Re: Medium severity flaw in BlackBerry QNX Neutrino RTOS

2014-03-13 Thread Tim Brown
Might have been helpful to attach the advisory. Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ NDSA20140311.txt.asc Description: PGP signature signature.asc Description: This is a digitally signed message part.

Medium severity flaw in BlackBerry QNX Neutrino RTOS

2014-03-12 Thread Tim Brown
been disclosed by a 3rd party. In light of this and in the absence of any timely response from BlackBerry, Nth Dimension have opted to make full details public. -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ signature.asc Description: This is a digitally signed

Re: [Full-disclosure] CVE-2013-1643 - Unauthorised Access To Other Users Email Messages in Symantec PGP Universal Web Messenger

2014-02-18 Thread Tim Brown
VDBs, please note that the referenced CVE ID is wrong. CVE-2014-1643 was actually assigned to this issue by Symantec. Tim -- Tim Brown mailto:t...@65535.com signature.asc Description: This is a digitally signed message part.

[OVSA20131108] OpenVAS Manager And OpenVAS Administrator Vulnerable To Partial Authentication Bypass

2013-11-17 Thread Tim Brown
and OpenVAS Administrator have also been created which incorporate these patches. Thanks OpenVAS would like to thank Antonio Sanchez Arago for his help in reporting the vulnerability and apologise to all concerned for the substantial delay in triaging his report. -- Tim Brown mailto:t...@openvas.org

Low severity flaw in RIM BlackBerry PlayBook OS browser

2012-12-03 Thread Tim Brown
a patch which it is believed successfully resolves the reported issue. Thanks Nth Dimension would like to thank all the security folk at RIM, in particular the BlackBerry Incident Response team for the way they worked to resolve the issue. -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth

[OVSA20121112] OpenVAS Manager Vulnerable To Command Injection

2012-11-13 Thread Tim Brown
releases of both 3.0.x and 4.0.x have also been created which incorporate this patch. Thanks OpenVAS would like to thank Andre Heinecke of Greenbone Networks for his help in reporting the vulnerability. -- Tim Brown mailto:timb@openvas,org http://www.openvas.org/ OpenVAS Security Advisory

Re: [OVSA20121112] OpenVAS Manager Vulnerable To Command Injection

2012-11-13 Thread Tim Brown
Doh, a document gets proof read by multiple people and yet it contains a mistake. In the Current Status section of the advisory, the date is incorrect. A corrected advisory is attached. Tim -- Tim Brown mailto:timb@openvas,org http://www.openvas.org/ OpenVAS Security Advisory (OVSA20121112

Re: [Full-disclosure] Breaking the links: Exploiting the linker

2011-10-17 Thread Tim Brown
-dimension.org.uk/downloads.php?id=80 - Generic attack on the QNX runtime linker which abuses an arbitrary file overwrite and race condition to get root. CVE-2011-4060. Cheers, Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ signature.asc Description

Medium severity flaw with Ark

2011-10-07 Thread Tim Brown
this does not allow the wrong file to be overwritten, after closing the default view, Ark will then attempt to delete the temporary file which could result in the deletion of the incorrect file. After discussions with the vendor, CVE-2011-2725 was assigned to this vulnerability. Tim -- Tim Brown

Low severity flaw in various applications including KSSL, Rekonq, Arora, Psi IM

2011-10-07 Thread Tim Brown
-2011-3366 * Arora - CVE-2011-3367 Note that no CVE has yet been assigned to Psi IM. Nokia have also updated the QLabel class section of the Qt documentation to provide updated security information regarding this issue. -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk

Breaking the links: Exploiting the linker

2011-06-30 Thread Tim Brown
to get root. The paper is still a work in progress but both DB2 and QNX are available for download if you want to take them for a spin. Anyway, enjoy! Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ signature.asc Description: This is a digitally signed

Medium severity flaw in Konqueror

2011-04-12 Thread Tim Brown
-- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ NDSA20110321.txt.asc Description: PGP signature signature.asc Description: This is a digitally signed message part.

