Re: [Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data

2003-11-13 Thread Jordan Wiens
On Thu, 13 Nov 2003, Pentest Security Advisories wrote:

> A recent posting from A.L. Digital suggests that security flaws exist in
> Bluetooth, while not describing the vulnerabilities in any technical
> detail. This email concerns itself specifically with the vulnerabilities
> related to retrieval of personal information from devices.

> The ultimate fix is for manufacturers to provide a greater separation of
> services, an attitude that seems to have been taken with the Ericsson T610.

I'm a bit confused; if I read it right, the first report specifically
mentioned this as a vulnerable device, now it's listed as one that got it
right?  Did I misread?

-- 
Jordan Wiens, CISSP
UF Network Incident Response Team
(352)392-2061


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Paul Schmehl
--On Thursday, November 13, 2003 4:46 PM -0800 Josh 
<[EMAIL PROTECTED]> wrote:
It is people like you who will drive this list into the ground.  The only
reason you are here is to hear yourself talk and possibly to get some
0-day sploitz that you can impress your computer lab buddies with.
Just one comment.

I'll never understand what the fascination is with "0-day sploitz".  Who 
really cares?  Do you seriously think most professionals are salivating 
waiting for them?

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data

2003-11-13 Thread Andreas Steinmetz
Pentest Security Advisories wrote:
Fixes.
==
1) Only enable Bluetooth when absolutely necessary.

2) Place the device in non-discoverable mode. While this does not correct
   the fault, it is harder to find the target device. There can be problems
   with this, some Nokia devices fail will to connect properly when hidden.
Hint: After powering on or enabling bluetooth on the 6310i put the phone 
  in discoverable mode, connect the required devices and after that put 
the phone in non-discoverable mode. At least the HDW-2 heatset will then 
be able to connect while the 6310i is in non-discoverable mode.

--
Andreas Steinmetz
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] RE: Secure Network Operations SRT2003-11-13-0218, PCAnywhere allows local users to become SYSTEM

2003-11-13 Thread Sym Security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Symantec Security Response Advisory 

13 November 2003
Symantec pcAnywhere Service-Mode Help File Elevation of Privilege

Risk Impact
High (very dependent on product configuration and operating
environment)

Overview
Security analysts from Secure Network Operations notified Symantec of
a vulnerability in the Symantec pcAnywhere application.  Depending on
the configuration, a non-privileged user could access and manipulate
Symantec pcAnywhere's help function to gain privileged access on the
local system.

Affected Components
Symantec pcAnywhere version 11
Symantec pcAnywhere version 10.x

Details

Secure Network Operations analysts notified Symantec of an issue they
discovered in the functionality of the help interface in the Symantec
pcAnywhere GUI.  By effectively manipulating the help interface,
Secure Network Operations analysts were able to demonstrate that a
non-privileged user could gain privileged access to files or
functionality on the local system with Symantec pcAnywhere running in
service-mode.

Symantec pcAnywhere can be run in various configurations.  It can run
either in "application-mode" or it can be configured in
"service-mode" to launch as a service whenever the host boots up. 
Symantec pcAnywhere is ONLY vulnerable to this issue when running in
service-mode.  Symantec pcAnywhere is NOT vulnerable in
application-mode.

In order for Secure Network Operations analysts to exploit this
vulnerability, they configured Symantec pcAnywhere to run as a
service so it would launch on system start-up.  In this
configuration, a non-privileged user, provided they have user access
to that specific host, could log onto the system where Symantec
pcAnywhere is running. 

While the non-privileged user cannot access the remote functionality
of Symantec pcAnywhere without additional
authorization/authentication, the non-privileged user can still
access the help file from the Symantec pcAnywhere GUI.

The Symantec pcAnywhere help functionality is implemented using an
interface to the Windows operating system help function.  This
interface was made to provide the user with a common interface that
the user understands, is use to, and is able to implement quickly and
easily.  However, there was a weakness in the way the interface was
made that permits the Window help functionality to assume permissions
from Symantec pcAnywhere.  When run in service-mode Symantec
pcAnywhere runs with SYSTEM privileges.

By effectively manipulating the help interface in the Symantec
pcAnywhere GUI, the non-privileged user may gain the ability to
search all system files, assume full permission for all directories
and files on the host system, or even add themselves to the local
administrative group.

Symantec Response

Symantec verified this vulnerability does exist in the service-mode
configuration of currently supported releases of Symantec pcAnywhere.
 This issue has been rectified and fixes are available via LiveUpdate
to Symantec pcAnywhere.

Mitigating Circumstances

While this potentially is a high-risk vulnerability, there are
various mitigating circumstances that greatly reduce the risk of
intentional or inadvertent exploitation of this weakness in Symantec
pcAnywhere. 

* Symantec pcAnywhere must first be configured as a service by an
admin-level user, launched and running on the machine BEFORE a
non-privileged user could exploit this vulnerability 
o If the host service is not running when the non-privileged user
logs on the machine in question, they have NO ABILITY to configure
and launch Symantec pcAnywhere in a manner where this exploit will be
present 
o Setting up the Symantec pcAnywhere Host service (and launching it)
requires administrative privileges 
* The user must have a user-account on the host system and be logged
on interactively to exploit this issue
* This issue cannot be exploited remotely
* System privileges can be gained only on the local system, which
normally limits the impact to the user system
* Although Symantec pcAnywhere allows remote control and management
of other systems, additional identification and authentication is
required by default to gain access to any remotely managed systems
o   Just gaining SYSTEM-level access on the local host does not
provide additional access to any remote system(s) through Symantec
pcAnywhere
* Access to remote administration capability should normally be
restricted to trusted Administrators only with additional restricted
access to the physical host system(s)

Symantec strongly recommends all users of supported versions of
Symantec pcAnywhere update to the latest LiveUpdate packages to
prevent potential misuse of this local access weakness.

Credit
Symantec takes the security and proper functionality of its products
very seriously. Symantec appreciates the efforts of KF and the
Security Network Operations security team in identifying this issue
and coordinating with Symantec during the fix process. 

CVE
The Common

Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Kenneth Ekdahl
On Thu, Nov 13, 2003 at 10:57:52AM -0400, Stephen Clowater wrote:
> True, But the problem with the announce list is it does take away the 
> disccusion of issues, which is what this list is about. The issue is it 
> has been polluted with crap, and bitching about that crap (ie - This 
> email :) ) and has deaparted from the breif, proffessional, meaningful 
> discussions about security issues, to a form that resembles an IRC channel.

Maybe not, if all posts to the announce list is also sent to the
disscusion list, for disccusion. That will be a solution very similar to
the one I proposed earlier in this thread. I also suggest a closed admin
list, for moderators only, which is where all posts to the announce list
go for moderation. It then needs a handler for when any moderator
replies to a mail there, then the mail will be accepted, and forwarded
to the moderated list. That is IMHO the easiest way to handle many
moderators, but then I'm no expert in mail list administration...

So if I just want the announcements I subscribe to the announce list, if
I want the full discussion and all the flamewars etc. I subscribe to the
discussion list instead.

-- 
/~\ The ASCIIKenneth Ekdahl 
\ / Ribbon Campaign  [EMAIL PROTECTED]  
 X  Against HTML [EMAIL PROTECTED]
 / \ Email!  http://sensei.nu http://merit.sensei.nu   

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Frontpage Extensions Remote Command Execution

2003-11-13 Thread Marc Maiffret
| From: [EMAIL PROTECTED]
| Sent: Wednesday, November 12, 2003 10:47 AM
| To: [EMAIL PROTECTED]

| Well, for one, it's not root level.  It allows ANONYMOUS 
| (Guest) access to
| a site using FPSE for anyone who can POST to a vulnerable 
| ISAPI extension. 
| FPSE is not enabled by default on any OS other than Windows 
| 2000 Server
| series OSes (according to MS), and is usually a security risk anyway. 

Indeed this flaw does not directly result in "root", SYSTEM, or administrator level 
code execution. However, it does result in executing code in the context of a shared 
process/privilege (dllhost) that is used for other critical web components. Its always 
interesting to me when people down play the severity of a vulnerability by saying "Its 
only remote code execution as an unprivileged user." That stupid statement should 
leave any knowledgeable person laughing. But since some people seem confused about 
this type of flaws severity...

What is an unprivileged user? It seems to me that if your attacking a service, and can 
now execute code as you wish within that service, then you are actually VERY 
privileged. As in the case of CodeRed and the .ida overflow you could perform in-line 
API hooking within the affected application. For example since a lot of eCommerce 
related scripts and ISAPI's are running in dllhost (same privilege/execution as this 
FrontPage overflow) you can now, with this "unprivileged" attack, intercept critical 
data and launch further attacks. For example hooking the dllhost outbound data sends, 
in an effort to attack visitors to the now owned website. Maybe using something like 
the recent "zero day" (well not anymore) [1]IE Object Bug. Or steal form inputs, and 
god knows what else. In the end an attacker is still becoming "privileged" to do 
things that they should not be. While maybe they cant interact with other 
data/processes on the system, they still can do anything they want to the pr!
 ocess they are executing code within, and also any data that process has access to. 

Now you might not agree with the above statements and be ignorant to still think "its 
just 'unprivileged' code execution, who cares" So then lets move on to the real-world 
examples of where you combine two attacks. One attack being remote code execution as 
an "unprivileged" user and the second being a local privilege escalation vulnerability.

Take your pick there is a constant stream of local privilege escalation 
vulnerabilities. I'll actually use a really old example, just to illustrate this style 
of combined attack is not new.

Three years ago, almost to this date, eEye released an [2]advisory on how to gain 
remote SYSTEM on a Microsoft IIS web server. The vulnerability we discovered was not 
actually a remote SYSTEM level vulnerability. In fact it was a "local" vulnerability 
within .ASP file parsing, that would lead to a buffer overflow and code execution as 
SYSTEM. Combine this "local" SYSTEM privilege elevation with any unprivileged IIS 
attack (At the time we used Unicode), and b00m, now you have remote SYSTEM. So for 
example, if this local buffer overflow still existed, you could combine Brett Moores 
FrontPage attack with this local overflow and now you easily have remote SYSTEM, 
whereas if you didn't have Brett's flaw, you wouldn't have remote SYSTEM. Anyways 
again this is a 3 year old example illustrating why these "unprivileged" remote code 
execution bugs are in fact still VERY relevant and important. Hopefully no one 
responds saying "yah but that was 3 years ago"... go do some homework, ther!
 e are plenty of very recent privilege escalation flaws that have been released. In 
fact Brett Moore himself has released some recently. So I wouldn't put it past him to 
have an exploit that combines one of those priv flaws with his FrontPage flaw to allow 
remote SYSTEM shells on vulnerable systems. vegas again soon? :-)

As for your comment about Windows 2000... I am not sure what that was about other than 
to further illustrate how critical this flaw is since your basically saying this flaw 
affects default installations of the operating system most prevalent and depended on 
by the majority of the business world.

[1] eEye IE Object Bug Advisory - 
http://www.eeye.com/html/Research/Advisories/AD20030820.html
[2] eEye $19.95 "dual-bug" privilege hack 
http://www.eeye.com/html/Research/Advisories/AD20001003.html


| You know, I can't believe that people criticize MS for sitting on the
| details of root-level holes when they don't even bother to read the
| bulletin.  A decent admin would configure FPSE such that this 
| flaw is a
| non-issue.  This is because no ordinary user has a reason to 
| be accessing
| FPSE's files.  If FPSE is secured, this means that an 
| attacker is getting
| their own privileges back.

Its not worth really discussing your comment about how this is a mute issue if 
administrators would configure their software correctly. Obviously we cannot depend on 
admini

Re: [Full-Disclosure] Fwd: YOUR PAYPAL.COM ACCOUNT EXPIRES

2003-11-13 Thread Rodrigo Barbosa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Thu, Nov 13, 2003 at 04:43:16PM -0800, Larry Hand wrote:
> Anyone else seeing this? It comes with an attachment Paypal.asp.scr. 
> Anyone know what it is? It sure looks suspicious.

I beg your pardon, but ... suspicious ?!?! :)

> --  Forwarded Message  --
> 
> Subject: YOUR PAYPAL.COM ACCOUNT EXPIRES
> Date: Fri, 14 Nov 2003 03:29:00 -0500
> From: PayPal.com <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]

- -- 
Rodrigo Barbosa <[EMAIL PROTECTED]>
"Quid quid Latine dictum sit, altum viditur"
"Be excellent to each other ..." - Bill & Ted (Wyld Stallyns)

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE/tENnpdyWzQ5b5ckRAsuCAJ9m25kwTnpwR7oV9jaeSKmVg0v8MACgkmbV
TThDx7KiEGijiGOhBnr5BwU=
=ro3i
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread vb
On Thu, Nov 13, 2003 at 10:08:13AM -0600, Frank Knobbe wrote:
> The reason IIS4+ runs as SYSTEM appears to be to gain performance.

Sorry, I do not understand that - why should that improve performance
if user SYSTEM is used and not a normal user?

> I
> guess running IIS as a kernel module and having less context switches
> does do well for performance (like an Apache LKM), but unfortunately not
> for security.

Perhaps one should better have a look at Felix von Leitners work
for doing scalable network programming.

VB.
-- 
Volker Birk, Postfach 1540, 88334 Bad Waldsee, Germany
Phone +49 (7524) 912142, Fax +49 (7524) 996807, [EMAIL PROTECTED]
http://fdik.org, Deutsches IRCNet [EMAIL PROTECTED]
PGP-Key: http://www.x-pie.de/vb.asc

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] RE: SQL Slammer doing the rounds again?

2003-11-13 Thread Jim Harrison \(ISA\)
(hee-hee); nice shots..
> Isn't "should" kind of a "maybe"??   8-)

..Yep, I was assuming that this was the only reason the poor netadmin
had to allow access to the SQL over TCP-1434.  My bad...

RE: the web designers and their choices; I can't speak to the issues
(really; I don't know them) regarding my own company's design choices,
but I'll bet they'd love to hear from you directly.
The idea of "listen to the customer" is being made very clear to
everyone these days.
The "squeaky wheel..." and all that.

* Jim Harrison 
MCP(NT4/2K), A+, Network+
Security Business Unit (ISA SE)

"I used to hate writing assignments, but now I enjoy them. 
I realized that the purpose of writing is to inflate weak ideas, 
obscure poor reasoning, and inhibit clarity. 
With a little practice, writing can be an intimidating and 
impenetrable fog!"
-Calvin

-Original Message-
From: Nick FitzGerald [mailto:[EMAIL PROTECTED] 
Sent: Thursday, November 13, 2003 14:56
To: [EMAIL PROTECTED]
Cc: Jim Harrison (ISA); Harlan Carvey; [EMAIL PROTECTED]
Subject: RE: SQL Slammer doing the rounds again?

"Jim Harrison (ISA)" <[EMAIL PROTECTED]> replied to "Harlan Carvey" 
<[EMAIL PROTECTED]>:

[corrected for top-postingitis]

> > While I fully agree w/ Jim's advice, one thing I'm
> > still curious about...since we first saw Slammer...is
> > this - Is there a valid business reason to expose UDP
> > 1434 to the Internet?
> > 
> > I've asked this before and not received any responses.
> > 
> > If anyone has one, I'd love to hear it.  Please
> > refrain from the "maybes"...I'd like to hear valid
> > reasons why this port is exposed.
> 
> The simple answer is, "if the web app is properly designed, coded and
> tested, there should be no reason to 'open a port' (apologies to TS)
to
> the SQL from the Internet.

Isn't "should" kind of a "maybe"??   8-)

> 
> 
> Unfortunately, there are many folks who have queried the ISA
newsgroups
> and other ISA lists about how (not why) to allow inbound SQL
connections
> because many web designers haven't quite caught up to the idea that
the
> Internet isn't the friendly little sandbox that they seem to believe
it
> is.
> 
> Consequently, they deploy distributed web apps that expect to have
> direct access to a SQL server across whatever network they're
installed
> in.  This often leaves the network admins with one choice; open
external
> access to the SQL server.
> 
> While it's true that you can IP-restrict that traffic, there's also IP
> spoofing to contend with.  Many ISP's don't even apply the basic ACLs
> that any first-year Cisco intern would have been taught, causing the
> plethora of "I'm seeing spoof attack reports from 127.0.0.1"
complaints
> from many new ISA admins.  If the upstream devices were properly
> configured, their firewall (app, appliance, monkeys & buckets, etc.)
> would never see this traffic in the first place.
> 
> 

Understood, but I suspect that in Harlan's terms what you have just 
described is not "a valid business reason".

"My developer is a petulant, ignorant brat" is not a valid business 
reason for doing something that is, from a security standpoint both 
chronically stupid and thoroughly indefensible.

The real problem here though is that the "petulant, ignorant brats" 
hold too much power.  They are (often) seen as "the experts" by the non-
technical "I just want an e-commerce solution that works" business folk 
whose expertise is making widgets not computer security.

Or the web designers may be seen as "creative geniuses" whose flashy, 
whizz-bang "design" would be compromised by even the suggestion from a 
mere mortal that some mundane, real-world consideration such as system 
security should be taken into account in the design.

And there may well be other common "do not upset the designer/ 
implementer" reasons others have come across.

This raises an intersting point for me though Jim -- which of those is 
the reason the MS web site as a whole, and the security-oriented parts 
of it in particular, are _entirely unusable_ for those who choose to 
vastly improve the security of their default MS-suplied web browser by 
disabling scripting?

Or, put in security terms, why does MS require its users to lower 
"reasonable" security standards just to use its web site?

Isn't that just like the web designers you have just ranted against 
expecting/requiring worldwide access to SQL servers?

Actually it isn't, as this arrogance of Microsoft's affects hugely more 
(as in many orders of magnitude more) folk...

> ..I feel better now...

Good -- maybe you'll be up to kicking some MS web-designer butt down 
the hall...

