[Full-disclosure] CyberLink products vulnerable to DLLHijacking

2010-08-25 Thread exploit dev
Hi Trying to play with the HD Moore tool on a default HP notebook installation, I have found that the CyberLink products seems vulnerable to this kind of threat. I have check and test the proof of concept generated by dllhijacking and works. The products are: - CyberLink PowerDirector v7 - Cyber

[Full-disclosure] Details of cisco-sa-20081022-asa security advisory?

2010-08-25 Thread Fernando Gont
Hi, I'm curious if anybody is aware of the details of the IPv6 DoS vulnerabilities listed in the aforementioned advisory (available at: http://www.cisco.com/warp/public/707/cisco-sa-20081022-asa.shtml). Thanks! Kind regards, Fernando ___ Full-Disclosu

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread paul . szabo
Dear Dan, > A Debian patch introducing a security vulnerability? Wow, I bet > that's never happened before... No need for patches. Debian is insecure by policy: http://bugs.debian.org/299007 http://bugs.debian.org/538392 Cheers, Paul Paul Szabo p...@maths.usyd.edu.au http://www.maths.usyd.

[Full-disclosure] Multiple vulnerabilities in eSitesBuilder

2010-08-25 Thread MustLive
Hello Full-Disclosure! I want to warn you about multiple vulnerabilities in eSitesBuilder. After previous vulnerabilities in eSitesBuilder (SecurityVulns ID:10940), which I wrote earlier in June, there are Insufficient Anti-automation, Cross-Site Scripting, SQL Injection and Full path disclosure v

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread Pavel Kankovsky
On Wed, 25 Aug 2010, Tim Brown wrote: > the key point is that an empty directory specification statement in > LD_LIBRARY_PATH, PATH (and probably others) is equivalent to $CWD. And there is also the infamous DT_RPATH (and DT_RUNPATH) that makes it possible to hardwire unsafe paths into executable

Re: [Full-disclosure] phpMyAdmin 3.3.5 / 2.11.10 <= Cross Site Scripting (XSS) Vulnerability

2010-08-25 Thread YGN Ethical Hacker Group
> Which I presume means it affects the system only with a registered (and a > logged in) account. Yes. Affecting only currently logged-in users. If you're sure that you could never be fooled by someone through any means, you're safe not to patch this upgrade. _

Re: [Full-disclosure] phpMyAdmin 3.3.5 / 2.11.10 <= Cross Site Scripting (XSS) Vulnerability

2010-08-25 Thread Christian Sciberras
After looking into several sources, I've found the following: 6. IMPACT Attackers can compromise currently logged-in user session and inject arbitrary SQL statements (CREATE,INSERT,UPDATE,DELETE) via crafted XSS payloads. Which I presume means it affects the system only with a registered (and a

[Full-disclosure] Joomla! Component com_bcaccount Persistent Cross Script Scripting (XSS) Vulnerability

2010-08-25 Thread YGN Ethical Hacker Group
=== Joomla! Component com_bcaccount Persistent Cross Script Scripting (XSS) Vulnerability === 1. OVERVIEW The Joomla! Component

[Full-disclosure] Method to encode DLL payloads for hijacking purposes.

2010-08-25 Thread matt
Hey.. Yesterday I wrote a post describing how to exploit these vulnerabilities using the "webdav_dll_hijacker" Metasploit module, but it requires you to jump through some hoops in order to get your victim to browse to the rogue share. So, here's a new article that doesn't use the "webdav_dll_hija

[Full-disclosure] BlastChat Chat Client Component version 3.3 <= Cross Script Scripting (XSS) Vulnerability

2010-08-25 Thread YGN Ethical Hacker Group
== BlastChat Chat Client Component version 3.3 <= Cross Script Scripting (XSS) Vulnerability == 1. OVERVIEW The BlastCh

[Full-disclosure] Joomla! Component com_bc Cross Script Scripting (XSS) Vulnerability

2010-08-25 Thread YGN Ethical Hacker Group
= Joomla! Component com_bc Cross Script Scripting (XSS) Vulnerability = 1. OVERVIEW The Joomla! Component com_bc was vulnerable to Cross Script Scripting (XSS)

Re: [Full-disclosure] phpMyAdmin 3.3.5 / 2.11.10 <= Cross Site Scripting (XSS) Vulnerability

2010-08-25 Thread YGN Ethical Hacker Group
Did you read the advisory that contains vendor advisory link - http://www.phpmyadmin.net/home_page/security/PMASA-2010-5.php ? On Sat, Aug 21, 2010 at 12:46 AM, Christian Sciberras wrote: > Since I didn't see this mentioned even on their website, (phpmyadmin.net), I > would like to ask, are th

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread bk
On Aug 25, 2010, at 10:55 AM, Dan Rosenberg wrote: > ...And it looks like I jumped the gun on blaming upstream. The > vulnerability was introduced by Debian patch > "mozjs1.9_ldlibpath.patch" on 3/24/2009. > > -Dan A Debian patch introducing a security vulnerability? Wow, I bet that's never

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread Dan Rosenberg
...And it looks like I jumped the gun on blaming upstream. The vulnerability was introduced by Debian patch "mozjs1.9_ldlibpath.patch" on 3/24/2009. -Dan On Wed, Aug 25, 2010 at 1:23 PM, Dan Rosenberg wrote: > Apache CouchDB (tested on Ubuntu 10.04) is vulnerable to exactly this > issue.  The s

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread Dan Rosenberg
Apache CouchDB (tested on Ubuntu 10.04) is vulnerable to exactly this issue. The script installed on my machine at /usr/bin/couchdb first sets LD_LIBRARY_PATH with: LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/xulrunner-`xulrunner-1.9.2 --gre-version`/ At the time of invocation, the following envir

[Full-disclosure] ZDI-10-165: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Vulnerability

2010-08-25 Thread ZDI Disclosures
ZDI-10-165: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-10-165 August 25, 2010 -- CVSS: 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C) -- Affected Vendors: Trend Micro -- Affected Products: Trend Micro Internet

Re: [Full-disclosure] Reliable reports on attacks on medical software and IT-systems available?

