Solaris 7 x86 lp exploit

2000-04-24 Thread Theodor Ragnar Gislason
Setuid proggie /usr/bin/lp has an easily exploitable buffer overflow. This exploit is for Solaris 7 x86 version, no sparc exploit is available to my knowledge. later, DiGiT /* * * solaris 2.7 /usr/bin/lp local exploit, i386. * * discovered by DiGiT. * try offset 150-250 if sploit fails *

mtr-0.41 root exploit

2000-04-24 Thread Przemyslaw Frasunek
/* (c) 2000 babcia padlina / buffer0verfl0w security (www.b0f.com) */ /* freebsd mtr-0.41 local root exploit */ #include #include #include #include #define NOP 0x90 #define BUFSIZE 1 #define ADDRS 1200 long getesp(void) { __asm__("movl %esp, %eax\n"); }

Buffer Overflow in version .14

2000-04-24 Thread Jesse Schachter
IC Radius version .14, and possibly earlier versions, contain a buffer overflow that occurs when trying to authenticate with a valid username longer than 24 characters. The culprit is in mysql.c, in the function sql_getvpdata. This function is normally run 4 times during authentication. The secon

man-exploit for MANPAGER environment and a comment about the IMAP vuln

2000-04-24 Thread psychoid
For the sake of full disclosure an exploit for the MANPAGER environment variable: - snip - /* * MAN-Exploit for MANPAGER environmental variable. * rh 6.x, tested on rh 6.1 * written by psychoid/tCl * gives egid man. * * Originally discovered by lcamtuf. * educational. yes. * */ #includ

Solaris x86 Xsun overflow.

2000-04-24 Thread Theodor Ragnar Gislason
There exists an overflow in /usr/openwin/bin/Xsun setuid root program on solaris 7 x86 version, I'm not sure about sol 8. This bug was discovered and exploited sometime in '98. The program comes default setgid root on the sparc version of solaris. I haven't checked wether this is exploitable on s

unsafe fgets() in sendmail's mail.local

2000-04-24 Thread 3APA3A
Topic: unsafe fgets() in sendmail's mail.local Description: There are 4 problems: 1. Possibility to insert LMTP commands into e-mail message 2. Possibility of deadlock between sendmail and mail.local 3. Possibility to corrupt user's mailbox 4. Possibility to ch

Re: netkill - generic remote DoS attack

2000-04-24 Thread stanislav shalunov
It seems many people have found my explanation too long to be read. This is a shorter summary of what it is not and what it is. Netkill is not a connect() flood. The latter establishes connections and holds them open, making t

Re: pop3

2000-04-24 Thread Jason Godsey
I've had it use ~/.pop3.lock for quite some time (since 1995). I'm sure this won't work for people who don't provide users w/ home directories, but it has worked for us. Jason On Thu, 20 Apr 2000, spoon spoon wrote: > Date: Thu, 20 Apr 2000 18:23:28 +0200 > From: spoon spoon <[EMAIL PROTECTED]

Solaris 7 x86 lpset exploit.

2000-04-24 Thread Theodor Ragnar Gislason
Solaris 7 x86 /usr/bin/lpset overflow, there is a small overflow(32 bytes) in lpset which will yield root access if properly exploited. There is a sparc version avail for this bug, the bug was discovered by duke some time ago. I am releasing this exploit because of a copy-cat exploit on hack.co.

CVS DoS

2000-04-24 Thread Michal Szymanski
Hi, I've just found annoying bug in cvs-1.10.7 (probably others too). Let's assume you've decided to make your remote cvs repository available to several trusted people. Therefore you need to edit your /etc/inetd.conf file and add line similar to presented below: cvspserver stream tcp nowait

Re: local user can delete arbitrary files on SuSE-Linux

2000-04-24 Thread Pavel Kankovsky
On Fri, 21 Apr 2000, [ISO-8859-1] Peter Münster wrote: > If MAX_DAYS_IN_TMP > 0 in /etc/rc.config on a SuSE-Linux system, a local > user can delete arbitrary files by doing some commands like these: > mkdir -p "/tmp/hhh /somedirectory" > touch -t some-early-date "/tmp/hhh /somedirectory/somefile"

Postgresql cleartext password storage

2000-04-24 Thread Robert van der Meulen
Hi, While migrating some postgres databases to a different server (including user accounts) i noticed the following problem in the way postgres stores user passwords: SmellyCat:/var/postgres/data# strings pg_shadow someaccountname someaccountpassword anotheraccountname anotheraccountpassword Sme

freebsd libncurses overflow

2000-04-24 Thread Przemyslaw Frasunek
_ b u f f e r 0 v e r f l 0 w s e c u r i t y a d v i s o r y # 3 Advisory Name: libncurses buffer overflow Date: 24/4/00

Re: IE 5 security vulnerablity - circumventing Cross-framesecurity policy using Java/JavaScript (and disabling ActiveScripting is not that easy)