(Oh, and don't throw the "use trusted sites" thing back at me -- your 
employer has chosen to colo with Akamai which has already infected one 
of your web pages with Nimda, so we should trust "MS on Akamai" why?  
BTW, the ironic thing about this is that MS's security pages are _much_ 
easier to use with your competitor browsers...)


Regards,

Nick FitzGerald


Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Josh
I had given up on this thread as a loss,  but I feel a bit of hope renewed.

If you have posts to the announce list post to the open list, it will 
eliminate the issue of discussion.  In this manner you allow those who 
don't have time to wade through all discussions to be able to weigh in 
on announcements at their leisure rather than slogging through 50+ posts 
a day. 

A similar model which worked well for this was the Attrition defacement 
list. 

Attrition.org had a government list which only sent out emails about 
.gov websites which many gov people had forwarded to their pagers,  this 
would filter out the 300 other sites per day which were owned after the 
Unicode hole came out.  The govt list posts were still sent to the full 
defacement list, it was just a nice method by which to filter it.  If we 
could get someone to moderate announcements only (of which there are 
very few) or take announcements and cross post them to another announce 
only list,  it would allow those who need the information in a timely 
fashion to get it,  and be able to review and comment at a later date.

Another option is to leave the announce list open, with the 
understanding that only announcements of a critical nature need be 
posted there, and that all other posts get posted to FD.  I know I 
didn't need to read Paul's fight with morning wood, or the instruction 
of someone on how to return a firewall back to defaults (deny all).  If 
people all replied to the posts with proper mail clients, I could just 
zip up the thread, but unfortunately there are some security 
professionals out there who don't know how to use their mail clients. 
If someone begins to abuse the announce list, deal with that topic at 
that point.  Hopefully those who are subscribed would  have enough 
common sense to not abuse the announce list.

There IS a reason to change:  You WILL drive away anyone with clue if we 
continue down the same track.

My $.02
-Josh
Stephen Clowater wrote:

True, But the problem with the announce list is it does take away the 
disccusion of issues, which is what this list is about. The issue is 
it has been polluted with crap, and bitching about that crap (ie - 
This email :) ) and has deaparted from the breif, proffessional, 
meaningful discussions about security issues, to a form that resembles 
an IRC channel.

The list really needs to be loosely moderated, at least for a while. 
I'm not sure how practical it is to do that, Len could comment more 
correctly on that point than myself, however, as for a open solution 
(ie - not moderated), I really do not have any clue on how it could be 
done.

If anyone has an open solution, I think it should be posted to the 
list and cc'ed to Len. I think this is one off-topic disscusion that 
we need to have if full disclosure is to reamain a valid forum for 
discussing in a meaningful, restrained, and proffessional manner 
(pardon my spelling :) )

Steve



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data

2003-11-13 Thread Pentest Security Advisories
Summary.

A recent posting from A.L. Digital suggests that security flaws exist in
Bluetooth, while not describing the vulnerabilities in any technical 
detail. This email concerns itself specifically with the vulnerabilities 
related to retrieval of personal information from devices.

Some of the attacks described have been known about for some time and
discussed (or hinted at) in public before, at BlackHat/Defcon (Las Vegas)
by FX of Phenoelit (More Embedded Systems), at Defcon by Bruce Potter of
Shmoo and most recently by Alexander Grimm, Marcel Holtmann and Andreas
Vedral at the Wireless Technologies Congress.
Detail.
===
It is incorrect to assume that these vulnerabilities exist because of a
lack of security in Bluetooth itself. These vulnerabilities are purely the
result of design errors in the host devices, and Bluetooth is simply the
transport mechanism over which the attacks can be carried out. The
vulnerabilities occur in some of the OBEX profiles used by manufacturers
to transfer arbitrary information via Bluetooth.
In particular the OBEX Push Profile is often unprotected whereas the OBEX
FTP profile is not. The name of the profile is also misleading as you
would believe that the OBEX Push would only allow files to be uploaded.
However the profile also allows information retrieval.
The OBEX vulnerabilities can be divided into two categories, PUT and GET.
As is implied from the names, they refer to information being sent to or
returned by the host device. Both PUT and GET actions can be restricted by
the need to pair, however some manufacturers have chosen to remove this
restriction to add extra features, such as vCard exchanging.
It should be noted here that OBEX is protocol independent and it is
possible to exploit the vulnerabilities via IrDA and even via serial
connection. It should also be noted that OBEX does have the ability to
manage authentication. However, this is not used by any of the devices
we have tested over the past three months.
The rest of the information contained here will be based on un-paired and
un-trusted devices attacking a target device.
Much more information can be obtained from many devices by physical
contact or social engineering, however this is not a deficiency in
Bluetooth or the host device. Due to the prompt given by some devices, it
is possible to trick the user into pairing. However this is a form of
social engineering.
These vulnerabilities exist whether the Bluetooth device is in
discoverable mode or not.
Vulnerabilities.
=
OBEX PUT vulnerabilities.
-
This series of attacks relates to the movement of information towards the
target device. These attacks are based upon information extracted from the
IrMC specification, which describes several interesting files.
The IrMC specification can be found at:
http://www.irda.org/standards/pubs/IrMC_v1p1Specs_Errata001024.zip
These files are often accessible via unprotected Bluetooth profiles. While
they can be viewed on protected profiles, some manufacturers choose to
also enable this via un-protected profiles such as "OBEX Push". OBEX also
has a DELETE action, which is a PUT with an empty body, by pushing to each
of the phone book entries it would be possible to overwrite or delete all
of the phone book entries. A solution for manufacturers would be to
separate the PUT functions into specific profiles and not allow the same
actions via all profiles.
OBEX GET vulnerabilities.
-
While similar to the PUT vulnerabilities, these present a much more of a
serious threat including invasion of privacy. All vulnerable files are
mentioned in the IrMC specification.
Once again these files are usually only accessible via protected Bluetooth
profiles, however, it appears that some manufacturers have used the same
code to implement the un-protected services and thus the files are
visible.
Fixes.
==
1) Only enable Bluetooth when absolutely necessary.

2) Place the device in non-discoverable mode. While this does not correct
   the fault, it is harder to find the target device. There can be problems
   with this, some Nokia devices fail will to connect properly when hidden.
3) Refuse any pair attempt or content transfer unless it is from a known
   and trusted device/source.
The ultimate fix is for manufacturers to provide a greater separation of
services, an attitude that seems to have been taken with the Ericsson T610.
Current state of alerts.

The information relating to these vulnerabilities has been in the public
domain for some time. However, until the recent bugtraq and full
disclosure posts, the consequences of these issues was not widely
advertised. A number of affected vendors have already been contacted with
varied degrees of response.
Researchers.

Mark Rowe, Pentest Limited.
Tim Hurman, Pentest Limited.
Contact: bluetooth at pentest.co.uk
___
Full-Disclosure - We 

Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Josh




I had given up on this thread as a loss,  but I feel a bit of hope renewed. 

 
If you have posts to the announce list post to the open list, it will  eliminate
the issue of discussion.  In this manner you allow those who  don't have
time to wade through all discussions to be able to weigh in  on announcements
at their leisure rather than slogging through 50+ posts  a day.   
A similar model which worked well for this was the Attrition defacement  list.
  
Attrition.org had a government list which only sent out emails about  .gov
websites which many gov people had forwarded to their pagers,  this  would
filter out the 300 other sites per day which were owned after the  Unicode
hole came out.  The govt list posts were still sent to the full  defacement
list, it was just a nice method by which to filter it.  If we  could get
someone to moderate announcements only (of which there are  very few) or
take announcements and cross post them to another announce  only list,  it
would allow those who need the information in a timely  fashion to get it, 
and be able to review and comment at a later date. 
 
Another option is to leave the announce list open, with the  understanding
that only announcements of a critical nature need be  posted there, and that
all other posts get posted to FD.  I know I  didn't need to read Paul's fight
with morning wood, or the instruction  of someone on how to return a firewall
back to defaults (deny all).  If  people all replied to the posts with proper
mail clients, I could just  zip up the thread, but unfortunately there are
some security  professionals out there who don't know how to use their mail
clients.  If someone begins to abuse the announce list, deal with that topic
at  that point.  Hopefully those who are subscribed would  have enough  common
sense to not abuse the announce list. 
 
There IS a reason to change:  You WILL drive away anyone with clue if we
 continue down the same track. 
 
My $.02 
-Josh 
 
 
Stephen Clowater wrote: 
 
True, But the problem with the announce list is it
does take away the  disccusion of issues, which is what this list is about.
The issue is  it has been polluted with crap, and bitching about that crap
(ie -  This email 
 ) and has deaparted from the breif, proffessional,  meaningful discussions
about security issues, to a form that resembles  an IRC channel. 
 
The list really needs to be loosely moderated, at least for a while.  I'm
not sure how practical it is to do that, Len could comment more  correctly
on that point than myself, however, as for a open solution  (ie - not moderated),
I really do not have any clue on how it could be  done. 
 
If anyone has an open solution, I think it should be posted to the  list
and cc'ed to Len. I think this is one off-topic disscusion that  we need
to have if full disclosure is to reamain a valid forum for  discussing in
a meaningful, restrained, and proffessional manner  (pardon my spelling 
 ) 
 
Steve 
 
 
 
___ 
Full-Disclosure - We believe in it. 
Charter: http://lists.netsys.com/full-disclosure-charter.html 
  
 
 

 
 

Stephen Clowater wrote:
True,
But the problem with the announce list is it does take away the  disccusion
of issues, which is what this list is about. The issue is it  has been polluted
with crap, and bitching about that crap (ie - This  email :) ) and has deaparted
from the breif, proffessional, meaningful  discussions about security issues,
to a form that resembles an IRC channel. 
 
The list really needs to be loosely moderated, at least for a while. I'm
 not sure how practical it is to do that, Len could comment more  correctly
on that point than myself, however, as for a open solution (ie  - not moderated),
I really do not have any clue on how it could be done. 
 
If anyone has an open solution, I think it should be posted to the list  and
cc'ed to Len. I think this is one off-topic disscusion that we need  to have
if full disclosure is to reamain a valid forum for discussing in  a meaningful,
restrained, and proffessional manner (pardon my spelling :) ) 
 
Steve 
 
 
 
___ 
Full-Disclosure - We believe in it. 
Charter: http://lists.netsys.com/full-disclosure-charter.html 
 
 






RE: [Full-Disclosure] Fwd: YOUR PAYPAL.COM ACCOUNT EXPIRES

2003-11-13 Thread Christopher F. Herot

.SCR files are Windows screen savers - actally renamed .EXEs - and a
well-known way of distributing worms.

 
> -Original Message-
> From: Larry Hand [mailto:[EMAIL PROTECTED]
> Sent: Thursday, November 13, 2003 7:43 PM
> To: [EMAIL PROTECTED]
> Subject: [Full-Disclosure] Fwd: YOUR PAYPAL.COM ACCOUNT EXPIRES
> 
> Anyone else seeing this? It comes with an attachment Paypal.asp.scr.
> Anyone know what it is? It sure looks suspicious.
> 
> 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Fwd: YOUR PAYPAL.COM ACCOUNT EXPIRES

2003-11-13 Thread damned
Hello, Larry.

*.scr - equivalent of *.exe files.

100% Trojan horse or another malware.




-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Larry Hand
Sent: 14 ?? 2003 ?. 3:43
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] Fwd: YOUR PAYPAL.COM ACCOUNT EXPIRES

Anyone else seeing this? It comes with an attachment Paypal.asp.scr. 
Anyone know what it is? It sure looks suspicious.




___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Fwd: YOUR PAYPAL.COM ACCOUNT EXPIRES

2003-11-13 Thread Rachael Treu
Delete it or forward it to [EMAIL PROTECTED]

Headers (at least on the copy I received) identify the man behind
the curtain as...

>From [EMAIL PROTECTED]  Thu Nov 13 17:28:51 2003
Return-Path: <[EMAIL PROTECTED]>
Received: from 81.249.20.142 (APuteaux-111-1-5-142.w81-249.abo.wanadoo.fr
+[81.249.20.142])

The attachment is a yet another trojan-du-jour set to snarf a host of 
information through lines including but not limited to the following 
buzzwords:

KERNEL32.DLL
ADVAPI32.DLL
CRTDLL.DLL
GDI32.DLL
iphlpapi.DLL
SHELL32.DLL
USER32.DLL
wsock32.dll
LoadLibraryA
GetProcAddress
ExitProcess
RegCloseKey
exit
GetStockObject
GetNetworkParams
ShellExecuteA
SetTimer
recv

(I'm lazy and am pasting only the end of strings output.)

Have fun.
--ra


-- 
K. Rachael Treu, CISSP rara at navigo dot com
..Fata viam invenient..


On Thu, Nov 13, 2003 at 04:43:16PM -0800, Larry Hand said something to the effect of:
> Anyone else seeing this? It comes with an attachment Paypal.asp.scr. 
> Anyone know what it is? It sure looks suspicious.
> 
> 
> --  Forwarded Message  --
> 
> Subject: YOUR PAYPAL.COM ACCOUNT EXPIRES
> Date: Fri, 14 Nov 2003 03:29:00 -0500
> From: PayPal.com <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> 
> 
> Dear PayPal member,
> 
> PayPal would like to inform you about some important information regarding 
> your PayPal account. This account, which is associated with this email address 
> will be expiring within five business days.  We apologize for any inconvenience 
> that this may cause, but this is occurring because all of our customers are 
> required to update their account settings with their personal information.
> 
> We are taking these actions because we are implementing a new security 
> policy on our website to insure everyone's absolute privacy. To avoid any 
> 
> interruption in PayPal services then you will need to run the application that 
> we have sent with this email (see attachment) and follow the instructions. 
> Please do not send your personal information through email, as it will not be 
> as secure.
> 
> IMPORTANT! If you do not update your information with our secure application 
> within the next five business days then we will be forced to deactivate your 
> account and you will not be able to use your PayPal account any longer. It 
> is strongly recommended that you take a few minutes out of your busy day 
> and complete this now.
> 
> DO NOT REPLY TO THIS MESSAGE VIA EMAIL! This mail is sent by an 
> automated message system and the reply will not be received.
> 
> Thank you for using PayPal.
> 
> 
> ---
> 
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] why commcerical software *could* be better [WAS: Re: [Full-Disclosure] Microsoft prepares security assault on Linux]

2003-11-13 Thread Steven M. Christey

> 3. No source (!!) available for people to examine, thus making it, to a
>level, harder to locate security "holes" - for outsides in any case.

Possibly harder, but the vulnerabilities would still be latent in the
software.

Last year, I did a presentation on open vs. closed source security at
the Open Source Security Summit.  In it, I reported on the 10 most
commonly reported vulnerability types.  When comparing open source
versus closed source advisories, I found these semi-surprising
results:

  - format string bugs and symlink errors were reported more often in
open source

  - "malformed input" denial-of-service problems were reported more
often in closed source

My theory is that since format string bugs and symlinks were found
more often in open source because grep-strength auditing tools can be
effective in finding the usual suspect functions (yes, I know that
grep-strength has its problems with false positives).  Does that mean
these bugs appear less frequently in closed source?  Who knows? but
I'd think they'd be about the same.  But think of format string bugs,
which often appear when the application reports errors.  If you were
to perform a dynamic audit of an application, you'd have to reproduce
the environment that triggers the error, and "top-down" enumerate all
possible error conditions and then test them.  A lot more difficult
than grepping through source code.

Same goes for symlink issues.

On the other hand, look at "malformed input" DoS.  With closed source,
there's probably a lot more dynamic analysis going on.  Dynamic
analysis frequently involves manipulating inputs using fuzzers, etc.
It's probably a lot easier to find bugs this way instead of using
grep-style analysis (what do you even grep for?).  One way of testing
this notion is to look at PROTOS-style vulnerability testing suites
against both closed and open source products and see if there are any
major distinctions.

So, it may well be that open source software could benefit from more
black box testing, and closed source software could benefit from more
audits by third parties who have access to the source code.

It's a theory anyway.

- Steve

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Fwd: YOUR PAYPAL.COM ACCOUNT EXPIRES

2003-11-13 Thread Larry Hand
Anyone else seeing this? It comes with an attachment Paypal.asp.scr. 
Anyone know what it is? It sure looks suspicious.


--  Forwarded Message  --

Subject: YOUR PAYPAL.COM ACCOUNT EXPIRES
Date: Fri, 14 Nov 2003 03:29:00 -0500
From: PayPal.com <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]


Dear PayPal member,

PayPal would like to inform you about some important information regarding 
your PayPal account. This account, which is associated with this email address 
will be expiring within five business days.  We apologize for any inconvenience 
that this may cause, but this is occurring because all of our customers are 
required to update their account settings with their personal information.

We are taking these actions because we are implementing a new security 
policy on our website to insure everyone's absolute privacy. To avoid any 

interruption in PayPal services then you will need to run the application that 
we have sent with this email (see attachment) and follow the instructions. 
Please do not send your personal information through email, as it will not be 
as secure.

IMPORTANT! If you do not update your information with our secure application 
within the next five business days then we will be forced to deactivate your 
account and you will not be able to use your PayPal account any longer. It 
is strongly recommended that you take a few minutes out of your busy day 
and complete this now.

DO NOT REPLY TO THIS MESSAGE VIA EMAIL! This mail is sent by an 
automated message system and the reply will not be received.

Thank you for using PayPal.


---


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Josh
A preface to this message:
I am not partial to ad-hominem attacks, nor feeding flame wars.  I feel 
however, that this is the only way to communicate with the individual I 
am replying to.
My apologies for the chaos I am about to create.  I am through with this 
thread after this post.
-Josh

Paul,
So far, every comment you have made has been inflamatory.  It was enough 
to chime in with the "You'll never succeed in affecting change" post 
once in this thread.  If you have something constructive to add, it 
might be worth hearing.  From what I have read about you and your 
organization(SEE BELOW),  you promote a structure much like what I am 
proposing.  The only difference is that yours is a member's only 
organization, definitely not friendly to full disclosure, yet you 
pitched a fit at morning_wood over his decision to withold source to a 
purported exploit.

