[Full-disclosure] [SECURITY] [DSA 2406-1] icedove security update

2012-02-09 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2406-1   secur...@debian.org
http://www.debian.org/security/Florian Weimer
February 09, 2012  http://www.debian.org/security/faq
- -

Package: icedove
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2011-3670 CVE-2012-0442 CVE-2012-0444 CVE-2012-0449

Several vulnerabilities have been discovered in Icedove, Debian's
variant of the Mozilla Thunderbird code base.

CVE-2011-3670
Icedove does not not properly enforce the IPv6 literal address
syntax, which allows remote attackers to obtain sensitive
information by making XMLHttpRequest calls through a proxy and
reading the error messages.

CVE-2012-0442
Memory corruption bugs could cause Icedove to crash or
possibly execute arbitrary code.

CVE-2012-0444
Icedove does not properly initialize nsChildView data
structures, which allows remote attackers to cause a denial of
service (memory corruption and application crash) or possibly
execute arbitrary code via a crafted Ogg Vorbis file.

CVE-2012-0449
Icedove allows remote attackers to cause a denial of service
(memory corruption and application crash) or possibly execute
arbitrary code via a malformed XSLT stylesheet that is
embedded in a document

For the stable distribution (squeeze), this problem has been fixed in
version 3.0.11-1+squeeze7.

We recommend that you upgrade your icedove packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJPM7PyAAoJEL97/wQC1SS+46QH/0NkqnkfapTtEUKV71mvSufA
KSjeYaZqowMJtM1JQcuGdcGQifTeOoXqfm9lBCyXOpoxgGS5ltqOTYkbYRT+2XNr
+sw6SbMA+X5N3+gHIpeuZtDgEqT3hZWlyxoB83LarvVoQfxU+43jfjeR3d4GPNQe
kL0H40v3mt7WneVOdrk+N1LUlqO/EY1KK7lStXhyjSGShTQqOTrWzUXcogKBDcY9
DFT9bR3jKKjPXYKHr1kc4/mEUSGsJ9XHxm0nEAGiXEV6Np+6owB54ANb4BoLV3ON
ZXpYglfqw44ikYi+wDGaPsq91ofmIwb7eqiAadQPBMZTmjUM3BMLKLvumrp1CBY=
=KEq1
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] [SECURITY] [DSA 2407-1] cvs security update

2012-02-09 Thread Florian Weimer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2407-1   secur...@debian.org
http://www.debian.org/security/Florian Weimer
February 09, 2012  http://www.debian.org/security/faq
- -

Package: cvs
Vulnerability  : heap overflow
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-0804

It was discovered that a malicious CVS server could cause a heap
overflow in the CVS client, potentially allowing the server to execute
arbitrary code on the client.

For the stable distribution (squeeze), this problem has been fixed in
version 1:1.12.13-12+squeeze1.

For the unstable distribution (sid), this problem has been fixed in
version 2:1.12.13+real-7.

We recommend that you upgrade your cvs packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJPM8aCAAoJEL97/wQC1SS+sTkH/0CT3+vm2K0QcK8KUEJcY7ML
a9Wt/rChtSDnWWAcUJqnzizR0HJbjKdOzlX6RqVOfR3JwFfMPMo0j3RA8tqEb+Mn
l/Z9pdI/fJAB0qSrlb1yeWQaL1k/GQo1bcIbRsAEbAeETDTzbNRVuEm0O1Arf6ij
IwIa9B54Gbfuw4eEvzCJeaokyp/yMS4TEoxuPC/GYQkQTwEOeEhbh9PLz9p+W5k8
wTNhYzvIGNaUFqg0NKUm4ffbWyQ2f/Yt2F09UgSg5PNKraF2AhhURouwKCXLzXa8
GFiAXkJqoJIrc30YjGNhzTNoWrWkFSyAlRjXnMdfZ8FfTHbJj/78FJ1bk4UTm1c=
=nPqk
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Drupal Finder Module Multiple Vulnerabilities

2012-02-09 Thread Justin Klein Keane
Vulnerability Report

Description of Vulnerability:
-
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal Finder module
(https://drupal.org/project/finder) allows Drupal site administrators
to create flexible faceted search forms to find entities such as nodes
or users based on the values of fields and database attributes. The
Finder module contains multiple vulnerabilities including persistent
cross site scripting (XSS) and an arbitrary code execution
vulnerability.

Systems affected:
-
Drupal 6.22 with Finder 6.x-1.9 was tested and shown to be vulnerable

Impact
-
Users can execute code with the permissions of the web server. Malicious
users could inject arbitrary HTML into search results that could display
to all users.

Mitigating factors:
-
In order to execute arbitrary code execution malicious users must have
the ability to import finders. In order to execute arbitrary script
injection malicious users must have the ability to create content.

