[CVE-2013-6986] Insecure Data Storage in Subway Ordering for California (ZippyYum) 3.4 iOS mobile application

2013-12-10 Thread Daniel Wood
Title: [CVE-2013-6986] Insecure Data Storage in Subway Ordering for California 
(ZippyYum) 3.4 iOS mobile application

Published: December 7, 2013
Reported to Vendor: May 2013
CVE Reference: CVE-2013-6986 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6986

CVSS v2 Base Score: 4.9
CVSS v2 Vector (AV:L/AC:L/Au:N/C:C/I:N/A:N/E:H/RL:U/RC:C)

Credit: This issue was discovered by Daniel E. Wood
http://www.linkedin.com/in/danielewood

Originally posted here: http://seclists.org/fulldisclosure/2013/Dec/39

Vendor: ZippyYum, LLC | http://www.zippyyum.com
Application: https://itunes.apple.com/us/app/subwayoc/id510770549?mt=8
Tested Version: 3.4

File: SubwayOCKiosk.app
App Name: Subway CA Kiosk
Build Time-stamp: 2012-06-07_09-20-17

1. Introduction: Subway CA is a mobile application available both on iOS and 
Android based devices that allows customers to build and order food menu items 
that can be paid for through the application using a payment card such as a 
debit or credit card.  

2. Vulnerability Description: The application stores sensitive data insecurely 
to cache files located within ../Caches/com.ZippyYum.SubwayOC/ directory on the 
device.

Loading Cache.db and/or Cache.db-wal in a tool that can read sqlite databases 
(such as RazorSQL) will allow a malicious user to read unencrypted sensitive 
data stored in clear-text.

Sensitive data elements found within Cache.db and Cache.db-wal:
- password and encryptionKey for the application/user account
- customerPassword
- customerEmail
- deliveryStreet
- deliveryState
- deliveryZip
- paymentMethod
- paymentCardType
- paymentCardNumber
- paymentSecurityCode
- paymentExpMonth
- paymentExpYear
- paymentBillingCode
- customerPhone
- longitude (of device)
- latitude (of device)
- email

3. Vulnerability History:
May 9, 2013: Vulnerability identification
May 15, 2013: Unofficial vendor notification
August 4, 2013: Official vendor notification via report
September 20, 2013: Vulnerability remediation notification*  
December 7, 2013: Vulnerability disclosure

*Current Version: 3.7.1 (Tested: only customerName, customerEmail, 
customerPhone, location, paymentCardType are in clear-text within 
Subway.sqlite-wal)


signature.asc
Description: Message signed with OpenPGP using GPGMail


EMC Data Protection Advisor DPA Illuminator EJBInvokerServlet Remote Code Execution

2013-12-10 Thread nospam
EMC Data Protection Advisor DPA Illuminator EJBInvokerServlet Remote Code 
Execution 

tested against: Microsoft Windows Server 2008 r2 sp1
EMC Data Protection Advisor 5.8 sp5

vulnerability:
the DPA Illuminator service (DPA_Illuminator.exe) listening
on public port 8090 (tcp/http) and 8453 (tcp/https) is vulnerable.
It exposes the following servlet:

http://[host]:8090/invoker/EJBInvokerServlet
https://[host]:8453//invoker/EJBInvokerServlet

due to a bundled invoker.war
The result is remote code execution with NT AUTHORITY\SYSTEM
privileges.

proof of concept url:
http://retrogod.altervista.org/9sg_ejb.html

~rgod~


Air Gallery 1.0 Air Photo Browser - Multiple Vulnerabilities

2013-12-10 Thread Vulnerability Lab
Document Title:
===
Air Gallery 1.0 Air Photo Browser - Multiple Vulnerabilities


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1165


Release Date:
=
2013-12-09


Vulnerability Laboratory ID (VL-ID):

1165


Common Vulnerability Scoring System:

6.5


Product  Service Introduction:
===
View your entire photo library in a standard web browser! Show off your photos 
easily! Excellent for showing slides 
during a meeting, browsing through friends photos and more!

