Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Lawrence Paul MacIntyre
Daylight come and me wanna go home... This one time, at band camp, Thor (Hammer of God) wrote: > For the record, the original term "O-Day" was coined by a dyslexic > security engineer who listened to too much Harry Belafonte while working > all night on a drink of rum. It's true. Really. > > t

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Joey Mengele
That was a dumb fucking joke. Please end this thread. J On Tue, 25 Sep 2007 14:39:24 -0400 "Thor (Hammer of God)" <[EMAIL PROTECTED]> wrote: >For the record, the original term "O-Day" was coined by a dyslexic >security engineer who listened to too much Harry Belafonte while >working >all night

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Thor (Hammer of God)
For the record, the original term "O-Day" was coined by a dyslexic security engineer who listened to too much Harry Belafonte while working all night on a drink of rum. It's true. Really. t > -Original Message- > From: Roland Kuhn [mailto:[EMAIL PROTECTED] > Sent: Tuesday, September 25

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Roland Kuhn
On 25 Sep 2007, at 00:57, Lamont Granquist wrote: The exploit is not made public by its use. The exploit is not even made public by (back-channel) sharing amongst the hacker/cracker community. The exploit is only made public if detected or the vulnerability is disclosed. Until detected/di

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Steven Adair
ROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Jason > Sent: Tuesday, September 25, 2007 11:55 AM > To: J. Oquendo > Cc: Chad Perrin; pdp (architect); Gadi Evron; [EMAIL PROTECTED]; > full-disclosure@lists.grok.org.uk; Crispin Cowan > Subject: Re: [Full-disclosure] 0day: PDF

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread North, Quinn
@lists.grok.org.uk; Crispin Cowan Subject: Re: [Full-disclosure] 0day: PDF pwns Windows J. Oquendo wrote: > Jason wrote: > >> You present a valid position but fall short of seeing the whole picture. > >> As an attacker, nation state or otherwise, my goal being to cripple >&

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Jason
J. Oquendo wrote: > Jason wrote: > >> You present a valid position but fall short of seeing the whole picture. > >> As an attacker, nation state or otherwise, my goal being to cripple >> communications, 0day is the way to go. Resource exhaustion takes >> resources, something the 0day can depriv

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Iggy E
Hi Crispin, I agree with almost everything you say until here: "I continue to dismiss the requirement that an 0day be found maliciously exploiting machines, because that requires inferring intent." IMO, everybody in this thread is taking this from an inside-to-outside approach, whereas a '0day'

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Gadi Evron
On Tue, 25 Sep 2007, J. Oquendo wrote: > In a strategic war, most countries aim to eliminate supply points and > mission critical infrastructure as quickly as possible. In a > cyberwarfare situation me personally, I would aim to 1) disrupt/stop via > a coordinated attack whether its via a botnet or

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Gadi Evron
On Tue, 25 Sep 2007, Jason wrote: > You present a valid position but fall short of seeing the whole picture. > > As an attacker, nation state or otherwise, my goal being to cripple > communications, 0day is the way to go. Resource exhaustion takes > resources, something the 0day can deprive the ene

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Valdis . Kletnieks
On Tue, 25 Sep 2007 10:48:22 EDT, "J. Oquendo" said: > Counterpoint... You're trying to shoot me down with 0day crap: > > You --> 0day attack --> My Infrastructure > > Me --> Botnet --> Your infrastructure > > Never having to consume any resources other than a point and click shoot > em up atta

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread J. Oquendo
Jason wrote: > You present a valid position but fall short of seeing the whole picture. > As an attacker, nation state or otherwise, my goal being to cripple > communications, 0day is the way to go. Resource exhaustion takes > resources, something the 0day can deprive the enemy of. Counterpoint.

