance,
You mean "this is anarchy" or sparte ? SCNR
There   is   no   need  for  "security  guidance", there is a need for a
simple FLAG [x] Might be security relevant or [X] is security relevant.
Others  might  then  look  into  it  a  lot faster instead of triaging
through hundrets of irrelevant bugs.

MM>  someone else can easily step up and do it, like Brad, or Fefe,
MM> or whoever else.
 Brad and Fefe have certainly other things to do than point out
security intrinsics of bugs in OSS software. Setting the flags above
might help getting others to look into faster.

How  about  solving  the  problem  by  open  sourcing  the knowledge
required to attribute the security nature of a coding error as to help
those that simply ignore it ? That could be a start too.

It's often plain easy and can be explained in IF ELSE kind of way.

MM> Even we as Linux distributors should probably set some people up to study 
the
MM> .stable releases for such things.
It would certainly help, what helps a lot more from my POV is creating
a  website,  a  sort  of  hallofshame,  that discloses silent security
fixes.  It  helps everbody, puts pressure on the "they are just normal
bugs"  fraction,  helps  those  that  ignore  WHY a particular bug has
security implications and helps the overall perception of OSS software
in terms of security.


-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Linux Kernel CIFS Vulnerability

2009-04-10 Thread Thierry Zoller

>The correct wording is "no advisory was released yet".
An exception to the rule? The  question is why? If fefe wouldn't
have pointed it out there would have  been  no  advisory,
like  the 100 other silently fixed security bugs that even
those that backport don't catch.

There is a clear statement from the Kernelhacker groups on this
situation, and it is *not* positive, so why make it look like
those that complain just do it at the wrong point in time.

again see :
http://lwn.net/Articles/285438/
http://lwn.net/Articles/286263/
http://lwn.net/Articles/287339/
http://lwn.net/Articles/288473/

and hundrets of others.

-- 
http://blog.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Linux Kernel CIFS Vulnerability

2009-04-09 Thread Thierry Zoller

Addendum 2:
http://lwn.net/Articles/285438/
http://lwn.net/Articles/286263/
http://lwn.net/Articles/287339/
http://lwn.net/Articles/288473/


-- 
http://secdev.zoller.lu
Thierry Zoller

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  1   2   3   >