Not to endorse morning_wood in any way, but:

" So there's the 1% l33ts like you, and then there's the 99% of the 
human populace that has other things to do besides squirrel around with 
code. I get it."
Then there is you, who would rather sit and whine than learn to code.

"I learned in high school (which was a long long time ago) that there 
are those that say they can do something, and then there are those who 
don't say anything but do a lot. You appear to fall into the first 
category based on your ramblings."
You don't say alot, just the same thing over and over again.

It is people like you who will drive this list into the ground.  The 
only reason you are here is to hear yourself talk and possibly to get 
some 0-day sploitz that you can impress your computer lab buddies with.

I once was in a position like yours:  During college, I managed all of 
the VHDL and drafting labs,  I had to sit in a lab all day and roll up 
e-size plots as they came off of the plotter, read logs, read email, and 
make sure workstations/servers were up.  I was called a computer 
security person because I created and handed out accounts on the 
engineering unix systems.  Back then, that job left me with enough time 
to sit and fight out flame wars on many lists.

Not everyone works in academia, nor does everyone have as much time as 
you do.  Many on this list have more experience than you 
do.(http://www.utdallas.edu/~pauls/plsresume.html)  Why don't you try 
listening instead of constantly being a nay sayer?

I have a distaste for bugtraq and believe this list could become a 
complete surrogate for it if it were handled correctly.  

I have read this list for a long time, and have chosen not to get 
involved, however I think it is about time to stand up for a resource I 
consider valuable.  In the past slogging through the discussion was 
bearable, however, times change.

We MUST adapt lest we lose ALL those with clue. (People post for credit, 
if there is no-one here worth posting to, it is unlikely that they will 
post)

-Josh



*
AVIEN Membership Requirements
AVIEN Membership is restricted to professionals, working in 
organizations, and meeting the following criteria:

They do not work for an organization that commercially sells or markets 
Anti-Virus software/hardware or related products
They manage or are responsible for a user population in excess of 1500 
(if you don't quite meet this requirement, please feel free to submit 
your application anyway - we'll take other factors into account, if 
warranted)
They agree to abide by the group rules as described here and below.
Specific AVIEN Terms and Conditions will also apply and members will 
understand that all violations will be dealt with by an elected 
Disciplinary Committee.
Membership is at an individual level, not corporate. Membership does not 
imply endorsement in any shape or form of the organizations employing 
members.

Mailing Lists - AVIEN members can subscribe to more than ten mailing 
lists, including:

- AVI-EWS Alert: provides alert notifications (very low traffic)
- AVI-EWS Advisory: provides updates on potential threats (low traffic)
- AVI-EWS Virus Discuss: a forum to discuss viruses and other malware 
(medium-high traffic)
- AVI-EWS Talk: talk about Anti-Virus topics in general (medium traffic)
- AVI-EWS Vuln-Discuss: talk about security vulnerabilities which may be 
connected to malware (medium-low traffic)
- Product certification: discussions on how to test and evaluate 
anti-malware products (low traffic)
- Free tools: discussion on free software tools which can be used to 
fight malware (low traffic)
- Cooperate: a list for discussing how we can work together to make it a 
safer computer world
- SMB Lure tool: discussion on the SMB lure software tool which is used 
to track worms (the author of this tool participates).

As well as a mailing list to discuss management of AV solutions and a 
number of AV product-specific lists.

Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Damian Gerow
Thus spake Florian Weimer ([EMAIL PROTECTED]) [13/11/03 18:33]:
> > > The last exploit for a critical vulnerability in OpenSSH is from 2001.
> > > 
> > 
> > You might be helpful - in some /small/ way:
> > 
> > Google for "gobbles" and "ssh"  Bingo!
> 
> This vulnerability is not critical; it only affected a fraction of all
> deployed SSH systems.

Yes, but if the vulnerability affects the original posters systems, then he
has what he needs.  It doesn't matter that his systems are a part of this
fraction, it matters that they are vulnerable.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Josh




I had given up on this thread as a loss,  but I feel a bit of hope renewed. 

 
If you have posts to the announce list post to the open list, it will  eliminate
the issue of discussion.  In this manner you allow those who  don't have
time to wade through all discussions to be able to weigh in  on announcements
at their leisure rather than slogging through 50+ posts  a day.   
A similar model which worked well for this was the Attrition defacement  list.
  
Attrition.org had a government list which only sent out emails about  .gov
websites which many gov people had forwarded to their pagers,  this  would
filter out the 300 other sites per day which were owned after the  Unicode
hole came out.  The govt list posts were still sent to the full  defacement
list, it was just a nice method by which to filter it.  If we  could get
someone to moderate announcements only (of which there are  very few) or
take announcements and cross post them to another announce  only list,  it
would allow those who need the information in a timely  fashion to get it, 
and be able to review and comment at a later date. 
 
Another option is to leave the announce list open, with the  understanding
that only announcements of a critical nature need be  posted there, and that
all other posts get posted to FD.  I know I  didn't need to read Paul's fight
with morning wood, or the instruction  of someone on how to return a firewall
back to defaults (deny all).  If  people all replied to the posts with proper
mail clients, I could just  zip up the thread, but unfortunately there are
some security  professionals out there who don't know how to use their mail
clients.  If someone begins to abuse the announce list, deal with that topic
at  that point.  Hopefully those who are subscribed would  have enough  common
sense to not abuse the announce list. 
 
There IS a reason to change:  You WILL drive away anyone with clue if we
 continue down the same track. 
 
My $.02 
-Josh 
 
 
Stephen Clowater wrote: 
 
True, But the problem with the announce list is it
does take away the  disccusion of issues, which is what this list is about.
The issue is  it has been polluted with crap, and bitching about that crap
(ie -  This email 
 ) and has deaparted from the breif, proffessional,  meaningful discussions
about security issues, to a form that resembles  an IRC channel. 
 
The list really needs to be loosely moderated, at least for a while.  I'm
not sure how practical it is to do that, Len could comment more  correctly
on that point than myself, however, as for a open solution  (ie - not moderated),
I really do not have any clue on how it could be  done. 
 
If anyone has an open solution, I think it should be posted to the  list
and cc'ed to Len. I think this is one off-topic disscusion that  we need
to have if full disclosure is to reamain a valid forum for  discussing in
a meaningful, restrained, and proffessional manner  (pardon my spelling 
 ) 
 
Steve 
 
 
 
___ 
Full-Disclosure - We believe in it. 
Charter: http://lists.netsys.com/full-disclosure-charter.html 
  
 
 

 




[Full-Disclosure] RE: SQL Slammer doing the rounds again?

2003-11-13 Thread Nick FitzGerald
"Jim Harrison (ISA)" <[EMAIL PROTECTED]> replied to "Harlan Carvey" 
<[EMAIL PROTECTED]>:

[corrected for top-postingitis]

> > While I fully agree w/ Jim's advice, one thing I'm
> > still curious about...since we first saw Slammer...is
> > this - Is there a valid business reason to expose UDP
> > 1434 to the Internet?
> > 
> > I've asked this before and not received any responses.
> > 
> > If anyone has one, I'd love to hear it.  Please
> > refrain from the "maybes"...I'd like to hear valid
> > reasons why this port is exposed.
> 
> The simple answer is, "if the web app is properly designed, coded and
> tested, there should be no reason to 'open a port' (apologies to TS) to
> the SQL from the Internet.

Isn't "should" kind of a "maybe"??   8-)

> 
> 
> Unfortunately, there are many folks who have queried the ISA newsgroups
> and other ISA lists about how (not why) to allow inbound SQL connections
> because many web designers haven't quite caught up to the idea that the
> Internet isn't the friendly little sandbox that they seem to believe it
> is.
> 
> Consequently, they deploy distributed web apps that expect to have
> direct access to a SQL server across whatever network they're installed
> in.  This often leaves the network admins with one choice; open external
> access to the SQL server.
> 
> While it's true that you can IP-restrict that traffic, there's also IP
> spoofing to contend with.  Many ISP's don't even apply the basic ACLs
> that any first-year Cisco intern would have been taught, causing the
> plethora of "I'm seeing spoof attack reports from 127.0.0.1" complaints
> from many new ISA admins.  If the upstream devices were properly
> configured, their firewall (app, appliance, monkeys & buckets, etc.)
> would never see this traffic in the first place.
> 
> 

Understood, but I suspect that in Harlan's terms what you have just 
described is not "a valid business reason".

"My developer is a petulant, ignorant brat" is not a valid business 
reason for doing something that is, from a security standpoint both 
chronically stupid and thoroughly indefensible.

The real problem here though is that the "petulant, ignorant brats" 
hold too much power.  They are (often) seen as "the experts" by the non-
technical "I just want an e-commerce solution that works" business folk 
whose expertise is making widgets not computer security.

Or the web designers may be seen as "creative geniuses" whose flashy, 
whizz-bang "design" would be compromised by even the suggestion from a 
mere mortal that some mundane, real-world consideration such as system 
security should be taken into account in the design.

And there may well be other common "do not upset the designer/ 
implementer" reasons others have come across.

This raises an intersting point for me though Jim -- which of those is 
the reason the MS web site as a whole, and the security-oriented parts 
of it in particular, are _entirely unusable_ for those who choose to 
vastly improve the security of their default MS-suplied web browser by 
disabling scripting?

Or, put in security terms, why does MS require its users to lower 
"reasonable" security standards just to use its web site?

Isn't that just like the web designers you have just ranted against 
expecting/requiring worldwide access to SQL servers?

Actually it isn't, as this arrogance of Microsoft's affects hugely more 
(as in many orders of magnitude more) folk...

> ..I feel better now...

Good -- maybe you'll be up to kicking some MS web-designer butt down 
the hall...

(Oh, and don't throw the "use trusted sites" thing back at me -- your 
employer has chosen to colo with Akamai which has already infected one 
of your web pages with Nimda, so we should trust "MS on Akamai" why?  
BTW, the ironic thing about this is that MS's security pages are _much_ 
easier to use with your competitor browsers...)


Regards,

Nick FitzGerald

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Andrew J Caines
Robert,

> I do apologize for assuming those that do not do the appropriate research
> and patching in a timely manner lazy, whereas its possibly the suits and
> policy writers that are definitely more to blame. IMO, I would do the
> patching as soon as I found the patched service suitable, and if I lost my
> job, at least I know that's one more machine that was secure under my
> control.

This illustrates the conflict of being a systems and security professional
and being an employed systems/security administrator/engineer/whatever.
Your instinct to do what you know is in the best interests of protecting
the resources (systems, applications, data) under your control is natural
and certainly a necessary and admirable quality, however there is one
critical overriding detail:

You do not own the system. They do.

Unless you define policy, own the systems, pay the bills or whatever gives
you the real authority, the best you can do is to work to make sure that
they are able to make the best, most informed decisions possible based on
your expert advice. This includes details of systems security and threats,
as well as policy and process. Try to improve the system from within - use
the change control process, document issues, make sure you address your
audiences in terms appropriate to them (which does not mean to "dumb
down", but to accurately convey information which they can understand well
enough to make decisions based in it).

In the end, if you cannot accept the decisions made by them after you have
made a genuine effort to address what you consider to be the serious
issues affecting your duties and responsibilities, then you have the
authority to find a better job.

Either way, the reward in the end is when you get regularly asked, "What
do you suggest?".

> I'd rather tell a prospective employer that I was canned for taking
> security precaustions then canned for having a critical machine comprimised.

Presuming s/then/than/, the potential employer will be happier to hear
that on more than one occasion you advised your management of the threat,
provided solutions, worked with management to fix them problem then
resigned after the systems were compromised because you felt your
professional expertise was not being valued or used.


-Andrew-
-- 
 ___
| -Andrew J. Caines-   Unix Systems Engineer   [EMAIL PROTECTED]  |
| "They that can give up essential liberty to obtain a little temporary |
|  safety deserve neither liberty nor safety" - Benjamin Franklin, 1759 |

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Florian Weimer
Jeremiah Cornelius wrote:

> > The last exploit for a critical vulnerability in OpenSSH is from 2001.
> > 
> 
> You might be helpful - in some /small/ way:
> 
> Google for "gobbles" and "ssh"  Bingo!

This vulnerability is not critical; it only affected a fraction of all
deployed SSH systems.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Schmehl, Paul L
> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Robert Davies
> Sent: Thursday, November 13, 2003 2:46 PM
> To: [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: RE: [Full-Disclosure] SSH Exploit Request 
> 
> I do apologize for assuming those that do not do the 
> appropriate research and patching in a timely manner lazy, 
> whereas its possibly the suits and policy writers that are 
> definitely more to blame. IMO, I would do the patching as 
> soon as I found the patched service suitable, and if I lost 
> my job, at least I know that's one more machine that was 
> secure under my control. I'd rather tell a prospective 
> employer that I was canned for taking security precaustions 
> then canned for having a critical machine comprimised.
>
Your heart's in the right place, Robert, but you would have been canned
for insubordination, *not* for taking security precautions, and any
interviewer worth his salt would understand that as soon as you
explained why you were fired.
 
> Once again, my apologies for getting all worked up over this, 
> I just hate to see when suits slow down proper and prompt 
> security precautions and then cry about being comprimised 
> before they cut through the red tape.
>
They don't cry about it.  They fire the very security people that were
screaming at them for not patching in a timely manner, blaming them for
not protecting the organization.  And once in a great and wonderful
while, they say, "You were right.  How long did you say it would take to
implement that solution?"

Such is life in never-never land.

If you *really* want to make a difference in security, you stay where
you are, work within the rules and fight like a banshee for what you
know is right.  Then, when they finally "get it", you're a hero, because
you've been saying "I told you so" for a very long time.  Nothing worth
having ever comes easy, and seldom is anything easy to get worth having.
 
Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: AW: [Full-Disclosure] Using anonymizers to masquerade P2P use?

2003-11-13 Thread stefmit
http://www.starbandusers.com/downloads/tcp2http33_setup.exe


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Florian Weimer
Robert Davies wrote:

> A service is flawed in one way or another, patch it! If the vendor says the
> service is broke in some way, believe them, get off your lazy ass and get
> patching. If you are the admin, do your job and quit whining!

The OpenSSH maintainers lured Debian into distributing a vulnerable
OpenSSH version by issuing a security advisory (the version distributed
by Debian at that time was not vulnerable).

I'm sorry, things aren't always as easy as you assume.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Poof

> Carefully read the subtext in his note.  He would like an exploit if
> possible (or at least that's his claim) so that he can prove to someone
> else that yes, it DOES need to be patched, right now.  I.e. he's got a
> boss with pointy hair that isn't cooperating.
> 
> You don't have to believe his story.  Having dealt with many bosses (my
> own, or someone else's) exactly like that, I'm willing to entertain his
> story.
> 
> Calling the admin who wants to apply the patch, but isn't allowed to
> without jumping through hoops, lazy or stupid doesn't help anyone.

Uhm, if his boss is that way to an admin that's asked to secure a box/set of
computers I personally wouldn't work there. There is too much on my head
then.

Your boss should respect what you say and what you know and allow you to do
your job instead of wanting to do it himself.

Anyhow, I personally don't want a DCOM For nix... Since I know of a LOT of
boxes that haven't been patched yet. There is really no need for a 'box and
shipped' version of the vuln. There is a whitepaper out... Go read it and
figure it out yourself.

Moo~

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


AW: [Full-Disclosure] kievonline.org "were back"

2003-11-13 Thread Michael Linke
Here seams to be a statement of kiveonline.org about this:

http://www.kievonline.org/




-Ursprüngliche Nachricht-
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Maxime
Ducharme
Gesendet: Donnerstag, 13. November 2003 21:21
An: [EMAIL PROTECTED]
Betreff: [Full-Disclosure] kievonline.org "were back"


Another unpleasant spam from kievonline.org's hackers

Received: from HPPAV.cpe.mtgry.al.charter.com [66.168.255.47]
 by cybergeneration.com [207.134.66.24]
 with SMTP (MDaemon.PRO.v5.0.4.R)
 for <[EMAIL PROTECTED]>; Thu, 13 Nov 2003 11:32:37 -0500
X-Server: Relay for kievonline.org (host) id 002341
Message-ID: <[EMAIL PROTECTED]>
From: "admin" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: were back
Date: Thu, 13 Nov 2003 18:12:47 +0200
MIME-Version: 1.0
Content-Type: multipart/related;
 boundary="=_NextPart_000_0005_01C3AA11.BE2A3930";
 type="multipart/alternative"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1158
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
This is a multi-part message in MIME format.

--=_NextPart_000_0005_01C3AA11.BE2A3930
Content-Type: multipart/alternative;
 boundary="=_NextPart_001_0006_01C3AA11.BE2A3930"


--=_NextPart_001_0006_01C3AA11.BE2A3930
Content-Type: text/plain;
 charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

http://www.kievonline.org/kievforum/login.php





The only place for kiddy porn !!

we have 3 gig, including the hottest shit in town !!!

join now

[EMAIL PROTECTED]

--=_NextPart_001_000

...


It contains a very disgusting porn image.

A notice have been sent to Charter about this.

Ciao

---
  Maxime Ducharme
  Administrateur reseau, Programmeur

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Scott Taylor
On Thu, 2003-11-13 at 13:19, [EMAIL PROTECTED] wrote:
> On Thu, 13 Nov 2003 12:08:41 EST, Robert Davies <[EMAIL PROTECTED]>  said:
> 
> > I am quite bothered out the ass by well paid admins that are too damn lazy
> > to spend the few minutes it takes to repair a flawed service. Either start
> > doing your job, or get the hell out of the way for those of us that want to
> > do the job required properly!
> 
> Actually, the *original* problem was that the OP *wanted* to apply the patch
> to fix a flawed service, but was prevented from doing so by a flawed policy.
> 
> Now tell me - would *you* install the patch anyhow, knowing that (possibly)
> doing so without all the change-control paperwork being done correctly
> would mean your ass would be canned and you'd be looking for another job?

