Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-27 Thread Michael . Dillon
You seem to be inferring that it is a bad thing to silently patch bugs which may have security implications. The OpenBSD Full disclosure, we believe in it. That's why OpenBSD and other projects publish the full source code. That is full disclosure. I wonder if the same network operators

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-26 Thread Todd Vierling
On Sat, 25 Mar 2006, Gadi Evron wrote: Brandon Butterworth wrote: There are two exploit code samples I saw. There are two remote exploits for one of them so far that are public that I know of. Please provide reference URLs or the code, if not then stop spreading FUD. No. Talk to

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-26 Thread Martin Hannigan
On Sat, 25 Mar 2006, Gadi Evron wrote: Brandon Butterworth wrote: There are two exploit code samples I saw. There are two remote exploits for one of them so far that are public that I know of. Please provide reference URLs or the code, if not then stop spreading FUD. No. Talk to

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread JP Velders
Date: Thu, 23 Mar 2006 19:28:16 -0600 (CST) From: Gadi Evron [EMAIL PROTECTED] Subject: Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow) [ ... ] No offense Valdis, you know I both like you and consider you a friend, but if you

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Jeroen Massar
On Sat, 2006-03-25 at 13:30 +0100, JP Velders wrote: [..] This isn't about processes, it's about something that has been around for a while, many reply on and keeps *** up. Where it simply can't. What world do you live in were everything is done perfect ? If you don't like sendmail

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Gadi Evron
Steven M. Bellovin wrote: On Sat, 25 Mar 2006 04:39:11 +0200, Gadi Evron [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Well, it *is* mostly a theoretical overflow - for it to work, a site would have to: Exploit is out there. How long did that take? Is the exploit actually

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Brandon Butterworth
There are two exploit code samples I saw. There are two remote exploits for one of them so far that are public that I know of. Please provide reference URLs or the code, if not then stop spreading FUD. Bugs happen, deal with them and move on. The endless whine is more annoying (as are 20

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Gadi Evron
Brandon Butterworth wrote: There are two exploit code samples I saw. There are two remote exploits for one of them so far that are public that I know of. Please provide reference URLs or the code, if not then stop spreading FUD. No. Talk to you after the first worm.

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Matt Ghali
Brandon Butterworth wrote: Please provide reference URLs or the code, if not then stop spreading FUD. On Sat, 25 Mar 2006, Gadi Evron wrote: No. Talk to you after the first worm. OK. We're holding you to your word there, Gadi. [EMAIL PROTECTED]darwin Moral indignation is a

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Brandon Butterworth
Please provide reference URLs or the code, if not then stop spreading FUD. No. Talk to you after the first worm. Don't bother, it's too late then Anyone can claim to have had the 0day after the event. brandon

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Christopher L. Morrow
On Sat, 25 Mar 2006, Gadi Evron wrote: Brandon Butterworth wrote: There are two exploit code samples I saw. There are two remote exploits for one of them so far that are public that I know of. Please provide reference URLs or the code, if not then stop spreading FUD. No. Talk to

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Valdis . Kletnieks
On Sat, 25 Mar 2006 00:57:31 EST, Steven M. Bellovin said: On Sat, 25 Mar 2006 04:39:11 +0200, Gadi Evron [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Well, it *is* mostly a theoretical overflow - for it to work, a site woul d have to: Exploit is out there. How long did that

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-25 Thread Valdis . Kletnieks
On Sat, 25 Mar 2006 18:00:41 +0200, Gadi Evron said: There are two exploit code samples I saw. There are two remote exploits for one of them so far that are public that I know of. There's exploits for the race condition. I was *specifically* talking about the integer overflow, which looks

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-24 Thread Michael . Dillon
I wonder how many other unreported silently-patched vulnerabilities are out there? You seem to be inferring that it is a bad thing to silently patch bugs which may have security implications. The OpenBSD team makes a habit of auditing software for flaws and fixing them without waiting to find

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-24 Thread Gadi Evron
[EMAIL PROTECTED] wrote: I wonder how many other unreported silently-patched vulnerabilities are out there? You seem to be inferring that it is a bad thing to silently patch bugs which may have security implications. The OpenBSD Full disclosure, we believe in it. team makes a habit of

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-24 Thread Steven M. Bellovin
On Sat, 25 Mar 2006 04:39:11 +0200, Gadi Evron [EMAIL PROTECTED] wrote: [EMAIL PROTECTED] wrote: Well, it *is* mostly a theoretical overflow - for it to work, a site would have to: Exploit is out there. How long did that take? Is the exploit actually effective in the wild? The

SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-23 Thread Gadi Evron
Tech details: Sendmail vulnerabilities were released yesterday. No real public announcements to speak of to the security community. SecuriTeam released some data: Improper timeout calculation, usage of memory jumps and integer overflows allow attackers to perfom a race condition DoS on sendmail,

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-23 Thread Valdis . Kletnieks
On Thu, 23 Mar 2006 03:41:52 CST, Gadi Evron said: (I feel obligated to mention that there's 16 mentions of my name in the Sendmail release notes, and zero of Gadi's. This of course influences my opinions and commentary, and possibly Gadi's as well...) ISS only reported the Race Condition

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-23 Thread Dragos Ruiu
On March 23, 2006 01:41 am, Gadi Evron wrote: Here's what ISS releasing the Race Condition vulnerability has to say: http://xforce.iss.net/xforce/alerts/id/216 They say it's a remote code execution. They say it's a race condition. No real data available to speak of. I can't see how it's

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-23 Thread Gadi Evron
On Thu, 23 Mar 2006 [EMAIL PROTECTED] wrote: Also, it would help if instead of FUD-mongering, you actually went to Claus (or asked somebody else to) with *specific suggestions* of how to improve the process. He may be stubborn about the way he does things, but if you include specific

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-23 Thread Steven M. Bellovin
On Thu, 23 Mar 2006 03:41:52 -0600 (CST), Gadi Evron [EMAIL PROTECTED] wrote: It took Sendmail a mounth to fix this. A mounth. A mounth! With such Vendor Responsibility, perhaps it is indeed a Good Thing to go Full Disclosure. It seems like history is repeating itself and Full

Re: SendGate: Sendmail Multiple Vulnerabilities (Race Condition DoS, Memory Jumps, Integer Overflow)

2006-03-23 Thread Dragos Ruiu
On March 23, 2006 06:08 pm, Steven M. Bellovin wrote: On Thu, 23 Mar 2006 03:41:52 -0600 (CST), Gadi Evron [EMAIL PROTECTED] wrote: It took Sendmail a mounth to fix this. A mounth. A mounth! Given the scope of the changes you describe -- you wrote Sendmail.com's patch is so big they