[Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Roberto Suggi Liverani
(, ) (, . `.' ) ('.', ). , ('. ( ) ( (_,) .`), ) _ _, / _/ / _ \ _ \ \==/ /_\ \ _/ ___\/ _ \ / \ / \/ |\\ \__( _ ) Y Y \ /__ /\___|__ / \___ /|__|_| / \/ \/.-.\/ \/:wq

Re: [Full-disclosure] The GNU C library dynamic linker expands $ORIGIN in setuid library search path

2010-10-20 Thread Louis Granboulan
Am I the only one that thinks that the problem is in the way that Linux defines the semantics of /proc/nnn/fd/n ? I only think of three sensible ways of doing it. One could follow exactly what is in the man page, and /proc/nnn/fd/n are symbolic links to actual files. Then, if the file is deleted

Re: [Full-disclosure] The GNU C library dynamic linker expands $ORIGIN in setuid library search path

2010-10-20 Thread Tavis Ormandy
Louis Granboulan louis.granboulan.secur...@gmail.com wrote: However, it is quite clear to me that the current behaviour is inconsistent and is the reason of this security flaw. We see $ ls -l /proc/self/fd/3 pretend that it is a symbolic link to a file that does not exist, and $ ls -lL

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Michal Zalewski
Security-Assessment.com follows responsible disclosure and promptly contacted Oracle after discovering the issue. Oracle was contacted on August 1, 2010. My understanding is that Stefano Di Paola of Minded Security reported this back in April; and further, the feature was a part of reasonably

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Michal Zalewski
Eh, you can see where it came from though. Design bugs like this are absolutely miserable to fix (see how we'll never get rebinding out of the browser) and letting identical IP's script against eachother lets an awful lot of legitimate traffic through while blocking almost all attacks.

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Dan Kaminsky
Sent from my iPhone On Oct 20, 2010, at 8:58 AM, Michal Zalewski lcam...@coredump.cx wrote: Security-Assessment.com follows responsible disclosure and promptly contacted Oracle after discovering the issue. Oracle was contacted on August 1, 2010. My understanding is that Stefano Di Paola

[Full-disclosure] [CORE-2010-0819] LibSMI smiGetNode Buffer Overflow When Long OID Is Given In Numerical Form

2010-10-20 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://corelabs.coresecurity.com/ LibSMI smiGetNode Buffer Overflow When Long OID Is Given In Numerical Form 1. *Advisory Information* Title: LibSMI

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Chris Evans
On Wed, Oct 20, 2010 at 8:58 AM, Michal Zalewski lcam...@coredump.cxwrote: Security-Assessment.com follows responsible disclosure and promptly contacted Oracle after discovering the issue. Oracle was contacted on August 1, 2010. My understanding is that Stefano Di Paola of Minded

[Full-disclosure] [USN-1007-1] NSS vulnerabilities

2010-10-20 Thread Jamie Strandboge
=== Ubuntu Security Notice USN-1007-1 October 20, 2010 nss vulnerabilities CVE-2010-3170, CVE-2010-3173 === A security issue affects the following Ubuntu releases: Ubuntu

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Chris Evans
On Wed, Oct 20, 2010 at 2:29 PM, Billy Rios billy.r...@gmail.com wrote: In the patch for CVE-2008-5343 (GIFAR) Sun tightened their file parsing rules for remote JAR files, making it harder to smuggle JAR files onto the end of other filetypes. This makes it more difficult to create a GIF+JAR

[Full-disclosure] [USN-998-1] Thunderbird vulnerabilities

2010-10-20 Thread Jamie Strandboge
=== Ubuntu Security Notice USN-998-1 October 20, 2010 thunderbird vulnerabilities CVE-2010-3175, CVE-2010-3176, CVE-2010-3178, CVE-2010-3179, CVE-2010-3180, CVE-2010-3182, CVE-2010-3183

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Roberto Suggi Liverani
Hi Michael, Let me share some background on this advisory... I came to this result when I was looking into a way of exploiting the Apache Web Server Compatibility with older browser feature. A separate paper has been published here:

[Full-disclosure] [ MDVSA-2010:207 ] glibc

2010-10-20 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2010:207 http://www.mandriva.com/security/

Re: [Full-disclosure] Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Roberto Suggi Liverani
Hi Chris, Billy and Michal, The Host: headers and the ability to perform non-standard HTTP request is a separate issue from what I reported to Oracle on SOP bypass. I have only done some research on a XSRF attack involving use of a Java Applet with two multiple Host: headers matching the same