Remot File Include In SLAED_CMS_2

2007-03-31 Thread RaeD Hasadya
By Hasadya Raed Contact : [EMAIL PROTECTED] Israel --- Script : SLAED_CMS_2 Dork : "Web site engine code is Copyright © 2006 by SLAED CMS. All rights reserved" --- B.Files : admin.php index.php ---

Re: 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

2007-03-31 Thread Alexander Sotirov
Since exploit code has already been posted to Full-Disclosure, we are going to release an advisory with more technical details about the vulnerability. Enjoy: http://www.determina.com/security.research/vulnerabilities/ani-header.html Alex signature.asc Description: OpenPGP digital signature

Re: 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

2007-03-31 Thread Jan Wrobel
On Thu, 29 Mar 2007, Alexander Sotirov wrote: > Today Microsoft released a security advisory about a vulnerability in the > Animated Cursor processing code in Windows: > http://www.microsoft.com/technet/security/advisory/935423.mspx > > It seems like the vulnerability is already exploited in the

Re: 0-day ANI vulnerability in Microsoft Windows (CVE-2007-0038)

2007-03-31 Thread Alexander Sotirov
Jan Wrobel wrote: > I don't know if this rule detects all possible exploits or just one > particular type. Here is a Firekeeper version of the rule, which can > be used to detect sites hosting malicious files: > > alert (msg:"BLEEDING-EDGE CURRENT EVENTS MS ANI exploit"; body_content:"|54 > 53 49

PHP-Fusion 'Calendar_Panel' Module show_event.PHP (m_month) SQL Injection Exploit And PoC

2007-03-31 Thread UniquE
#!/usr/bin/perl -w # PHP-Fusion 'Calendar_Panel' Module show_event.PHP (m_month) SQL Injection Exploit And PoC # Type : # SQL Injection # Release Date : # {2007-03-31} # Product : # http://php-fusion.co.uk/ # Bug : # http://localhost/script/modules/articles/print.php?id=x AND 1=1 or 1=0

On-going Internet Emergency and Domain Names

2007-03-31 Thread Gadi Evron
There is a current on-going Internet emergency: a critical 0day vulnerability currently exploited in the wild threatens numerous desktop systems which are being compromised and turned into bots, and the domain names hosting it are a significant part of the reason why this attack has not yet been mi

CA BrightStor ARCserve Backup Mediasvr.exe vulnerability

2007-03-31 Thread Williams, James K
CA is aware that functional exploit code was publicized on March 30, 2007 for a CA BrightStor ARCserve Backup Mediasvr.exe vulnerability. We have verified that a high risk vulnerability does exist and we are now working on a patch to address the issue. CA recommends that BrightStor ARCserve

RE: [Full-disclosure] 0-day ANI vulnerability in Microsoft Windows(CVE-2007-0038)

2007-03-31 Thread Eric Sites
You really need to check for: RIFF[4 byte file size] <-- The file size can be ignored. Then the next 4 byte after the file size should contain: ACON Then look for: anih and the 4 byte value following it greater than 0x50, this is the stack buffer overflow point. New ANIs can be built with any nu

Busting The Bluetooth Myth

2007-03-31 Thread Max Moser
Dear List During the last year, rumours had come to my attention that apparently it is possible to transform a standard 30USD Bluetooth(r) dongle into a full-blown Bluetooth(r) sniffer. Thinking you absolutely need Hardware to be able to hop 79 channels 1600 times a second I was rather suspicious