[Full-disclosure] Ac1db1tch3z vs x86_64 Linux Kernel

2010-09-15 Thread ac1db1tch3z
/* Ac1dB1tch3z Vs Linux Kernel x86_64 0day Today is a sad day.. R.I.P. Tue, 29 Apr 2008 / Tue, 7 Sep 2010 a bit of history: MCAST_MSFILTER Compat mode bug found... upon commit! (2 year life on this one) authorDavid L Stevens Tue, 29 Apr 2008 10:23:22 + (03:23 -0700) committer

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-15 Thread Jeffrey Walton
On Wed, Sep 15, 2010 at 5:33 PM, Christian Sciberras wrote: >> Yes. Once again: get your homework done! >> >>> http://www.codeproject.com/KB/DLL/dynamicdllloading.aspx >> >> That's a double DYNAMIC there! > > Did you even bother to read the article? The very first paragraph > states the difference

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-15 Thread Christian Sciberras
> Yes. Once again: get your homework done! > >> http://www.codeproject.com/KB/DLL/dynamicdllloading.aspx > > That's a double DYNAMIC there! Did you even bother to read the article? The very first paragraph states the difference between the two. Oh, and for the records, you can't statically link t

Re: [Full-disclosure] DLL Hijacking vulnerability in Opera

2010-09-15 Thread MustLive
Hello Juha-Matti! Thanks for mentioning about exploit of Nicolas Krassas for Opera. I don't read such sites as exploit-db.com and secunia.com, but I read other sites, such as securityvulns.ru (securityvulns.com). And at his site (http://securityvulns.com/news/Microsoft/Windows/DLLHijacking.html)

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-09-15 Thread Valdis . Kletnieks
On Wed, 15 Sep 2010 17:45:27 +0200, Stefan Kanthak said: > BTW: Windows developers and administrators should know their platform. You're new here, aren't you? :) Out in the real world, if they have a McSE cert and know enough to keep the server running, they get the job even if they don't underst

[Full-disclosure] [ MDVSA-2010:183 ] socat

2010-09-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2010:183 http://www.mandriva.com/security/ _

[Full-disclosure] ZDI-10-178: Novell PlateSpin Orchestrate Graph Rendering Remote Code Execution Vulnerability

2010-09-15 Thread ZDI Disclosures
ZDI-10-178: Novell PlateSpin Orchestrate Graph Rendering Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-10-178 September 15, 2010 -- CVSS: 10, (AV:N/AC:L/Au:N/C:C/I:C/A:C) -- Affected Vendors: Novell -- Affected Products: Novell eDirectory -- Vulnerability

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-15 Thread Christian Sciberras
> No. Guess where the D in DLL comes from! > Static linking occurs when the linker builds a binary (this might be a > DLL.-) using *.OBJ and *.LIB. > Dynamic linking occurs when the loader loads a binary (again: this might > be a DLL) into memory and resolves its dependencies. Oh really? http://w

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-09-15 Thread Stefan Kanthak
Paul Szabo wrote: > Christian Sciberras wrote: > >> ... the user has opened the "bad" file ... > > The victim "views" a "data" file, does not (directly) run an executable. > The data file could be as harmless as a Word document or a plain-text > file. Word (resp. MS Office) documents ain't har

Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive

2010-09-15 Thread Stefan Kanthak
Dan Kaminsky wrote: > h0h0h0. There be history, Larry. > > Short version: Go see how many DLLs exist outside of c:\windows\system32. > Look, ye mighty, and despair when you realize all those apps would be broken > by CWD DLL blocking. No, that's the too much shortened version. The correct versi

Re: [Full-disclosure] DLL hijacking POC (failed, see for yourself)

2010-09-15 Thread Stefan Kanthak
Christian Sciberras wrote: > I wrote my own example POC. and failed to use it right! [...] > DHPOC\example\the-install-folder\ > DHPOC\example\the-install-folder\dhpocApp.exe > DHPOC\example\the-install-folder\dhpocDll.dll > DHPOC\example\the-remote-folder > DHPOC\example\the-remote-folder\exam

[Full-disclosure] Secunia Research: Microsoft Outlook Content Parsing Integer Underflow Vulnerability

2010-09-15 Thread Secunia Research
== Secunia Research 14/09/2010 - Microsoft Outlook Content Parsing Integer Underflow Vulnerability - == Table of Contents Affected Softw

[Full-disclosure] Directory Traversal in Axigen v7.4.1 running on Windows

2010-09-15 Thread Bogdan Calin
We are continuing with the list of security vulnerabilities found in a number of web applications while testing our latest version of Acunetix WVS v7 . In this blog post, we will look into the details of a very serious web vulnerability discovered by Acunetix WVS in Axigen. "Axigen is an integrate