-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dear World,
Below is copy paste of GOBBLES advisory for NTOP.  NTOP available from www.ntop.org.  
This serious remote root bug in logging mechanism.  Time for alert and disclosure is 
now.

Website with other advisories at http://www.bugtraq.org.  It look like shit because on 
free host.  GOBBLES poor researcher who not out for the big dollar, and nothing that 
can be done about this at this time.

The question:
"Freedom vs. Security: who will win?"

The answer:
GOBBLES.  It time for full disclosure.

All bets off.

GOBBLES SECURITY ADVISORY #31
Preauthentication Remote Root Hole in NTOP

Forward:
GOBBLES is afraid that zen-parse have found a copy of private GOBBLES exploit for this 
vulnerability and will try to contact vendor in sneaky fashion to pretend he found 
bug, without issuing typical conditional advisory full of "if this present, and this 
present, and the moon is full, two month later you get uid(uucp) on default install of 
Redhat Linux 1.1" for fame advisory, which seem to be typical practice for this shady 
character, thus forcing GOBBLES to quick release of advisory with no time to contact 
vendor.  Though GOBBLES not to offer apologies to anyone this might hurt, because at 
this point GOBBLES not really give a fuck about things.

No more "I found exploit in wild, must contact developer like good ethical whitehat 
loser."  This is not actual ethical action.  Proper credit must go to proper 
researcher.  This now race condition.

GOBBLES to come out victorious.

3APAPA, GOBBLES check your silly website.  Do not try to claim you find this 20 years 
ago and say, "GOBBLES, you still behind the leaders."  GOBBLES is the leader.  There 
no competition here,  especially from you. . .

Vendor Website:
http://www.ntop.org

Threat Level:
"So high, that Securityfocus will stop blocking our submissions and allow it on their 
lists...  at least, we hope!"

Description of Software:
hehe, GOBBLES flex he wrists for copy paste and show the eager penetrator the 
following:

                                                                                       
   (p1 of 2)

   What's ntop?

   ntop  is  a Unix tool that shows the network usage, similar to what the popular top 
Unix command does.  ntop  is based on libpcap and it has been written in a portable 
way in order to virtually run  on  every  Unix  platform and on Win32 as well. I have 
developed libpcap for Win32 (port of libpcap to Win32) in order to have a single ntop 
source tree.

   ntop  comes  with two applications: the 'classical' ntop that sports an embedded 
web server, and intop (interactive ntop) is basically a network shell based on the 
ntop engine.

   intop  provides  a  powerful  and  flexible interface to the ntop packet sniffer. 
Since ntop has grown  so much in functionality and it cannot be simply considered a 
network-brower, the problem of  capturinag  and  showing  network  usage  has  been 
split. As of version 1.3 the ntop engine captures  packets,  performs  traffic 
analysis and information storage. intop implements a bare,    command  line  based  
interface,  with  an  apparently  spartan  look  and feel, but  a lot of functionality 
already implemented, and others planned for future releases.

                                             [intop1.gif]

                                             [intop2.gif]

   Users  can  use  a  a  web  browser (e.g. netscape) to navigate through ntop (that 
acts as a web server)  traffic  information and get a dump of the network status. In 
the latter case, ntop can be seen as a simple RMON-like agent with an embedded web 
interface.

                                            [ntop1s.gif]

                                            [ntop2s.gif]

   What can ntop do for me?

     * Sort network traffic according to many protocols
     * Show network traffic sorted according to various criteria
     * Display traffic statistics
     * Show IP traffic distribution among the various protocols
     * Analyse IP traffic and sort it according to the source/destination
     * Display IP Traffic Subnet matrix (who's talking to who?)
     * Report IP protocol usage sorted by protocol type
                                   Platforms
     * Unix
     * Win32

   Media
     * Loopback
     * Ethernet
     * Token Ring
     * PPP
     * Raw IP
     * FDDI