2010-08-25 Thread Shawn Merdinger
Hi Halfdog, While I have not come across any specific documentation of willful attacks, security (and software quality) issues abound in the medical device space. You might try researching some of the databases at the FDA [1]. In particular, a good place to start is the FDA MAUDE database (Manuf

[Full-disclosure] [USN-977-1] MoinMoin vulnerabilities

2010-08-25 Thread Marc Deslauriers
=== Ubuntu Security Notice USN-977-1August 25, 2010 moin vulnerabilities CVE-2010-2487, CVE-2010-2969, CVE-2010-2970 === A security issue affects the following Ubuntu release

[Full-disclosure] [USN-976-1] Tomcat vulnerability

2010-08-25 Thread Marc Deslauriers
=== Ubuntu Security Notice USN-976-1August 25, 2010 tomcat6 vulnerability CVE-2010-2227 === A security issue affects the following Ubuntu releases: Ubuntu 9.04 Ubuntu 9.10 U

[Full-disclosure] Cisco Security Advisory: Cisco Unified Presence Denial of Service Vulnerabilities

2010-08-25 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco Unified Presence Denial of Service Vulnerabilities Advisory ID: cisco-sa-20100825-cup Revision 1.0 For Public Release 2010 August 25 1600 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Cisco Unified Communications Manager Denial of Service Vulnerabilities

2010-08-25 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco Unified Communications Manager Denial of Service Vulnerabilities Advisory ID: cisco-sa-20100825-cucm Revision 1.0 For Public Release 2010 August 25 1600 UTC (GMT

[Full-disclosure] Secunia Research: KDE Okular PDB Parsing RLE Decompression Buffer Overflow

2010-08-25 Thread Secunia Research
pening a specially crafted PDB file. == 5) Solution Apply patches. See the vendor's advisory for additional details. http://www.kde.org/info/security/advisory-20100825-1.txt == 6) Time Tab

Re: [Full-disclosure] WinAppDbg 1.4 is out!

2010-08-25 Thread Mario Vilas
Basically it supports 64 bits Windows, has a few more features, and comes with a crash analyzer. PyDbg on the other hand supports Mac OS and is integrated to PaiMei. So both frameworks have their own advantages. Also the programming API for PyDbg is much simpler (but still powerful), but WinAppDbg

[Full-disclosure] Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2880

2010-08-25 Thread Rodrigo Branco
Dear List, I'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Memory corruption when Adobe Shockwave Player parses .dir media fi

[Full-disclosure] Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2881

2010-08-25 Thread Rodrigo Branco
I'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Memory corruption when Adobe Shockwave Player parses .dir media file CVE-2010-2

[Full-disclosure] Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2864

2010-08-25 Thread Rodrigo Branco
I'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Memory corruption when Adobe Shockwave Player parses .dir media file CVE-2010-2

[Full-disclosure] Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2868

2010-08-25 Thread Rodrigo Branco
I'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Memory corruption when Adobe Shockwave Player parses .dir media file CVE-2010-

[Full-disclosure] Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2869

2010-08-25 Thread Rodrigo Branco
I'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Memory corruption when Adobe Shockwave Player parses .dir media file CVE-2010-

[Full-disclosure] Adobe Shockwave Player Memory Corruption Vulnerability - CVE-2010-2882

2010-08-25 Thread Rodrigo Branco
I'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Memory corruption when Adobe Shockwave Player parses .dir media file CVE-2010-

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread Tim Brown
On Wednesday 25 August 2010 10:38:37 Mihai Donțu wrote: > man sudo(8): > "Note that the dynamic linker on most operating systems will remove > variables that can control dynamic linking from the environment of setuid > executables, including sudo. Depending on the operating system this may > inclu

Re: [Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread Mihai Donțu
On Wednesday 25 August 2010 02:26:22 Tim Brown wrote: > All, > > If you've seen the recent Microsoft advisory. I put together a nice post > on a similar DLL hijacking issue that affects Linux (and other > POSIX-alikes). You can read the full details on my blog (http://www.nth- > dimension.org.uk

[Full-disclosure] DLL hijacking on Linux

2010-08-25 Thread Tim Brown
All, If you've seen the recent Microsoft advisory. I put together a nice post on a similar DLL hijacking issue that affects Linux (and other POSIX-alikes). You can read the full details on my blog (http://www.nth- dimension.org.uk/blog.php?id=87) but the key point is that an empty directory s

[Full-disclosure] [SECURITY] [DSA 2096-1] New zope-ldapuserfolder packages fix authentication bypass

2010-08-25 Thread Sebastien Delafond
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-2096-1 secur...@debian.org http://www.debian.org/security/ Moritz Muehlenhoff August 24, 2010

Re: [Full-disclosure] WinAppDbg 1.4 is out!

2010-08-25 Thread Aleksandr Yampolskiy
How is it different from pydbg? Sent from my Blackberry handheld. - Original Message - From: Mario Vilas To: bugt...@securityfocus.com ; full-disclosure@lists.grok.org.uk ; Python-Win32 List Sent: Tue Aug 24 09:00:59 2010 Subject: WinAppDbg 1.4 is out! What is WinAppDbg? =