Proof of Concept Exploit (Code Execution):
--
1.  Install and enable the Finder modules
2.  Enter '$a = phpinfo()' in the form at ?q=admin/build/finder/import
3.  Submit the form to view the executed code

Proof of Concept Exploit (XSS):
--
1.  Install and enable the Finder modules
2.  At ?q=node/add/story create a new node with the title
scriptalert('xss');/script and save it
3.  Create a new Node finder using the drop down at the bottom of the
page ?q=admin/build/finder
4.  Check 'Provide block' and select Autocomplete textfield from the
'Add element' drop down
5.  Save the new finder using the button at the bottom of the form
6.  In the resulting configuration scree
(?q=admin/build/finder/X/edit/2/edit/ where X is the Finder ID) select
Node:Title from the 'Find items by this field:' select list and click
'Save finder element'
7.  Enable the new Finder block at ?q=admin/build/block
8.  Type 'xss' into the Finder block to view the rendered JavaScript

Vendor Response:
-
Upgrade to the latest version of Finder. SA-CONTRIB-2012-017
(https://drupal.org/node/1432970)

Text of this advisory also available at 
http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities

-- 
Justin Klein Keane
http://www.MadIrish.net




signature.asc
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ MDVSA-2012:015 ] wireshark

2012-02-09 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2012:015
 http://www.mandriva.com/security/
 ___

 Package : wireshark
 Date: February 9, 2012
 Affected: 2011.
 ___

 Problem Description:

 Multiple file parser and NULL pointer vulnerabilities including a
 RLC dissector buffer overflow was found and corrected in Wireshark.
 
 This advisory provides the latest version of Wireshark (1.6.5 )
 which is not vulnerable to these issues.
 ___

 References:

 http://www.wireshark.org/security/wnpa-sec-2012-01.html
 http://www.wireshark.org/security/wnpa-sec-2012-02.html
 http://www.wireshark.org/security/wnpa-sec-2012-03.html
 ___

 Updated Packages:

 Mandriva Linux 2011:
 928f521ace4a9057612993e648d258bd  
2011/i586/dumpcap-1.6.5-0.1-mdv2011.0.i586.rpm
 5050ae3283980435098e8b49adad47be  
2011/i586/libwireshark1-1.6.5-0.1-mdv2011.0.i586.rpm
 ba897182d44dba67f80ee7090d9f8d12  
2011/i586/libwireshark-devel-1.6.5-0.1-mdv2011.0.i586.rpm
 6275cc3611c5587c5dbf46cb34a6fa17  
2011/i586/rawshark-1.6.5-0.1-mdv2011.0.i586.rpm
 389cac9860619287201c8ac6527cacb6  2011/i586/tshark-1.6.5-0.1-mdv2011.0.i586.rpm
 f19e04986353d7baa5cc19ebd96f2cc3  
2011/i586/wireshark-1.6.5-0.1-mdv2011.0.i586.rpm
 2d504b85fac7e81c954e2014c8bf6f47  
2011/i586/wireshark-tools-1.6.5-0.1-mdv2011.0.i586.rpm 
 614335cad461abe9b6a22cd39d4e08a2  2011/SRPMS/wireshark-1.6.5-0.1.src.rpm

 Mandriva Linux 2011/X86_64:
 2b08fbbbd05b606f24e718bdf63c40bb  
2011/x86_64/dumpcap-1.6.5-0.1-mdv2011.0.x86_64.rpm
 8a6ded3e508fdc70409afc73fd01fa0a  
2011/x86_64/lib64wireshark1-1.6.5-0.1-mdv2011.0.x86_64.rpm
 700de695c75daffa202e03e07e76bb98  
2011/x86_64/lib64wireshark-devel-1.6.5-0.1-mdv2011.0.x86_64.rpm
 d0bc1a32027baddeebbb2b5bf50cf955  
2011/x86_64/rawshark-1.6.5-0.1-mdv2011.0.x86_64.rpm
 b50919e405dbb3d6a0a1a24be68c2e2f  
2011/x86_64/tshark-1.6.5-0.1-mdv2011.0.x86_64.rpm
 2e0394ddaf1fbc71dd70166cc0e83938  
2011/x86_64/wireshark-1.6.5-0.1-mdv2011.0.x86_64.rpm
 90ab7081f9966a9277b32a0a9edd22e0  
2011/x86_64/wireshark-tools-1.6.5-0.1-mdv2011.0.x86_64.rpm 
 614335cad461abe9b6a22cd39d4e08a2  2011/SRPMS/wireshark-1.6.5-0.1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPM6YZmqjQ0CJFipgRAoqPAKDeBMgn8+6zGZvgHDfUOFQRYnbDSQCdHhaA
5IL+RS/TUC3GPqZhEuks4KU=
=Oxsu
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] Creating backdoors using SQL Injection

2012-02-09 Thread Adam Behnke
An InfoSec Institute Review on Creating backdoors using SQL Injection:

 

http://resources.infosecinstitute.com/backdoor-sql-injection/

 

A novel technique that highlights the risk of not chrooting your SQL
servers. 

