RE: Skype Network Remote DoS Exploit

2007-08-20 Thread Marc Maiffret
Apologies if someone already posted the obvious question but: How come this Patch Tuesday was different for Skype? Why didn't the last Patch Tuesday, which had the same rebooting requirements as any other Patch Tuesday, cause the same problem with Skype? What was different about this Patch Tuesd

ANI Zeroday, Third Party Patch

2007-03-30 Thread Marc Maiffret
[EMAIL PROTECTED] Signed, Marc Maiffret Co-Founder/CTO Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9329 http://eEye.com/Blink - End-Point Vulnerability Prevention http://eEye.com/Retina - Network Security Scanner http://eEye.com/Iris - Network Traffic Analyzer http

EEYE: Internet Explorer Compressed Content URL Heap Overflow Vulnerability

2006-08-24 Thread Marc Maiffret
Internet Explorer Compressed Content URL Heap Overflow Vulnerability Release Date: August 24, 2006 Date Reported: August 17, 2006 Severity: High (Code Execution) Systems Affected: Internet Explorer 6 SP1 with MS06-042 - Windows 2000 Internet Explorer 6 SP1 with MS06-042 - Windows XP SP1 Overvi

EEYE:ALERT: MS06-042 Related Internet Explorer 'Crash' is Exploitable

2006-08-22 Thread Marc Maiffret
MS06-042 Related Internet Explorer 'Crash' is Exploitable Date: August 22, 2006 Severity: High Systems Affected: Windows 2000 with IE6 SP1 and MS06-042 hotfix installed Windows XP SP1 with IE6 SP1 and MS06-042 hotfix installed Overview: On August 8th Microsoft released MS06-042 which was a cumu

RE: Mailslot bug (MS06-035) vs non-Mailslot bug (CVE-2006-3942)

2006-08-18 Thread Marc Maiffret
earch.eeye.com, it is in the current blog post, courtesy of Derek Soeder. It is obviously experimental and we recommend checking it out from a research perspective rather than it being something like our previous third party patch which was fine to install wherever. Signed, Marc Maiffret Chief Hackin

EEYE: research.eeye.com

2006-08-02 Thread Marc Maiffret
stly while speaking of blogging I am sure there will be some interesting things to "blog about" at this years Blackhat in Vegas. We hope to see all of you out there, and for those that can not make it, see you next Tuesday! Signed, Marc Maiffret Founder/CTO Chief Hacking Officer eEye Digital Sec

EEYE: Temporary workaround for IE createTextRange vulnerability

2006-03-28 Thread Marc Maiffret
workaround please visit: http://www.eeye.com/html/research/alerts/AL20060324.html Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9329 http://eEye.com/Blink - End-Point Vulnerability Prevention http://eEye.com/Retina - Network Security Scanner http://eEye.com

RE: [Full-disclosure] [EEYEB-20050523] Windows Kernel APC Data-FreeLocal Privilege Escalation Vulnerability

2005-12-14 Thread Marc Maiffret
To be clear we did not make any claim except that Retina has been updated to be able to identify this vulnerability. Obviously being that it is a local vulnerability we audit for the vulnerability using credentials through normal means that you should find in most any vulnerability assessment scann

RE: DCOM RPC exploit (dcom.c)

2003-07-29 Thread Marc Maiffret
Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Network Security Scanner http://eEye.com/Iris - Network Traffic Analyzer http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities | -Original Message- | From

EEYE:ALERT Free RPC/DCOM vulnerability scanning tool

2003-07-26 Thread Marc Maiffret
You can get the tool at: http://www.eeye.com P.S. Users of Retina (Network Security Scanner) have already had this check within the latest Retina updates. Signed, Marc Maiffret Co-Founder/Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Ne

RE: Alert: MS03-019, Microsoft... wrong, again.