2000-04-24 Thread Georgi Guninski
I made a mistake in my Advisory #10 - Scripting of Java applets does not stop neither a little modification of my exploit nor execution of Active Scripting if it is disabled. Before writing my advisory I tested one time an exploit with Scripitng of Java Applets disabled and it did stop the exploit

Hotmail security hole - injecting JavaScript in IE using "@import url(http://host/hostile.css)"

2000-04-24 Thread Georgi Guninski
Georgi Guninski security advisory #11, 2000 Hotmail security hole - injecting JavaScript in IE using "@import url(http://host/hostile.css)" Disclaimer: The opinions expressed in this advisory and program are my own and not of any company. The usual standard disclaimer applies, especially the fac

gpm-root initgroups()

2000-04-24 Thread Koblinger Egmont
Hello! As reported before, the "gpm-root" daemon in gpm-1.19.0 and earlier lets the user execute any command with uid=0. gpm-1.19.1 fixed half of the security hole by calling setuid() and setgid() at the right place but not calling initgruops(). gpm-1.19.2 is out there, which calls initgroups()

Re: DOS attack against HP JetDirect Printers (fwd)

2000-04-24 Thread Ben Woodard
As another data point G.07.19 seems immune to the problem. -ben > On Thu, 20 Apr 2000, Alfred Huger wrote: > > In case anyone is interested, scanning HP printers with > > tools such as nmap will cause the printer to lock up hard. > > I discovered this while trying to diagnose a connection > > p

Re: pop3

2000-04-24 Thread Christopher P. Lindsey
> Qualcomms POP servers have this problem as well, on linux, solaris, etc. > Except the lock file gets stored where ever your users mail is stored. > /var/mail(on a sun) or where ever. I guess a nice solution would be to have a > subdirectory with mode 700 permissions under /var/mail/locks or some

Re: Securax Security Advisory: Windows98 contains a serious buffer overflow with long filenameextensions.

2000-04-24 Thread Bob Fiero
I found that 98Lite (*) is not vulnerable to this, but my Eudora app was rendered inaccessible when Zoa_Chien e-mailed me an example. I had to delete his message from my Eudora spool directory before I was able to load Eudora again. (*) 98Lite is a modified Win98. It is a full 98 system without I

Re: More vulnerabilities in FP

2000-04-24 Thread Ron van Daal
> To test this vulnerability we need "htimage.exe" in our "cgi-bin" > directory (it's installed by default) and premission to execute it. > That's why only Windows is vulnerable, Unix to execute "htimage.exe" + > If "htimage.exe" exist). based systems can't execute "*.exe" files. Incorrect. The F

Re: DOS attack against HP JetDirect Printers (fwd)

2000-04-24 Thread John Bock
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've never seen nmap dos a HP4000 printer but they do die if you toss junk at the spooler port. The printer display says 86.00x EIO 1 Error, and the red attention light goes on. At this point you have to power the printer back on and off. The rev's

Re: netkill - generic remote DoS attack - Cisco LocalDirectors

2000-04-24 Thread Ollie Whitehouse
All, Stanislav mentioned Cisco LocalDirectors and I would like to shed a little more light on the configurations possible within the LocaLDirector which would be of use to people on the list. An important point to make is that I don't work for Cisco but have used both Cisco's and Intel's load bal

Re: More vulnerabilities in FP

2000-04-24 Thread Roman
Hello, > First remote FrontPage exploit? How about this one: http://server/AA FP will overflow and someone will see this message: VHTTPD32 caused an invalid page fault in module at :41414141. Registers: EAX= CS=0167 EIP=41414141 EFLGS=00010212 EBX= SS=016f

Re: Securax Security Advisory: Windows98 contains a serious buffer overflow with long filenameextensions.

2000-04-24 Thread Mike Murray
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Having tested it, it works on Win95 as well. - -Original Message- From: Zoa_Chien <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] <[EMAIL PROTECTED]> Date: April 22, 2000 3:11 AM Subject: Securax Security Advisory: Windows98 contains a serious buff

Re: ZoneAlarm

2000-04-24 Thread Gary Buckmaster
Wally, Verified, ableit unscientifically. ZoneAlarm does not appear to detect udp traffic from source port 67. Additionally, using nmap's -f flag allows you to send traffic past ZoneAlarm without any alerts. Wally Whacker wrote: > ZoneAlarm (http://www.zonelabs.com) is a very popular > person

Re: DOS attack against HP JetDirect Printers (fwd)

2000-04-24 Thread Terran Melconian
> In case anyone is interested, scanning HP printers with > tools such as nmap will cause the printer to lock up hard. I attemped to reproduce this and was unable to. When I scanned an HP LaserJet 4050N with JetDirect firmware revision G.08.03, one of the ones listed as being vulnerable, the pri