 

 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] List Charter

2012-02-09 Thread John Cartwright

[Full-Disclosure] Mailing List Charter
John Cartwright jo...@grok.org.uk
 

- Introduction  Purpose -

This document serves as a charter for the [Full-Disclosure] mailing 
list hosted at lists.grok.org.uk.

The list was created on 9th July 2002 by Len Rose, and is primarily 
concerned with security issues and their discussion.  The list is 
administered by John Cartwright.

The Full-Disclosure list is hosted and sponsored by Secunia.


- Subscription Information -

Subscription/unsubscription may be performed via the HTTP interface 
located at http://lists.grok.org.uk/mailman/listinfo/full-disclosure.

Alternatively, commands may be emailed to 
full-disclosure-requ...@lists.grok.org.uk, send the word 'help' in 
either the message subject or body for details.

 
- Moderation  Management -

The [Full-Disclosure] list is unmoderated. Typically posting will be
restricted to members only, however the administrators may choose to 
accept submissions from non-members based on individual merit and 
relevance.

It is expected that the list will be largely self-policing, however in
special circumstances (eg spamming, misappropriation) then offending 
members may be removed from the list by the management.

An archive of postings is available at 
http://lists.grok.org.uk/pipermail/full-disclosure/.
 

- Acceptable Content -

Any information pertaining to vulnerabilities is acceptable, for 
instance announcement and discussion thereof, exploit techniques and 
code, related tools and papers, and other useful information.

Gratuitous advertisement, product placement, or self-promotion is 
forbidden.  Disagreements, flames, arguments, and off-topic discussion 
should be taken off-list wherever possible.

Humour is acceptable in moderation, providing it is inoffensive. 
Politics should be avoided at all costs.

Members are reminded that due to the open nature of the list, they 
should use discretion in executing any tools or code distributed via
this list.
 

- Posting Guidelines -

The primary language of this list is English. Members are expected to 
maintain a reasonable standard of netiquette when posting to the list. 

Quoting should not exceed that which is necessary to convey context, 
this is especially relevant to members subscribed to the digested 
version of the list.

The use of HTML is discouraged, but not forbidden. Signatures will 
preferably be short and to the point, and those containing 
'disclaimers' should be avoided where possible.

Attachments may be included if relevant or necessary (e.g. PGP or 
S/MIME signatures, proof-of-concept code, etc) but must not be active 
(in the case of a worm, for example) or malicious to the recipient.

Vacation messages should be carefully configured to avoid replying to 
list postings. Offenders will be excluded from the mailing list until 
the problem is corrected.

Members may post to the list by emailing 
full-disclosure@lists.grok.org.uk. Do not send subscription/
unsubscription mails to this address, use the -request address 
mentioned above.


- Charter Additions/Changes -

The list charter will be published at 
http://lists.grok.org.uk/full-disclosure-charter.html.

In addition, the charter will be posted monthly to the list by the 
management.

Alterations will be made after consultation with list members and a 
consensus has been reached.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] What's up with the ImmunityInc forums?

2012-02-09 Thread Byron L. Sonne
Hey, anyone know why it's taking so long for the ImmunityInc forums to
come back up? It's been weeks, man.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Bug 718066 - [meta] Add feature to submit anonymous product metrics to Mozilla

2012-02-09 Thread Nick Boyce
On Wed, Feb 8, 2012 at 9:12 PM, . . kerdezd...@gmail.com wrote:

 https://bugzilla.mozilla.org/show_bug.cgi?id=718066

 what the hell is this?!

I'll bite ...  (I know your question was rhetorical)

It's a very bad idea IMO.

From TFA:
(https://wiki.mozilla.org/MetricsDataPing)

  Mozilla has a critical need to be able to understand
  the factors that cause installations of Firefox to no
  longer be used. The system must have some way to
  detect an abandoned installation.

Their proposed solution seems to be (from the bug and wiki) to include
code in Firefox to submit a lot of information to mozilla.org, on a
regular basis, about the individual FF installation ... date
installed, list of add-ons installed, with date each add-on installed,
date FF last used, OS type, FF version, whether up to date when last
used, etc.

Far too much information for comfort - sufficient to _enable_
fingerprinting and tracking of individual FF installation use (e.g.
is this browser installation using Tor the same as that other browser
not using Tor ?), even if that is not the _intention_.  Contravention
of EU data protection laws seems probable, or at least German laws.

OT: They should just make FF quality high and the design impeccable -
that's all they need do to win our hearts and minds (many other FLOSS
projects exist to attest to that).  The engineers know what's needed,
and the users have spoken out endlessly on the forums - metrics are
for managers.

Sigh.

Nick
-- 
public void Ballmer(Developers developers) throws Chair

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/