2003-05-30 Thread Marc Maiffret
and why. Not sure how you can have "Trust"worthy Computing when your misinforming customers on a regular basis or releasing patches that disable their Internet access. :-o For those technically inclined... supposedly MS thinks controlling ecx and eax on a mov [ecx],eax is not exploitable

EEYE: XDR Integer Overflow

2003-03-19 Thread Marc Maiffret
XDR Integer Overflow Release Date: March 19, 2003 Severity: High (Remote Code Execution/Denial of Service) Systems Affected: Sun Microsystems Network Services Library (libnsl) BSD-derived libraries with XDR/RPC routines (libc) GNU C library with sunrpc (glibc) Description: XDR is a standard f

RE: SQL Sapphire Worm Analysis

2003-01-25 Thread Marc Maiffret
/Research/Flash/AL20030125.html Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Network Security Scanner http://eEye.com/Iris - Network Traffic Analyzer http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities

SQL Sapphire Worm Analysis

2003-01-25 Thread Marc Maiffret
SQL Sapphire Worm Analysis Release Date: 1/25/03 Severity: High Systems Affected: Microsoft SQL Server 2000 pre SP 2 Description: Late Friday, January 24, 2003 we became aware of a new SQL worm spreading quickly across various networks around the world. The worm is spreading using a buffer ove

Macromedia Shockwave Flash Malformed Header Overflow #2

2002-12-17 Thread Marc Maiffret
Macromedia Shockwave Flash Malformed Header Overflow #2 Release Date: December 16, 2002 Severity: High (Remote Code Execution) Systems Affected: Macromedia Flash Player versions less than 6.0.65.0 Description: While working on some pre-release Retina® CHAM tools, multiple exploitable conditions

PNG (Portable Network Graphics) Deflate Heap Corruption Vulnerability

2002-12-12 Thread Marc Maiffret
PNG (Portable Network Graphics) Deflate Heap Corruption Vulnerability Release Date: December 11, 2002 Severity: High (Code Execution) Systems Affected: We have specifically tested the following software and verified the potential for exploitation: Microsoft Internet Explorer 5.01 Microsoft Inter

EEYE: Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities

2002-11-12 Thread Marc Maiffret
Macromedia ColdFusion/JRun Remote SYSTEM Buffer Overflow Vulnerabilities Release Date: November 12, 2002 Severity: High (Remote SYSTEM level code execution) Systems Affected: Macromedia Coldfusion 6.0 and prior (IIS ISAPI) Macromedia JRun 4.0 and prior (IIS ISAPI) Description: Macromedia JRun a

RE: White paper: Exploiting the Win32 API.

2002-08-10 Thread Marc Maiffret
. :-o Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Network Security Scanner http://eEye.com/Iris - Network Traffic Analyzer http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities -Original Message-

EEYE: Sun(TM) ONE / iPlanet Web Server 4.1 and 6.0 Remote Buffer Overflow

2002-08-09 Thread Marc Maiffret
Sun(TM) ONE / iPlanet Web Server 4.1 and 6.0 Remote Buffer Overflow Release Date: August 8, 2002 Severity: High (Remote SYSTEM/ROOT) Systems Affected: iPlanet 6.0 and prior Description: A vulnerability in transfer chunking can be exploited to remotely execute code of an attacker's choice on a

EEYE: Macromedia Shockwave Flash Malformed Header Overflow

2002-08-09 Thread Marc Maiffret
Macromedia Shockwave Flash Malformed Header Overflow Release Date: August 8, 2002 Severity: High (Remote Code Execution) Systems Affected: Macromedia Shockwave Flash - All Versions; Unix and Windows; Netscape and Internet Explorer Description: While working on some pre-release eEye Retina CHAM

EEYE: Remote PGP Outlook Encryption Plug-in Vulnerability

2002-07-10 Thread Marc Maiffret
-in, to protect systems from this flaw. You may download the patch from: http://www.nai.com/naicommon/download/upgrade/patches/patch-pgphotfix.asp Note: This issue does not affect PGP Corporate Desktop users. Discover: Marc Maiffret Exploitation: Riley Hassell Greetings: Kasia, and the hot photog

