[SECURITY] [DSA-058-1] exim printf format attack

2001-06-10 Thread Wichert Akkerman
-BEGIN PGP SIGNED MESSAGE- - Debian Security Advisory DSA-058-1 [EMAIL PROTECTED] http://www.debian.org/security/ Wichert Akkerman June 10, 2001 -

Broker FTP Server 5.9.5.0 Buffer Overflow / DoS / Directory Traversal

2001-06-10 Thread ByteRage
Broker FTP Server 5.9.5.0 Buffer Overflow / DoS / Directory Traversal TESTED ON Broker FTP Server 5.9.5.0 on Windows 98, likely to work on NT / 2k DESCRIPTION 1) Buffer Overflow / DoS The DoS, which completely freezes the victim machine, can be triggered by repeatedly sending the following

IDS's, host: headers, and .printer ISAPI overflow as an example

2001-06-10 Thread Marc Maiffret
A lot of Intrusion Detection Systems are only look for Host: strings when dealing with web server attacks that do bad things with the Host: field. An example of that would be the .printer ISAPI overflow that eEye released a few weeks or so ago. We have seen three distinct patterns in signatures

Mac OS X - Apache Case Insensitive Filesystems

2001-06-10 Thread Stefan Arentz
Environment: Mac OS X 10.0.3 / Darwin 1.3.3 Apache 1.3.14 This is the the default setup, out of the box, with available software updates installed. Please note, this is OS X *Client*. Who is affected: Everybody who used Apache on Mac OS X Client with the following conditions:

Re: Microsoft Security Bulletin MS01-030

2001-06-10 Thread Paul L Schmehl
At UTD we are running active-active clustering (a-a-c) with two virtual Exchange 2000 servers and a RAID array. We were in the process of installing Exchange 2000 on the second node, and the admins decided to apply this patch to the active node as well. After application of the patch (this

Re: SSH / X11 auth: needless complexity - security problems?

2001-06-10 Thread Casper Dik
The problem isn't the authentication, it's the granularity of the authorization that the filesystem affords. NFS leaves authorization up to the client host (aka ``No File Security''). NFS provides most any level of security you desire; not many vendors implement NFS security, though. NFSv4

Re: Webtrends HTTP Server %20 bug (UTF-8)

2001-06-10 Thread Peter W
On Fri, Jun 08, 2001 at 04:51:57AM +0100, Glynn Clements wrote: Eric Hacker wrote: Conveniently, UTF8 uses the same values as ASCII for ASCII representation. Above the standard ASCII 127 character representation, UTF8 uses multi-byte strings beginning with 0xC1. No; the sequences for

RE: SECURITY.NNOV: Outlook Express address book spoofing

2001-06-10 Thread David F. Skoll
On Fri, 8 Jun 2001 [EMAIL PROTECTED] wrote: One simple method of adding security in this case would be to pop up a security alert when there is an attempt to add an address book entry where the real name portion is de facto an RFC compliant mail address. The user then can decide if he wants

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Chris Adams
Once upon a time, Peter Ajamian [EMAIL PROTECTED] said: While crypt password authentication is not in and of itself very secure, Network Sulotions have made it even less so by including the first two characters of the password as the salt of the encrypted form. While the This is not new; I

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Len Sassaman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Fri, 8 Jun 2001, Peter Ajamian wrote: Do not use the Crypt-PW authentication-scheme. Instead use the MAIL_FROM or PGP scheme instead. Neither of these are very good options either. The problems with MAIL-FROM are the obvious flaws you find in

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Peter W
On Fri, Jun 08, 2001 at 12:37:34AM -0700, Peter Ajamian wrote: While crypt password authentication is not in and of itself very secure, Network Sulotions have made it even less so by including the first two characters of the password as the salt of the encrypted form. While the password is

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread jkohl
On Fri, 08 Jun 2001 00:37:34 -0700 Peter Ajamian [EMAIL PROTECTED] wrote. Problem: While crypt password authentication is not in and of itself very secure, Network Sulotions have made it even less so by including the first two characters of the password as the salt of the encrypted form. While

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Peter van Dijk
On Fri, Jun 08, 2001 at 12:37:34AM -0700, Peter Ajamian wrote: [snip] computer. A new 1ghz computer could easily crank out 6 char passwords in mere seconds, 8 char passwords in a few hours, and a 10 char password probably in a week to a month or better. crypt() passwords are never more than

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Tyler Walden
For those interested here is perl program to generate Crypt-PW's with a propper salt. #!/usr/bin/perl $salt=salt(); print password encryptee, [CTRL]-D quits.\n; while (STDIN) { chop; $text=crypt($_,$salt); print $text.\n; } sub salt { local($salt); local($i, $rand); local(@itoa64) = ( 0

Re: Network Solutions Crypt-PW Authentication-Scheme vulnerability

2001-06-10 Thread Peter Ajamian
Peter W wrote: Plus when you submit a change request template, your email contains the plaintext password. :-( Changing your password means sending the cleartext value to NetSol via email. So changing your password involves risk. :-( In my recent experience, the unencrypted password is

Re:XFree86-xfs-4.0.1-1 DoS

2001-06-10 Thread Mathias Dybvik
Confirmed, on Mandrake 8.0. I should, however, point out that I was only able to take down the font-server as a local user, and not from a remote host. This could be a bandwidth problem, caused by the fact that I only have a measly 10Mb/s LAN. Then again, my urandom bandwidth is less than