Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-13 Thread lars brun nielsen
hi, setting 750 on /etc/cron.* would stop this exploit /lars if ( !( child = fork() )) { chdir(/etc/cron.d); prctl(PR_SET_DUMPABLE, 2); sleep(200); exit(1); ___ Full-Disclosure - We believe in it. Charter:

RE: [Full-disclosure] MIMESweeper For Web 5.X Cross Site Scripting

2006-07-13 Thread Lise Moorveld
Hi, In my opinion, there are two possibilities... the injected code is executed in the context of the banned website, or the injected code is executed in the context of the Access denied-page served by MIMESweeper. The latter would be the case if MIMESweeper redirects to a page of its own, the

[Full-disclosure] rpl: Microsoft Excel Array Index Error Remote Code Execution

2006-07-13 Thread reiserfs4
good job,sowhat -邮件原件- 发件人: Sowhat [mailto:[EMAIL PROTECTED] 发送时间: 2006年7月12日 10:17 收件人: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk 主题: Microsoft Excel Array Index Error Remote Code Execution Microsoft Excel Array Index Error Remote Code Execution By Sowhat of

[Full-disclosure] [USN-317-1] zope2.8 vulnerability

2006-07-13 Thread Martin Pitt
=== Ubuntu Security Notice USN-317-1 July 13, 2006 zope2.8 vulnerability CVE-2006-3458 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 This

[Full-disclosure] [USN-318-1] libtunepimp vulnerability

2006-07-13 Thread Martin Pitt
=== Ubuntu Security Notice USN-318-1 July 13, 2006 libtunepimp vulnerability http://bugs.musicbrainz.org/ticket/1764 === A security issue affects the following Ubuntu

[Full-disclosure] [off topic] CoffeeWars VII: Call For Beans

2006-07-13 Thread foofus
CoffeeWars HQ Undisclosed Location Not near Dick Cheney's (we have no idea where he stays, although

Re: [Full-disclosure] 70 million computers are using Windows 98 right now

2006-07-13 Thread Tonnerre Lombard
Salut, On Tue, 2006-07-11 at 18:42 +0100, n3td3v wrote: Microsoft could collapse under its own weight if a *major* unpatched Microsoft Windows 98 vulnerability comes along. This is illusionary. Windows NT 4.0 was much more important as a product, and not much after support stopped, the whole

Re: [Full-disclosure] Are consumers being misled by phishing?

2006-07-13 Thread Tonnerre Lombard
Salut, On Thu, 2006-06-29 at 20:55 +, Bill Weiss wrote: In case others didn't catch it, IQ is _defined_ as a normal distribution with the mid-point at 100. Thus, half of the population has a double-digit IQ. The criteria for a 100 IQ is recalculated every once in a while to maintain the

[Full-disclosure] n3td3v

2006-07-13 Thread 1 l0\\/3 n3td3v .
On Sun, 13 Nov 2005 17:02:39 -0800 n3td3v wrote: Yet another fuckwit basing their opinion on someone they don't know. If it wasn't for me you wouldn't have an internet to sent your packets on right now. You take people at face value instead of getting to know them first. 0101 01101110

RE: [Full-disclosure] 70 million computers are using Windows 98rightnow

2006-07-13 Thread Castigliola, Angelo
This doesn't mean that W98 is secure. On Secunia's site the latest (corrected) vulnerability is dated 20060613, less than 1 month ago, and tomorrow someone could find a new one that won't be corrected. Sure, that could happen but seeing how there are only two known exploits published in 2006 for

Re: [Full-disclosure] 70 million computers are using Windows 98rightnow

2006-07-13 Thread Dude VanWinkle
On 7/13/06, Castigliola, Angelo [EMAIL PROTECTED] wrote: This doesn't mean that W98 is secure. On Secunia's site the latest(corrected) vulnerability is dated 20060613, less than 1 month ago, andtomorrow someone could find a new one that won't be corrected. Sure, that could happen but seeing how

[Full-disclosure] [ MDKSA-2006:123 ] - Updated kernel packages fixes multiple vulnerabilities

2006-07-13 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:123 http://www.mandriva.com/security/

[Full-disclosure] Debian Development Machine Gluck Hacked - UPDATE

2006-07-13 Thread Morning Wood
Debian Development Machine Hacked http://lists.debian.org/debian-devel-announce/2006/07/msg3.html or http://www.zone-h.org/content/view/13853/31/ Confirmed hacked by: Linux Kernel PRCTL Core Dump Handling Privilege Escalation Vulnerability http://www.debian.org/News/2006/20060713

