Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit

2009-07-21 Thread Jeremy Brown
Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit This exploit is based on the brief information provided by Nine:Situations:Group (http://www.milw0rm.com/exploits/9199). Exploiting improper permissions is fun. A few notes are in order though. The getPlus service (that I tested, via 9.1

ZDI-09-046: Novell Privileged User Manager Remote DLL Injection Vulnerability

2009-07-21 Thread ZDI Disclosures
ZDI-09-046: Novell Privileged User Manager Remote DLL Injection Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-046 July 21, 2009 -- Affected Vendors: Novell -- Affected Products: Novell Privileged User Manager -- Vulnerability Details: This vulnerability allows remote attackers

Re[4]: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Steven M. Christey
On Tue, 21 Jul 2009, Thierry Zoller wrote: > Yeah, security is too complex. Dude, the fix was to LIMIT the the > number of elements. This is not rocket science. I believe Michal and I are having the conversation in a larger context. What you found is valid on its own merit and got addressed, wh

Re: Re[2]: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Steven M. Christey
On Tue, 21 Jul 2009, Michal Zalewski wrote: > The code created an oversized list, which does not seem to be that far > from creating an overly nested DOM tree, or drawing an oversized CANVAS > shape, or any other creating-too-many-things-for-the-renderer-to-handle > attacks... but really, I'm not

Re[4]: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Steven, SMC> we will quickly run SMC> into lots of complexity that may well enter the realm of undecidable SMC> problems, Yeah, security is too complex. Dude, the fix was to LIMIT the the number of elements. This is not rocket science. -- http://blog.zoller.lu Thierry Zoller

Re: Re[2]: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Michal Zalewski
> Yes,  we  all  know  that.  The  flaw here was not looping on itself a > thousands  of  times,  wow.  It was a DOM implementation flaw. The code created an oversized list, which does not seem to be that far from creating an overly nested DOM tree, or drawing an oversized CANVAS shape, or any oth

Re[2]: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Thierry Zoller
Hi Michal, Yes, we all know that. The flaw here was not looping on itself a thousands of times, wow. It was a DOM implementation flaw. That's what made it interesting. A border case that was not accounted for. That's all, still interesting. I don't see how Javascripts endless loops

Re: [Full-disclosure] Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari, Opera, Chrome, Seamonkey, iPhone, iPod, Wii, PS3....

2009-07-21 Thread Michal Zalewski
> + The bug was present in a 9 year old version of Netscape - draw your own > conclusions. There are literally thousands of HTML- and JavaScript-related denial of service vectors in modern browsers. If you want a silly, ad hoc example I just made up on the spot (and so could any reader of the list

Re: Re: [Full-disclosure] [ISecAuditors Security Advisories] Gmail vulnerable to automated password cracking

2009-07-21 Thread admin
I understand what you're saying, but you're not so good at explaining things like this in a clear manner. What I understand from reading your studies, is that gmail implements one of two (or possibly both) systems where authentication is forcefully denied (to either the IP or the account): i. I

mChek 3.4 Information Disclosure

2009-07-21 Thread gursev . kalra
Advisory Title: mChek 3.4 Information Disclosure Advisory ID: FSSA-2009-0401 Author: Gursev Kalra (gursev.ka...@foundstone.com) Vendor Contact Date: 4/21/2009 (Vendor notified by email) Release Date: 07/21/2009 Platform: Symbian OS 9.1, Series 60 v3.0. Other mobile platforms might behave in same w

[INFIGO-2009-07-09]: NASA Common Data Format remote buffer overflow(s)

2009-07-21 Thread infocus
=== 'Celebrating 40 years of Apollo and 20 years of buffer overflows' === INFIGO IS Security Advisory #ADV-2009-07-09 http://www.infigo.hr/en/

Re: DoS vulnerabilities in Firefox, Internet Explorer, Opera and Chrome

2009-07-21 Thread MustLive
Hello Jeremiah! It's possible that Microsoft made IE8 more stable then IE6, so you have such result with this exploit. Also take into account the hardware of your computer. If your computer is powerful enough, then this attack on IE8 and even on IE6 and IE7 can be not so effective (because it's

RE: DoS vulnerabilities in Firefox, Internet Explorer, Opera and Chrome

2009-07-21 Thread Jeremiah Gowdy
I've tested this DoS on Internet Explorer 8, does not significantly impact my system. -Original Message- From: MustLive [mailto:mustl...@websecurity.com.ua] Sent: Sunday, July 19, 2009 10:33 AM To: bugtraq@securityfocus.com Subject: DoS vulnerabilities in Firefox, Internet Explorer, Oper

Update: [GSEC-TZO-44-2009] One bug to rule them all - Firefox, IE, Safari,Opera, Chrome,Seamonkey,iPhone,iPod,Wii,PS3....

2009-07-21 Thread Thierry Zoller
One bug to rule them all IE5,IE6,IE7,IE8,Netscape,Firefox,Safari,Opera,Konqueror, Seamonkey,Wii,PS3,iPhone,iPod,Nokia,Siemens and more. __