Macromedia Flash Activex Buffer overflow

2002-05-02 Thread Marc Maiffret
Macromedia Flash Activex Buffer overflow Release Date: 05/02/2002 Severity: High (Remote code execution) Systems Affected: Flash Activex Ocx Version 6, revision 23 (Possibly older versions) Forward: This is an unusual advisory in a number of ways. One, it was found while investigating an acce

Windows 2000 and NT4 IIS .ASP Remote Buffer Overflow

2002-04-10 Thread Marc Maiffret
Windows 2000 and NT4 IIS .ASP Remote Buffer Overflow Release Date: 00/00/2002 Severity: High (Remote code execution) IWAM_MACHINE Privilege Level Systems Affected: Microsoft Windows NT 4.0 Internet Information Services 4.0 Microsoft Windows 2000 Internet Information Services 5.0 Description:

Tool released to scan for possible CodeRed infected servers

2001-07-20 Thread Marc Maiffret
rch/Tools/codered.html Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Network Security Scanner http://eEye.com/Iris - Network Traffic Analyzer http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities

CodeRed: the next generation

2001-07-20 Thread Marc Maiffret
The following is a description of a "variant" "Code Red" worm that we have found to be in the wild. Sorry for the rough content but we thought it would be best to get this information out sooner and worry about pretty text formating later ;-] -- In this text, we will be referi

RE: Full analysis of the .ida "Code Red" worm.

2001-07-19 Thread Marc Maiffret
e worm was designed to do that... to stop infecting and start attacking an IP address that use to point to whitehouse.gov. This whole worm process that we have been going through will basically start from scratch and run its course again when the 1st of next month comes around. Signed, Marc Maiffret Chi

RE: 'Code Red' does not seem to be scanning for IIS

2001-07-19 Thread Marc Maiffret
the worm just tries port 80 on ip's. doesnt care if its IIS or not. also as for the ip seed thing... we have heard reports there is a variant worm that is doing truly random IP addresses. We dont have any more info on that though. Signed, Marc Maiffret Chief Hacking Officer eEye Di

Update to "Code Red" Worm. Its a date bomb, not time.

2001-07-19 Thread Marc Maiffret
Thanks to Eric from Symantec for tossing us a note about the worm being Date based and not Time based. We made an error in our last analysis and said the worm would start attacking whitehouse.gov based on a certain time. In reality its based on a date (the 20th UTC) which is tomorrow. If the wor

Full analysis of the .ida "Code Red" worm.

2001-07-18 Thread Marc Maiffret
The following is a detailed analysis of the "Code Red" .ida worm that we reported on July 17th 2001. This analysis was performed by Ryan Permeh and Marc Maiffret of eEye Digital Security. The disassembly (complete with comments) was done by Ryan "Shellcode Ninja" Permeh

RE: IIS5 .idq exploit

2001-07-18 Thread Marc Maiffret
hsj's exploit... hsj's exploit is _not_ a worm. Just wanted to clear that up for the handful of people I have seen misreporting things. Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Network Security Scanner http:

Initial analysis of the .ida "Code Red" Worm

2001-07-17 Thread Marc Maiffret
The following information was researched by Ryan Permeh ([EMAIL PROTECTED] and Marc Maiffret ([EMAIL PROTECTED] of eEye Digital Security. We would like to specially thank Matthew Asham of Left Coast Systems Corp and Ken Eichman of Chemical Abstracts Service for providing us with logs and needed

RE: ISAPI and SECUREIIS

2001-06-28 Thread Marc Maiffret
believe to be a bug then I would suggest contacting us first so that we can give you the needed information (I.E. 3 or so new versions of SecureIIS have been released since 1.0.6) and if there is a valid problem then we can fix that problem. This however is not an issue. Thanks! Signed, Marc

All versions of Microsoft Internet Information Services, Remote buffer overflow (SYSTEM Level Access)

2001-06-18 Thread Marc Maiffret
All versions of Microsoft Internet Information Services, Remote buffer overflow (SYSTEM Level Access) Release Date: June 18, 2001 Severity: High (Remote SYSTEM level code execution) Systems Affected: Microsoft Windows NT 4.0 Internet Information Services 4.0 Microsoft Windows 2000 Internet Info

