Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-16 Thread Micheal Espinola Jr
Not to be a smart-ass, but - sales reps typically dont know techinical
details, nor should they.

Got link/more info/etc as to what you are referring to?


On Mon, 15 Nov 2004 15:37:42 -0500, Dave Aitel [EMAIL PROTECTED] wrote:
 
 
 That's a good question for your Microsoft sales rep. If you want
 technical details, Immunity has a working and reliable Wins exploit in
 the Vulnerability Sharing Club version of CANVAS. I think there's an
 interesting difference between how the Linux community handled the
 recent kernel bugs, and how Microsoft and other commercial vendors
 handle all bugs.
 
 Dave Aitel
 Immunity, Inc.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] MSIE srcname property disclosure

2004-11-15 Thread joe
How is it an example?

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dave Aitel
Sent: Monday, November 08, 2004 9:49 AM
To: Michal Zalewski
Cc: Berend-Jan Wever; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] MSIE srcname property disclosure

SNIP
WINS is a classic example.
SNIP

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


RE: [Full-Disclosure] MSIE srcname property disclosure

2004-11-15 Thread joe
I don't know how your club works. 

Do you report to MS as well or just within your club that you charge people
to be part of? Has MS responded to you if you did report it? What was their
response that makes WINS a classic example?

  joe 

-Original Message-
From: Dave Aitel [mailto:[EMAIL PROTECTED] 
Sent: Monday, November 15, 2004 3:38 PM
To: joe
Cc: 'Michal Zalewski'; 'Berend-Jan Wever'; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] MSIE srcname property disclosure

That's a good question for your Microsoft sales rep. If you want technical
details, Immunity has a working and reliable Wins exploit in the
Vulnerability Sharing Club version of CANVAS. I think there's an interesting
difference between how the Linux community handled the recent kernel bugs,
and how Microsoft and other commercial vendors handle all bugs.

Dave Aitel
Immunity, Inc.

joe wrote:

How is it an example?

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dave Aitel
Sent: Monday, November 08, 2004 9:49 AM
To: Michal Zalewski
Cc: Berend-Jan Wever; [EMAIL PROTECTED]; 
[EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] MSIE srcname property disclosure

SNIP
WINS is a classic example.
SNIP

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
  


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-15 Thread Dave Aitel
That's a good question for your Microsoft sales rep. If you want 
technical details, Immunity has a working and reliable Wins exploit in 
the Vulnerability Sharing Club version of CANVAS. I think there's an 
interesting difference between how the Linux community handled the 
recent kernel bugs, and how Microsoft and other commercial vendors 
handle all bugs.

Dave Aitel
Immunity, Inc.
joe wrote:
How is it an example?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dave Aitel
Sent: Monday, November 08, 2004 9:49 AM
To: Michal Zalewski
Cc: Berend-Jan Wever; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] MSIE srcname property disclosure
SNIP
WINS is a classic example.
SNIP
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-15 Thread Dave Aitel
Joe,
http://www.immunitysec.com/services-sharing.shtml has the answers to 
your questions about the Immunity VSC, but my point was specifically 
about bugs that Microsoft knew about, but didn't think the public did. 
In Linux's case, said bugs would have a detailed advisory. In 
Microsoft's case, such bugs are wrapped into the next service pack silently.

Private firms such as Immunity and several others in the market often 
close the gaps, but it's likely that hackers have had such bugs for long 
periods of time.

Dave Aitel
Immunity, Inc.

joe wrote:
I don't know how your club works. 

Do you report to MS as well or just within your club that you charge people
to be part of? Has MS responded to you if you did report it? What was their
response that makes WINS a classic example?
 joe 

-Original Message-
From: Dave Aitel [mailto:[EMAIL PROTECTED] 
Sent: Monday, November 15, 2004 3:38 PM
To: joe
Cc: 'Michal Zalewski'; 'Berend-Jan Wever'; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] MSIE srcname property disclosure

That's a good question for your Microsoft sales rep. If you want technical
details, Immunity has a working and reliable Wins exploit in the
Vulnerability Sharing Club version of CANVAS. I think there's an interesting
difference between how the Linux community handled the recent kernel bugs,
and how Microsoft and other commercial vendors handle all bugs.
Dave Aitel
Immunity, Inc.
joe wrote:
 

How is it an example?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dave Aitel
Sent: Monday, November 08, 2004 9:49 AM
To: Michal Zalewski
Cc: Berend-Jan Wever; [EMAIL PROTECTED]; 
[EMAIL PROTECTED]
Subject: Re: [Full-Disclosure] MSIE srcname property disclosure

SNIP
WINS is a classic example.
SNIP
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
   

 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-08 Thread Michal Zalewski
On Mon, 8 Nov 2004, Berend-Jan Wever wrote:

 In response to statements found at
 http://news.com.com/Exploit+code+makes+IE+flaw+more+dangerous/2100-1002_3-5439370.html

Yup.

But what amuses me most, is the following bit:

  Microsoft has begun to investigate the Iframe vulnerability and has not
  been made aware of any program designed to exploit the flaw, the company
  said in an e-mail statement to CNET News.com.