- View your photos in a browser over WiFi
- Optional password protection
- Show albums, events, faces (your photo library needs to have these albums in 
order to show it)
- One click slideshows
- Easy navigation
- Supports bonjour publishing

(Copy of the Homepage: https://itunes.apple.com/app/id499204622 )


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities 
in the SharkFood Air Gallery 1.0 Air Photo Browser mobile application for Apple 
iOS.


Vulnerability Disclosure Timeline:
==
2013-12-09:Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

SharkFood
Product: Air Gallery - Air Photo Browser iOS 1.0


Exploitation Technique:
===
Remote


Severity Level:
===
High


Technical Details  Description:

1.1
A local command/path injection web vulnerabilities has been discovered in the 
SharkFood Air Gallery 1.0 Air Photo Browser mobile application for Apple iOS.
A local command inject vulnerability allows attackers to inject local commands 
via vulnerable system values to compromise the apple mobile iOS application.

The vulnerability is located in the vulnerable `devicename` value of the file 
dir und sub category `header` (header-title) section. Local attackers are 
able to inject own malicious system specific commands or path value requests as 
the physical iOS hardware devicename. The execute of the injected 
command or path request occurs with persistent attack vector in the index and 
sub category list of the web interface. The security risk of the local 
command/path inject vulnerability is estimated as high(-) with a cvss (common 
vulnerability scoring system) count of 6.5(+)|(-)6.6.

Exploitation of the command/path inject vulnerability requires a low privileged 
iOS device account with restricted access and no user interaction. 
Successful exploitation of the vulnerability results in unauthorized execute of 
system specific commands or unauthorized path requests.


Vulnerable Module(s):
[+] Content  header-title

Vulnerable Parameter(s):
[+] devicename

Affected Module(s):
[+] Index- File Dir Listing
[+] Sub Folder/Category - File Dir Listing



1.2
A local command/path injection web vulnerability has been discovered in the 
SharkFood Air Gallery 1.0 Air Photo Browser mobile application for Apple iOS.
A local command inject vulnerability allows attackers to inject local commands 
via vulnerable system values to compromise the apple mobile iOS application.

The second local command/path inject vulnerability is located in the in the 
album name value of the web-interface index and sub category list module.
Local attackers are able to manipulate iOS device `photo app` (default) album 
names by the inject of a payload to the wrong encoded albumname input fields. 
The execute of the injected command/path request occurs in the album sub 
category list and the main album name index list. The security risk of the 
command/path inject vulnerabilities are estimated as high(-) with a cvss 
(common vulnerability scoring system) count of 6.6(+).

Exploitation of the command/path inject vulnerability requires a local low 
privileged iOS device account with restricted access and no direct user 
interaction. 
Successful exploitation of the vulnerability results unauthorized execution of 
system specific commands or unauthorized path requests.

Vulnerable Module(s):
[+] Poster  group-header  groupinfo

Vulnerable Parameter(s):
[+] album name

Affected Module(s):
[+] Index - Item Name List
[+] Sub Category - Title List


Proof of Concept (PoC):
===
1.1
The local command/path inject web vulnerability can be exploited by local 
attackers with restricted or low privileged device user account 
without user interaction. For security demonstration or to reproduce the 
vulnerability follow the provided information and steps below.


1. Install the 

LiveZilla 5.1.1.0 Stored XSS in operator clients

2013-12-10 Thread zoczus
Author: Jakub Zoczek [zoc...@gmail.com]
CVE Reference: CVE-2013-7003
Product: LiveZilla 
Vendor: LiveZilla GmbH [http://livezilla.net]
Affected version: 5.1.1.0
Severity: Medium
CVSSv2 Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Status: Fixed


0x01 Background

LiveZilla, the widely-used and trusted Live Help and Live Support System.

0x02 Description

LiveZilla in version 5.1.1.0 is prone to multiple Stored Cross-Site Scripting 
issues in Webbased Operator Client and LiveZilla Client. Attacker can put 
payloads in fields like full name , company, or create crafted filename to 
exploit this vulnerability.

0x03 Proof of Concepts

Name and Surname variant: 

My name is Jakub and this is looong username img src=a 
onerror=alert(document.cookie)h

Operator who will try to chat with attacker with this name will get javascript 
code executed.

