Send Dailydave mailing list submissions to dailydave@lists.immunitysec.com
To subscribe or unsubscribe via the World Wide Web, visit http://lists.immunitysec.com/mailman/listinfo/dailydave or, via email, send a message with subject or body 'help' to dailydave-requ...@lists.immunitysec.com You can reach the person managing the list at dailydave-ow...@lists.immunitysec.com When replying, please edit your Subject line so it is more specific than "Re: Contents of Dailydave digest..." Today's Topics: 1. Sun Web Server stack overflow (Evgeny Legerov) 2. Re: We hold these axioms to be self evident (Shane Macaulay) 3. Re: A change (alexm) 4. Re: A change (Dragos Ruiu) 5. Re: A change (Marius) 6. Re: Sun Web Server stack overflow (dave) 7. Re: We hold these axioms to be self evident (twiz) 8. Re: Sun Web Server stack overflow (Evgeny Legerov) 9. Re: A change (Jim Manico) ---------------------------------------------------------------------- Message: 1 Date: Wed, 20 Jan 2010 01:17:11 +0300 From: Evgeny Legerov <ad...@vulndisco.net> Subject: [Dailydave] Sun Web Server stack overflow To: dailydave@lists.immunitysec.com Message-ID: <4b562f67.2090...@vulndisco.net> Content-Type: text/plain; charset=ISO-8859-1 Hello, We've published the details of Sun Web Server stack overflow bug here - http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html This is the same bug which has been demonstrated in sjws_demo flash movie http://intevydis.com/sjws_demo.html regards, -evgeny ------------------------------ Message: 2 Date: Tue, 19 Jan 2010 17:30:51 -0800 From: Shane Macaulay <sh...@security-objectives.com> Subject: Re: [Dailydave] We hold these axioms to be self evident To: dave <d...@immunityinc.com> Cc: dailyd...@lists.immunityinc.com Message-ID: <4b565ccb.9080...@security-objectives.com> Content-Type: text/plain; charset=ISO-8859-1 Very cool/deeply technical stuff from Travis as expected. It also does a good job at taking out VirtualBox when running under a 64bit Windows guest (Was testing in a VM since no x86 in 64 bit Windows 7 any more :\). I didn't look at any other VM but am guessing it would be a DoS also, probably a VM escape. I would of thought he tested VM's ? I forget what VMWare version (circa 2002-3), but this reminds me of a bug that you could trigger along the lines of; echo "THIS IS NOT A VALID EXECUTABLE FILE!!!!" > invalid.com (might of been invalid .exe) Inside of a VMWare on Windows 2000, then from command.com (or cmd.exe long time ago), you try to run it. You'd get to see your system go-critical via crashing out the vm guest/vmware/host OS and resulted in a blue screen. Even thinking of where to begin to debug that mess seemed too insane, I guess Travis has a few good analysis tricks, from his post on full-disc and code regarding the forged trap frame is very interesting. I also was reminded of a post I had read, http://x86asm.net/articles/calling-bios-from-driver-in-windows-xp-x64/index.html, I wonder if their are any exposed VDM facilities under 64 bit versions which would allow you to exploit this hole on those platforms. Also makes me think when (maybe has happened already) somebody will exploit those CPU errata flaws Theo was talking about. -- Shane On 1/19/2010 12:51 PM, dave wrote: > Code running in userspace can always run as Ring0. This is an axiom of > information security that is often forgotten, but Tavis Ormandy has > chosen to remind us of. > > http://lists.grok.org.uk/pipermail/full-disclosure/2010-January/072549.html > > Immunity's version of this exploit is available here: > http://www.immunityinc.com/ceu-index.shtml > > We haven't tested it on Windows 3.1, but we have tested it on all the > others. :> > > Thanks, > Dave Aitel > Immunity, Inc. _______________________________________________ Dailydave mailing list Dailydave@lists.immunitysec.com http://lists.immunitysec.com/mailman/listinfo/dailydave ------------------------------ Message: 3 Date: Wed, 20 Jan 2010 01:55:12 -0500 From: alexm <al...@immunityinc.com> Subject: Re: [Dailydave] A change To: Haroon Meer <har...@sensepost.com> Cc: "dailyd...@lists.immunityinc.com" <dailyd...@lists.immunityinc.com>, dave <d...@immunityinc.com> Message-ID: <4b56a8d0.4080...@immunityinc.com> Content-Type: text/plain; charset=ISO-8859-1 > If I was using the test to determine how my sandboxing worked, it > could make sense. If I was testing to see how my "anti exploitation > mechanisms" were working it could make sense. In the absence of any > sort of reactive defence, is there value in a semi-automated "click > here to get owned by 0day you can't currently defend against" type of > service?