When you posted your first message confirming that the problem is
exploitable, I forwarded it to [EMAIL PROTECTED], so that they know
they have a problem in case they do not read Full-Disclosure. I got no
response. Later, when you posted a working exploit, I sent them another
forward, including a remark it is probably a good idea to react now, if
they failed to do so before.

In response, I got a mail from Lennart of Microsoft Security Response
Center, saying that they are aware of the problem and read mailing lists,
and that my original mail simply got lost in the noise.

Several days later, this statement surfaces in an article, showing beyond
any doubt that they are, quite simply, lying to the public to save face
and gain time.

As much as I am not a rabid Microsoft hater, this pissed me off more than
a bit.

-- 
- bash$ :(){ :|:};: --
 Michal Zalewski * [http://lcamtuf.coredump.cx]
Did you know that clones never use mirrors?
--- 2004-11-08 15:09 --

   http://lcamtuf.coredump.cx/photo/current/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure (E - GORILLA WAR stratigy? )

2004-11-08 Thread bipin gautam
huh!
Reviewing all the latest IE advisories, i believe they
are in a way attacking M$. So that its coutomers are
forced to  choose another browser... due to the
security risks involved.

I will rate it as a birth of  E - GORILLA WAR
stratigy?   (o;   of the minorities.


 Can a company sue a person, for publishing
irresponsible sec. advisories as such? No offence. I
just wanna know your views. Afterall, the haxor is
reverse engineering the software. I don't know if M$
will ever fire a case against such ppl. in future with
a propaganda, TO PROTECT ITS USERS?

have your say?

bipin gautam
--- Berend-Jan Wever [EMAIL PROTECTED] wrote:

 Hi all,
 
 In response to statements found at

http://news.com.com/Exploit+code+makes+IE+flaw+more+dangerous/2100-1002_3-5439370.html
  Microsoft is concerned that this new report of a
 vulnerability in
 Internet Explorer was not disclosed responsibly,
 potentially putting
 computer users at risk, the company said in the
 statement. We believe
 the commonly accepted practice of reporting
 vulnerabilities directly to a
 vendor serves everyone's best interests, by helping
 to ensure that
 customers receive comprehensive, high-quality
 updates for security
 vulnerabilities with no exposure to malicious
 attackers while the patch
 is being developed.
 
 About responsible disclosure:
 The origional vulnerability was found and disclosed
 by ned. As far as I
 know, ned only knew he had found something that
 crashed MSIE: a bug.
 Microsofts concerns would suggest two options:
 1) They expect everybody who finds a bug to
 investigate the issue and act
 according to the impact the problem might have on
 security. I do not think
 this is likely to happen unless everybody is
 required to be a 1337
 ubergeek before they are allowed to use MS software.
 It's a nice goal to
 aim for, but not very realistic.
 2) You can not talk about your software crashing,
 ever, unless it's to the
 vendor: You might have stumbled upon a vulnerability
 and if a malicous
 attacker hears about it, he might use it.
 
 About commonly accepted practice of reporting
 vulnerabilities directly to
 a vendor:
 When did they arrest all the black-hats ?
 
 About no exposure to malicious attackers while the
 patch is being
 developed:
 Allthough I believe in responsible disclosure of
 vulnerabilities, it DOES
 NOT prevent malicious attackers to discover and
 exploit the same
 vulnerability while a patch is being developed.
 Resonsible disclosure
 decreases the chance of somebody hacking your system
 while you are
 vulnerable, it doesn't make it zero.
 
 Anybody who understands basic bufferoverflow
 techniques will be able to
 write an exploit for this vulnerability. I did it in
 a few minutes, so how
 hard can it be ? I do not feel I disclosed anything
 new, I just saved a
 lot of people the trouble of writing it themselves.
 
 The vulnerability has been rated extremely
 critical since I released the
 exploit. I say it was allready extremely critical
 before ned disclosed
 his information, only nobody knew it was there. It
 was extremely
 critical when ned did, but only a few could grasp
 that. Then I explained
 it was an easy to exploit bufferoverflow, it still
 did not get much
 attention.
 Writing the exploit hasn't changed the flaw or it's
 impact, it just
 attracked the right amount of attention to the
 problem.
 
 Cheers,
 SkyLined
 
 ___
 Full-Disclosure - We believe in it.
 Charter:
 http://lists.netsys.com/full-disclosure-charter.html
 




__ 
Do you Yahoo!? 
Check out the new Yahoo! Front Page. 
www.yahoo.com 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-08 Thread Georgi Guninski
0wning the windoze population is not enough for m$.

they also want to 0wn the intellectual property of bugs and exploits in their
warez.

as much as i love them, i must admit they are lamers.

-- 
where do you want bill gates to go today?

