Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread William A. Rowe, Jr.
Michal Zalewski wrote: I feel silly for reporting this, but I couldn't help but notice that Apache and IIS both have a bizarro implementation of HTTP/1.1 Range header functionality (as defined by RFC 2616). Their implementations allow the same fragment of a file to be requested an arbitrary

CFP for RAID 2007

2007-01-04 Thread Jeffrey Horton
CALL FOR PAPERS RAID 2007 10th International Symposium on Recent Advances in Intrusion Detection 2007 September 5-7, 2007 Crowne

Re: [Full-disclosure] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread Juha-Matti Laurio
Possibly no, but I was just sending this reference to the lists: http://www.kb.cert.org/vuls/id/815960 According to public reports, this vulnerability is addressed in Adobe Acrobat Reader 8.0. Solution: http://www.adobe.com/products/acrobat/readstep2.html But it is worth of mentioning that

Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread Michal Zalewski
On Wed, 3 Jan 2007, William A. Rowe, Jr. wrote: Seriously, HTTP pipelining can accomplish EXACTLY the same thing with minimal pain. No, it can't. Client-side pipelining using simultaneous sessions with keep-alives is usually severely restricted on server-side (exactly for the reason they can

Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread William A. Rowe, Jr.
Michal Zalewski wrote: On Wed, 3 Jan 2007, William A. Rowe, Jr. wrote: If you have an issue with this behavior, of HTTP, then you have an issue with the behavior under FTP or a host of other protocols. Not really; see above. These are typically well known, preventable by configuring

Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread Michal Zalewski
On Thu, 4 Jan 2007, William A. Rowe, Jr. wrote: On the matter of your 1GB window (which is, again, the real issue), you have any examples of a kernel that permits that large a sliding window buffer by default No, I simply mentioned the hypothetical maximum; common configurations for

Re: OpenSER OSP Module remote code execution

2007-01-04 Thread bogdan
Thanks for the report. The maintainer of the OSP module, Di-Shi Sun already applied a patch to fix this issue. The fix fix has been committed to 1.1.x (latest stable) and MAIN HEAD (development) on 1/2/07. Regards, Bogdan

Re: SMS handling OpenSER remote code executing

2007-01-04 Thread bogdan
Thanks for report. I just applied an fix for both the latest stable version (1.1.0) and the development version (1.2.0). Not sure if code injection is possible as the maximum overflow is of 5 bytes, guess not long enough to encode an instruction. Regards, Bogdan

Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread bugtraq
A slashdot user suggested the following One possible work around on the server side: Direct your web server to serve .pdf files as mime type application/octet That way the files will be saved to disk instead of opening in the browser plug in. URL:

Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread Jim Manico
I'm most worried about the CSRF vector. XSS attacks are easily preventable via a web app firewall, input validation and/or session ID rotation; and I see a lot of frameworks (like Drupal 4.7.4+) protect against CSRF via Form Keys and/or rotating sessions. But I do not see a lot of custom

23C3 - Bluetooth hacking revisted [Summary and Code]

2007-01-04 Thread Thierry Zoller
Dear List, Kevin Finistere and myself gave a Talk in Berlin 29th on Bluetooth Hacking, we presented new implementation bugs as well as bugs/problems deeply buried within the Protocol itself. This mail to the list should represent a digest for those not able to attend or able to view the stream.

Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread RSnake
No, that is incorrect. This is not visible by the application because achor tags are not sent to the webserver. This is completely invisible to web application firewalls. Btw, a user on http://sla.ckers.org/ made this recommendation for fixing your own browsers:

MkPortal All Guests are Admin Exploit

2007-01-04 Thread info
MkPortal All Guests are Admin Exploit Vulnerability discovered and exploited by: Demential Web: http://headburn.altervista.org E-mail: info[at]burnhead[dot]it Mkportal website: http://www.mkportal.it Start Macromedia Flash and create an swf file with this code: var idg:Number = 9; var

LS-20061102 - Business Objects Crystal Reports XI Professional Stack Overflow Vulnerability

2007-01-04 Thread advisories
LS-20061102 LSsec has discovered a vulnerability in Business Objects Crystal Reports XI Professional, which could be exploited by an attacker in order to execute arbitrary code on an affected system. Exploitation requires that the attacker coerce the target user into opening a malicious .RPT

Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread pdp (architect)
ahhh, fragment identifiers make sense to browsers only. they are not send to the server On 1/4/07, der wert [EMAIL PROTECTED] wrote: The best solution I see would be to keep all pdf files in a non-web accessible location on the web server, then have all the pdf files outputed through a script

Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread Pieter de Boer
Michal Zalewski wrote: 2) Negotiate a high TCP window size for each of the connections (1 GB should be doable), Just zooming in on one detail of your e-mail. While you could set your own TCP receive window to 1GB, you obviously can't set the sender's send window to 1GB if it doesn't

[vuln.sg] PowerArchiver PAISO.DLL Buffer Overflow Vulnerability

2007-01-04 Thread vulnpost-remove
[vuln.sg] Vulnerability Research Advisory PowerArchiver PAISO.DLL Buffer Overflow Vulnerability by Tan Chew Keong Release Date: 2007-01-04 Summary --- A vulnerability has been found in PowerArchiver. When exploited, the vulnerability allows execution of arbitrary code when the user opens a

Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread HASEGAWA Yosuke
Hi, As the server side solution, force rewriting fragment identifiers in URI by redirecion responce can be considered. Disallow the directoly access to PDF on the server and return response such as: -- Location: http://example.com/one-shot-url.pdf#top -- As a result, fragment identifiers in

Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread Siim Põder
Michal Zalewski wrote: 1) Connect to the server (as many times as allowed by the remote party or deemed appropriate for the purpose of this demonstration), 2) Negotiate a high TCP window size for each of the connections (1 GB should be doable), 3) Send a partial request as

Universal PDF XSS After Party

2007-01-04 Thread pdp (architect)
Everybody knows about it. Everybody talks about it. We had a nice party. It is time for estimating the damages. In this article I will try to show the impact of the Universal PDF XSS vulnerability by explaining how it can be used in real life situations.

RE: [Full-disclosure] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread Larry Seltzer
According to public reports, this vulnerability is addressed in Adobe Acrobat Reader 8.0. I've actually tested it. On Reader 8 Acrobat you get a messagebox that says This operation is not allowed Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/

Re: RE: [Full-disclosure] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread Juha-Matti Laurio
Additionally, the public PoC doesn't work on Preview version 3.0.8 (409) on OS X 10.4.8. - Juha-Matti Larry Seltzer [EMAIL PROTECTED] wrote: According to public reports, this vulnerability is addressed in Adobe Acrobat Reader 8.0. I've actually tested it. On Reader 8 Acrobat you get a

Re: Universal XSS with PDF files: highly dangerous

2007-01-04 Thread Thierry Zoller
Dear List, Did anybody mention this does not work in Adobe Acrobat Reader 8 ? -- http://secdev.zoller.lu Thierry Zoller Fingerprint : 5D84 BFDC CD36 A951 2C45 2E57 28B3 75DD 0AC6 F1C7

Re: PHP as a secure language? PHP worms? [was: Re: new linux malware]

2007-01-04 Thread Lawrence Paul MacIntyre
Dana: The S in RSA stands for Adi Shamir, not Ravi Sethi. Ravi is the author of the Dragon Book, however. This one time, at band camp, Dana Hudes wrote: Darren Reed wrote: In functional programming languages (think 4GLs like prolog), Prolog isn't a 4GL (it was invented in 1972 ). In Ravi

RE: PHP as a secure language? PHP worms? [was: Re: new linux malware]

2007-01-04 Thread Jim Harrison
..comment has nothing to do with either.. - I'm addressing the generalistic genuine security arguments offered in this discussion. I have no contrary argument to the point that PHP in its current incarnation is not designed to be secure; only that those who espouse the idyllic language are in for

Re: [Full-disclosure] Universal PDF XSS After Party(posible solution)

2007-01-04 Thread Darren Bounds
If I recall correctly from the Content-Disposition HTML attachment handling vulnerabilities last year, Opera didn't reliably abide by the Content-Disposition header. Additionally, Content-Disposition support in IE, Firefox, Opera, Safari and a few others was extremely inconsistent from version

Re: PHP as a secure language? PHP worms? [was: Re: new linux malware]

2007-01-04 Thread Bill Nash
On Wed, 3 Jan 2007, Darren Reed wrote: The problem we have right now is that the language commonly used for dynamic web pages on non-Microsoft platforms is PHP and that this has not been engineered *for security*. The goal of a language such as PHP should be to make it possible to do what

SAP Security Contact

2007-01-04 Thread Mark Litchfield
I do not like to bother this mailing list with such requests, but as you will see from below (SAP's response), I feel this is a last resort. I have also phoned SAP leaving a voice mail but with no success. So if anyone can assist with a contact email address at SAP, ideally an individual,

Re: PHP as a secure language? PHP worms? [was: Re: new linux malware]

2007-01-04 Thread Ronald Chmara
On Jan 2, 2007, at 10:37 AM, Darren Reed wrote: In some mail from Jim Harrison, sie said: Again; I agree with and fully support the effort. What I'm trying to point out is the literal impossibility of actually achieving genuine security in either our code or the languages it's written in.