Screenshots:

http://postimg.org/image/orvwl36on/
http://postimg.org/image/uhh72ij6f/
http://postimg.org/image/6f0d7n2jb/
http://postimg.org/image/6hk8uh66v/
http://postimg.org/image/7z5p61axj/

Uploaded filename variant: 

If attacker (while chatting) will try to upload specially crafted file with 
name: cimg src=a onerror=alert(document.cookie)hh.jpg - then operator 
would get javascript code execution without any interaction.

Screenshots:

http://postimg.org/image/kp9xj4ivr/
http://postimg.org/image/pqhbkhqc7/
http://postimg.org/image/7c6sgie1j/
 
0x04 Fix

Vulnerabilities was fixed in LiveZilla 5.1.2.0 version.

0x05 Timeline

21.11.2013 - Vendor notified
01.12.2013 - Ping
02.12.2013 - Vendor responded with information about planing fix 
06.12.2013 - Fixed version released
10.12.2013 - Public Disclosure


[security bulletin] HPSBUX02943 rev.1 - HP-UX Running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities

2013-12-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04031205

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04031205
Version: 1

HPSBUX02943 rev.1 - HP-UX Running Java6, Remote Unauthorized Access,
Disclosure of Information, and Other Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2013-12-04
Last Updated: 2013-12-04

Potential Security Impact: Remote unauthorized access, disclosure of
information, and other vulnerabilities

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in the Java Runtime
Environment (JRE) and the Java Developer Kit (JDK) running on HP-UX. These
vulnerabilities could allow remote unauthorized access, disclosure of
information, and other exploits.

References: CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774,
CVE-2013-5776, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783,
CVE-2013-5784, CVE-2013-5787, CVE-2013-5789, CVE-2013-5790, CVE-2013-5797,
CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809,
CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819,
CVE-2013-5820, CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829,
CVE-2013-5830, CVE-2013-5831, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843,
CVE-2013-5848, CVE-2013-5849, CVE-2013-5852, SSRT101346.

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, B.11.23, and B.11.31 running HP JDK and JRE v6.0.20 and
earlier.

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2013-3829(AV:N/AC:L/Au:N/C:P/I:P/A:N)6.4
CVE-2013-4002(AV:N/AC:M/Au:N/C:N/I:N/A:C)7.1
CVE-2013-5772(AV:N/AC:H/Au:N/C:N/I:P/A:N)2.6
CVE-2013-5774(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5776(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5778(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2013-5780(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2013-5782(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5783(AV:N/AC:L/Au:N/C:P/I:P/A:N)6.4
CVE-2013-5784(AV:N/AC:M/Au:N/C:N/I:P/A:N)4.3
CVE-2013-5787(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5789(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5790(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2013-5797(AV:N/AC:M/Au:S/C:N/I:P/A:N)3.5
CVE-2013-5801(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2013-5802(AV:N/AC:L/Au:N/C:P/I:P/A:P)7.5
CVE-2013-5803(AV:N/AC:H/Au:N/C:N/I:N/A:P)2.6
CVE-2013-5804(AV:N/AC:L/Au:N/C:P/I:P/A:N)6.4
CVE-2013-5809(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5812(AV:N/AC:L/Au:N/C:P/I:N/A:P)6.4
CVE-2013-5814(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5817(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5818(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5819(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5820(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5823(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2013-5824(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5825(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2013-5829(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5830(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5831(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5840(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2013-5842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5843(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5848(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5849(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2013-5852(AV:N/AC:H/Au:N/C:C/I:C/A:C)7.6
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following Java version upgrade to resolve these
vulnerabilities.