On Mon, Nov 08, 2004 at 12:40:08PM +0100, Berend-Jan Wever wrote:
 Hi all,
 
 In response to statements found at
 http://news.com.com/Exploit+code+makes+IE+flaw+more+dangerous/2100-1002_3-5439370.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-08 Thread Elia Florio
Common laws in IT-security:

I° Micro$oft bugs law :
a bug is a bug only if found in competitor's software (or if it
could be used in any commercial report to show Windoze
betterstronger than other OSes).

II° Micro$oft bugs law :
Windoze has only bugs that M$ said it has; every other bug, found
by bad-and-evil-security-guys is not a bug.

III° Micro$oft bugs law :
every bug discovered by others is only a windows update problem or
a missing feature of operating system which will be fixed in next
service pack

IV° Micro$oft bugs law :
if we found a bug by ourselves...we fix it in the darkness
and then erase programmers memories to avoid that they one day
could remember about it

:)


Messaggio inviato da
Edizioni Master Webmail
http://mbox.edmaster.it

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-08 Thread Paul Schmehl
--On Monday, November 08, 2004 03:13:57 PM +0100 Michal Zalewski 
[EMAIL PROTECTED] wrote:
Several days later, this statement surfaces in an article, showing beyond
any doubt that they are, quite simply, lying to the public to save face
and gain time.
As much as I am not a rabid Microsoft hater, this pissed me off more than
a bit.
Never attribute to malice what can be explained by incompetence.  Most 
likely what happened is the left hand (PR) didn't know what the right hand 
(secure@) was doing.

Paul Schmehl ([EMAIL PROTECTED])
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-08 Thread Georgi Guninski
On Mon, Nov 08, 2004 at 01:33:17PM -0600, Paul Schmehl wrote:
 Never attribute to malice what can be explained by incompetence.  Most 
 likely what happened is the left hand (PR) didn't know what the right hand 
 (secure@) was doing.


suppose your logic were right.

so, when m$ pr talk, they don't know what the rest of the evil empire is
doing.

but what is the explanation if the m$ pr refuse to talk - as in the case
several hundred planes circling above a city ?

-- 
where do you want bill gates to go today?

 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-08 Thread Michal Zalewski
On Mon, 8 Nov 2004, Paul Schmehl wrote:

  [ Moderators - feel free to kill this ]

 Never attribute to malice what can be explained by incompetence.  Most
 likely what happened is the left hand (PR) didn't know what the right
 hand (secure@) was doing.

Highly unlikely; Microsoft Security Response is a team that, among other
things, manages and handles security response, including security-related
PR-esque functions (ever seen 'security evangelist' job postings on the
net?). The quote is fairly specific, so I doubt it could be spawned by a
lone PR drone who did not check with them.

-- 
- bash$ :(){ :|:};: --
 Michal Zalewski * [http://lcamtuf.coredump.cx]
Did you know that clones never use mirrors?
--- 2004-11-08 21:35 --

   http://lcamtuf.coredump.cx/photo/current/

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] MSIE srcname property disclosure

2004-11-08 Thread Gadi Evron
Dave Aitel wrote:
 This is another reason why studies comparing Microsoft's security to 
Open Source security are always bizzare. They compare the entire set of 
Linux vulnerabilities to a tiny subset of the bugs Microsoft knows 
about, but pretends other people don't. WINS is a classic example.

Actually, I personally have nothing against MS. They succeeded where 
many failed. Good for them!

Their bad attitude and bloody competitive nature can hardly be blamed in 
the world they compete in... and their corporate culture.. it's their 
own problem.

So where do I blame them? I blame them in how they treat me;
- They have released vague and mind-boggling advisories (where do I
  start?).
- They don't advertise most of their security issues (remember defcon a
  couple of years back with the CoDC and their we already use that
  computer name? issue? MS refused to give credit because they were
  already aware of the issue).
- They hide security patches inside other patches (so much that the best
  way to find Windows vulnerabilities is to do reversing on their
  patches).
- They pre-patch products and for that reason hold on patches until such
  products are out (XP SP2).
- They insist on dealing with trouble by either ignoring it or killing
  it by applying a band-aid (I'll give only one example: winnuke and
  closing the port).
And don't even get me started on viruses (all the way back through 
macro viruses and beyond).

I don't envy, hate or mock Microsoft. I actually appreciate what they 
have accomplished. I have a serious issue with their way of doing 
business with non-competition - the way they treat me as a security 
professional.

All the above, is naturally, only my personal opinion. I may have some 
of the details not 100% accurate, but I stand by the spirit of the words.

I tried and start a good-natured FACTUAL discussion on the subject in 
the past - but all the kiddies always jump up and yell. In this case, 
even some of my best friends enter the yelling criteria.

Oh.. and any idea why MS keeps adding caches on caches on caches to 
solve problems? It turns me crazy.
Which reminds me of a similar discussion on a list I own a bit back. 
Someone asked why IE keeps checking a certain Windows game - it was 
turning him crazy. So the Managing Director of a big 
disassembler/debugger company offered to make it a surprise discount 
on the order forms if someone wrote the name of the game there.
It was hilarious. :o)

That's the best you will see out of me on religion. I decide to comment 
on such issues about twice a year.

Gadi Evron.
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html