"Change Control" paperwork is the bane of security folks. I have most
often been on the network/firewall side of things and  had been expected
to block access at the network level to make up for slow  patching from
the sysadmin side. I was at least lucky enough to have a management
chain that understood the importance of security enough to verbally
approve any reasonable requests from our team on short notice.

There is definitely a need for change control and regression testing.
Especially when microsoft servers are concerned. Who hasn't seen a site
go down or a computer bluescreen or something equally fatal to the
system after a microsoft patch was applied? They obviously can't be
bothered to test their software, so its up to users concerned with
uptime to test it themselves before applying patches to production
servers.

But it really does take both sides to keep systems safe. Not everything
can be filtered at the network level, and threats are not exclusively
from "the internet". Unhappy employees or otherwise compromised machines
can further exploit the internal network. 

--
Scott Taylor - <[EMAIL PROTECTED]> 

BOFH Excuse #209:

Only people with names beginning with 'A' are getting mail this week (a la Microsoft)

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Russ
You really need to know someone before you make such comments Jason. I've no reason to 
believe you have any insight into "the real reason that Microsoft has been nice to" 
me, beyond your own opinion. Can you honestly believe your *opinion* is the "real 
reason?"

You certainly have no idea what I do for a living.

"have they ever perceived you as a developer/book author/technical writer/purchasing 
agent/distributor/business partner/other for-profit commercial entity?"

At one point or another over the past 17 years, I have been all of these in the eyes 
of various people at MS.

I cast no aspersions on you and certainly didn't expect you to use trash to rebuke an 
honest alternative opinion.

Shame, I used to make a point of reading your posts.

Cheers,
Russ - NTBugtraq Editor

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] local ListBox/ComboBox exploit for Win32 (MS03-045)

2003-11-13 Thread Alexander Antipov
Hi!

local ListBox/ComboBox exploit for Win32 (MS03-045):

http://www.securitylab.ru/41258.html

Created by xCrZx [EMAIL PROTECTED]


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] [RHSA-2003:325-01] Updated glibc packages provide security and bug fixes

2003-11-13 Thread bugzilla
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
   Red Hat Security Advisory

Synopsis:  Updated glibc packages provide security and bug fixes
Advisory ID:   RHSA-2003:325-01
Issue date:2003-11-12
Updated on:2003-11-13
Product:   Red Hat Linux
Keywords:  netlink getgrouplist
Cross references:  
Obsoletes: RHSA-2003:212
CVE Names: CAN-2003-0689 CAN-2003-0859
- -

1. Topic:

Updated glibc packages that resolve vulnerabilities and address several bugs
are now available.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - i386, i686
Red Hat Linux 7.2 - i386, i686, ia64
Red Hat Linux 7.3 - i386, i686
Red Hat Linux 8.0 - i386, i686
Red Hat Linux 9 - i386, i686

3. Problem description:

The glibc packages contain GNU libc, which provides standard system libraries.

A bug in the getgrouplist function can cause a buffer overflow if
the size of the group list is too small to hold all the user's groups.
This overflow can cause segmentation faults in user applications, which may
have security implications, depending on the application in question. This
vulnerability exists only when an administrator has placed a user in a
number of groups larger than that expected by an application. Therefore,
there is no risk in instances where users are members of few groups. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0689 to this issue.

Herbert Xu reported that various applications can accept spoofed messages
sent on the kernel netlink interface by other users on the local machine.
This could lead to a local denial of service attack.  In Red Hat Linux 9
and later, the glibc function getifaddrs uses netlink and could therefore
be vulnerable to this issue.  The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2003-0859 to this issue.

In addition to the security issues, a number of other bugs were fixed.

Users are advised to upgrade to these erratum packages, which contain a
patch that checks that netlink messages actually came from the kernel, a
backported security patch for the getgroups list vulnerability, and patches
for the various bug fixes.

[Update 2003-11-13]: The packages for Red Hat Linux 9 have been updated
for compatibility with kernels not provided by Red Hat.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run the following
command at a shell prompt:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  On the i686
architecture, *.i686.rpm packages should be installed where available
rather than *.i386.rpm.

If you are unsure which architecture you are on, run the following
command at a shell prompt:

rpm -q --qf '%{arch}\n' glibc

Only those RPMs which are currently installed will be updated.  Those RPMs
which are not installed but included in the list will not be updated.
Note that you can also use wildcards (*.rpm) if your current directory
only contains the desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate
Errors, you need to install a version of the up2date client with an updated
certificate.  The latest version of up2date is available from the Red Hat
FTP site and may also be downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

54697 - nscd locks immediately if started with -t 1 and nss_ldap is used
83973 - Wrong sort order for uk_UA locale
85994 - SIGSEGV in malloc: __morecore clobbered by perror conflict with _IO_check_libio
86032 - trailing spaces in /etc/ld.so.conf entries are not ignored
88409 - strxfrm() overruns buffer by indexing with uninitialized value
88456 - glibc-2.3.2-27.9.i686.rpm does not rpm -Fvh properly.
88978 - locale ja_JP.EUC-JP has two undefined bytes [buffer overrun]
89448 - getaddrinfo segv - unitialized structure?
90002 - binary compatibility for '_res' broken in glibc 2.3.x
90036 - race/deadlock in fork() with signal handler.
90077 - [EMAIL PROTECTED] corrupts memory arena by buffer overrun
90301 - Programs fail at exit if compiled with gcc and cxa_atexit
90987 - sprintf() is limited to 2^26 bytes.
91567 - setegid sets saved gid
97814 - "Incorrectly built binary which accesses errno..." message in elf/rtld.c needs 
some way to be silenced.
97828 - Sudo

RE: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Jim Harrison \(ISA\)
Hello Jason,

I'll start by saying that you're not in any way obligated to reply and I
really don't care one way or the other as it's clear that you believe
that your opinion is the only correct one and that I must have been
"assimilated" by the "Evil Empire" that is Microsoft.

The fact that you're a published writer in no way validates your
statements about Microsoft, my employment or any inter-relationship
therein and you would do well to leave that garbage out of any continued
discussion.

Your statement about "until you've published ..blah" is irrelevant to
the discussion at hand.  The document you linked is more opinion than
fact and very nearly invalidates any technical value the remainder of
the book might have had otherwise.

As I said before; it's a shame that you had to present your research
this way; any technical value is lost in the screams of
"EEeeevil!"

Later,

* Jim Harrison 
MCP(NT4/2K), A+, Network+
Security Business Unit (ISA SE)

"I used to hate writing assignments, but now I enjoy them. 
I realized that the purpose of writing is to inflate weak ideas, 
obscure poor reasoning, and inhibit clarity. 
With a little practice, writing can be an intimidating and 
impenetrable fog!"
-Calvin

-Original Message-
From: Jason Coombs [mailto:[EMAIL PROTECTED] 
Sent: Thursday, November 13, 2003 10:57
To: Jim Harrison (ISA)
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] Microsoft prepares security assault on
Linux

Aloha, Jim.

What in particular makes it "immediately clear" to you why it was never
published? Not publishing the book saves Microsoft from sending out 
conflicting messages when they launch new deceptive advertising 
campaigns like this one that will assert that Windows poses less of a 
security risk than does Linux:

http://www.infoworld.com/article/03/11/11/HNmsassault_1.html

I can assure you the introduction to my book was written when preparing
the book for self-publication as a free electronic work and nothing that
even closely resembles such direct and harsh criticism of Microsoft was
to be found in the manuscript sans-Introduction as submitted to
Microsoft for publication. Read a little more of the book if you'd like
to get some idea of the prevailing tone and mood, which is nothing short
of practical and optimistic.

I realized that I had been seriously mistaken in my belief that it was
reasonable and respectable to give Microsoft the benefit of the doubt
and engage in commercial activities that support their abusive
behaviors. Thus I consciously and intentionally changed the tone of my
Introduction so that there could be no mistake as to my conclusions; the
helpful and technically-accurate Microsoft technical material that I've
authored notwithstanding. Just because I know about and have written
about Microsoft products that does not mean that I support what they do
and how they do it. You might reconsider the way that you portray your
support for them, yourself, as part of your professional work.

If you would like to debate my assertions, feel free to write back.

Microsoft must be stopped. They are harmful and malicious. If you had a
little more awareness of what they are and have been doing, and why,
then I am certain you would be ashamed to have Microsoft decorations
after your name. You realize, don't you, that you can be competent and
have skills that are in-demand in the marketplace and still not be a
Microsoft crony? You are aligning yourself with the wrong side when you
lend PR/marketing/emotional support to Microsoft and its victims. Don't
forget that the people you choose to support says a lot about who you
are and why you do the things that you do... Reconsider supporting
Microsoft; you can make a nice living and hold your certifications
without aiding and abetting or lending solace to evildoers.

After you write a book about Microsoft security and work for a while in
computer forensics, talk to me again about whether or not your silent
and tacit support for the company and its bad people sits well in your
stomach.

Sincerely,

Jason


Jim Harrison (ISA) wrote:
> Having followed your link to the "book written under contract", it's
> immediately clear why it was never published.
> 
> I won't get into a debate about your assertions; just a reminder that
> how you choose to express yourself is at least as important as what
you
> have to say.
> 
> * Jim Harrison 
> MCP(NT4/2K), A+, Network+
> Security Business Unit (ISA SE)
> 
> "I used to hate writing assignments, but now I enjoy them. 
> I realized that the purpose of writing is to inflate weak ideas, 
> obscure poor reasoning, and inhibit clarity. 
> With a little practice, writing can be an intimidating and 
> impenetrable fog!"
> -Calvin
> 


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] new worm - "warm-pussy.jpg".

2003-11-13 Thread Evidence
Funny thing is is that warm-pussy.jpg is just a directory name.  Does anyone
here know what file your browser would attempt to access if you type a url
of a non existant file?  Yes thats right...

http://gibsonhaxor.tv/warm-pussy.jpg/index.html

Jason

- Original Message - 
From: "Gadi Evron" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, November 13, 2003 2:08 AM
Subject: Re: [Full-Disclosure] new worm - "warm-pussy.jpg".


> segfault wrote:
>
> > You idiot.  Just because a file is called warm-pussy.jpg, doesn't mean
that
> > the webserver it resides on isn't going to parse it's actual content
(which
> > is probably plaintext).  Look again, I'm sure you'll be surprised.
> >
>
> HTML _is_ plain-text.
> Just because the server sends it as plain text doesn't mean the browser
> won't execute it.
>
> It does.
>
> This *is* a Trojan horse.
>
> Do you have anything real to contribute or are you just going to call a
> guy that raised the alarm of a _possible_ new dangerous Trojan hourse
names?
> -- 
>Gadi Evron (i.e. ge),
>[EMAIL PROTECTED]
>
> The Trojan Horses Research mailing list - http://ecompute.org/th-list
>
> My resume (Hebrew) - http://vapid.reprehensible.net/~ge/resume.rtf
>
> PGP key for [EMAIL PROTECTED] -
> http://vapid.reprehensible.net/~ge/Gadi_Evron.asc
> Note: this key is used mainly for files and attachments, I sign email
> messages using:
> http://vapid.reprehensible.net/~ge/Gadi_Evron_sign.asc
>
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] SRT2003-11-13-0218 - PCAnywhere local SYSTEM exploit

2003-11-13 Thread KF
 Secure Network Operations, Inc. http://www.secnetops.com/research
Strategic Reconnaissance Team   [EMAIL PROTECTED]
Team Lead Contact   [EMAIL PROTECTED]


Our Mission:

Secure Network Operations offers expertise in Networking, Intrusion 
Detection Systems (IDS), Software Security Validation, and 
Corporate/Private Network Security. Our mission is to facilitate a 
secure and reliable Internet and inter-enterprise communications 
infrastructure through the products and services we offer. 

To learn more about our company, products and services or to request a 
demo of ANVIL FCS please visit our site at http://www.secnetops.com, or 
call us at: 978-263-3829


Quick Summary:

Advisory Number : SRT2003-11-13-0218
Product : Symantec PCAnywhere
Version : 10.x and 11.x
Vendor  : http://www.symantec.com/pcanywhere/
Class   : Local
Criticality : High (to PCAnywhere users)
Operating System(s) : Win32


Notice

The full technical details of this vulnerability can be found at:
http://www.secnetops.com under the research section. 


Basic Explanation

High Level Description  : PCAnywhere allows local users to become SYSTEM
What to do  : run LiveUpdate and apply latest patches. 


Basic Technical Details

Proof Of Concept Status : SNO has proof of concept. 

Low Level Description   : PCAnywhere is an industry-leading remote control
software that features remote management paired with file transfer capabilities.
PCAnywhere has the ability to help quickly resolve helpdesk and server support 
issues.

When PCAnywhere is started as a service or set to launch with windows an
attacker may be able to take SYSTEM rights via the help interface. AWHOST32.exe 
runs as the user SYSTEM while interacting with the local desktop on the machine 
that PCAnywhere is listening. Users have the ability to interact with AWHOST32
via an icon in the Windows systray. 

Brett Moore of security-assessment.com pointed out a flaw in the Win32 help 
API which can be found at http://www.securityfocus.com/bid/8884 . A variation 
of this attack is present in both PCAnywhere 10 and 11. It is unknown how this
issue affects older versions of PCAnywhere since they are no longer supported
products.

full details at http://www.secnetops.biz/research/SRT2003-11-13-0218.txt

Vendor Status   : Symantec promptly attended to the issue and 
was very responsive during all phases of discovery / research and patching. 
Fixes are now available via LiveUpdate. 

Bugtraq URL : To be assigned. CVE candidate CAN-2003-0936.
Disclaimer
--
This advisory was released by Secure Network Operations,Inc. as a matter
of notification to help administrators protect their networks against
the described vulnerability. Exploit source code is no longer released
in our advisories but can be obtained under contract.. Contact our sales 
department at [EMAIL PROTECTED] for further information on how to 
obtain proof of concept code.

--
Secure Network Operations, Inc. || http://www.secnetops.com
"Embracing the future of technology, protecting you."


 


Re[2]: [Full-Disclosure] Frontpage Extensions Remote Command Execution

2003-11-13 Thread Adik

Hello Nick,

Thursday, November 13, 2003, 3:14:40 AM, you wrote:

NJ> Has anyone even had any luck reproducing this?  I can't for the life of
NJ> me get a crash...

NJ> -Original Message- 
NJ> From: Geo. 
NJ> Sent: Wed 11/12/2003 11:41 AM 
NJ> To: [EMAIL PROTECTED] 
NJ> Cc: 
NJ> Subject: RE: [Full-Disclosure] Frontpage Extensions Remote
NJ> Command Execution



NJ> >>
NJ> Well, for one, it's not root level.  It allows ANONYMOUS (Guest)
NJ> access
NJ> <<

NJ> No it's not, IWAM is Web Applications MANAGER account you were
NJ> thinking of
NJ> IUSR perhaps? This is not guest. This account can change
NJ> websites so in a
NJ> multi host environment this level of access will allow a
NJ> compromise of every
NJ> website on the server.

NJ> Geo. (I'd call that root)

NJ> ___
NJ> Full-Disclosure - We believe in it.
NJ> Charter: http://lists.netsys.com/full-disclosure-charter.html


What i learned from this overflow was that there is a difference
between sending 500 'A's and sending 500 'X's. sending 500 'A' even
more doesn't trigger access violation on dllhost process. however if u
send 500 'X's u'll get acces violation. well at least thats what i
noticed. maybe i'm wrong. so sometimes sendin different strings
might generate different results.



-- 
Best regards,
 Adikmailto:[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] PGP signed mail? Has to be spam!

2003-11-13 Thread Shawn McMahon
[EMAIL PROTECTED] wrote:
The problem stays the same. The implication of my experience(and several of 
the list replies here) are:
If you want your mails to be delivered, abandon crypto. I do not like that at 
all. 
You shouldn't, because that removes authentication without guaranteeing 
delivery.  It is therefore obviously the wrong thing to do.


pgp0.pgp
Description: PGP signature


RE: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Robert Davies
 

> -Original Message-
**snip**
> Actually, the *original* problem was that the OP *wanted* to 
> apply the patch to fix a flawed service, but was prevented 
> from doing so by a flawed policy.
> 
> Now tell me - would *you* install the patch anyhow, knowing 
> that (possibly) doing so without all the change-control 
> paperwork being done correctly would mean your ass would be 
> canned and you'd be looking for another job?

That is dependant on the seriousness taken to network security. I for one
feel that the less time a vulnerable service is open, the less time someone
can move in and exploit it.

I know, I may sound like a dick, but when it comes down to it, after testing
the patch on a non-production machine and verification that the service is
working properly, that is all the time needed to patch a flawed service.

Maybe in large corporate environments, all the restrictions and flawed
policies cause more problems then needed, but in that case, I really would
not want to see them cry that they have been comprimised because they take
their time with paperwork. 

I feel I would rather justify downing a service for one minute then having
to explain why the system has to be taken offline for a few days while the
drive is cloned and an attack is researched. 

I do apologize for assuming those that do not do the appropriate research
and patching in a timely manner lazy, whereas its possibly the suits and
policy writers that are definitely more to blame. IMO, I would do the
patching as soon as I found the patched service suitable, and if I lost my
job, at least I know that's one more machine that was secure under my
control. I'd rather tell a prospective employer that I was canned for taking
security precaustions then canned for having a critical machine comprimised.

Once again, my apologies for getting all worked up over this, I just hate to
see when suits slow down proper and prompt security precautions and then cry
about being comprimised before they cut through the red tape.

RKD

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Valdis . Kletnieks
On Thu, 13 Nov 2003 12:08:41 EST, Robert Davies <[EMAIL PROTECTED]>  said:

> I am quite bothered out the ass by well paid admins that are too damn lazy
> to spend the few minutes it takes to repair a flawed service. Either start
> doing your job, or get the hell out of the way for those of us that want to
> do the job required properly!