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Jason
J. Oquendo wrote: > Crispin Cowan wrote: > >> This is a perfectly viable way to produce what amounts to Internet >> munitions. The recent incident of Estonia Under *Russian Cyber Attack*? >> is an example >> of such a network brush war i

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread J. Oquendo
Crispin Cowan wrote: > > This is a perfectly viable way to produce what amounts to Internet > munitions. The recent incident of Estonia Under *Russian Cyber Attack*? > is an example > of such a network brush war in which possession of such

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Glenn.Everhart
Minor point: No need to limit such accumulations to nation-states though. People interested in fiddling with other peoples' computers have come up with attacks that don't get instantly published at least since the 1970s, and have had more-or-less private channels to communicate them. The motives

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Lamont Granquist
On Sun, 23 Sep 2007, Chad Perrin wrote: > In the case of that "private zero day exploit", then, nobody will ever > know about it except the person that has it waiting in reserve -- and if > someone else discovers and patches the vulnerability before the exploit > is ever used, it never becomes a

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Crispin Cowan
Chad Perrin wrote: > On Sat, Sep 22, 2007 at 10:34:07PM -0700, Crispin Cowan wrote: > >> A "private 0day exploit" (the case I was concerned with) would be where >> someone develops an exploit, but does not deploy or publish it, holding >> it in reserve to attack others at the time of their choos

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread Chad Perrin
On Sat, Sep 22, 2007 at 10:34:07PM -0700, Crispin Cowan wrote: > > A "private 0day exploit" (the case I was concerned with) would be where > someone develops an exploit, but does not deploy or publish it, holding > it in reserve to attack others at the time of their choosing. Presumably > if such

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-25 Thread cocoruder .
From: "Eduardo Tongson" <[EMAIL PROTECTED]> To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] 0day: PDF pwns Windows Date: Sun, 23 Sep 2007 10:59:33 +0800 That exploits the JavaScript [1] and open URI [2] feature through the Acrobat WebLink plug-in. Adobe put in

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-23 Thread Crispin Cowan
[EMAIL PROTECTED] wrote: >> But then there is the important concept of the "private 0day", a new >> vulnerability that a malicious person has but has not used yet. >> > But the point is there is no such thing as a 0day *vulnerability"; there's > a 0day exploit, an exploit in the wild before th

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-22 Thread Eduardo Tongson
That exploits the JavaScript [1] and open URI [2] feature through the Acrobat WebLink plug-in. Adobe put in JavaScript to PDF 1.3 specifications for Forms interaction. Opening up the calculator should not be a feature [3]. [1] /JS ({app.alert\("evil javascript active!"\);}\r{app.alert\("Oh wait! W

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-22 Thread silky
On 9/22/07, Geo. <[EMAIL PROTECTED]> wrote: > > pa> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > > Is this the way responsible disclosure works these days ? > > "Adobe?s representatives can contact me from the usual place." > > > > Wow, now that's coordinated release. Knowing the bugs tha

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Tremaine Lea
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 That's been disclosed already, but thanks for your $0.02 USD ($0.02 CDN) Cheers, - --- Tremaine Lea Network Security Consultant Intrepid ACL "Paranoia for hire" On 21-Sep-07, at 5:40 PM, h4h wrote: > Jeez, what a bunch of whiny pussies. > ___

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread h4h
Jeez, what a bunch of whiny pussies. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Kevin Finisterre (lists)
Partial disclosure rocks... -KF On Sep 21, 2007, at 3:53 PM, Thierry Zoller wrote: > Dear All, > > pa> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > Is this the way responsible disclosure works these days ? > "Adobe’s representatives can contact me from the usual place." > > Wow, now th

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Geo.
> pa> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > Is this the way responsible disclosure works these days ? > "Adobe?s representatives can contact me from the usual place." > > Wow, now that's coordinated release. Knowing the bugs that you found > previously it should take 10 minutes to

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Thierry Zoller
Dear All, pa> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows Is this the way responsible disclosure works these days ? "Adobe’s representatives can contact me from the usual place." Wow, now that's coordinated release. Knowing the bugs that you found previously it should take 10 minutes to

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread J. Oquendo
[EMAIL PROTECTED] wrote: > But a "0 day vulnerability" is meaningless as a definition; it applies to > a vulnerability for exactly 24 hours and then is meaningless. ALL > vulnerabilities were discovered at some point and had their 24 hours of > "0 day fame" by your definition. It just does not

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Casper . Dik
>But then there is the important concept of the "private 0day", a new >vulnerability that a malicious person has but has not used yet. But the point is there is no such thing as a 0day *vulnerability"; there's a 0day exploit, an exploit in the wild before the vulnerability id discovered. By clai

