Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Vladimir '3APA3A' Dubrovin
Adrian, If you can execute javascript - what is a reason to wait for user to click the link? The message I reply stated there is no need to force user to visit Web page and clicking the obfuscated link _sent_ to admin is enougth. I replied in this case only GET request is possible

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Adrian P
you would be surprised how many people out there (mistakenly) still think that only GET requests are CSRFable! 2009/6/16 Jeremi Gosney : > Vladimir: "Where there is an open mind, there will always be a frontier." - > Charles Kettering > > name='DoS'> >   > > Google > > > > -Original Messag

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Jeremi Gosney
Vladimir: "Where there is an open mind, there will always be a frontier." - Charles Kettering Google -Original Message- From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Vladimir Dubrovin Sent: Tuesday, June 16, 200

[Full-disclosure] [SECURITY] [DSA 1816-1] New apache2 packages fix privilege escalation

2009-06-16 Thread Stefan Fritsch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1816-1 secur...@debian.org http://www.debian.org/security/ Stefan Fritsch June 16, 2009

Re: [Full-disclosure] Things to do before vulnerability disclosure

2009-06-16 Thread epixoip
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ... really? so everyone who believes in full disclosure is a blackhat now? by your definition, even those who follow RFPolicy are blackhats as well. your "ethics" are severely flawed, and are malaligned with the philosophies that many security professi

[Full-disclosure] [DSF-02-2009] - Zoki Catalog SQL Injection

2009-06-16 Thread SmOk3
Ref. [DSF-02-2009] - Zoki Catalog SQL Injection Vendor: Zoki Soft (www.zokisoft.com) Status: Patched by vendor Original advisory: http://www.davidsopas.com/2009/06/15/zoki-catalog-sql-injection/ Zoki Catalog Smart Catalog is unique and convenient software. It is designed for many purposes whether

[Full-disclosure] ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability

2009-06-16 Thread ZDI Disclosures
ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-043 June 16, 2009 -- CVE ID: CVE-2009-1719 -- Affected Vendors: Apple -- Affected Products: Apple Java -- TippingPoint(TM) IPS Customer Protection: Tipping

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Vladimir Dubrovin
Dear sr., clicking on the link can not produce POST request, only GET, unless there are some special conditions, like crossite scripting vulnerability in the router. --16.06.2009 19:16, you wrote [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability to full-disclos

Re: [Full-disclosure] WinAppDbg version 1.2 is out!

2009-06-16 Thread Mario Alejandro Vilas Jerez
Basically it's got some different features than PyDbg and a more complete documentation. If you have an *existing* project built upon PyDbg it's probably not worth switching (unless you've hit some very bad problem with it) but I believe it's better for newer projects, as this new library is more f

Re: [Full-disclosure] WinAppDbg version 1.2 is out!

2009-06-16 Thread Jared DeMott
Mario Alejandro Vilas Jerez wrote: > What is WinAppDbg? > == > > The WinAppDbg python module allows developers to quickly code instrumentation > scripts in Python under a Windows environment. Can you compare/contrast with pydbg so I can understand why I might want to give it a try

[Full-disclosure] WinAppDbg version 1.2 is out!

2009-06-16 Thread Mario Alejandro Vilas Jerez
What is WinAppDbg? == The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment. It uses ctypes to wrap many Win32 API calls related to debugging, and provides an object-oriented abstraction layer to manipulate thre

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Jeremi Gosney
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 and as previously stated, if you have 'remote management' enabled then you are truly vulnerable to outside threats. csrf works as well. but an attack carried out on the LAN would still be considered a remote attack; although, you'd likely be within

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread sr.
it could still be carried out remotely by obfuscating a link sent to the "admin" of the device. this would obviously rely on the admin clicking on the link, and is more of a phishing / social engineering style attack. this would also rely on the router being setup with all of the default internal L

[Full-disclosure] [ MDVSA-2009:133 ] irssi

2009-06-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:133 http://www.mandriva.com/security/

[Full-disclosure] Official release of "Keykeriki" open source wireless keyboard sniffer

2009-06-16 Thread Max Moser
Hi everyone, i just like to announce officially the release of our wireless keyboard sniffer Keykeriki. An addition to the official press release; Website: http://www.remote-exploit.org/Keykeriki.html Video with some demonstration available on website as well Contact: hardh...@remote-exploit.org

[Full-disclosure] CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability

2009-06-16 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability CA Advisory Reference: CA20090615-02 CA Advisory Date: 2009-06-15 Impact: A remote attacker can inject arbitrary web script or HTML. Summary: The release of Tomcat

[Full-disclosure] CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities

2009-06-16 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities CA Advisory Reference: CA20090615-01 CA Advisory Date: 2009-06-15 Reported By: iViZ Security Research Team Impact: A remote attacker can cause a denial o

[Full-disclosure] CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities

2009-06-16 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities CA Advisory Reference: CA20090615-01 CA Advisory Date: 2009-06-15 Reported By: iViZ Security Research Team Impact: A remote attacker can cause a denial o

[Full-disclosure] [IVIZ-09-004] CA ARCserve Denial of Service

2009-06-16 Thread iViZ Security Advisories
--- [ iViZ Security Advisory 09-004                            16/06/2009 ] --- iViZ Techno Solutions Pvt. Ltd.                                            http://w

[Full-disclosure] [IVIZ-09-003] CA ARCserve Denial of Service

2009-06-16 Thread iViZ Security Advisories
--- -- [ iViZ Security Advisory 09-00316/06/2009 ] --- -- iViZ Techno Solutions Pvt. Ltd.

[Full-disclosure] [TZO-40-2009] Clamav generic bypass (RAR, CAB, ZIP)

2009-06-16 Thread Thierry Zoller
From the low-hanging-fruit-department Clamav generic evasion (RAR,CAB,ZIP) Shameless plug :

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Vladimir '3APA3A' Dubrovin
Dear Tom Neaves, It still can be exploited from Internet even if "remote management" is only accessible from local network. If you can trick user to visit Web page, you can place a form on this page which targets to router and request to router is issued from victim's browser. --Tuesday

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Hanno Böck
Am Montag 15 Juni 2009 schrieb Tom Neaves: > Within the "/cgi-bin/" directory of the administrative web interface exists > a > file called "firmwarecfg". This file is used for firmware upgrades. A > HTTP POST > request for this file causes the web server to hang. The web server will > stop > res

[Full-disclosure] [TZO-33-2009] Fprot generic bypass (TAR)

2009-06-16 Thread Thierry Zoller
From the low-hanging-fruit-department F-prot generic TAR bypass / evasion Shameless plug : ---

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Alaa El yazghi
I know and I understand. What I wanted to mean is that we can not eventually acces to the web interface of a netgear router remotely if we cannot localy. As for the DoS, it is simple to solve such attack from outside. We just disable receiving pings (There is actually an option in even the lowest

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Alaa El yazghi
How can it be carried out remotely if it bugs localy? 2009/6/15 Tom Neaves > Product Name: Netgear DG632 Router > Vendor: http://www.netgear.com > Date: 15 June, 2009 > Author: t...@tomneaves.co.uk > Original URL: http://www.tomneaves.co.uk/Netgear_DG632_Remote_DoS.txt > Discovered: 18 November