[ GLSA 200701-01 ] DenyHosts: Denial of Service

2007-01-04 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [WEB SECURITY] RE: Universal PDF XSS After Party(posible solution)

2007-01-04 Thread RSnake
Be careful using either of those. REQUEST_URI can contain anything: http://example.com/file.pdf?whatever#vectorgoeshere For that example the request URI will be ..pathto..file.pdf?whatever which does not match \.pdf$. Likewise the second one has issues, including the fact that referrers are

Re: [WEB SECURITY] RE: [Full-disclosure] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread RSnake
Last night I came up with a proof of concept to exploit this locally: http://ha.ckers.org/blog/20070103/pdf-xss-can-compromise-your-machine/ If you have Adobe 7.0 installed there is a at least one standard PDF installed on the local drive. Ouch. -RSnake http://ha.ckers.org/

Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread Rob Sherwood
On Thu, Jan 04, 2007 at 12:45:35PM +0100, Pieter de Boer wrote: Michal Zalewski wrote: 2) Negotiate a high TCP window size for each of the connections (1 GB should be doable), For instance, FreeBSD by default has TCP send buffers set to 32KB. It does not (apart from recent work)

[ GLSA 200701-02 ] Mozilla Firefox: Multiple vulnerabilities

2007-01-04 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Correction (High Risk Vulnerability in the OpenOffice and StarOffice Suites)

2007-01-04 Thread NGSSoftware Insight Security Research
Only versions prior to OpenOffice 2.1.0 are vulnerable to the heap overflows found by John. Cheers, David Litchfield -- E-MAIL DISCLAIMER The information contained in this email and any subsequent correspondence is private, is solely for the intended recipient(s) and may contain confidential

[ GLSA 200701-03 ] Mozilla Thunderbird: Multiple vulnerabilities

2007-01-04 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: [VulnWatch] High Risk Vulnerability in the OpenOffice and StarOffice Suites

2007-01-04 Thread Florian Weimer
* NGSSoftware Insight Security Research: The vulnerabilities, three heap overflows, affect OpenOffice 2.1.0 and http://download.openoffice.org/2.1.0/index.html As far as I can tell, there is no version newer than 2.1.0 available at the web site. According to uncorroborated, version 2.1.0 is

Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread Rude Yak
RSnake wrote: No, that is incorrect. This is not visible by the application because achor tags are not sent to the webserver. This is completely invisible to web application firewalls. Btw, a user on http://sla.ckers.org/ made this recommendation for fixing your own browsers:

Re: [VulnWatch] High Risk Vulnerability in the OpenOffice and StarOffice Suites

2007-01-04 Thread David Litchfield
Hi Florian, * NGSSoftware Insight Security Research: The vulnerabilities, three heap overflows, affect OpenOffice 2.1.0 and http://download.openoffice.org/2.1.0/index.html As far as I can tell, there is no version newer than 2.1.0 available at the web site. According to uncorroborated,

RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread RSnake
That's correct. In doing some quick tests you can mitigate this if you take the URL (let's say http://site.com/file.pdf) and 301 them to the same file with an empty anchor tag: http://site.com/file.pdf# Of course that would cause an infinite loop since the empty anchor tag is not visible to

High Risk Vulnerability in the OpenOffice and StarOffice Suites

2007-01-04 Thread NGSSoftware Insight Security Research
John Heasman of NGSSoftware has discovered several high risk vulnerabilities in the handling of WMF and EMF graphics formats within the OpenOffice StarOffice suite. The vulnerabilities, three heap overflows, affect OpenOffice 2.1.0 and StarOffice 6, 7 and 8. If an attacker can coax a user into

RE: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread Martin O'Neal
I've had a better look at this now, and there seems to be a generic server side solution through the content-disposition header (at least for the versions of Firefox and IE which I have tested). If it is specified, the default installs of both products always produce a download dialog and don't

Concurrency strikes MSIE (potentially exploitable msxml3 flaws)