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Steven Adair
Not in my book. I guess the people on this list are working off too many different definitions of 0day. 0day to me is something for which there is no patch/update at the time of the exploit being coded/used. So if I code an exploit for IE right now and they don't patch it until April September 2

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread pdp (architect)
None of them are related to this vulnerability. As far as I know, the issue is brand new. On 9/21/07, Antivirus Taneja <[EMAIL PROTECTED]> wrote: > Hi, > > Too interesting and dangerousLast couple of months there were PDF > spamming (Stocks Information) all over the internet..I analyzed those

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread pdp (architect)
D]; full-disclosure@lists.grok.org.uk > Sent: Thursday, September 20, 2007 6:51:33 PM > Subject: [Full-disclosure] 0day: PDF pwns Windows > > http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > > I am closing the season with the following HIGH Risk vulnerability: > Adob

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Antivirus Taneja
Hi, Too interesting and dangerousLast couple of months there were PDF spamming (Stocks Information) all over the internet..I analyzed those PDF i didn't find any such thingDid you checked them? Are they related to any vulnerability? Regards, Taneja Vikas http://annysoft.wordpress.com O

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-21 Thread Rohit Srivastwa
Satellite Nothing but the Internet - Original Message From: pdp (architect) <[EMAIL PROTECTED]> To: [EMAIL PROTECTED]; full-disclosure@lists.grok.org.uk Sent: Thursday, September 20, 2007 6:51:33 PM Subject: [Full-disclosure] 0day: PDF pwns Windows http://www.gnucitizen.org/blo

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread scott
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Well put. Who here hasn't pwned at one time or another.At home or work.? I wish I could be on that list.(Make my job EASY!!!) (PLEASE) Make my job easier!!!Shh! Cheers, Redwolves rule coderman wrote: > On 9/20/07, Crispin Cowan <[EMAIL PROTECTED

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread coderman
On 9/20/07, Crispin Cowan <[EMAIL PROTECTED]> wrote: > ... > Rather, I just treat "0day" as a synonym for "new vulnerability" 0day is a perspective; if it came out of nowhere and pwnd your ass it is 0day. [that is, where you are on that clunky chain of disclosure process you describe...] __

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread Crispin Cowan
Gadi Evron wrote: > Impressive vulnerability, new. Not a 0day. > > Not to start an argument again, but fact is, people stop calling > everything a 0day unless it is, say WMF, ANI, etc. exploited in the > wild without being known. > > I don't like the mis-use of this buzzword. I respectfully disagre

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread Gadi Evron
On Thu, 20 Sep 2007, Joey Mengele wrote: > Dear Fatboy, > > Let's put aside for a minute the fact that you have no idea what You like people on the heavy side? Psst... call me. > you are talking about and let's also, for the benefit of this very > valuable debate, assume your definition is corre

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread Joey Mengele
Dear Fatboy, Let's put aside for a minute the fact that you have no idea what you are talking about and let's also, for the benefit of this very valuable debate, assume your definition is correct. First, please prove this bug was never used in the wild. After that, please prove your credibilit

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread pdp (architect)
> My upcoming research feature everything regarding this and the issue you > have > already discussed. really :).. which one... the one from last year? On 9/20/07, Aditya K Sood <[EMAIL PROTECTED]> wrote: > pdp (architect) wrote: > > http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > > > > I

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread Gadi Evron
Impressive vulnerability, new. Not a 0day. Not to start an argument again, but fact is, people stop calling everything a 0day unless it is, say WMF, ANI, etc. exploited in the wild without being known. I don't like the mis-use of this buzzword. Gadi. On Thu, 20 Sep 2007, pdp (archite

[Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread pdp (architect)
http://www.gnucitizen.org/blog/0day-pdf-pwns-windows I am closing the season with the following HIGH Risk vulnerability: Adobe Acrobat/Reader PDF documents can be used to compromise your Windows box. Completely!!! Invisibly and unwillingly!!! All it takes is to open a PDF document or stumble acros

Re: [Full-disclosure] 0day: PDF pwns Windows

2007-09-20 Thread Aditya K Sood
pdp (architect) wrote: > http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > > I am closing the season with the following HIGH Risk vulnerability: > Adobe Acrobat/Reader PDF documents can be used to compromise your > Windows box. Completely!!! Invisibly and unwillingly!!! All it takes > is to op