[1] I think so but in this context it's a corner case. Given a desktop computer which is part of a corporate network, has no protection mechanisms other than what is provided via it's current updates and it is in no kind of network or VM sandbox. Essentially, no real protection at all. Then having an 0day automated test gives you ammunition, in the form of real and reproducible test results, to demand that some of these protection mechanisms be put into place. I say corner case because we're discussing a service Immunity provides and advertised on this list, if the day-to-day security of a corporation is at the described level I'd say it's going to be pretty unlikely they'd be reading DD in the first place :) This then raises the question that if the sys-admin's gamble works and security dollars go in their direction but they still get owned after all the software protections they've asked for are put in place, what then? How good are your logs and backups? -AlexM ------------------------------ Message: 4 Date: Wed, 20 Jan 2010 00:02:44 -0800 From: Dragos Ruiu <d...@kyx.net> Subject: Re: [Dailydave] A change To: dave <d...@immunityinc.com> Cc: dailyd...@lists.immunityinc.com Message-ID: <40021e0b-a498-4297-83c9-31e4e7c89...@kyx.net> Content-Type: text/plain; charset=US-ASCII; format=flowed On 15-Jan-10, at 10:39 AM, dave wrote: > Perhaps the era of IDS and AV and scanners has come to an > abrupt end? We can only hope. Funny, how some interpret technology methodology shifts. I assumed just the reverse, IDS is going to have to move up a notch, you can no longer just apply it as a topical spray, you will need operators. And other stuff... ;-P cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, Canada March 22-26 http://cansecwest.com Amsterdam, Netherlands June 16/17 http://eusecwest.com pgpkey http://dragos.com/ kyxpgp ------------------------------ Message: 5 Date: Wed, 20 Jan 2010 16:01:47 +0100 From: Marius <wishi...@googlemail.com> Subject: Re: [Dailydave] A change To: dailydave@lists.immunitysec.com Message-ID: <4b571adb.7020...@googlemail.com> Content-Type: text/plain; charset="iso-8859-1" That's something between the Iron Curtain and new Digital Curtains. I agree: people are too fast to blame China, because proxyfing attacks is too easy to be as specific as many media are. However it seems to be rather obvious that a "Cyberware" for real doesn't exist, in the media headlines it dominates. - Like zero-day. I think if you bundle enough security buzz-words, that'll cause enough media coverage to make people believe anything regarding cyberwar, Chinese threats and even zero-day prevention. Maybe blaming China is simply easier? Am 19.01.10 22:43, schrieb Matthew Wollenweber: > I agree, to me these attacks don't appear overly sophisticated. I've heard > it argued that a nation state wouldn't use an extremely sophisticated attack > for deniability. However, I think that gets into a circular argument of who > is smarter. Personally, I think China just has a lot of unlicensed and > unpatched machines that are easy to exploit and therefore easy to use for > further attacks. Some activists were targeted, but also a lot of high-tech > companies. To me that sounds like greed which aligns with most every day > attacks. > > What strikes me is the ready attribution to China. What's the evidence for > it? > > Symantec gave some details here: > http://www.symantec.com/security_response/writeup.jsp?docid=2010-011114-1830-99&tabid=2 > but there was no confirmation it was the same event until I saw the Avert > Labs blog today. So I looked at some network information I got from > centralops and robtex the other day. I wrote it up here: > http://www.cyberwart.com/blog/2010/01/19/idle-speculation-on-auroras/ but > I'm even more confused as to why everyone thinks it's China. > > > > On Mon, Jan 18, 2010 at 6:47 AM, Nelson Brito <nbr...@sekure.org> wrote: > >> Well... A really sophisticated attack can use "one year old" vulnerability >> targeting new exploit "triggers" inside vulnerabilities. I have >> demonstrated >> this in H2HC - how to play a little bit deeper to really know "almost all" >> the >> aspects behind a vulnerability. >> >> I can tell you that some of "Protection Solutions" doesn't really protects >> and >> just let the "new exploit" pass thru the protection layers. I call this >> "Z-Day": >> An "one-year-old" vulnerability's new approach, that could be compared to >> new >> "0-day"... Hopefully I will submit this to BH-USA and will demonstrate my >> approach. >> >> /* >> * $Id: .siganture,v 1.3 2009-12-11 09:22:54-02 nbrito Exp $ >> * >> * Author: Nelson Brito <nbrito [at] sekure [dot] org> >> >> Copyright(c) 2004-2009 Nelson Brito. All rights reserved worldwide. >> http://fnstenv.blogspot.com */ >> >> >>> -----Original Message----- >>> From: dailydave-boun...