Actually, the *original* problem was that the OP *wanted* to apply the patch
to fix a flawed service, but was prevented from doing so by a flawed policy.

Now tell me - would *you* install the patch anyhow, knowing that (possibly)
doing so without all the change-control paperwork being done correctly
would mean your ass would be canned and you'd be looking for another job?


pgp0.pgp
Description: PGP signature


[Full-Disclosure] kievonline.org "were back"

2003-11-13 Thread Maxime Ducharme

Another unpleasant spam from kievonline.org's hackers

Received: from HPPAV.cpe.mtgry.al.charter.com [66.168.255.47]
 by cybergeneration.com [207.134.66.24]
 with SMTP (MDaemon.PRO.v5.0.4.R)
 for <[EMAIL PROTECTED]>; Thu, 13 Nov 2003 11:32:37 -0500
X-Server: Relay for kievonline.org (host) id 002341
Message-ID: <[EMAIL PROTECTED]>
From: "admin" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: were back
Date: Thu, 13 Nov 2003 18:12:47 +0200
MIME-Version: 1.0
Content-Type: multipart/related;
 boundary="=_NextPart_000_0005_01C3AA11.BE2A3930";
 type="multipart/alternative"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1158
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
This is a multi-part message in MIME format.

--=_NextPart_000_0005_01C3AA11.BE2A3930
Content-Type: multipart/alternative;
 boundary="=_NextPart_001_0006_01C3AA11.BE2A3930"


--=_NextPart_001_0006_01C3AA11.BE2A3930
Content-Type: text/plain;
 charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

http://www.kievonline.org/kievforum/login.php





The only place for kiddy porn !!

we have 3 gig, including the hottest shit in town !!!

join now

[EMAIL PROTECTED]

--=_NextPart_001_000

...


It contains a very disgusting porn image.

A notice have been sent to Charter about this.

Ciao

---
  Maxime Ducharme
  Administrateur reseau, Programmeur

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Ron DuFresne

[SNIP]

> >
> But...  He may work for an organization that
>
> a) makes him responsible for function, and isolated from policy influence
> (possibly broken).
>
> b) in which his manager is politically isolated (broken).
>
> c) is subject to a DITSCAP-style regime of testing and documentation processes
> - - not broken!
>
> In any case - it is unhelpful an peevishly arrogant to spit out "change your
> process."  O.K.  That may be happening over time.  What can I do /now/?
>
> Not pointing out the obvious - gobbles exploit code - leads to this kind of
> meta-thread, which has been the cause of so much grievance to some.
>
> A simple reply about the exploit and currency would have been entirely on
> topic for the list!

And of course the gobbles code is old and most likely does not fit the
bill for the current need to patch, as was the starting point for the
fairly recently secure programming threads.  There might not be current
sploit code to cover the potential risk his version of openssh/openssl is
requiring a patch/fix.

Thanks,

Ron DuFresne
~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Schmehl, Paul L
> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Robert Davies
> Sent: Thursday, November 13, 2003 11:09 AM
> To: [EMAIL PROTECTED]
> Subject: RE: [Full-Disclosure] SSH Exploit Request 
> 
> I am failing to see the logic in some of these issues here...
> 
> A service is flawed in one way or another, patch it! If the 
> vendor says the service is broke in some way, believe them, 
> get off your lazy ass and get patching. If you are the admin, 
> do your job and quit whining!
> 
Never heard the phrase, "Never criticize a man until you've walked a
mile in his shoes", Robert?

> Since that argument throws about the sniveling of, "We can't 
> afford the downtime of a server reboot", then think of it 
> this way, with services such as SSH, a restart of the SSH 
> Service does NOT shut down the whole server or kill active 
> connections, instead it's a 2 second lapse where the server 
> will refuse the connection, in which super important person Z 
> will just have to rety to connect.
> 
In some people's worlds, they don't get to make those decisions.  Yet
you would toss them out in the street for incompetence because you are
so much more competent?
> 
> I am quite bothered out the ass by well paid admins that are 
> too damn lazy to spend the few minutes it takes to repair a 
> flawed service. Either start doing your job, or get the hell 
> out of the way for those of us that want to do the job 
> required properly!
> 
I'm equally bothered by people who think they have all the answers and
anyone who doesn't think they way they do is incompetent.

So, now we're both equally bothered, and yet we haven't accomplished a
thing.  Frustrating, isn't it, Robert?

Maybe we should concentrate on our own problems and let other people
solve theirs?

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Adam
This is not a flame!!

I'm just wondering if announcing to a list full of people both good, and bad 
who are able to exploit an old bug that "I have an un-patched system" is good 
security practice?

I got rooted after simply replying to an ass-hole asking "if any one thought 
they where being spied on by the US Gov" off the list it was an old MDK8.1 
box I was trying to keep around just a minuet or two longer and didn't have 
time to patch properly. (My Bad) 

My 2 cents

Adam


On Thursday 13 November 2003 01:03 pm, Jeremiah Cornelius wrote:
> On Thu November 13 2003 08:07, [EMAIL PROTECTED] wrote:
> > On Thu, 13 Nov 2003 02:18:57 PST, Jeremiah Cornelius said:
> > > > > We need to test it before we are permitted to upgrade. Please help.
> > > >
> > > > Help yourself and redesign your patch management.
> > >
> > > Yeah.  Everyone can do that, smartass.
> >
> > No, he's right. The OP's environment apparently requires that there be
> > testing before they're allowed to upgrade.
> >
> > That's *broken*.  Plain and simple.
>
> But...  He may work for an organization that
>
> a) makes him responsible for function, and isolated from policy influence
> (possibly broken).
>
> b) in which his manager is politically isolated (broken).
>
> c) is subject to a DITSCAP-style regime of testing and documentation
> processes - not broken!
>
> In any case - it is unhelpful an peevishly arrogant to spit out "change
> your process."  O.K.  That may be happening over time.  What can I do
> /now/?
>
> Not pointing out the obvious - gobbles exploit code - leads to this kind of
> meta-thread, which has been the cause of so much grievance to some.
>
> A simple reply about the exploit and currency would have been entirely on
> topic for the list!
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

-- 
-BEGIN PGP PUBLIC KEY BLOCK-
Version: OpenKeyServer v1.2
Comment: Extracted from belgium.keyserver.net
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=jeF/
-END PGP PUBLIC KEY BLOCK- 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Blue Boar
Robert Davies wrote:
I am failing to see the logic in some of these issues here...

A service is flawed in one way or another, patch it! If the vendor says the
service is broke in some way, believe them, get off your lazy ass and get
patching. If you are the admin, do your job and quit whining!
Carefully read the subtext in his note.  He would like an exploit if 
possible (or at least that's his claim) so that he can prove to someone 
else that yes, it DOES need to be patched, right now.  I.e. he's got a 
boss with pointy hair that isn't cooperating.

You don't have to believe his story.  Having dealt with many bosses (my 
own, or someone else's) exactly like that, I'm willing to entertain his 
story.

Calling the admin who wants to apply the patch, but isn't allowed to 
without jumping through hoops, lazy or stupid doesn't help anyone.

	BB

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] [Exploit]: Microsoft FPSE fp30reg.dll Overflow Remote Exploit (MS03-051)

2003-11-13 Thread Stephen
your server seems to be too busy, so for the "fans"
the mirror is on k-otik :-)

http://www.k-otik.com/exploits/11.13.fp30reg.c.php

Cheers !

** Stephen - Germany



Adik <[EMAIL PROTECTED]> wrote:
Hello folks,
If anyone is interested in an exploit for recently
announced FPSE fp30reg.dll 
overflow bug (MS03-051) by Brett Moore, u can pick it
up at 
http://netninja.to.kg

 fp30reg.dll overflow ---

C:\fp30reg

-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051)
ver 0.1 }=-

by Adik < netmaniac [at] hotmail.KG >
http://netninja.to.kg

Usage: fp30reg [Target] 
eg: fp30reg.exe 192.168.63.130

C:\>fp30reg 192.168.63.130

-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051)
ver 0.1 }=-

by Adik < netmaniac [at] hotmail.KG >
http://netninja.to.kg

[*] Target: 192.168.63.130 Port: 80

[*] Socket initialized...
[*] Checking for presence of fp30reg.dll... Found!
[*] Packet injected!
[*] Sleeping . . . . . . . . . . . . .
[*] Connecting to host: 192.168.63.130 on port 
[*] Dropping to shell...

Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-2000 Microsoft Corp.

C:\WINNT\system32>



CHeerz,

Adik

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

__
Do you Yahoo!?
Protect your identity with Yahoo! Mail AddressGuard
http://antispam.yahoo.com/whatsnewfree

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Jason Coombs
Aloha, Russ!

Honey attracts ants, and they're much harder to get rid of than are
flies. Ants also set into motion that whole food web thing, bringing in
larger and larger pests over time.
You should allocate a few more CPU cycles to understanding the real
reason that Microsoft has been nice to you over the years. They want
something in return. They allow you your little tantrums now and then
because they really don't have any effect on their bottom line, and
remember the old adage "there's no such thing as negative publicity."
Microsoft needs you to keep churning out Microsoft-brand information.
The more times Microsoft's products are mentioned, the better. You're
part of the media and from what I can tell that's how they've always
perceived you -- have they ever perceived you as a developer/book
author/technical writer/purchasing agent/distributor/business
partner/other for-profit commercial entity?
I'm amazed at the degree and scope of thought control that Microsoft has
succeeded in creating. Certain tried, tested, and proven thought
processes from the information security field are killed as soon as they
appear, even outside Microsoft, because they pose real threats to the
viability of a company in denial. It is no different from any substance
abusing/alcoholic family with the pink elephant in the living room.
Sincerely,

Jason

Russ wrote:

Jason said;


I wrote an information security book last year under contract with 
Microsoft Press. The book was never published -- among other things it 
explains truthfully the poor security condition of Windows and offers 
detailed instructions and advice for defending against Microsoft's bad 
business practices and incorrect security decisions.


Because maybe a book isn't needed to describe what I describe in 3 pages, 10 points, keystroke by keystroke, button click by button click, documentation. Assuming the requisite files are on hand, it takes less than an hour to "harden" an IIS box against all of this years attacks, and the document was written 2 years ago.

Fine, my 3 pages doesn't help "to educate developers of Web applications so that fewer new vulnerabilities would have been created.", but at least mine got published to our customers...;-]


Microsoft suppresses awareness of vulnerabilities in order to profit.


Funny how they've always encouraged me with NTBugtraq, that would seem to be at odds with your perception of their position. Funny how I once tried to convince them to bury a vulnerability patch in a service pack rather than release a security bulletin, and there was no way they would have it.

The old adage, "You catch more flies with honey" seems to often be the opinion of publishers, one reason I've never written a book (no publisher wants to publish a book written the way I write...;-]) Since they're putting the money up, I have to assume they have good stats on the demographics of who will buy it and what the buyer expects. Its their audience, write it for yourself, publish it yourself (as you've done.) That they thought it wasn't going to be profitable (from a publishing perspective) doesn't necessarily mean Microsoft is trying to "suppress awareness of vulnerabilities", it could just mean they didn't think it would sell.

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor




___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Schmehl, Paul L
> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Burnes, James
> Sent: Thursday, November 13, 2003 10:19 AM
> To: 'Jonathan A. Zdziarski'; Stephen Clowater
> Cc: Kryptos; [EMAIL PROTECTED]
> Subject: RE: [Full-Disclosure] Feeding Stray Cats
> 
> How about some sort of soft moderation that forwards all 
> posts, but sets the reply-to on off-topic posts to something 
> other than the list itself?

?

The reply-to is set to poster now.  In order to post to the list you
either have to reply to all (which many do, unfortunately) or simply
reply, remove the OP's adddress and send it to the list (as I have done
here.)

Don't ask list software to try to do things that simple good sense and
reasonableness can do already.

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Jason Coombs
Aloha, Jim.

What in particular makes it "immediately clear" to you why it was never
published? Not publishing the book saves Microsoft from sending out 
conflicting messages when they launch new deceptive advertising 
campaigns like this one that will assert that Windows poses less of a 
security risk than does Linux:

http://www.infoworld.com/article/03/11/11/HNmsassault_1.html

I can assure you the introduction to my book was written when preparing
the book for self-publication as a free electronic work and nothing that
even closely resembles such direct and harsh criticism of Microsoft was
to be found in the manuscript sans-Introduction as submitted to
Microsoft for publication. Read a little more of the book if you'd like
to get some idea of the prevailing tone and mood, which is nothing short
of practical and optimistic.
I realized that I had been seriously mistaken in my belief that it was
reasonable and respectable to give Microsoft the benefit of the doubt
and engage in commercial activities that support their abusive
behaviors. Thus I consciously and intentionally changed the tone of my
Introduction so that there could be no mistake as to my conclusions; the
helpful and technically-accurate Microsoft technical material that I've
authored notwithstanding. Just because I know about and have written
about Microsoft products that does not mean that I support what they do
and how they do it. You might reconsider the way that you portray your
support for them, yourself, as part of your professional work.
If you would like to debate my assertions, feel free to write back.

Microsoft must be stopped. They are harmful and malicious. If you had a
little more awareness of what they are and have been doing, and why,
then I am certain you would be ashamed to have Microsoft decorations
after your name. You realize, don't you, that you can be competent and
have skills that are in-demand in the marketplace and still not be a
Microsoft crony? You are aligning yourself with the wrong side when you
lend PR/marketing/emotional support to Microsoft and its victims. Don't
forget that the people you choose to support says a lot about who you
are and why you do the things that you do... Reconsider supporting
Microsoft; you can make a nice living and hold your certifications
without aiding and abetting or lending solace to evildoers.
After you write a book about Microsoft security and work for a while in
computer forensics, talk to me again about whether or not your silent
and tacit support for the company and its bad people sits well in your
stomach.
Sincerely,

Jason

Jim Harrison (ISA) wrote:
Having followed your link to the "book written under contract", it's
immediately clear why it was never published.
I won't get into a debate about your assertions; just a reminder that
how you choose to express yourself is at least as important as what you
have to say.
* Jim Harrison 
MCP(NT4/2K), A+, Network+
Security Business Unit (ISA SE)

"I used to hate writing assignments, but now I enjoy them. 
I realized that the purpose of writing is to inflate weak ideas, 
obscure poor reasoning, and inhibit clarity. 
With a little practice, writing can be an intimidating and 
impenetrable fog!"
-Calvin

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] [Exploit]: Microsoft FPSE fp30reg.dll Overflow Remote Exploit (MS03-051)

2003-11-13 Thread Adik
Hello folks,
If anyone is interested in an exploit for recently announced FPSE fp30reg.dll 
overflow bug (MS03-051) by Brett Moore, u can pick it up at 
http://netninja.to.kg

 fp30reg.dll overflow ---

C:\fp30reg

-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.1 }=-

 by Adik < netmaniac [at] hotmail.KG >
 http://netninja.to.kg

 Usage: fp30reg [Target] 
 eg: fp30reg.exe 192.168.63.130

C:\>fp30reg 192.168.63.130

-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.1 }=-

 by Adik < netmaniac [at] hotmail.KG >
 http://netninja.to.kg

[*] Target: 192.168.63.130  Port: 80

[*] Socket initialized...
[*] Checking for presence of fp30reg.dll... Found!
[*] Packet injected!
[*] Sleeping . . . . . . . . . . . . .
[*] Connecting to host: 192.168.63.130 on port 
[*] Dropping to shell...

Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-2000 Microsoft Corp.

C:\WINNT\system32>



CHeerz,

Adik

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Schmehl, Paul L
> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Stephen Clowater
> Sent: Thursday, November 13, 2003 8:58 AM
> To: Jonathan A. Zdziarski
> Cc: Kryptos; [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] Feeding Stray Cats
> 
> If anyone has an open solution, I think it should be posted 
> to the list 
> and cc'ed to Len. I think this is one off-topic disscusion 
> that we need 
> to have if full disclosure is to reamain a valid forum for 
> discussing in 
> a meaningful, restrained, and proffessional manner (pardon my 
> spelling :) )
>
I don't know how long you've been subscribed to this list.  I was one of
the first.  And I can tell you that what you suggest has been stated and
restated here ad nauseum ad infinitum.  This list *is* a valid forum and
always will be precisely *because* it is not moderated.  Some people
like that.  Others do not.  If they don't, they're free to leave.  The
list isn't going anywhere.

And since I'm already wasting bandwidth by replying, let me voice my
biggest pet peeve to all readers.  If you decide you want to leave a
list that you're on, just leave.  Don't post your parting gripe about
why you can't take it any more and the list is going to hell in a hand
basket.  No one cares.  Just move on with your life and spare us the
histrionics.

*That* one irritates me even more than the dolts who post "How do I
unsubscribe" and the idiots who send their OoO messages to the lists.

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/ 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Jeremiah Cornelius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Thu November 13 2003 08:07, [EMAIL PROTECTED] wrote:
> On Thu, 13 Nov 2003 02:18:57 PST, Jeremiah Cornelius said:
>
> > > > We need to test it before we are permitted to upgrade. Please help.
> > >
> > > Help yourself and redesign your patch management.
> >
> > Yeah.  Everyone can do that, smartass. 
>
> 
> No, he's right. The OP's environment apparently requires that there be
> testing before they're allowed to upgrade.
> 
> That's *broken*.  Plain and simple.
> 
But...  He may work for an organization that 

a) makes him responsible for function, and isolated from policy influence 
(possibly broken).

b) in which his manager is politically isolated (broken).

c) is subject to a DITSCAP-style regime of testing and documentation processes 
- - not broken!

In any case - it is unhelpful an peevishly arrogant to spit out "change your 
process."  O.K.  That may be happening over time.  What can I do /now/?

Not pointing out the obvious - gobbles exploit code - leads to this kind of 
meta-thread, which has been the cause of so much grievance to some.