                                    IP Protocols Fully User Configurable
   Additional
   Features
     * Embedded HTTP server
     * Network Flows
     * Local Traffic Analysis
     * Multithread
     * Lightweight Network IDS (Intrusion Detection System)
     * C++/Perl lightweight API for accessing ntop from remote
     * Internet Domain Statistics
     * CGI support
     * Advanced 'per user' HTTP password protection with encrypted passwords
     * Support for SQL database for storing persistent traffic information
     * Remote hosts OS identification (via nmap)
     * HTTPS (Secure HTTP via OpenSSL)
     * libwrap support
     * Virtual/multiple network interfaces support
     * Graphical Charts (via gdchart)
     * Perl Interface
     * WAP support

hehehehehehehe ;pppppppppppppppppp


Description of Problem(s):
Before GOBBLES give you information needed to get uid(0) everywhere, he want to show 
you something about ntop which may be something used to discourage you from using lame 
software.

GOBBLES@dev02:/home/hacking/ntop > grep -r "Buffer overflow" * -r |wc -l
    513

Programmer know he own code is lame and have issues, but all he can do to fix is tell 
you why he program sucks. . .

On to more pressing matter.

>From util.c, we look at content of function traceLevel().

...

        switch(traceLevel) {
        case 0:
          syslog(LOG_ERR, buf);
          break;
        case 1:
          syslog(LOG_WARNING, buf);
          break;
        case 2:
          syslog(LOG_NOTICE, buf);
          break;
        default:
          syslog(LOG_INFO, buf);
          break;
        }
#else
        syslog(LOG_ERR, buf);

...

Uh oh, there some bugs!  But now important question is, can GOBBLES control buf with 
malicious GOBBLEScode to execute rm -rf /* on machine?  Lets take a look at how 
function traceLevel() called throughout rest of code.

Time to look at admin.c

      traceEvent(TRACE_INFO, "User='%s' - Pw='%s [%s]'\n", user, pw, data_data.dptr);

Uh oh.  Option to log username and password sent to http for authentication to ntop, 
when faulty syslog() and printf() statement to be called.

This remote and root.  Beware.

Fix:
None at this time.  Thank zen-parse for being leech.

Suggested Workaround:
Don't run software on network that can report buffer overflows in itself from 513 
different locations in the code.

Greets:
Our #1 fan, Dave Aitel.  Dave, GOBBLES love you -- you get free GOBBLES Security 
tshirt at Defcon.


Love to all (but especially to "bob"),
GOBBLES Security
http://www.bugtraq.org
[EMAIL PROTECTED]


ps: GOBBLES currently in communication with Sun Microsystems about lethal remote bug 
in Solaris 6, 7, and 8.  Sun has asked GOBBLES to wait one month to release advisory 
so that service can be fixed.  GOBBLES not sure if he can wait this long, but will try 
very hard to not click "send" for while longer on hole.  If you run Solaris, likely 
you are vulnerable.  But you will have to wait.

No joke, this serious remote root hole.  GOBBLES turned blind eye to argument from 
hackers about danger of releasing vulnerabilities.  GOBBLES know that only hackers 
care about non-disclosure.  Anyone else is likely to be very boring. :))))

Hey, GOBBLES considered two ways of getting fame and recognition for he world-class 
security group... 1. put up a message board on bugtraq.org with gobbles group name 
branded all over it and let world know he have private exploits... 2. submit 
ground-breaking research to the securityfocus mailing lists.....

hey, the latter has a bigger audience ;)))))))

Hush provide the worlds most secure, easy to use online applications - which solution 
is right for you?
HushMail Secure Email http://www.hushmail.com/
HushDrive Secure Online Storage http://www.hushmail.com/hushdrive/
Hush Business - security for your Business http://www.hush.com/
Hush Enterprise - Secure Solutions for your Enterprise http://www.hush.com/

Looking for a good deal on a domain name? 
http://www.hush.com/partners/offers.cgi?id=domainpeople

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wlwEARECABwFAjy1k3cVHGdvYmJsZXNAaHVzaG1haWwuY29tAAoJEBzRp5chmbAPsUEA
n0YCfbYbhyvYgWYIolGRX8FVIbCHAJ0dLAzuHGB7ruhgsINM38dBPJ2Opw==
=/r5w
-----END PGP SIGNATURE-----

Reply via email to