Re: [Full-disclosure] nginx exploit documentation, about a generic way to exploit Linux targets

2013-07-26 Thread Kingcope
Thanks for the hint about how to solve the issue! Two questions. Is the combination of both the iptables setting and python script a standalone solution along with the exploit code or is it required to send the exploit buffers in nfq.py? I assume the first. Does this configuration require

[Full-disclosure] Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack

2013-07-26 Thread Hurgel Bumpf
Just found this online.. might be of interest Abstract: Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use the attack to extract private encryption keys from GnuPG. The high resolution and low noise of the

[Full-disclosure] CVE-2013-2189: OpenOffice DOC Memory Corruption Vulnerability

2013-07-26 Thread Herbert Duerr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2013-2189 OpenOffice DOC Memory Corruption Vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache OpenOffice 3.4.0 to 3.4.1 on all platforms. Predecessor versions of OpenOffice.org may be

[Full-disclosure] CVE-2013-4156: OpenOffice DOCM Memory Corruption Vulnerability

2013-07-26 Thread Herbert Duerr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2013-4156 OpenOffice DOCM Memory Corruption Vulnerability Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache OpenOffice 3.4.0 and 3.4.1, on all platforms. Predecessor versions of OpenOffice.org may be

[Full-disclosure] SEC Consult SA-20130726-0 :: Multiple vulnerabilities - Surveillance via Symantec Web Gateway

2013-07-26 Thread SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory 20130726-0 === title: Multiple vulnerabilities - Surveillance via Symantec Web Gateway product: Symantec Web Gateway vulnerable

[Full-disclosure] [ MDVSA-2013:200 ] ruby

2013-07-26 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2013:200 http://www.mandriva.com/en/support/security/

[Full-disclosure] [ MDVSA-2013:201 ] ruby

2013-07-26 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2013:201 http://www.mandriva.com/en/support/security/

[Full-disclosure] Trustlook Found Hundreds of Malicious Applications in the Google Play Store

2013-07-26 Thread bugfree
Here is the article. http://blog.trustlook.com/news/trustlook-found-hundreds-of-malicious-applications-in-the-google-play-store/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored

Re: [Full-disclosure] Trustlook Found Hundreds of Malicious Applications in the Google Play Store

2013-07-26 Thread adam
You know what's funny? Their privacy policy http://www.trustlook.com/privacy/ Specifically, the part that says: If you wish, you may contact us instead via non-cellular telephone at the numbers provided at various locations on our sites or, *in the case of our health plan members*, at the

Re: [Full-disclosure] Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack

2013-07-26 Thread Valdis . Kletnieks
On Fri, 26 Jul 2013 07:31:09 +0100, Hurgel Bumpf said: Just found this online.. might be of interest Direct PDF: http://eprint.iacr.org/2013/448.pdf From the fine PDF: The Flush+Reload attack is a variant of the Prime+Probe attack that relies on sharing pages between the spy and the victim

Re: [Full-disclosure] Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack

2013-07-26 Thread Jeffrey Walton
On Fri, Jul 26, 2013 at 3:37 PM, valdis.kletni...@vt.edu wrote: On Fri, 26 Jul 2013 07:31:09 +0100, Hurgel Bumpf said: Just found this online.. might be of interest Direct PDF: http://eprint.iacr.org/2013/448.pdf From the fine PDF: The Flush+Reload attack is a variant of the Prime+Probe

Re: [Full-disclosure] Trustlook Found Hundreds of Malicious Applications in the Google Play Store

2013-07-26 Thread Jeffrey Walton
On Fri, Jul 26, 2013 at 11:13 AM, bugfree bugf...@gmail.com wrote: Here is the article. http://blog.trustlook.com/news/trustlook-found-hundreds-of-malicious-applications-in-the-google-play-store/ Peter Gutmann has a lot of fun with over-permissioned battery apps in his book Engineering

Re: [Full-disclosure] nginx exploit documentation, about a generic way to exploit Linux targets

2013-07-26 Thread Albert Puigsech Galicia
Hello, The fact is that you need to send the TCP packages in different order than the kernel does on normal connections, and you have two ways to do that: 1. Do not use kernel functions to manage connections, so you need to implement a little TCP/IP stack on user-space using raw sockets. 2. Use

[Full-disclosure] DoS and XSS vulnerabilities in Googlemaps plugin for Joomla

2013-07-26 Thread MustLive
Hello list! Earlier I wrote about multiple vulnerabilities in Googlemaps plugin for Joomla (http://securityvulns.ru/docs29645.html). After my informing, the developer fixed these vulnerabilities in versions 2.19 and 3.1 of the plugin - by removing proxy functionality. And in version 3.2 of the

Re: [Full-disclosure] Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack

2013-07-26 Thread Jann Horn
On Fri, Jul 26, 2013 at 03:47:41PM -0400, Jeffrey Walton wrote: Dr. Bernstein puts a lot of effort into defending against timing attacks and other side channels in his NaCl library. I'm not aware of any other libraries which go to the same depths. On the downside, NaCl is not easy to work with