A simple reply about the exploit and currency would have been entirely on 
topic for the list!
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/s8eCJi2cv3XsiSARArHKAKDq2u91UdBYxMz9RUMkNycgnnS5zgCeM8ks
9j8V9ZJoeQpC3wVFG9Sj+ak=
=TGLt
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Ryan Johnson

I think it is unfair to categorize linux or windows as having a vulnerability just 
because an application like apache has a vulnerability. I mean as someone stated 
earlier, the linux and windows developers have no control over third-party apps. If 
IIS has bug, that should look bad on microsoft, but not on windows.

Ballmer is banking that the people he is talking to do not understand the difference 
between linux, its distro and windows, this truly comparing apples and oranges. You 
know what, he is going to get away with it, because most people don't understand.
If you were to compare a full redhat 9 install against a full win2k server install, 
redhat9 would most likely lose, because Redhat9 has  many more apps, therefore it is 
more likely to have bugs. Even if you compared linux, which would be just the kernel 
and maybe some of the the gnu tools to interact with the kernel vs windows, it is 
still not fair. Windows has a kernel, gui, everyone's favorite user space app that can 
not be uninstalled, IE. In this case windows has greater chance of having bugs.

Then you have cases with distro specific bugs, which often are categorized as a linux 
bug. An example of this was the apache config file bug on redhat from last week. That 
is a redhat bug, not a linux bug, nor is it an apache bug. Slackware did not put that 
configuration in their apache server configuration.

Another comparison that I abhor, is the stability issue. "Linux is more stable than 
windows". Are you talking about linux with the gui, or without. Running linux without 
the gui is incredibly stable. Linux with a gui, well stability defintely decreases 
(but in reality it is not linux's stability in question rather that of the gui). 

What about openbsd (dont get me wrong I love openbsd), they claim "Only one remote 
hole in the default install, in more than 7 years!". Well of course, have you ever 
installed openbsd using the default? The only remotely accessible service is openssh, 
vs multiple services in a redhat default vs multiple services in a windows default 
install. I could make my own linux distro with no remote services enabled by default 
and it would never have a remote hole in the default install.

My point being is that it is very hard to compare the bsds, the distros and windows. 
Bsds and linux are easier to compare, but then you have the distro aspect.

As far as patches getting out, I am very happy with the response from the open source 
community, I think they do an excellent job. I very rarely have a problem with an 
opensource patch, if the author does not come out with a patch, more than likely 
someone who has reviewed the code will.

Ryan




> On Thu, Nov 13, 2003 at 03:20:14AM +0100, Mikael Olsson wrote:
> > I'm sorry to disappoint you, but the script kiddies don't care
> > about zealotry. I have yet to hear one say "Oh, this is a Linux
> > box, so I can't use this Apache bug to own it. That'd be rong."
> > 
> I don't think anybody said a linux box can't be owned with an apache
> flaw. My arugemnt for count of bugs is the should be counted against the
> people who actually WROTE the code. In Microsofts case it is becasue
> they wrote IIS, 2000/XP/2003, and Exchange. In contrast the Linux kernel
> projecn that just wrote the kernel. It sounds like you want a list of
> opensource bugs vs. Microsoft Bugs.
> 
> > Saying "the linux kernel has only foo bugs while every microsoft
> > app combined has foo^3 bugs" makes no sense in a security 
> > discussion. You don't read mail or serve web pages with a kernel.
> > 
> No one is saying this. To be truely useful a list of bugs should be done
> by developer, not by instance of software. This will help establish
> trends in my software development practices.
> 
> > Publishing an _unbiased_ report of total vulnerability counts 
> > for two or more OSes, with common apps installed, is a service
> > to admins everywhere.  (And no, I _really_ don't think comparing 
> > RH6 with W2K3 is "unbiased". I think it stinks.)
> > 
> I think blaming OS developers for code they didn't write nor have any
> control over isn't unbiased. It would be a diffrent story if it was a
> flaw in something like redhat-update. That is clearly a Redhat bug, but
> that is still not a Linux bug.
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

Ryan Johnson
Security Architect
ESP Group
703-418-6317

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Robert Davies
I am failing to see the logic in some of these issues here...

A service is flawed in one way or another, patch it! If the vendor says the
service is broke in some way, believe them, get off your lazy ass and get
patching. If you are the admin, do your job and quit whining!

Since that argument throws about the sniveling of, "We can't afford the
downtime of a server reboot", then think of it this way, with services such
as SSH, a restart of the SSH Service does NOT shut down the whole server or
kill active connections, instead it's a 2 second lapse where the server will
refuse the connection, in which super important person Z will just have to
rety to connect.

If that is not good enough for you, then think of it another way, while you
sit there thinking about if it is reasonable to take the 5 minutes out of
your day to compile updated packages and install them as needed, some skript
kiddie is going through your server looking for more toys to play with on
your network.

If the reluctance in patching is due to upsetting someone whom can't afford
the downtime, think about your job security after your network is breached
and you did not take the initative to repair a critical flaw anyway.

I am quite bothered out the ass by well paid admins that are too damn lazy
to spend the few minutes it takes to repair a flawed service. Either start
doing your job, or get the hell out of the way for those of us that want to
do the job required properly!

RKD

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
> Sent: Thursday, November 13, 2003 11:08 AM
> To: Jeremiah Cornelius
> Cc: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] SSH Exploit Request 
> 
> On Thu, 13 Nov 2003 02:18:57 PST, Jeremiah Cornelius said:
> > > > We need to test it before we are permitted to upgrade. 
> Please help.
> > > Help yourself and redesign your patch management.
> > Yeah.  Everyone can do that, smartass. 
> 
> No, he's right. The OP's environment apparently requires that 
> there be testing before they're allowed to upgrade.
> 
> That's *broken*.  Plain and simple.
> 
> "Testing can reveal the presence of flaws, but not their 
> absence" - Dijkstra.
> 
> How many people have trouble getting *known* *good* exploits 
> to run in their environment?  Now think hard here - if the 
> exploit *works*, then yes, you have a problem.  But if it 
> doesn't work, *it doesn't prove the problem is actually 
> fixed*.  So you end up in a situation where you have *known* 
> vulnerable boxes, and a fix to install, and the fix isn't 
> being installed because you're busy trying to verify if the 
> patch actually works, or if you simply have a defective 
> exploit that would have worked if you had used gcc 2.96 
> instead of gcc 3.3 (a
> *known* issue for a lot of exploits), or if you had too many 
> environment variables and something moved around in memory, or
> 
> So let's see.. We have a fix from the vendor/maintainer that 
> is claimed to fix the problem.  The canned exploit doesn't 
> work.  Now, it's POSSIBLE that your exploit is b0rked, the 
> fix didn't work, and if you changed something the exploit would work.
> 
> Now how much effort are you going to put in to that testing 
> (assuming that you're qualified to do it), while you have 
> vulnerable machines in production?
> 
> *That* is why the OP's patching scheme is broken.
> 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Volker Tanger
On Thu, 13 Nov 2003 10:08:13 -0600 Frank Knobbe <[EMAIL PROTECTED]> wrote:
> On Thu, 2003-11-13 at 08:41, Volker Tanger wrote:
> > > Ideally the Apache exe should be running as an unpriviledged user.
> > > but then, ideally the IIS server should be running as an
> > > unpriviledged user too
> > 
> > Well, running a kernel task is a bit difficult to do unprivileged...
> 
> The reason IIS4+ runs as SYSTEM appears to be to gain performance. I
> guess running IIS as a kernel module and having less context switches
> does do well for performance (like an Apache LKM), but unfortunately
> not for security.
> What specific kernel task were you referring to?

Sorry, vague wording on my side. I meant exactly the "kernel module"
part you mentioned when saying "kernel task". 

Did not work with IIS for the last few years, so memory suffered
(obviously). 

Bye

Volker Tanger
ITK-Security

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Eudora 6.0.1 attachment spoof

2003-11-13 Thread madsaxon
At 11:40 AM 11/13/2003 +1100, you wrote:

print "From: me\n";
[...]

print "\n";
To save yourself a little effort in the future, try

print <<"EOF";
From: me
[...]

EOF

Cleans up the code a lot.

;-)

m5x

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Ron DuFresne
On Wed, 12 Nov 2003, Mikael Olsson wrote:

>
>
> [EMAIL PROTECTED] wrote:
> >
> > Certainly a vulnerability in Apache should not be a strike
> > against Linux, should it?
>
> Of course it should.  You don't just "run an OS". Obviously, you
> want your machine to actually do something useful.

Of course, since apache has been ported to the windows realm, then bugs in
apache should be applied against both linux/unix variants as well as M$
OS's.  But, when one looks at apache related bugs, one finds that there
are some specific to platform, soo this then gets to be a bit of a muster
fluck...


Thanks,

Ron DuFresne
~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: Feeding Stray Cats

2003-11-13 Thread Alain

> There really is only one way to solve this, and that is to moderate the 
> list. At least temporarly, until the noise dies down. At which time the 
> list can be unmoderated agian.

Another solution is to ban temporally people who wrotes non-security
related posts and spamers. It's bad idea to moderate a list like that.
It won't be a "democratic" and usefull list, if only some "gurus" cant
wrote.



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Burnes, James
How about some sort of soft moderation that forwards all posts, but sets the
reply-to on off-topic posts to something other than the list itself?  That
way it doesn't really function as censorship, but does act to squelch the
thoughtless and accidental flame wars and run-on threads that decrease the
SNR.

It also makes the replier think about what they are replying to and whether
it's on-topic.

Or you could also subscribe to Secunia.

jburnes

> -Original Message-
> From: Jonathan A. Zdziarski [mailto:[EMAIL PROTECTED]
> Sent: Thursday, November 13, 2003 8:50 AM
> To: Stephen Clowater
> Cc: Kryptos; [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] Feeding Stray Cats
> 
> I suggest we keep this list open as a discussion group and create a
> full-disclosure-announce list or something similar that is moderated and
> designed only for the purpose of releasing vulnerability information,
> exploit code, etc.  Or perhaps full-disclosure-discussion and
> full-disclosure-security lists...either way you get my point.
> 
> Then the people who want to put up with the spam can put up with
> it...and the people who just want the meat can get it, most importantly
> leaving an unmoderated list for those concerned about becoming a
> bugtraq.
> 
> On Thu, 2003-11-13 at 09:02, Stephen Clowater wrote:
> > There really is only one way to solve this, and that is to moderate the
> > list. At least temporarly, until the noise dies down. At which time the
> > list can be unmoderated agian.
> 
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Valdis . Kletnieks
On Thu, 13 Nov 2003 02:18:57 PST, Jeremiah Cornelius said:
> > > We need to test it before we are permitted to upgrade. Please help.
> > Help yourself and redesign your patch management.
> Yeah.  Everyone can do that, smartass. 

No, he's right. The OP's environment apparently requires that there be
testing before they're allowed to upgrade.

That's *broken*.  Plain and simple.

"Testing can reveal the presence of flaws, but not their absence" - Dijkstra.

How many people have trouble getting *known* *good* exploits to run in their
environment?  Now think hard here - if the exploit *works*, then yes, you have
a problem.  But if it doesn't work, *it doesn't prove the problem is actually
fixed*.  So you end up in a situation where you have *known* vulnerable boxes,
and a fix to install, and the fix isn't being installed because you're busy
trying to verify if the patch actually works, or if you simply have a defective
exploit that would have worked if you had used gcc 2.96 instead of gcc 3.3 (a
*known* issue for a lot of exploits), or if you had too many environment
variables and something moved around in memory, or

So let's see.. We have a fix from the vendor/maintainer that is claimed to
fix the problem.  The canned exploit doesn't work.  Now, it's POSSIBLE that
your exploit is b0rked, the fix didn't work, and if you changed something
the exploit would work.

Now how much effort are you going to put in to that testing (assuming that
you're qualified to do it), while you have vulnerable machines in production?

*That* is why the OP's patching scheme is broken.


pgp0.pgp
Description: PGP signature


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Frank Knobbe
On Thu, 2003-11-13 at 08:41, Volker Tanger wrote:
> > Ideally the Apache exe should be running as an unpriviledged user. but
> > then, ideally the IIS server should be running as an unpriviledged
> > user too
> 
> Well, running a kernel task is a bit difficult to do unprivileged...
> *SCNR*  

I don't understand this comment at all. Ideally IIS should be running as
an unpriviledged user, like in the good ole IIS 3 days. Back then the
service was running under a user account so even if the IIS service got
hijacked through a BO, you still had to hack your way to privileges. No
immediate SYSTEM there.

The reason IIS4+ runs as SYSTEM appears to be to gain performance. I
guess running IIS as a kernel module and having less context switches
does do well for performance (like an Apache LKM), but unfortunately not
for security.

What specific kernel task were you referring to?

Regards,
Frank



signature.asc
Description: This is a digitally signed message part


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Valdis . Kletnieks
On Thu, 13 Nov 2003 15:41:39 +0100, Volker Tanger said:

> Well, running a kernel task is a bit difficult to do unprivileged...

Well. Yeah.  Running as a kernel task is something you should only be
doing if there's no alternative, and is *supposed* to be difficult.

Unless of course your security model is "everything including the mail
program is a kernel task, and when we add normal users, we'll give them
full sys admin rights".  But that's crazy talk, nobody would be THAT
silly when they design their operating system


pgp0.pgp
Description: PGP signature


[Full-Disclosure] Re: Funny article

2003-11-13 Thread Bruce Ediger
On Wed, 12 Nov 2003, martin f krafft wrote:

> i guess the main argument against this joke is that an operating
> system with 10 different web servers, 10 different mail servers, 10
> different ftp servers, 20 different window managers, 10 different
> browsers, 20 different mail clients, and so on, and so on, will have
> how many more bugs than a monolithic approach with 1 web server,
> 1 mail server, 1 ftp server, etc...

Doesn't this argument constitute the "monoculture" argument in reverse?

I suppose that once you've hauled out every gun, big and small, to deny
the validity of the anti-monoculture argument, then you've got to argue
the reverse of it.

We'll have to see how it plays in Peoria, but in the real world, it's
false.  The "Slapper" worm didn't spread much not only because of the
number of web servers, but because of the variety of versions, and the
variety of compilations out there.  I doubt that 10 different mail clients
will perform a whole-internet denial of service, like Sobig.f did.

The resistance that linux, unix and the BSDs have to viruses and worms
etc probably derives at least in part from the variety, the spread of
versions in use, the fragmented hardware base, and local customizaions.

When will you guys learn that "resistance to epidemics" is a property
of a population, not a property of the individual computer.  Sure,
any individual Slackware box might get infected or cracked, but all
the SuSE boxes will have immunity.  Or all the Pine users might send out
the next Anna Kournikova chainmail, but the Evolution users won't.


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Jonathan A. Zdziarski
I suggest we keep this list open as a discussion group and create a
full-disclosure-announce list or something similar that is moderated and
designed only for the purpose of releasing vulnerability information,
exploit code, etc.  Or perhaps full-disclosure-discussion and
full-disclosure-security lists...either way you get my point.

Then the people who want to put up with the spam can put up with
it...and the people who just want the meat can get it, most importantly
leaving an unmoderated list for those concerned about becoming a
bugtraq.

On Thu, 2003-11-13 at 09:02, Stephen Clowater wrote:
> There really is only one way to solve this, and that is to moderate the 
> list. At least temporarly, until the noise dies down. At which time the 
> list can be unmoderated agian.


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: new worm - "warm-pussy.jpg".

2003-11-13 Thread Feher Tamas
Hello,

>http://kalleth.2tone-dev.com/fd/warm-pussy.rar
>
>It is unknown whether this is another variant of irc.trojan.fgt

The JPG named file inside is the "JS/Petch.A" and the 90kB exe file is a 
new "Fagot" variant, according to AV companies.

Sincerely: Tamas Feher.


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Stephen Clowater
True, But the problem with the announce list is it does take away the 
disccusion of issues, which is what this list is about. The issue is it 
has been polluted with crap, and bitching about that crap (ie - This 
email :) ) and has deaparted from the breif, proffessional, meaningful 
discussions about security issues, to a form that resembles an IRC channel.

The list really needs to be loosely moderated, at least for a while. I'm 
not sure how practical it is to do that, Len could comment more 
correctly on that point than myself, however, as for a open solution (ie 
- not moderated), I really do not have any clue on how it could be done.

If anyone has an open solution, I think it should be posted to the list 
and cc'ed to Len. I think this is one off-topic disscusion that we need 
to have if full disclosure is to reamain a valid forum for discussing in 
a meaningful, restrained, and proffessional manner (pardon my spelling :) )

Steve



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Volker Tanger
On Thu, 13 Nov 2003 14:06:03 - "Dave Howe"
<[EMAIL PROTECTED]> wrote:
> David Maynor wrote:
> > Linux kernel projecn that just wrote the kernel. It sounds like you
> > want a list of opensource bugs vs. Microsoft Bugs.
> Ideally the Apache exe should be running as an unpriviledged user. but
> then, ideally the IIS server should be running as an unpriviledged
> user too

Well, running a kernel task is a bit difficult to do unprivileged...
*SCNR*  

Volker Tanger
ITK-Security

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Microsoft prepares security assault on Linu x

2003-11-13 Thread Burnes, James
Volker:

What you describe is support.  I'm glad you actually extracted good support
from MS.  Other's mileage may vary.

Liability is another thing entirely.  It's legal responsibility for having
written, distributed and sold an inferior or broken product that causes
someone else harm or damage.

I'd like to see MS take *that* kind of responsibility without a protracted
and very expensive court fight.


> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Sent: Thursday, November 13, 2003 5:07 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] Microsoft prepares security assault on
> Linux
> 
> On Wed, Nov 12, 2003 at 04:15:14PM -0800, Charles E. Hill wrote:
> > > 2. A commercial company providing with liability (and responsibility)
> > > for the software you use (in other words - someone to blame).
> > What commercial software company actually offers guarantees and some
> form
> > of liability?  I've *never* heard of anyone successfully suing MS or
> > Oracle or anyone else for their software screwing up.  SAYING you can
> > blame Microsoft is one thing -- doing it (other than pointing fingers)
> is
> > another.
> 
> I now for four times acted as following:
> 
> I bought a single support call from Microsoft. We together detected that
> my problem was caused by errors in Microsoft code. They corrected. I
> paid nothing because Microsoft's support is free if the error was caused
> by errors of Microsoft. The support was friendly, helpful and quick.
> 
> That is one reason because I have nothing against Microsoft. Of course,
> no one paid me the work I did. And there are big problems with Windoze 2k
> and WiXP, sometimes so big problems that I will not use such systems
> except
> if I'm forced to.
> 
> Windows NT is getting worse. Unfortunately.
> For security reasons Windows is disastrous.
> 
> VB.
> --
> Volker Birk, Postfach 1540, 88334 Bad Waldsee, Germany
> Phone +49 (7524) 912142, Fax +49 (7524) 996807, [EMAIL PROTECTED]
> http://fdik.org, Deutsches IRCNet [EMAIL PROTECTED]
> PGP-Key: http://www.x-pie.de/vb.asc
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Dave Howe
David Maynor wrote:
> On Thu, Nov 13, 2003 at 03:20:14AM +0100, Mikael Olsson wrote:
>> I'm sorry to disappoint you, but the script kiddies don't care
>> about zealotry. I have yet to hear one say "Oh, this is a Linux
>> box, so I can't use this Apache bug to own it. That'd be rong."
> I don't think anybody said a linux box can't be owned with an apache
> flaw. My arugemnt for count of bugs is the should be counted against
> the people who actually WROTE the code. In Microsofts case it is
> becasue they wrote IIS, 2000/XP/2003, and Exchange. In contrast the
> Linux kernel projecn that just wrote the kernel. It sounds like you
> want a list of opensource bugs vs. Microsoft Bugs.
Ideally the Apache exe should be running as an unpriviledged user. but
then, ideally the IIS server should be running as an unpriviledged user
too

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Luis Bruno
Gadi Evron wrote:
> there is a lot to be said for:
> 1. A serious (note serious) commercial company that has a crew working 
>on addressing security concerns, and updating the product.
> 2. A commercial company providing with liability (and responsibility) 
>for the software you use (in other words - someone to blame).

Your clients' safety is your own safety, and nobody was ever fired for
buying IBM either. But the accountability argument that goes with
$BIG_CORPORATION's name doesn't have any value. The EULA on your products
debunks the accountability myth.

-- 
Luis BrunoC8-H10-N4-O2-CH3-CH2-OH
UTM 29T 629481 E 4511776 N  Alt: 576m

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread David Maynor
On Thu, Nov 13, 2003 at 03:20:14AM +0100, Mikael Olsson wrote:
> I'm sorry to disappoint you, but the script kiddies don't care
> about zealotry. I have yet to hear one say "Oh, this is a Linux
> box, so I can't use this Apache bug to own it. That'd be rong."
> 
I don't think anybody said a linux box can't be owned with an apache
flaw. My arugemnt for count of bugs is the should be counted against the
people who actually WROTE the code. In Microsofts case it is becasue
they wrote IIS, 2000/XP/2003, and Exchange. In contrast the Linux kernel
projecn that just wrote the kernel. It sounds like you want a list of
opensource bugs vs. Microsoft Bugs.

> Saying "the linux kernel has only foo bugs while every microsoft
> app combined has foo^3 bugs" makes no sense in a security 
> discussion. You don't read mail or serve web pages with a kernel.
> 
No one is saying this. To be truely useful a list of bugs should be done
by developer, not by instance of software. This will help establish
trends in my software development practices.

> Publishing an _unbiased_ report of total vulnerability counts 
> for two or more OSes, with common apps installed, is a service
> to admins everywhere.  (And no, I _really_ don't think comparing 
> RH6 with W2K3 is "unbiased". I think it stinks.)
> 
I think blaming OS developers for code they didn't write nor have any
control over isn't unbiased. It would be a diffrent story if it was a
flaw in something like redhat-update. That is clearly a Redhat bug, but
that is still not a Linux bug.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Feeding Stray Cats

2003-11-13 Thread Stephen Clowater
There really is only one way to solve this, and that is to moderate the 
list. At least temporarly, until the noise dies down. At which time the 
list can be unmoderated agian.

I loath the idea of moderating a security mailing list, however, the un 
moderated thing is just not working.

Steve

Kryptos wrote:

Personally I'd like to see the non-security related posts such as this
cease.  This thread has done nothing more than generate unnecessary messages
which have absolutely no bearing on security whatsoever.
--
Kryptos
[EMAIL PROTECTED]
925.955.8110
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
 



___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread martin f krafft
would you be so kind as to stop CC'ing me?

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
 
the heineken uncertainty principle:
  you can never be sure how many
  beers you had last night.


pgp0.pgp
Description: PGP signature


Re: [Full-Disclosure] Microsoft prepares security assault on Linux ]

2003-11-13 Thread Luis Bruno
William Warren wrote:
> if you really want apples to apples..then take MS and their IE

Damian Gerow replied:
> bash/tcsh/zsh/ash/whatever are *also* critical to a Linux system

MySQL and PostgresQL aren't; should their bugs count as Linux bugs?
And should we count each advisory from Red Hat, then Debian and then SuSE
as a separate bug?

> Public's point of view, Linux means the kernel, the shell, X, Gnome/KDE,

There's problem when you get creative with your bug tallying method. If you
count MySQL's bugs you should count SQL Server bugs too.

I'm looking forward to read that Microsoft-sponsored report to see their
methods.

-- 
Luis BrunoC8-H10-N4-O2-CH3-CH2-OH
UTM 29T 629481 E 4511776 N  Alt: 576m

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Sniffing ICQ traffic

2003-11-13 Thread Marcos Machado
Luiz Gustavo wrote:

"Anti-Hackers Internet Informatica Ltda."

For a second I got really scared of your evil intentions, of course you
should find yourself a better name for a business or whatever you call
it.
 

Ok, Mr. 'registrar wizard'... Lets make it clear: this was the name of 
an old (97/2000) website about end-user/soho security, a popularity 
contest winner in Brazil (Microsoft was in the second place, Xerox in 
the third and yes, I'm proud of it). It shows me the, at least, the 
'word of the mouth' campaign has worked. ;) This kind of 'popularity' 
helps to reach the end-user. The newspapers uses the term "hacker" all 
the time. After bring his attention, we start to teach the right 
concepts. Totally filantropic...

This website has gone, the domain (used in this mail addr to subscribe 
lists) points to my hobby, a forum about security. I'm yet trying to 
teach good manners to the kids. And it's a hard job...

I'm professionally working on a "policy enforcement" project. One of its 
features is to monitoring IM traffic. So, don't worry about my "evil 
intentions". I don't need to steal secrets from my girlfriend ICQ... :)

[]s, MM

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread vb
On Wed, Nov 12, 2003 at 04:15:14PM -0800, Charles E. Hill wrote:
> > 2. A commercial company providing with liability (and responsibility)
> > for the software you use (in other words - someone to blame).
> What commercial software company actually offers guarantees and some form
> of liability?  I've *never* heard of anyone successfully suing MS or
> Oracle or anyone else for their software screwing up.  SAYING you can
> blame Microsoft is one thing -- doing it (other than pointing fingers) is
> another.

I now for four times acted as following:

I bought a single support call from Microsoft. We together detected that
my problem was caused by errors in Microsoft code. They corrected. I
paid nothing because Microsoft's support is free if the error was caused
by errors of Microsoft. The support was friendly, helpful and quick.

That is one reason because I have nothing against Microsoft. Of course,
no one paid me the work I did. And there are big problems with Windoze 2k
and WiXP, sometimes so big problems that I will not use such systems except
if I'm forced to.

Windows NT is getting worse. Unfortunately.
For security reasons Windows is disastrous.

VB.
-- 
Volker Birk, Postfach 1540, 88334 Bad Waldsee, Germany
Phone +49 (7524) 912142, Fax +49 (7524) 996807, [EMAIL PROTECTED]
http://fdik.org, Deutsches IRCNet [EMAIL PROTECTED]
PGP-Key: http://www.x-pie.de/vb.asc

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] clarification - reasons as to why commercial software *could* be better

2003-11-13 Thread Brent J. Nordquist
On Thu, 13 Nov 2003, Gadi Evron <[EMAIL PROTECTED]> wrote:

> point (3) - when one doesn't have the source code, one finds it more
> difficult, AGAIN, to a level, to find holes in the software.

OK, yes, "to a level".  But:

> NOT every kid in the world who *knows* how to read code, also knows how 
> to even.. use a disassembler. If that takes some kids off the software's 
> "back". it is a plus. Is it a major one? I think it is.

Sorry, I think in an Internet-connected world, it is not.  Many people
have pointed out that it only takes one person to find the flaw and create
an exploit, which is published or leaks out.  Then how many kiddiez or
worm instances will there be at the gate, armed with it?

I didn't save every message for this thread, so if you responded to
Jeremiah, my apologies for missing it.  But I think this is very
significant:

On Wed, 12 Nov 2003, Jeremiah Cornelius <[EMAIL PROTECTED]> wrote:

> Almost every one of the vulnerabilities that I reference were discovered
> by independent 3rd parties, with access only to derived binary objects.  
> MS - with privileged access to sources - never discovered any of these
> flaws internally.

So if closed source (only object code made public) is really a "major"  
advantage (your word) for the home team with respect to security, why
would the above be true?

I think if Microsoft (or any other company) wants to claim credibly that
closed source is a major security advantage, they need an order of
magnitude more people reviewing their own code.  (It would only be the
combination of the two that would make a difference, and frankly that
isn't even the most important thing in my view.)  MS in particular stands
out because they have billions in the bank... and they couldn't hire
people as clever as the people outside their organization finding these
vulns. without the source, if they really wanted to?  Come on.

-- 
Brent J. Nordquist <[EMAIL PROTECTED]> N0BJN
Other contact information: http://kepler.acns.bethel.edu/~bjn/contact.html
* Fast pipe * Always on * Get out of the way - Tim Bray http://tinyurl.com/7sti

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] clarification - reasons as to why commercial software *could* be better

2003-11-13 Thread vb
On Thu, Nov 13, 2003 at 04:41:53AM -0800, Gadi Evron wrote:
> First of all, notice the subject.. *could* be better, not *is* better.

Also "could be better" is wrong.

There are good (financial) reasons for closed source software also.
But I cannot see one of them in your list.

> Microsoft, we all don't like Microsoft

Please do not use such generalisations - I already stated that I have
nothing against Microsoft, and that I meant seriously.

> Microsoft is not a very good representation of commercial software when 
> it comes to security.

For some software fortunately you're right.
For some software unfortunately you're wrong.

> Many companies chose commercial software because of the arguments I 
> presented earlier, and pasted again below.

But these companies make a mistake.

> And excuse me, but with all the respect in the world.. as to my LAST 
> point (3) - when one doesn't have the source code, one finds it more 
> difficult, AGAIN, to a level, to find holes in the software.

Sorry, I cannot see that at all. Obviously you don't know people
who do that.

Additionally, the opposite is true. You're even more secure with
OpenSource, because then many people you can trust in check the
code by just reading source. Those people also could check the
code by debugging the object code. But they won't do that. Why?
Those people usually don't read source for finding security flaws
but for personal interest or for developing purposes. And coming 
by they're detecting possible problems - and publicate them.

> > 1. A serious (note serious) commercial company that has a crew working
> >on addressing security concerns, and updating the product.
> Note, serious company ?

Yes. I noted. ;-)

> > 2. A commercial company providing with liability (and responsibility)
> >for the software you use (in other words - tech support and
> >someone to blame).
> Who talked about law suits? I mentioned tech support and blame.
> 

You're able to receive tech support and someone to blame for Free
Software also. It is a well known lie that for Free Software commercial
support does not exist support at all. (I think, we're not talking about
OpenSource Software here, but about Free Software, right?)

> > 3. No source (!!) available for people to examine, thus making it, to
> >a level, harder to locate security "holes" - for outsides in any
> >case.
> Read again what I said - TO a level, harder.

Quite the contrary is true - no source available does not detain anybody
from finding security holes, apart from many of the people who care for
their removal.

VB.
-- 
Volker Birk, Postfach 1540, 88334 Bad Waldsee, Germany
Phone +49 (7524) 912142, Fax +49 (7524) 996807, [EMAIL PROTECTED]
http://fdik.org, Deutsches IRCNet [EMAIL PROTECTED]
PGP-Key: http://www.x-pie.de/vb.asc

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Jeremiah Cornelius
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Thursday 13 November 2003 01:09, Florian Weimer wrote:
> Jack Chum wrote:
> 
>
> > Though it's late to ask, but could anyone send me the last openssh
> > exploit for our lab-test?
>
> 
> The last exploit for a critical vulnerability in OpenSSH is from 2001.
> 

You might be helpful - in some /small/ way:

Google for "gobbles" and "ssh"  Bingo!

> > We need to test it before we are permitted to upgrade. Please help.
>
> 
> Help yourself and redesign your patch management.

Yeah.  Everyone can do that, smartass. 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/s1qRJi2cv3XsiSARAmQnAJoChIj/tcvoOELhkDg00pXTnruP4wCePkIx
6TtvnOE+NnFFShhnHFJVLo8=
=di6f
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Corsaire Security Advisory: PeopleSoft Gateway Administration

2003-11-13 Thread advisories

-- Corsaire Security Advisory --

Title: PeopleSoft IScript XSS issue
Date: 04.07.03
Application: PeopleTools 8.20/8.43 and prior
Environment: Various
Author: Glyn Geoghegan [EMAIL PROTECTED]
Audience: General distribution
Reference: c030704-004


-- Scope --

The aim of this document is to clearly define a vulnerability in the 
PeopleSoft IScript functionality, as supplied by PeopleSoft Ltd. [1], 
that would allow an attacker to perform a Cross Site Scripting (XSS) 
attack.


-- History --

Discovered: 01.07.03 (Glyn Geoghegan)
Vendor notified: 04.07.03 
Document released: 12.11.03


-- Overview --

The PeopleSoft IScript environment allows developers to produce custom 
environments, tailored to an organisations needs. By using a malformed 
URL in an HTTP request to the IScript application, it is possible to 
achieve an XSS attack, potentially giving access to confidential 
information, such as session cookies etc.


-- Analysis --

The IScript interface accepts a number of arguments via HTTP POST/GET 
calls. 

By using a carefully constructed URL, mobile code such as JAVA, can be 
executed within the users context. This style of attack can be used to 
gain access to sensitive information, such as session cookies etc.


-- Recommendations --

PeopleSoft have released details of this and other issues under security 
rollup vulnerability ID 20031112, which is available to registered users 
from the PeopleSoft support site [2].

PeopleSoft recommends that customers address the vulnerability by 
applying the following fixes available on PeopleSoft Customer 
Connection. 

   Release   Patch
   8.18  8.18.15
   8.19  8.19.12
   8.20  8.20.03 
   8.42  8.42.14 
   8.43  8.43.11

For those who can not implement the patches promptly, as a mitigating 
strategy a firewall or other HTTP filtering device can be used to block 
queries containing sensitive strings, or as a last resort all access to 
the PeopleSoft application can be disabled in entirety.


-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2003-0629 to this issue. This is a candidate for
inclusion in the CVE list (http://cve.mitre.org), which standardises
names for security problems.


-- References --

[1] http://www.peoplesoft.com
[2] http://www.peoplesoft.com/corp/en/patch_fix/search.jsp


-- Revision --

a. Initial release.
b. Minor detail revisions.
c. Revised to include vendor information.


-- Distribution --

This security advisory may be freely distributed, provided that it 
remains unaltered and in its original form. 


-- Disclaimer --

The information contained within this advisory is supplied "as-is" with 
no warranties or guarantees of fitness of use or otherwise. Corsaire 
accepts no responsibility for any damage caused by the use or misuse of 
this information.


Copyright 2003 Corsaire Limited. All rights reserved. 




--
CONFIDENTIALITY:  This e-mail and any files transmitted with it are
confidential and intended solely for the use of the recipient(s) only.
Any review, retransmission, dissemination or other use of, or taking
any action in reliance upon this information by persons or entities
other than the intended recipient(s) is prohibited.  If you have
received this e-mail in error please notify the sender immediately
and destroy the material whether stored on a computer or otherwise.
--
DISCLAIMER:  Any views or opinions presented within this e-mail are
solely those of the author and do not necessarily represent those
of Corsaire Limited, unless otherwise specifically stated.
--
Corsaire Limited, 3 Tannery House, Tannery Lane, Send, Surrey, GU23 7EF
Telephone: +44(0)1483-226000  Email:[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Corsaire Security Advisory: PeopleSoft PeopleBooks Search CGI multiple argument issues

2003-11-13 Thread advisories

-- Corsaire Security Advisory --

Title: PeopleSoft PeopleBooks Search CGI multiple argument issues
Date: 04.07.03
Application: PeopleTools 8.20/8.43 and prior
Environment: Various
Author: Martin O'Neal [EMAIL PROTECTED]
Audience: General distribution
Reference: c030704-010


-- Scope --

The aim of this document is to clearly define several issues in the 
argument handling functionality of the PeopleSoft PeopleBooks Search CGI 
application, as supplied by PeopleSoft Ltd. [1]. 


-- History --

Discovered: 01.07.03 (Martin O'Neal)
Vendor notified: 04.07.03 
Document released: 12.11.03


-- Overview --

The PeopleSoft PeopleBooks component provides a CGI based search 
application as part of the default installation. Several of the 
attributes that are passed into the CGI application allow the 
specification of a server-side path. By entering various path values 
into this argument it is possible to:

- Access arbitrary files outside of the web servers document root.
- Cause a Denial of Services (DoS) on the web server host.


-- Analysis --

The Search CGI application (psdoccgi.exe) is used within the PeopleBooks 
online documentation. This application accepts two arguments, headername 
and footername, that allow the selection of header and footer content to 
be returned as part of the search results HTML page.

