Re: DC4420 - London DEFCON - September meet - Tuesday 24th September 2013

2013-09-24 Thread Tony Naggs
We now have a second talk for tomorrow (Tuesday) night. Thanks Alec
for setting this up. :-)

***

Secondary speaker:

Collin Greene, Facebook.

Title:

Tales from a Whitehat programme

***

Venue: The Phoenix, Cavendish Square
http://www.phoenixcavendishsquare.co.uk/

Date: Tuesday 24th September, 2013

Time: 17:30 till kicking out - talk starts at 19:30

***

Looking forward to seeing you there.


CVE-2013-5118 - XSS Good for Enterprise iOS

2013-09-24 Thread mario
Hello,

Last month I identified a XSS vulnerability in the Good for Enterprise iOS 
application.

The vulnerable versions are v2.2.2.1611 and earlier
 
Proof of Concept:
HTML Email including the following payload will execute Javascript statements 
when the victim open the email using the vulnerable version.
 
Payload:
body
div
scriptalert('XSS Here')/script
/div
/body
 
Remediation:
I worked with the Good people to close the issue, I provided some guidance and 
feedback and agreed with them to not disclose it until they fix it.

The new release is now available:
Update the Good for Enterprise iOS application to 2.2.4.1659 or newer
 
References:
https://www.roblest.com/#research:CVE-2013-5118 

Can the comunity please provide feedback and comments in order to ensure the 
fix is working well

Many thanks

Mario


[SECURITY] [DSA 2763-1] pyopenssl security update

2013-09-24 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2763-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
September 24, 2013 http://www.debian.org/security/faq
- -

Package: pyopenssl
Vulnerability  : hostname check bypassing
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2013-4314
Debian Bug : 722055

It was discovered that PyOpenSSL, a Python wrapper around the OpenSSL
library, does not properly handle certificates with NULL characters in
the Subject Alternative Name field.

A remote attacker in the position to obtain a certificate for
'www.foo.org\0.example.com' from a CA that a SSL client trusts, could
use this to spoof 'www.foo.org' and conduct man-in-the-middle attacks
between the PyOpenSSL-using client and the SSL server.

For the oldstable distribution (squeeze), this problem has been fixed in
version 0.10-1+squeeze1.

For the stable distribution (wheezy), this problem has been fixed in
version 0.13-2+deb7u1.

For the unstable distribution (sid), this problem has been fixed in
version 0.13-2.1.

We recommend that you upgrade your pyopenssl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
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=fCjj
-END PGP SIGNATURE-