[Full-disclosure] rPSA-2006-0122-2 kernel

2006-07-13 Thread Justin M. Forbes
rPath Security Advisory: 2006-0122-2 Published: 2006-07-07 Updated: 2006-07-13 Upgraded to Critical status with additional information Products: rPath Linux 1 Rating: Critical Exposure Level Classification: Local Root Deterministic Privilege Escalation Updated Versions: kernel=/[EMAIL

Re: [Full-disclosure] Debian Development Machine Gluck Hacked - UPDATE

2006-07-13 Thread David Taylor
Escalation Vulnerability http://www.debian.org/News/2006/20060713 or http://www.zone-h.org/content/view/13853/31/ ( updated ) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

Re: [Full-disclosure] Debian Development Machine Gluck Hacked - UPDATE

2006-07-13 Thread [EMAIL PROTECTED]
lity http://www.debian.org/News/2006/20060713 or http://www.zone-h.org/content/view/13853/31/ ( updated ) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://s

Re: [Full-disclosure] Debian Development Machine Gluck Hacked -UPDATE

2006-07-13 Thread Morning Wood
David Taylor wrote: Curious why Secunia is rating this as 'less critical'. The way I see it, this exploit could be integrated into the other exploits for mambo, joomla, phpbb, etc. Also, all of us that have websites hosted on linux machines that have a vulnerable kernel could get root? I'm

Re: [Full-disclosure] Debian Development Machine Gluck Hacked - UPDATE

2006-07-13 Thread gboyce
On Thu, 13 Jul 2006, David Taylor wrote: Curious why Secunia is rating this as 'less critical'. The way I see it, this exploit could be integrated into the other exploits for mambo, joomla, phpbb, etc. Also, all of us that have websites hosted on linux machines that have a vulnerable kernel

Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-13 Thread Matthew Murphy
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 7/13/06, lars brun nielsen [EMAIL PROTECTED] wrote: hi, setting 750 on /etc/cron.* would stop this exploit Incorrect. Did you even try this on ONE vulnerable box? The vulnerability exists BECAUSE the kernel doesn't enforce directory

[Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-13 Thread PERFECT . MATERIAL
Matt Murphy write:If you actually bothered to read ANY of the vendor advisories on thisissue, you'd know why. The vulnerability exists because the kernelDOES NOT VERIFY write permissions to core dump directories. If your users actually have write permissions to /etc/cron.d, do the world afavor

Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-13 Thread Michal Zalewski
On Thu, 13 Jul 2006, Matthew Murphy wrote: setting 750 on /etc/cron.* would stop this exploit Incorrect. Did you even try this on ONE vulnerable box? The vulnerability exists BECAUSE the kernel doesn't enforce directory permissions when writing a core dump. You cannot chdir to (or access a

Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-13 Thread Matthew Murphy
Michal Zalewski wrote: On Thu, 13 Jul 2006, Matthew Murphy wrote: setting 750 on /etc/cron.* would stop this exploit Incorrect. Did you even try this on ONE vulnerable box? The vulnerability exists BECAUSE the kernel doesn't enforce directory permissions when writing a core dump. You

Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-13 Thread PERFECT . MATERIAL
Dear Matt,This is silly, you are a lying jigaboo. That is of course unless the machine you tested on was compiled with the CONFIG_ALLOW_MATT_MURPHY_TO_RUN_HIS_MOUTH_AND_CHDIR_INTO_NON_EXECUTABLE_DIRECTORIES option. This option hasn't been on by default in any distribution since Redhat 6.2 as far

[Full-disclosure] Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know

2006-07-13 Thread Bill Stout
Title: Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know Hi guys, Im looking for vulnerabilities or other weaknesses in our GreenBorder Pro (application virtualization and isolation) product. I invite you to download and hammer it. Please tell me of any

Re: [Full-disclosure] Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know

2006-07-13 Thread mikeiscool
On 7/14/06, Bill Stout [EMAIL PROTECTED] spammed: Hi guys, I'm looking for vulnerabilities or other weaknesses in our GreenBorder Pro (application virtualization and isolation) product. I invite you to download and hammer it. Please tell me of any vulnerability you may find. how about

Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-13 Thread Kyle Lutze
it seems that this relies on /etc/cron.d being there? or is it specific to a crond? I use fcron which doesn't use /etc/cron.d and I have been unable to get the exploit to successfully work. 2.6.14 kernel sh: /tmp/sh: No such file or directory I'm running gentoo-sources without selinux or