Re: [Full-disclosure] Medium severity flaw in Konqueror

2011-04-12 Thread Tim Brown
On Tuesday 12 April 2011 03:36:24 Vincent Danen wrote: * [2011-04-11 22:07:24 +0100] Tim Brown wrote: I was recently taking a look at Konquerer and spotted an example of universal XSS. Essentially, the error page displayed when a requested URL is not available includes said URL. If said URL

Medium severity flaw in QNX Neutrino RTOS

2011-03-11 Thread Tim Brown
of an arbitrary file. Moreover the technique by which this can be achieved can be triggered even where the binary being executed is setUID and is running as another user. Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ NDSA20110310.txt.asc Description: PGP signature

[OVSA20110118] OpenVAS Manager Vulnerable To Command Injection

2011-01-25 Thread Tim Brown
to thank Ronald Kingma and Alexander van Eee of ISSX for their help in reporting the vulnerability. -- Tim Brown mailto:t...@openvas.org http://www.openvas.org/ OpenVAS Security Advisory (OVSA20110118) Date: 18th January 2011 Product: OpenVAS Manager = 1.0.3 and 2.0rc2 Vendor: OpenVAS http

Medium security flaw in Apache Traffic Server

2010-09-10 Thread Tim Brown
. Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ NDSA20100830.txt.asc Description: PGP signature signature.asc Description: This is a digitally signed message part.

DLL hijacking on Linux

2010-08-25 Thread Tim Brown
been defined. It's worth checking for this kind of thing in scripts that may be run via sudo/su when auditing hosts. I don't believe it's a vulnerability per se, but particular instances of broken scripts may well be. Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth

Re: [Full-disclosure] Medium security hole in Varnish reverse proxy

2010-03-30 Thread Tim Brown
, an attacker probably doesn't need to make the distinction anyway. Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth-dimension.org.uk/ signature.asc Description: This is a digitally signed message part.

Medium security hole in Varnish reverse proxy

2010-03-29 Thread Tim Brown
in that the administrative interface can be disabled, I'm not convinced that making a C compiler available over a network interface without authentication is sound practice, especially when the resultant compiled code can be made to run as root rather trivially. Tim -- Tim Brown mailto:t...@nth

High security hole in NullLogic Groupware

2009-07-06 Thread Tim Brown
Hi, I've identified a couple of security flaws affecting the NullLogic Groupware which may allow compromise of accounts, denial of service or even remote code execution.  These issues were reported by email to the developer but no response was forthcoming.   Tim -- Tim Brown mailto:t...@nth

Medium security hole in TekRADIUS

2009-07-06 Thread Tim Brown
Hi, I've identified a couple of security flaws affecting the TekRADIUS radius server for Windows which may allow privilege escalation. These issues were reported by email to the vendor and have I believe been resolved. Tim -- Tim Brown mailto:t...@nth-dimension.org.uk http://www.nth

Medium security hole affecting Festival on Debian unstable/testing and Ubuntu Hardy Heron

2008-04-04 Thread Tim Brown
this flaw. An advisory for this flaw which provides further information is attached. A short analysis of Debian's response can be found at http://www.nth-dimension.org.uk/blog.php?id=68. Cheers, Tim -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/ NDSA20080215.txt.asc

Serious holes affecting SiteBar 3.3.8

2007-10-18 Thread Tim Brown
or assigned to the best of my knowledge. Tim -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/ Index: command.php === --- command.php (revision 412) +++ command.php (working copy) @@ -94,8 +94,15

SSHatter 0.6

2007-10-06 Thread Tim Brown
-dimension.org.uk/downloads.php?id=34. Remember, auditing systems without permission may be a crime, always read the label. Tim -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/

