[Full-disclosure] Firefox + popup blocker + XMLHttpRequest + srand() = oops

2007-02-05 Thread Michal Zalewski
There is an interesting vulnerability in the default behavior of Firefox builtin popup blocker. This vulnerability, coupled with an additional trick, allows the attacker to read arbitrary user-accessible files on the system, and thus steal some fairly sensitive information. This was tested on

Re: [Full-disclosure] Firefox + popup blocker + XMLHttpRequest + srand() = oops

2007-02-05 Thread Michal Zalewski
On Mon, 5 Feb 2007, pdp (architect) wrote: You may as well use a QuickTime .mov/.qtl or a PDF document to open a file:// link . I think it is easier. Sure. You can probably have a file:// link in Open Office / MS Office documents as well; but these all rely on external components, and as such,

Re: [Full-disclosure] Web 2.0 backdoors made easy with MSIE XMLHttpRequest

2007-02-05 Thread Troy Cregger
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The 2005 text does briefly mention Accessing content / web-scanning (take a look at Notes 1-3). So the problem is much older. Well, that's Micro$loth for ya. Amit Klein wrote: Michal Zalewski wrote: On Sat, 3 Feb 2007, Michal Zalewski wrote:

[Full-disclosure] iDefense Security Advisory 02.02.07: Blue Coat Systems WinProxy CONNECT Method Heap Overflow Vulnerability

2007-02-05 Thread iDefense Labs
Blue Coat Systems WinProxy CONNECT Method Heap Overflow Vulnerability iDefense Security Advisory 02.02.07 http://labs.idefense.com/intelligence/vulnerabilities/ Feb 02, 2007 I. BACKGROUND BlueCoat WinProxy is an Internet sharing proxy server designed for small to medium businesses. In addition

[Full-disclosure] [USN-417-1] PostgreSQL vulnerabilities

2007-02-05 Thread Martin Pitt
=== Ubuntu Security Notice USN-417-1 February 05, 2007 postgresql-7.4/-8.0/-8.1 vulnerabilities CVE-2007-0555, CVE-2007-0556 === A security issue affects the following Ubuntu

Re: [Full-disclosure] [Full-Disclosure] (Psexec on *NIX)

2007-02-05 Thread Marcello Barnaba
On Monday 05 February 2007 01:20, Q-Ball wrote: Key-based logon is a bad idea in general because afaik, it's not possible to implement any type of password policy on those keys. $ ssh-keygen -h 21 | grep pass -N phrase Provide new passphrase. -P phrase Provide old passphrase. -p

[Full-disclosure] Informix SQL injection

2007-02-05 Thread Joshua Tagnore
List, I'm doing a pentest on a website that uses informix web datablade and found a sql injection point. I have been able to use the webexplode() stored procedure to execute any SQL commands, and also operating system commands using SYSTEM. The problem I have is that SYSTEM doesnt return the

Re: [Full-disclosure] Informix SQL injection

2007-02-05 Thread Tyop?
On 2/5/07, Joshua Tagnore [EMAIL PROTECTED] wrote: List, I'm doing a pentest on a website that uses informix web datablade and found a sql injection point. I have been able to use the webexplode() stored procedure to execute any SQL commands, and also operating system commands using

[Full-disclosure] [ MDKSA-2007:034 ] - Updated samba packages address multiple vulnerabilities

2007-02-05 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:034 http://www.mandriva.com/security/

Re: [Full-disclosure] Firefox + popup blocker + XMLHttpRequest + srand() = oops

2007-02-05 Thread James Matthews
Do you think it will be patched?? On 2/5/07, Michal Zalewski [EMAIL PROTECTED] wrote: On Mon, 5 Feb 2007, pdp (architect) wrote: You may as well use a QuickTime .mov/.qtl or a PDF document to open a file:// link . I think it is easier. Sure. You can probably have a file:// link in Open

[Full-disclosure] [USN-418-1] Bind vulnerabilities

2007-02-05 Thread Kees Cook
=== Ubuntu Security Notice USN-418-1 February 05, 2007 bind9 vulnerabilities CVE-2007-0493, CVE-2007-0494 === A security issue affects the following Ubuntu releases: Ubuntu

Re: [Full-disclosure] Firefox + popup blocker + XMLHttpRequest + srand() = oops

2007-02-05 Thread James Matthews
Thats what i was looking for not if you were going to patch it! If they were! On 2/5/07, Ben Bucksch [EMAIL PROTECTED] wrote: No, we never patch bugs. Where would this lead us? Only commies taking over! Tracked in bug 369390. James Matthews wrote: Do you think it will be patched?? On

[Full-disclosure] Every MS Exploit

2007-02-05 Thread layne
Project to find exploits for every MS Security Bulletin gets wiki’ed Last September (part 1) http://ElseNot.com contributed it’s collocation and goal (try to find an exploit for every MS Security Bulletin ever released). Activity stopped when Microsoft published 473 bulletins and 163 Exploits