@lists.immunitysec.com [mailto:dailydave- >>> boun...@lists.immunitysec.com] On Behalf Of dave >>> Sent: Friday, January 15, 2010 4:39 PM >>> To: dailyd...@lists.immunityinc.com >>> Subject: [Dailydave] A change >>> > I think we're seeing a sudden change in how large companies (or simply > companies with a high level of perceived threat[1]) deal with software > security. Perhaps the era of IDS and AV and scanners has come to an > abrupt end? We can only hope. > > Everyone says an attack is "sophisticated" whenever any 0day is > involved. But that should be the baseline. Or rather, it IS the baseline > and everyone seems to just be finding out. > > One of the things Immunity has been including in our services but is now > offering seperately is a client-side 0day penetration test against a > single host using CANVAS technology. You get your penetration verified > during phone consultation. And you receive real-time analyst > interpretation of results, plus delivery of log data at the end. For > more information you can contact m...@immunityinc.com. > > > > Thanks, > Dave Aitel > Immunity, Inc. > > [1]http://news.cnet.com/8301-27080_3-10434551-245.html _______________________________________________ Dailydave mailing list Dailydave@lists.immunitysec.com http://lists.immunitysec.com/mailman/listinfo/dailydave >> >> _______________________________________________ >> Dailydave mailing list >> Dailydave@lists.immunitysec.com >> http://lists.immunitysec.com/mailman/listinfo/dailydave >> > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave -- http://www.crazylazy.info PGP : 0xCCCA5E74 OTR: 4096B23D E3FACDFC 15B65DF5 A74D2B36 EC1D89F4 - XMPP: wi...@jabber.ccc.de >> >> Hi! I'm your friendly neighborhood signature virus. >> >> Copy me to your signature file and help me spread! -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 857 bytes Desc: OpenPGP digital signature Url : http://lists.immunitysec.com/pipermail/dailydave/attachments/20100120/85da41af/attachment-0001.pgp ------------------------------ Message: 6 Date: Wed, 20 Jan 2010 10:14:54 -0500 From: dave <d...@immunityinc.com> Subject: Re: [Dailydave] Sun Web Server stack overflow To: Evgeny Legerov <ad...@vulndisco.net> Cc: dailydave@lists.immunitysec.com Message-ID: <4b571dee.6010...@immunityinc.com> Content-Type: text/plain; charset=ISO-8859-1 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 iPlanet used to have a real dominant presence in Enterprises before WebLogic and WebSphere eviscerated it? I assume this is the renamed iPlanet Web Server? Does your exploit affect Solaris as well as Linux or does the bug not translate well to SPARC platforms? - -dave Evgeny Legerov wrote: > Hello, > > We've published the details of Sun Web Server stack overflow bug here - > http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html > > This is the same bug which has been demonstrated in sjws_demo flash > movie http://intevydis.com/sjws_demo.html > > regards, > -evgeny > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org iEYEARECAAYFAktXHe4ACgkQtehAhL0gherK4ACghEUFpMjKgtjEoNO4F/5FxGmr 5cYAn3f/ujlpLYgFGtgEc0dN+5pW9QvP =2dBM -----END PGP SIGNATURE----- ------------------------------ Message: 7 Date: Wed, 20 Jan 2010 08:17:15 -0800 From: twiz <t...@email.it> Subject: Re: [Dailydave] We hold these axioms to be self evident To: Shane Macaulay <sh...@security-objectives.com> Cc: dailyd...@lists.immunityinc.com, dave <d...@immunityinc.com> Message-ID: <4b572c8b.8010...@email.it> Content-Type: text/plain; CHARSET=US-ASCII -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Shane Macaulay wrote: > > echo "THIS IS NOT A VALID EXECUTABLE FILE!!!!" > invalid.com > (might of been invalid .exe) > > Inside of a VMWare on Windows 2000, then from command.com (or cmd.exe > long time ago), you try to run it. You'd get to see your system > go-critical via crashing out the vm guest/vmware/host OS and resulted in > a blue screen. Uhm, to start, integer overflow on executable header? (well, you should first recall about .exe or .com :-)). Just a guess. > > Even thinking of where to begin to debug that mess seemed too insane, I > guess Travis has a few good analysis tricks, from his post on full-disc > and code regarding the forged trap frame is very interesting. > > I also was reminded of a post I had