[Full-disclosure] [USN-978-2] Thunderbird regression

2010-09-16 Thread Jamie Strandboge
=== Ubuntu Security Notice USN-978-2 September 16, 2010 thunderbird regression https://launchpad.net/bugs/640839 === A security issue affects the following Ubuntu releases: Ubun

[Full-disclosure] [ MDVSA-2010:184 ] samba

2010-09-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2010:184 http://www.mandriva.com/security/ _

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-16 Thread T Biehn
Shit man, I was keeping notes for my class in pedantry, can't you two keep it going for a few more days? -Travis On Wed, Sep 15, 2010 at 7:19 PM, Stefan Kanthak wrote: > Christian Sciberras wrote: > > >> Yes. Once again: get your homework done! > >> > >>> http://www.codeproject.com/KB/DLL/dynami

[Full-disclosure] Workaround for Ac1db1tch3z exploit.

2010-09-16 Thread Terje Malmedal
If you do not actually need to run any 32bits binaries on x86_64 you can do: echo ':32bits:M:0:\x7fELF\x01::/bin/echo:' > /proc/sys/fs/binfmt_misc/register This will make the kernel run /bin/echo filename instead of executing the file whenever it sees a 32bit ELF binary. Of course if you actua

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-16 Thread Stefan Kanthak
Christian Sciberras wrote: >> Yes. Once again: get your homework done! >> >>> http://www.codeproject.com/KB/DLL/dynamicdllloading.aspx >> >> That's a double DYNAMIC there! > > Did you even bother to read the article? The very first paragraph > states the difference between the two. > > Oh, and f

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-16 Thread Stefan Kanthak
Christian Sciberras wrote: >> No. Guess where the D in DLL comes from! >> Static linking occurs when the linker builds a binary (this might be a >> DLL.-) using *.OBJ and *.LIB. >> Dynamic linking occurs when the loader loads a binary (again: this might >> be a DLL) into memory and resolves its de

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-16 Thread Stefan Kanthak
Christian Sciberras wrote: >> and failed to use it right! > > Well, I suppose I could have used neat tricks such as specifically and > directly loading the "bad" dll. > But as much as security goes, those are cheap tricks. Wrong again! You dont need tricks, you need to understand Windows' DLL se

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-09-16 Thread Stefan Kanthak
Dan Kaminsky wrote: > On Tue, Sep 14, 2010 at 6:07 PM, Stefan Kanthak > wrote: >> Dan Kaminsky wrote: >>> Short version: Go see how many DLLs exist outside of c:\windows\system32. >>> Look, ye mighty, and despair when you realize all those apps would be broken >>> by CWD DLL blocking. >> >> No,