Re: [Full-disclosure] Next generation malware: Windows Vista's gadget API

2007-09-17 Thread Tim Brown
does the trust model for gadgets consist of full trust and nothing more. Why not allow gadgets to state in their manifest that for example they don't need to execute things, won't make use of ActiveX controls and will only connect to a specific host? Tim -- Tim Brown mailto:[EMAIL PROTECTED]

Re: [Full-disclosure] Next generation malware: Windows Vista's gadget API

2007-09-17 Thread Tim Brown
(the default gadgets in Vista, in the case of the PoC). Essentially anywhere a gadget calls for example eval() on untrusted data you *may* have a a problem. Tim -- Tim Brown mailto:[EMAIL PROTECTED]

Re: Next generation malware: Windows Vista's gadget API

2007-09-17 Thread Tim Brown
analysis. Tim -- Tim Brown mailto:[EMAIL PROTECTED]

Next generation malware: Windows Vista's gadget API

2007-09-13 Thread Tim Brown
paper can be found at http://www.portcullis-security.com/165.php. Cheers, Tim -- Tim Brown mailto:[EMAIL PROTECTED]

Tutorial on Fuzzled

2007-09-04 Thread Tim Brown
provide some inspiration to others. The full paper can be found at: http://www.nth-dimension.org.uk/utils/get.php?downloadsid=35. Cheers, Tim PS If anyone wants to try a release candidate of Fuzzled 1.1, contact me off list and we'll see what we can do. -- Tim Brown mailto:[EMAIL PROTECTED

Serious holes affecting JFFNMS

2007-06-11 Thread Tim Brown
with the developers, the holes have been resolved. Attached are the advisory and patch relating to these flaws. Tim -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/ diff -Nru -x'*.png' -x'*.ini' -x'*.*sql' -x'*.patch' jffnms-0.8.3/htdocs/admin/adm/test.php jffnms-0.8.4-pre2/htdocs

Re: Medium security hole affecting DSL-G624T

2007-05-05 Thread Tim Brown
in a manner whereby they actually respond to the reports when contacted. Not holding my breath though. Tim -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/

Re: Medium security hole affecting DSL-G624T

2007-05-04 Thread Tim Brown
vendors who respond[1] quickly even more :). [1] such as our alternate discussion -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/

Medium security hole affecting DSL-G624T

2007-05-03 Thread Tim Brown
not function adequately using either Firefox nor Konqueror. Tim -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/ Nth Dimension Security Advisory (NDSA20070412) Date: 12th April 2007 Author: Tim Brown mailto:[EMAIL PROTECTED] URL: http://www.nth-dimension.org.uk/ / http

Medium level security hole in FreeProxy

2007-02-07 Thread Tim Brown
available on the 24th. Full details can be found in the attached advisory. -- Tim Brown mailto:[EMAIL PROTECTED] http://www.nth-dimension.org.uk/ NDSA20070206.txt.asc Description: application/pgp-keys

Low security hole affecting IPCalc's CGI wrapper

2006-07-22 Thread Tim Brown
to attack other applications hosted on the same web server. I contacted the author (Krischan Jodies - http://www.jodies.de/) on the 7th, offering them 14 days to respond but have had no reply to acknowledge that the problem even exists, I've decided to publish this warning. Tim -- Tim Brown, Nth

Fresh hole in W3Mail (fwd)

2002-11-12 Thread Tim Brown
they never bothered to acknowledge our contact last time, we're expecting no official response. Hopefully this time they will be able to correct the bug in less than 4 months. Cheers, Tim - -- Tim Brown mailto:securityfocus;machine.org.uk http://www.machine.org.uk/ -BEGIN PGP SIGNATURE- Version

Medium security hole affecting W3Mail

2002-07-25 Thread Tim Brown
to acknowledge that the problem even exists, I've decided to publish this warning: - -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Nth Dimension Security Advisory (NDSA20020719) Date: 19th July 2002 Author: Tim Brown mailto:[EMAIL PROTECTED] URL: http://www.nth-dimension.org.uk/ / http