The upgrade is available from the following location: http://www.hp.com/java

OS Version
 Release Version

HP-UX B.11.11, B.11.23, B.11.31
 JDK and JRE v6.0.21 or subsequent

MANUAL ACTIONS: Yes - Update
For Java v6.0 update to Java v6.0.21 or subsequent
PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.11
HP-UX 

[security bulletin] HPSBUX02944 rev.1 - HP-UX Running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities

2013-12-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04031212

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04031212
Version: 1

HPSBUX02944 rev.1 - HP-UX Running Java7, Remote Unauthorized Access,
Disclosure of Information, and Other Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2013-12-04
Last Updated: 2013-12-04

Potential Security Impact: Remote unauthorized access, disclosure of
information, and other vulnerabilities

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in Java Runtime
Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These
vulnerabilities could allow remote unauthorized access, disclosure of
information, and other exploits.

References: CVE-2013-3829, CVE-2013-4002, CVE-2013-5772, CVE-2013-5774,
CVE-2013-5775, CVE-2013-5776, CVE-2013-5777, CVE-2013-5778, CVE-2013-5780,
CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5789,
CVE-2013-5790, CVE-2013-5797, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803,
CVE-2013-5804, CVE-2013-5805, CVE-2013-5806, CVE-2013-5809, CVE-2013-5810,
CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819,
CVE-2013-5820, CVE-2013-5823, CVE-2013-5824, CVE-2013-5825, CVE-2013-5829,
CVE-2013-5830, CVE-2013-5831, CVE-2013-5832, CVE-2013-5838, CVE-2013-5840,
CVE-2013-5842, CVE-2013-5843, CVE-2013-5844, CVE-2013-5846, CVE-2013-5848,
CVE-2013-5849, CVE-2013-5850, CVE-2013-5852, CVE-2013-5854, SSRT101346.

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.23, and B.11.31 running HP JDK and JRE v7.0.07 and earlier.

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2013-3829(AV:N/AC:L/Au:N/C:P/I:P/A:N)6.4
CVE-2013-4002(AV:N/AC:M/Au:N/C:N/I:N/A:C)7.1
CVE-2013-5772(AV:N/AC:H/Au:N/C:N/I:P/A:N)2.6
CVE-2013-5774(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5775(AV:N/AC:L/Au:N/C:P/I:P/A:P)7.5
CVE-2013-5776(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5777(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5778(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2013-5780(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2013-5782(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5783(AV:N/AC:L/Au:N/C:P/I:P/A:N)6.4
CVE-2013-5784(AV:N/AC:M/Au:N/C:N/I:P/A:N)4.3
CVE-2013-5787(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5789(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5790(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2013-5797(AV:N/AC:M/Au:S/C:N/I:P/A:N)3.5
CVE-2013-5801(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2013-5802(AV:N/AC:L/Au:N/C:P/I:P/A:P)7.5
CVE-2013-5803(AV:N/AC:H/Au:N/C:N/I:N/A:P)2.6
CVE-2013-5804(AV:N/AC:L/Au:N/C:P/I:P/A:N)6.4
CVE-2013-5805(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5806(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5809(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5810(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5812(AV:N/AC:L/Au:N/C:P/I:N/A:P)6.4
CVE-2013-5814(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5817(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5818(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5819(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5820(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5823(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2013-5824(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5825(AV:N/AC:L/Au:N/C:N/I:N/A:P)5.0
CVE-2013-5829(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5830(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5831(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5832(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5838(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5840(AV:N/AC:L/Au:N/C:P/I:N/A:N)5.0
CVE-2013-5842(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5843(AV:N/AC:L/Au:N/C:C/I:C/A:C)   10.0
CVE-2013-5844(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5846(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5848(AV:N/AC:L/Au:N/C:N/I:P/A:N)5.0
CVE-2013-5849(AV:N/AC:M/Au:N/C:P/I:N/A:N)4.3
CVE-2013-5850(AV:N/AC:M/Au:N/C:C/I:C/A:C)9.3
CVE-2013-5852(AV:N/AC:H/Au:N/C:C/I:C/A:C)7.6
CVE-2013-5854(AV:N/AC:H/Au:N/C:P/I:N/A:N)2.6
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following Java version upgrade to 

CORE-2013-1107 - IcoFX Buffer Overflow Vulnerability

2013-12-10 Thread CORE Advisories Team
Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/