IDS's, host: headers, and .printer ISAPI overflow as an example

2001-06-10 Thread Marc Maiffret
acker changes any of the various exploit programs on the net to place the overflow buffer in http://%s/ instead of Host: %s then that exploit will basically sneak past certain IDS's that are only focusing on Host: data instead of doing proper host header checking. just a heads up Signed, Ma

RE: ASLabs-2001-01: Multiple Security Problems in eEye SecureIIS

2001-05-19 Thread Marc Maiffret
L PROTECTED] or myself so that we can work with you to fix the bugs ASAP. Thanks! Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538 http://eEye.com/Retina - Network Security Scanner http://eEye.com/Iris - Network Traffic Analyzer http://eEye.com/

iPlanet - Netscape Enterprise Web Publisher Buffer Overflow

2001-05-16 Thread Marc Maiffret
iPlanet – Netscape Enterprise Web Publisher Buffer Overflow Release Date: May 11, 2001 Severity: High (Remote SYSTEM level code execution) Systems Affected: Netscape Enterprise 4.1 and prior versions. Description: The Web Publisher feature in Netscape Enterprise 4.1 is vulnerable to a buffer o

Windows 2000 .printer remote overflow proof of concept exploit

2001-05-02 Thread Marc Maiffret
E and then typing in http://www.example.com/anything.printer which should then return an error like "Error in web printer install." However by default IE shows "friendly" HTTP error messages and is not going to show you the ISAPI error message. So either turn off friendly HTTP error messag

Windows 2000 IIS 5.0 Remote buffer overflow vulnerability (Remote SYSTEM Level Access)

2001-05-01 Thread Marc Maiffret
Windows 2000 IIS 5.0 Remote buffer overflow vulnerability (Remote SYSTEM Level Access) Release Date: May 01, 2001 Severity: High (Remote SYSTEM level code execution) Systems Affected: Microsoft Windows 2000 Internet Information Services 5.0 Microsoft Windows 2000 Internet Information Services 5

Solaris ipcs vulnerability

2001-04-13 Thread Marc Maiffret
Solaris ipcs vulnerability Release Date: April 11, 2001 Systems Affected: Solaris 7 (x86) Other versions of Solaris are most likely affected also. Discovered by: Riley Hassell [EMAIL PROTECTED] Description: We have discovered a buffer overflow in the /usr/bin/i86/ipcs utility provided with Sol

Re: Solaris Xsun buffer overflow vulnerability

2001-04-12 Thread Marc Maiffret
Actually that was an error in our advisory. The correct (yet correct us if we are wrong again ;-]) information is: Solaris 7 and Solaris 8 x86 Xsun is suid Solaris 7 and Solaris 8 Sparc Xsun is sgid Signed, Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349.9538

Re: Windows Sharing Allows Internet Tracking

2001-03-25 Thread Marc Maiffret
7;s because the cache doesn't get transferred. Well at least from what I have seen, I could be completely wrong. | Cheers, | Charles Chear [[EMAIL PROTECTED]] | http://presto.tpgn.net Marc Maiffret Chief Hacking Officer eEye Digital Security T.949.349.9062 F.949.349

Re: shell on IIS server with Unicode using *only* HTTP

2001-01-26 Thread Marc Maiffret
denied etc. added | | | Regards, | Roelof. | | -- | Roelof W Temmingh SensePost IT security | [EMAIL PROTECTED] +27 83 448 6996 | http://www.sensepost.com Signed, Marc Maiffret Chief Hacking Officer eCompan

Re: eEye Iris the Network traffic analyser DoS

2001-01-23 Thread Marc Maiffret
;evil" packet in order for Iris to crash. If you simply open iris and start sniffing and receive the "evil" packet, without clicking to view it, then Iris will not crash. Thanks much to grazer for contacting us prior to posting to Bugtraq so that we could work on a fix for this pr