Re: [Full-disclosure] Advisory: Dolphin Browser HD Cross-Application Scripting

2011-09-21 Thread adam
I'm hoping that #7 wasn't important. :( On Tue, Sep 20, 2011 at 11:52 AM, Roee Hay wrote: > 1 Background > > Android applications are executed in a sandbox environment, to ensure that > no > application can access sensitive information held by another, without > adequate > privilege

Re: [Full-disclosure] Possibility to exploit bash "*" processing

2011-09-21 Thread Valdis . Kletnieks
On Wed, 21 Sep 2011 11:36:32 PDT, Andrew Farmer said: > Not true - the multibyte sequences in UTF-8 text consist entirely of > high-bit characters (0xC2 - 0xF4 initial, 0x80 - 0xBF continuation). All > characters below 0x80, including ASCII control characters, are always > mapped directly to the c

Re: [Full-disclosure] Possibility to exploit bash "*" processing

2011-09-21 Thread Andrew Farmer
On 2011-09-21, at 09:55, valdis.kletni...@vt.edu wrote: > On Wed, 21 Sep 2011 16:01:24 +0300, Dan Carpenter said: >> Seems like a good time to promote David Wheeler's filename proposal: >> http://www.dwheeler.com/essays/fixing-unix-linux-filenames.html > > Unfortunately, David Wheeler's proposal h

Re: [Full-disclosure] NGS00099 Patch Notification: Vulnerable SUID script in (nomachine) NX Server for Linux

2011-09-21 Thread Tavis Ormandy
Research@NGSSecure wrote: > Vulnerable SUID script in (nomachine) NX Server for Linux 3.5.0-4 > (Advanced and Enterprise across redhat and debian hosts) > > 21 September 2011 > > NGS Secure has discovered a High risk vulnerability in (nomachine) NX > Server for Linux 3.5.0-4 (Advanced and Enter

[Full-disclosure] Authenex A-Key/ASAS Web Management Control 3.1.0.2 (latest) - Time-based SQL Injection

2011-09-21 Thread Jose Carlos de Arriba
FOREGROUND SECURITY, SECURITY ADVISORY 2011-002 - Original release date: September 21, 2011 - Discovered by: Jose Carlos de Arriba - Senior Security Analyst at Foreground Security - Contact: (jcarriba (at) foregroundsecurity (dot) com, d

Re: [Full-disclosure] OT: help generating gpg key with prescribed key ID

2011-09-21 Thread Valdis . Kletnieks
On Wed, 21 Sep 2011 16:21:24 +0300, Georgi Guninski said: > for a fishing expedition i need to generate a gpg key with prescribed key ID. > > is there a relatively easy way to do this? It's intentionally difficult. It *is* possible to generate a key to match a given key ID, or even match a give

Re: [Full-disclosure] Possibility to exploit bash "*" processing

2011-09-21 Thread Valdis . Kletnieks
On Wed, 21 Sep 2011 16:01:24 +0300, Dan Carpenter said: > Seems like a good time to promote David Wheeler's filename proposal: > http://www.dwheeler.com/essays/fixing-unix-linux-filenames.html Unfortunately, David Wheeler's proposal has some implementation issues: 1. Forbid/escape ASCII control c

Re: [Full-disclosure] Apple Lion OS Suffers From A Major Security Issue

2011-09-21 Thread Sabahattin Gucukoglu
On 21 Sep 2011, at 17:14, Thor (Hammer of God) wrote: > FYI Yep, he already told us. Don't run as admin, you're fine. And change the permissions of the dscl binary to 0100 root:wheel if you can't trust yourself not to run malicious code. It wants fixing, though. Cheers, Sabahattin _

[Full-disclosure] FW: Apple Lion OS Suffers From A Major Security Issue

2011-09-21 Thread Thor (Hammer of God)
FYI From: Raging Hagis Sent: Wednesday, September 21, 2011 7:21 AM To: Thor (Hammer of God) Subject: Apple Lion OS Suffers From A Major Security Issue Apple’s Lion OS X stores passwords insecurely, with the updated OS appearing to be more vulnerable than its previous Snow Leopard and Leopard ver

Re: [Full-disclosure] Possibility to exploit bash "*" processing

2011-09-21 Thread Dan Carpenter
Seems like a good time to promote David Wheeler's filename proposal: http://www.dwheeler.com/essays/fixing-unix-linux-filenames.html regards, dan carpenter ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter

[Full-disclosure] OT: help generating gpg key with prescribed key ID

2011-09-21 Thread Georgi Guninski
i know i am dumb. for a fishing expedition i need to generate a gpg key with prescribed key ID. is there a relatively easy way to do this? (don't feel like spending much time on this, RTFM failed, opportunistic hex editing failed, couldn't locate where to patch gpg in 1 hour) 10x. -- joro __

Re: [Full-disclosure] Possibility to exploit bash "*" processing

2011-09-21 Thread Jacqui Caren
On 21/09/2011 10:39, Cédric Jeanneret wrote: > Consider using: > rm ./* I dont see why someone would know how to use '--' for touch and not for rm... [jacqui@dieter test]$ touch -- -f -r [jacqui@dieter test]$ rm * [jacqui@dieter test]$ ls -l total 0 -rw-rw-r-- 1 jacqui jacqui 0 Sep 21 12:53 -f -r

[Full-disclosure] Trusteer Rapport and anti-keylogging

2011-09-21 Thread Neil Kettle
All - It has been a few weeks now since I demonstrated the following at 44con (http://www.44con.com) and thus time to just dump the details here. The following are what can only be described as 'design flaws' in Trusteer Rapport's anti-keylogger protections, that is Rapport provides the functional

Re: [Full-disclosure] Possibility to exploit bash "*" processing

2011-09-21 Thread Cédric Jeanneret
Consider using: rm ./* this will prevent the dashed files to be taken as options.. Cheers, C. On Tue, 20 Sep 2011 13:29:11 +0300, Kirils Solovjovs wrote: > Brought this up a year ago. Seems that no attention has been given to > this so far. > > See this screenshot for PoC: > http://02.lv/f/2010

[Full-disclosure] Trusteer Rapport and anti-keylogging

2011-09-21 Thread mu-b
All - It has been a few weeks now since I demonstrated the following at 44con (http://www.44con.com) and thus time to just dump the details here. The following are what can only be described as 'design flaws' in Trusteer Rapport's anti-keylogger protections, that is Rapport provides the functional

Re: [Full-disclosure] Another minor facebook security flaw

2011-09-21 Thread adam
TinEye never used to index Facebook, has that changed? Even if it has, there's a half a dozen things wrong with that entire concept. I've hit the /roadblock page quite a few times, and I've never been given the same set of images. So unless it's easily reproducible (and wasn't just a fluke for tha

Re: [Full-disclosure] Another minor facebook security flaw

2011-09-21 Thread Dan Dart
> there is a really neat image search engine. You point it at an > image (file->save image as?) and it will hunt down the URLs referencing > similar images. You're probably thinking of TinEye (tineye.com) but Google Images does it now too. ___ Full-Dis

Re: [Full-disclosure] Another minor facebook security flaw

2011-09-21 Thread Jacqui Caren-home
On 20/09/2011 06:04, James Fife wrote: > I noticed a recent flaw in Facebooks security resolution process recently. > After being asked to confirm my identity simply because I was using a > different computer, I apparently took too long to > identify my friends in their photos. However, I was abl