2007-01-04 Thread Michal Zalewski
A while ago, apparently angry with Larry Seltzer, I penned a quick write-up on the possible issues with race conditions triggered by asynchronous browser events (such as JavaScript timers) colliding with synchronous content rendering: http://seclists.org/vulnwatch/2006/q3/0023.html This is in

DMA[2007-0104a] - 'iLife iPhoto Photocasing Format String Vulnerability'

2007-01-04 Thread K F (lists)
DMA[2007-0104a] - 'iLife iPhoto Photocasing Format String Vulnerability' Author: Kevin Finisterre Vendor(s): http://www.apple.com Product: 'iLife 06 (?)' References: http://www.digitalmunition.com/DMA[2007-0104a].txt http://www.apple.com/ilife/iphoto/features/photocasting.html

Re: a cheesy Apache / IIS DoS vuln (+a question)

2007-01-04 Thread Michal Zalewski
On Thu, 4 Jan 2007, Michal Zalewski wrote: On Thu, 4 Jan 2007, William A. Rowe, Jr. wrote: 2) Theoretical window size limits and commonly implemented settings do have a side effect of making such attacks more feasible for attackers with a very limited bandwidth available. There's

RE: [Full-disclosure] Concurrency strikes MSIE (p otentially exploitablemsxml3 flaws)

2007-01-04 Thread Larry Seltzer
I hope you're still not angry! I just tried your demo on IE7. It took a while longer but does seem to have locked up. Were you looking at IE6 or IE7, and is the behavior any different? Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/

RE: Universal PDF XSS After Party(posible solution)

2007-01-04 Thread Noe Espinoza M.
We need to force to the users do download the pdf files And we can add to the httpd.conf or .htaccess the next code SetEnvIf Request_URI \.pdf$ requested_pdf=pdf Header add Content-Disposition Attachment env=requested_pdf Other solution is protect our pdf files to external links (hotlinking)

[USN-398-3] Firefox theme regression

2007-01-04 Thread Kees Cook
=== Ubuntu Security Notice USN-398-3 January 04, 2007 firefox-themes-ubuntu regression https://launchpad.net/bugs/76871 === A security issue affects the following Ubuntu

Perforce client: security hole by design

2007-01-04 Thread Ben Bucksch
= Abstract = The Perforce client has a huge gapping security hole by design. It totally trusts the Perforce server and does whatever the server tells it, writing arbitrary files. = Disclaimer = This is so terribly obvious that I'd be surprised that this is news, but I couldn't find

SAP Security

2007-01-04 Thread Mark Litchfield
I note from http://www.sap.com/solutions/security/index.epx - In addition, SAP follows a thorough security response process, which will soon include a security bulletin to keep SAP customers up-to-date as new security threats and vulnerabilities are uncovered and addressed Guess they are still

Re: Re: [WEB SECURITY] Universal XSS with PDF files: highly dangerous

2007-01-04 Thread rudeyak
YMMV, but in our own testing of server-side defenses for Apache, we had to resort to the following to extract the anchor information: # mod_rewrite defense RewriteCond %{THE_REQUEST} .*\.pdf[^A-Za-z0-9._?%-] RewriteRule (.*\.(pdf)) $1 [R,L] # mod_security defense SecRule REQUEST_URI_RAW:

CMS Made Simple non-permanent XSS

2007-01-04 Thread nanoymaster
# /||` \ | || \` / ||\ # #/ || |\\| ||` \/` || \# #\ || | \` || |\/| || /# # \||_|` \_||_|` |_||/ # # http://www.nanoy.org # Hacker.: NanoyMaster CMS: CMS Made Simple Version: 1.0.2 [exploits--] 1) Search XSS

Re: [VulnWatch] High Risk Vulnerability in the OpenOffice and StarOffice Suites

2007-01-04 Thread Pete Connolly
On Thursday 04 January 2007 21:00, David Litchfield wrote: Hi Florian, * NGSSoftware Insight Security Research: The vulnerabilities, three heap overflows, affect OpenOffice 2.1.0 and http://download.openoffice.org/2.1.0/index.html As far as I can tell, there is no version newer than

RE: [Full-disclosure] Concurrency strikes MSIE (p otentially exploitablemsxml3 flaws)

2007-01-04 Thread Michal Zalewski
On Thu, 4 Jan 2007, Larry Seltzer wrote: I hope you're still not angry! It took months of therapy, but I recovered ;) I just tried your demo on IE7. It took a while longer but does seem to have locked up. Were you looking at IE6 or IE7, and is the behavior any different? I tested several