These arguments appear to be checked for basic formatting issues, 
however it is still possible to access files outside of the web server 
root, such as configuration files, that may contain passwords or other 
confidential information.


-- Recommendations --

PeopleSoft have released details of this and other issues under security 
rollup vulnerability ID 20031112, which is available to registered users 
from the PeopleSoft support site [2].

PeopleSoft recommends that customers address the vulnerability by 
applying the following fixes available on PeopleSoft Customer 
Connection. 

   Release   Patch
   8.18  8.18.15
   8.19  8.19.12
   8.20  8.20.03 
   8.42  8.42.14 
   8.43  8.43.11

For those who can not implement the patches promptly, as a mitigating 
strategy a firewall or other HTTP filtering device can be used to block 
queries containing sensitive strings, or as a last resort all access to 
the PeopleSoft application can be disabled in entirety.


-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
Multiple numbers to this issue: 

CAN-2003-0626 PeopleSoft PeopleBooks Search CGI arbitrary file read issue
CAN-2003-0627 PeopleSoft PeopleBooks Search CGI DoS issue

These are candidates for inclusion in the CVE list, which standardises 
names for security problems (http://cve.mitre.org). 


-- References --

[1] http://www.peoplesoft.com
[2] http://www.peoplesoft.com/corp/en/patch_fix/search.jsp


-- Revision --

a. Initial release.
b. Minor detail revisions.
c. Revised to include vendor information.


-- Distribution --

This security advisory may be freely distributed, provided that it 
remains unaltered and in its original form. 


-- Disclaimer --

The information contained within this advisory is supplied "as-is" with 
no warranties or guarantees of fitness of use or otherwise. Corsaire 
accepts no responsibility for any damage caused by the use or misuse of 
this information.


Copyright 2003 Corsaire Limited. All rights reserved. 



--
CONFIDENTIALITY:  This e-mail and any files transmitted with it are
confidential and intended solely for the use of the recipient(s) only.
Any review, retransmission, dissemination or other use of, or taking
any action in reliance upon this information by persons or entities
other than the intended recipient(s) is prohibited.  If you have
received this e-mail in error please notify the sender immediately
and destroy the material whether stored on a computer or otherwise.
--
DISCLAIMER:  Any views or opinions presented within this e-mail are
solely those of the author and do not necessarily represent those
of Corsaire Limited, unless otherwise specifically stated.
--
Corsaire Limited, 3 Tannery House, Tannery Lane, Send, Surrey, GU23 7EF
Telephone: +44(0)1483-226000  Email:[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Corsaire Security Advisory: PeopleSoft Gateway Administration servlet path disclosure issue

2003-11-13 Thread advisories

-- Corsaire Security Advisory --

Title: PeopleSoft Gateway Administration servlet path disclosure issue
Date: 04.07.03
Application: PeopleTools 8.20/8.43 and prior
Environment: Various
Author: Martin O'Neal [EMAIL PROTECTED]
Audience: General distribution
Reference: c030704-003


-- Scope --

The aim of this document is to clearly define a vulnerability in the 
PeopleSoft Gateway Administration servlet, as supplied by PeopleSoft 
Ltd. [1], that allows an attacker to disclose the actual path of server 
configuration files.


-- History --

Discovered: 01.07.03 (Martin O'Neal)
Vendor notified: 04.07.03 
Document released: 12.11.03


-- Overview --

The PeopleSoft Gateway Administration servlet provides a web-based 
interface to configure handlers. In the event of an invalid value being 
entered, the actual path of the server side configuration files is 
disclosed in the error response.


-- Analysis --

The gateway.administration servlet is used within the PeopleSoft 
environment to configure handlers. This application accepts a number of 
values via an HTML form. If an invalid value is entered, then the 
servlet responds with an error page that contains the actual path of the 
server side configuration files. 

This path can then be used in conjunction with other potential 
vulnerabilities to attack specific OS and application configuration 
files.


-- Recommendations --

PeopleSoft have released details of this and other issues under security 
rollup vulnerability ID 20031112, which is available to registered users 
from the PeopleSoft support site [2].

PeopleSoft recommends that customers address the vulnerability by 
applying the following fixes available on PeopleSoft Customer 
Connection. 

   Release   Patch
   8.18  8.18.15
   8.19  8.19.12
   8.20  8.20.03 
   8.42  8.42.14 
   8.43  8.43.11

For those who can not implement the patches promptly, as a mitigating 
strategy a firewall or other HTTP filtering device can be used to block 
queries containing sensitive strings, or as a last resort the 
administration functionality of the PeopleSoft Gateway can be disabled 
by restricting access to the servlet itself.


-- CVE --

The Common Vulnerabilities and Exposures (CVE) project has assigned
the name CAN-2003-0628 to this issue. This is a candidate for
inclusion in the CVE list (http://cve.mitre.org), which standardises
names for security problems.


-- References --

[1] http://www.peoplesoft.com
[2] http://www.peoplesoft.com/corp/en/patch_fix/search.jsp


-- Revision --

a. Initial release.
b. Revised to include vendor information.


-- Distribution --

This security advisory may be freely distributed, provided that it 
remains unaltered and in its original form. 


-- Disclaimer --

The information contained within this advisory is supplied "as-is" with 
no warranties or guarantees of fitness of use or otherwise. Corsaire 
accepts no responsibility for any damage caused by the use or misuse of 
this information.


Copyright 2003 Corsaire Limited. All rights reserved. 



--
CONFIDENTIALITY:  This e-mail and any files transmitted with it are
confidential and intended solely for the use of the recipient(s) only.
Any review, retransmission, dissemination or other use of, or taking
any action in reliance upon this information by persons or entities
other than the intended recipient(s) is prohibited.  If you have
received this e-mail in error please notify the sender immediately
and destroy the material whether stored on a computer or otherwise.
--
DISCLAIMER:  Any views or opinions presented within this e-mail are
solely those of the author and do not necessarily represent those
of Corsaire Limited, unless otherwise specifically stated.
--
Corsaire Limited, 3 Tannery House, Tannery Lane, Send, Surrey, GU23 7EF
Telephone: +44(0)1483-226000  Email:[EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] Re: Funny article

2003-11-13 Thread Mikael Olsson

David Maynor wrote:
> 
> Mikael Olsson wrote:
> > counting bugs in
> > the most commonly used [apps] is most certainly reasonable.
> >
>
> What about apps that run on both windows and linux? 

If it's a common enough app to count, its vulnerability count
should of course be included in both totals.  That was my point.

> When you start
> counting 3rd party apps in the equation, you are throwing a horrible
> slant into the mix. This is similar to getting a new 3rd party part for
> your car then blaming the carmaker when that part fails. Microsoft needs
> to include things like apache becasue the make both their OS and the
> webserver, so a comaprsion of security flaws broken down by responsible
> groups would make Microsoft look horrible.

I'm sorry to disappoint you, but the script kiddies don't care
about zealotry. I have yet to hear one say "Oh, this is a Linux
box, so I can't use this Apache bug to own it. That'd be rong."

If I expose N attack vectors, I want the vulnerability counts for 
all those vectors nicely summed up for platform options A, B and 
C before I choose which platform to use.

Saying "the linux kernel has only foo bugs while every microsoft
app combined has foo^3 bugs" makes no sense in a security 
discussion. You don't read mail or serve web pages with a kernel.


Again, I suspect we're in violent agreement of the platform of
choice for all relevant areas of use, but I prefer to make my 
choices on _relevant_ facts, and so, I suspect, does the 
majority of security-conscious people.  

Publishing an _unbiased_ report of total vulnerability counts 
for two or more OSes, with common apps installed, is a service
to admins everywhere.  (And no, I _really_ don't think comparing 
RH6 with W2K3 is "unbiased". I think it stinks.)


Regards,
/Mikael

-- 
Mikael Olsson, Clavister AB
Storgatan 12, Box 393, SE-891 28 ÖRNSKÖLDSVIK, Sweden
Phone: +46 (0)660 29 92 00   Mobile: +46 (0)70 26 222 05
Fax: +46 (0)660 122 50   WWW: http://www.clavister.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] Re: Funny article

2003-11-13 Thread netcat
[EMAIL PROTECTED] wrote:

On Wed, 12 Nov 2003, martin f krafft wrote:

 

i guess the main argument against this joke is that an operating
system with 10 different web servers, 10 different mail servers, 10
different ftp servers, 20 different window managers, 10 different
browsers, 20 different mail clients, and so on, and so on, will have
how many more bugs than a monolithic approach with 1 web server,
1 mail server, 1 ftp server, etc...
   

I don't consider the web/mail/ftp servers, windows managers, browsers, mail 
clients etc. to be part of the operating system, per se.

Certainly a vulnerability in Apache should not be a strike against Linux, 
should it?

I like how the article quoted Steve Ballmer comparing Windows 2000 Server and 
W2K3 Server with Red Hat 6. Why doesn't Ballmer compare the state of the art 
Windows OS' available at the time RH6 came out? Did Windows NT 4 not stack up 
as well against RH6 as W2K/3?

--
Dave Hull
Senior IT Analyst, Information Services
The University of Kansas
voice: (785) 864-0403 || fax: (785) 864-0485


 

I wonder that it's not mentioned that nobody wants to apply M$ patches
as they usually break something else. The real comparson should be
between the vuln. discovery and the real fact of patching a system.
Well, you can blame the admins and not the OS but this whole comparison
is ... hmm ... strange ?
--
NetCat



FREE 10MB email + Antivirus + AntiSpam + POP3 + more
Get it at http://www.doal.co.il:81/free/?c=both
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] Microsoft prepares security assault on Linux

2003-11-13 Thread Russ
Jason said;

>I wrote an information security book last year under contract with 
>Microsoft Press. The book was never published -- among other things it 
>explains truthfully the poor security condition of Windows and offers 
>detailed instructions and advice for defending against Microsoft's bad 
>business practices and incorrect security decisions.

Because maybe a book isn't needed to describe what I describe in 3 pages, 10 points, 
keystroke by keystroke, button click by button click, documentation. Assuming the 
requisite files are on hand, it takes less than an hour to "harden" an IIS box against 
all of this years attacks, and the document was written 2 years ago.

Fine, my 3 pages doesn't help "to educate developers of Web applications so that fewer 
new vulnerabilities would have been created.", but at least mine got published to our 
customers...;-]

>Microsoft suppresses awareness of vulnerabilities in order to profit.

Funny how they've always encouraged me with NTBugtraq, that would seem to be at odds 
with your perception of their position. Funny how I once tried to convince them to 
bury a vulnerability patch in a service pack rather than release a security bulletin, 
and there was no way they would have it.

The old adage, "You catch more flies with honey" seems to often be the opinion of 
publishers, one reason I've never written a book (no publisher wants to publish a book 
written the way I write...;-]) Since they're putting the money up, I have to assume 
they have good stats on the demographics of who will buy it and what the buyer 
expects. Its their audience, write it for yourself, publish it yourself (as you've 
done.) That they thought it wasn't going to be profitable (from a publishing 
perspective) doesn't necessarily mean Microsoft is trying to "suppress awareness of 
vulnerabilities", it could just mean they didn't think it would sell.

Cheers,
Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] [RHSA-2003:313-01] Updated PostgreSQL packages fix buffer overflow

2003-11-13 Thread bugzilla
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
   Red Hat Security Advisory

Synopsis:  Updated PostgreSQL packages fix buffer overflow
Advisory ID:   RHSA-2003:313-00
Issue date:2003-11-13
Updated on:2003-11-13
Product:   Red Hat Linux
Keywords:  
Cross references:  
Obsoletes: RHSA-2003:001 RHSA-2003:010
CVE Names: CAN-2003-0901
- -

1. Topic:

Updated PostgreSQL packages that correct a buffer overflow in the to_ascii
routines are now available.

2. Relevant releases/architectures:

Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

PostgreSQL is an advanced Object-Relational database management system
(DBMS).  

Two bugs that can lead to buffer overflows have been found in the
PostgreSQL abstract data type to ASCII conversion routines.  A remote
attacker who is able to influence the data passed to the to_ascii functions
may be able to execute arbitrary code in the context of the PostgreSQL
server.  These issues affect PostgreSQL 7.2.x, and 7.3.x before 7.3.4. 
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2003-0901 to these issues.

In addition, a bug that can lead to leaks has been found in the string to
timestamp abstract data type conversion routine.  If the input string to
the to_timestamp() routine is shorter than what the template string is
expecting, the routine will run off the end of the input string, resulting
in a leak of previous timestamp behavior and unstable behavior.

Users of PostgreSQL are advised to upgrade to these erratum packages, which
contain backported patches that correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network.  To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Note that no initdb will be necessary from previous PostgreSQL packages.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

108079 - CAN-2003-0901 PostgreSQL To_Ascii() Buffer Overflow Vulnerability
109068 - to_timestamp not stable if date string shorter than template

6. RPMs required:

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/postgresql-7.1.3-5.72.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-odbc-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-contrib-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-perl-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-devel-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-python-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-docs-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-server-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-jdbc-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-tcl-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-libs-7.1.3-5.72.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/postgresql-tk-7.1.3-5.72.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-odbc-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-contrib-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-perl-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-devel-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-python-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-docs-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-server-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-jdbc-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-tcl-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-libs-7.1.3-5.72.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/postgresql-tk-7.1.3-5.72.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/postgresql-7.2.4-5.73.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-contrib-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-devel-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-docs-7.2.4-5.73.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/postgresql-jdbc-7.2.4-5.7

Re: [Full-Disclosure] SSH Exploit Request

2003-11-13 Thread Florian Weimer
Jack Chum wrote:

> Though it's late to ask, but could anyone send me the last openssh
> exploit for our lab-test?

The last exploit for a critical vulnerability in OpenSSH is from 2001.

> We need to test it before we are permitted to upgrade. Please help.

Help yourself and redesign your patch management.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] [RHSA-2003:307-01] Updated zebra packages fix security vulnerabilities

2003-11-13 Thread bugzilla
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
   Red Hat Security Advisory

Synopsis:  Updated zebra packages fix security vulnerabilities
Advisory ID:   RHSA-2003:307-01
Issue date:2003-11-13
Updated on:2003-11-13
Product:   Red Hat Linux
Keywords:  DoS
Cross references:  
Obsoletes: 
CVE Names: CAN-2003-0795 CAN-2003-0858
- -

1. Topic:

Updated zebra packages that close a locally-exploitable and a
remotely-exploitable denial of service vulnerability are now available.

2. Relevant releases/architectures:

Red Hat Linux 7.2 - i386, ia64
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386
Red Hat Linux 9 - i386

3. Problem description:

Zebra an open source implementation of TCP/IP routing software.

Jonny Robertson reported that Zebra can be remotely crashed if a Zebra
password has been enabled and a remote attacker can connect to the Zebra
telnet management port.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0795 to this issue.

Herbert Xu reported that Zebra can accept spoofed messages sent on the
kernel netlink interface by other users on the local machine.  This could
lead to a local denial of service attack.  The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2003-0858 to
this issue.

Users of Zebra should upgrade to these erratum packages, which contain
a patch preventing Zebra from crashing when it receives a telnet option
delimiter without any option data, and a patch that checks that netlink
messages actually came from the kernel.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

107140 - CAN-2003-0795 Remote DoS in zebra

6. RPMs required:

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/zebra-0.91a-8.7.2.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/zebra-0.91a-8.7.2.i386.rpm

ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/zebra-0.91a-8.7.2.ia64.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/zebra-0.92a-5.7.3.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/zebra-0.92a-5.7.3.i386.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/zebra-0.93a-5.8.0.src.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/zebra-0.93a-5.8.0.i386.rpm

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/zebra-0.93b-4.9.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/zebra-0.93b-4.9.i386.rpm



7. Verification:

MD5 sum  Package Name
- --
1c42972cd3666c8d5c36fe2d4636bbbe 7.2/en/os/SRPMS/zebra-0.91a-8.7.2.src.rpm
f3c2cd447407735bfa0a6ee3ea107f9c 7.2/en/os/i386/zebra-0.91a-8.7.2.i386.rpm
2caa6379b78578f62c0267ae703dc552 7.2/en/os/ia64/zebra-0.91a-8.7.2.ia64.rpm
de79d8ae225cad78b897338307c74f70 7.3/en/os/SRPMS/zebra-0.92a-5.7.3.src.rpm
09d89f6a6d9ccb46bba080c6d7bc8b93 7.3/en/os/i386/zebra-0.92a-5.7.3.i386.rpm
4b4a738f98718f4e49c1ad16dfc8c515 8.0/en/os/SRPMS/zebra-0.93a-5.8.0.src.rpm
1665646ebda30a90ff04a06697b7df5f 8.0/en/os/i386/zebra-0.93a-5.8.0.i386.rpm
1d1e42921d7e83d7208a4c92aa9523e1 9/en/os/SRPMS/zebra-0.93b-4.9.src.rpm
73fad11a6b94e96ab66325c5bdac16cd 9/en/os/i386/zebra-0.93b-4.9.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:

rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
   

Re: [Full-Disclosure] new worm - "warm-pussy.jpg".

2003-11-13 Thread I.R. van Dongen
On Wed, Nov 12, 2003 at 02:36:41PM -0500, segfault wrote:
> You idiot.  Just because a file is called warm-pussy.jpg, doesn't mean that
> the webserver it resides on isn't going to parse it's actual content (which
> is probably plaintext).  Look again, I'm sure you'll be surprised.
> 
> Contents of warm-pussy.jpg:


I edited the source to make it harmless (putty from official website
instead of virus) and fixed the dependency on existence of c:\windows.

For those who want to see how it works:
http://lamorak.hetisw.nl/concept.jpg

I tested on 3 volunteers and 1 reported a virusscanner (can't remember
which one) reporting VBS/Psyme.

Either test on a fast line, or allow enough time for putty to download.

Greetings,

Ivo van Dongen

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html