IcoFX Buffer Overflow Vulnerability


1. *Advisory Information*

Title: IcoFX Buffer Overflow Vulnerability
Advisory ID: CORE-2013-1107
Advisory URL:
http://www.coresecurity.com/advisories/icofx-buffer-overflow-vulnerability
Date published: 2013-12-10
Date of last update: 2013-12-10
Vendors contacted: IcoFX Software
Release mode: User release


2. *Vulnerability Information*

Class: Buffer overflow [CWE-119]
Impact: Code execution
Remotely Exploitable: No
Locally Exploitable: Yes
CVE Name: CVE-2013-4988


3. *Vulnerability Description*

IcoFX [1] is prone to a (client side) security vulnerability when
processing .ICO files. This vulnerability could be exploited by a remote
attacker to execute arbitrary code on the target machine, by enticing
the user of IcoFX to open a specially crafted icon file.


4. *Vulnerable Packages*

   . IcoFX v2.5.0.0 for Windows.
   . Other versions are probably affected too, but they were not checked.


5. *Vendor Information, Solutions and Workarounds*

There was no official answer from vendor after several attempts to
report this vulnerability (see [Sec. 8]). As mitigation action, given
that this is a client-side vulnerability, avoid to open untrusted ICO
files. Contact vendor for further information.


6. *Credits*

This vulnerability was discovered and researched by Marcos Accossatto
from Core Exploit Writers Team. The publication of this advisory was
coordinated by Fernando Miranda from Core Advisories Team.


7. *Technical Description / Proof of Concept Code*

Below is shown the result of opening the maliciously crafted file
'CORE-2013-1107-icofx-poc.ico'[2] on Windows XP SP3 (EN).

The vulnerable function is located in 0x80D9F8. By loading the PoC, the
loop [0x80DA74, 0x80DA93] fills the buffer and overwrite the Exception
Handler:

/-
0080DA748B45 E8   MOV EAX,DWORD PTR SS:[EBP-18]
0080DA7703C0  ADD EAX,EAX
0080DA798D94C5 8CF9   LEA EDX,DWORD PTR SS:[EBP+EAX*8-674]
0080DA80B9 1000   MOV ECX,10   ;
Will copy 16 bytes from file to buffer
0080DA858B45 F8   MOV EAX,DWORD PTR SS:[EBP-8]
0080DA888B18  MOV EBX,DWORD PTR DS:[EAX]
0080DA8AFF53 0C   CALL DWORD PTR DS:[EBX+C]
0080DA8DFF45 E8   INC DWORD PTR SS:[EBP-18];
Index, will be overwritten with our value in the penultimate loop turn
0080DA90FF4D DC   DEC DWORD PTR SS:[EBP-24];
Counter, will be overwritten with our value in the penultimate loop turn
0080DA9375 DF JNZ SHORT 0080DA74
0080DA950FBF45 F0 MOVSX EAX,WORD PTR SS:[EBP-10]
-/

At the 'MOVSX' of 0x80DA95, the CPU registers are as follows:


/-
EAX 0010
ECX 7C80189C kernel32.7C80189C
EDX 0010
EBX 004617F4 IcoFX2.004617F4
ESP 0012F380
EBP 0012FA08
ESI 005B2CBC IcoFX2.005B2CBC
EDI 02555C80
EIP 0080DA95 IcoFX2.0080DA95
C 1  ES 0023 32bit 0()
P 1  CS 001B 32bit 0()
A 0  SS 0023 32bit 0()
Z 1  DS 0023 32bit 0()
S 0  FS 003B 32bit 7FFDF000(FFF)
T 0  GS  NULL
D 0
O 0  LastErr ERROR_SUCCESS ()
EFL 00200247 (NO,B,E,BE,NS,PE,GE,LE)
ST0 empty -???  00F300F3 00F300F3
ST1 empty -???  00FE00FE 00FE00FE
ST2 empty -???  0009 00220065
ST3 empty -???  000A 00240069
ST4 empty 1.2948274137727088000e+16
ST5 empty 2.5896178900861029000e+16
ST6 empty 3.2651492439228483000e+16
ST7 empty 3.1244147623526446000e+16
   3 2 1 0  E S P U O Z D I
FST   Cond 0 0 0 0  Err 0 0 0 0 0 0 0 0  (GT)
FCW 1272  Prec NEAR,53  Mask1 1 0 0 1 0
-/