read, > http://x86asm.net/articles/calling-bios-from-driver-in-windows-xp-x64/index.html, > I wonder if their are any exposed VDM facilities under 64 bit versions > which would allow you to exploit this hole on those platforms. No. That's an emulator, on the lines of what x86emu does for X or uvesafb on Linux (similar things on other UNIXes). Basically, the main use (as in the example there) is to call Video BIOS routines even in protected mode: you map the VBIOS, which a diligent OS has left at his place (C0000-C7FFFh), and emulate what the code does. All you really need (besides full memory access) is enough IO privileges (IOPL) to touch the right ports. I'm not saying that these emulators are immune to vulnerabilities, but just that one that relies on a hw feature (the v86 mode) can't really apply there that much. > Also makes me think when (maybe has happened already) somebody will > exploit those CPU errata flaws Theo was talking about. If you trust what Kaspersky said in 2008 (and why you shouldn't)... - twiz > -- > Shane > > > > On 1/19/2010 12:51 PM, dave wrote: >> Code running in userspace can always run as Ring0. This is an axiom of >> information security that is often forgotten, but Tavis Ormandy has >> chosen to remind us of. >> >> http://lists.grok.org.uk/pipermail/full-disclosure/2010-January/072549.html >> >> Immunity's version of this exploit is available here: >> http://www.immunityinc.com/ceu-index.shtml >> >> We haven't tested it on Windows 3.1, but we have tested it on all the >> others. :> >> >> Thanks, >> Dave Aitel >> Immunity, Inc. > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave > > _______________________________________________ > Dailydave mailing list > Dailydave@lists.immunitysec.com > http://lists.immunitysec.com/mailman/listinfo/dailydave > -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.11 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAktXLIsACgkQWLb7DjnXQ4i3/QCghGBdVXYlWVTrwM/OekSKtOeg 8xAAmwWfrj/zkDjp4FPxAuwzVTV0TQDg =Thls -----END PGP SIGNATURE----- ------------------------------ Message: 8 Date: Wed, 20 Jan 2010 20:08:10 +0300 From: Evgeny Legerov <ad...@vulndisco.net> Subject: Re: [Dailydave] Sun Web Server stack overflow To: dave <d...@immunityinc.com>, dailydave@lists.immunitysec.com Message-ID: <4b57387a.5060...@vulndisco.net> Content-Type: text/plain; charset=ISO-8859-1 dave wrote: > iPlanet used to have a real dominant presence in Enterprises before > WebLogic and WebSphere eviscerated it? I assume this is the renamed > iPlanet Web Server? Yep, it is also former Sun ONE Web Server. > Does your exploit affect Solaris as well as Linux or does the bug not > translate well to SPARC platforms? Two bugs I've published so far (TRACE and WebDav overflows) should affect all platforms that Sun Web Server supports (confirmed on Windows and Solaris x86). The particular vd_sjws2 exploit supports Linux version only. Regards, Evgeny L. > -dave > > > Evgeny Legerov wrote: >> Hello, > >> We've published the details of Sun Web Server stack overflow bug here - >> http://intevydis.blogspot.com/2010/01/sun-java-system-web-server-70u7-webdav.html > >> This is the same bug which has been demonstrated in sjws_demo flash >> movie http://intevydis.com/sjws_demo.html > >> regards, >> -evgeny >> _______________________________________________ >> Dailydave mailing list >> Dailydave@lists.immunitysec.com >> http://lists.immunitysec.com/mailman/listinfo/dailydave > ------------------------------ Message: 9 Date: Wed, 20 Jan 2010 12:04:23 -1000 From: Jim Manico <j...@manico.net> Subject: Re: [Dailydave] A change To: dailyd...@lists.immunityinc.com Message-ID: <4b577de7.8010...@manico.net> Content-Type: text/plain; charset=ISO-8859-1 Hello DD, Is the recent ie6 0-day anything special? How many similar 0-days are for sale on the black market? What is the rate/difficulty for discovery of new windows-based 0-days for the common MS and Adobe products that are installed on almost every corporate client? (I heard Dave mention that discovery is getting more difficult)? How easy is discovery for someone with resources like the Chinese government? How bad is it really? I suspect we are just looking at one grain of sand in a beach of 0-days.... -- Jim Manico OWASP Podcast Host/Producer OWASP ESAPI Project Manager http://www.manico.net ------------------------------ _______________________________________________ Dailydave mailing list Dailydave@lists.immunitysec.com http://lists.immunitysec.com/mailman/listinfo/dailydave End of Dailydave Digest, Vol 54, Issue 4 ****************************************