And the stack Exception Handler is overwritten (shellcode starts in
0x12F3A4):


/-
0012F380   0012FA10  Pointer to next SEH record
0012F384   42424242  SE handler
0012F388   41414141
0012F38C   41414141
0012F390   41414141
0012F394   000502A8
0012F398   7E4188A6  USER32.GetWindowLongW
0012F39C   
0012F3A0   0012F3D8  ASCII AAA...
0012F3A4   41414141
-/

As a result, the normal execution flow can be altered in order to
execute arbitrary code.


8. *Report Timeline*

. 2013-11-11:
Core Security Technologies attempts to contact the IcoFX team; no reply
received. Publication date is set for Dec 3rd, 2013.

. 2013-11-14:
Core attempts to contact vendor.

. 2013-11-26:
Core attempts to contact vendor.

. 2013-12-03:
Core attempts to contact vendor.

. 2013-12-03:
First release date missed.

. 2013-12-10:
Advisory CORE-2013-1107 published.


9. *References*

[1]  http://icofx.ro/.
[2]
http://www.coresecurity.com/system/files/attachments/2013/12/CORE-2013-1107-icofx-poc.zip


10. *About CoreLabs*

CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system 

[security bulletin] HPSBPI02945 rev.1 - HP Officejet Pro 8500 (A909) All-in-One Printer, Cross-Site Scripting (XSS)

2013-12-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04035829

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04035829
Version: 1

HPSBPI02945 rev.1 - HP Officejet Pro 8500 (A909) All-in-One Printer,
Cross-Site Scripting (XSS)

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2013-12-10
Last Updated: 2013-12-10

Potential Security Impact: Cross-site scripting (XSS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Officejet Pro
8500 (A909) All-in-One Printer. The vulnerability could be exploited to allow
cross-site scripting (XSS).

References: CVE-2013-4845, SSRT101164

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Product Name
 Model Number

HP Officejet Pro 8500 (A909) All-in-One Printer
 CB022A, CB023A, CB025A, CB793A, CB794A, CB862A, CB874A, CN539A

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2013-4845(AV:N/AC:H/Au:N/C:N/I:P/A:N)   2.6
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

The Hewlett-Packard Company thanks David Stroud of Perspective Risk for
reporting CVE-2013-4845 to security-al...@hp.com

RESOLUTION

HP has provided updated HP Officejet Pro 8500 (A909) All-in-One Printer
firmware version DLM1FN1344AR to resolve this issue. To obtain the updated
firmware, go to www.hp.com/go/support

Select Drivers  Downloads
Enter the product name or model number listed in the table above into the
search field
Select on Go
If the search returns a list of products click on the appropriate product
Choose an operating system under Select operating system
Select the firmware under Firmware

HISTORY
Version:1 (rev.1) - 10 December 2013 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hp.com.

Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-al...@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2013 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided as is
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits;damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (GNU/Linux)

iEYEARECAAYFAlKnc6sACgkQ4B86/C0qfVmbhQCgzMbeE2Bxlv3KNCnXK0Jn2Wni
dBsAnA8ts7oaHl26ztUzJeH7BjSaTO4D
=W6N6
-END PGP SIGNATURE-


Android Fragment Injection vulnerability

2013-12-10 Thread Roee Hay
Hi,

We have recently disclosed a new vulnerability to the Android Security
Team. The vulnerability affected many apps, including Settings (the
one that is found on every Android device), Gmail, Google Now, Dropbox
and Evernote. To be more accurate, any App which extended the
PreferenceActivity class using an exported activity was automatically
vulnerable. A patch has been provided in Android KitKat. If you
wondered why your code is now broken, it is due to the Android KitKat
patch which requires applications to override the new method,
PreferenceActivity.isValidFragment, which has been added to the
Android Framework.

Important links:
1. Blog post: http://ibm.co/1bAA8kF
2. Whitepaper: http://ibm.co/IDm2Es

Roee Hay
IBM Application Security Team Lead