Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Alaa El yazghi
How can it be carried out remotely if it bugs localy? 2009/6/15 Tom Neaves t...@tomneaves.co.uk Product Name: Netgear DG632 Router Vendor: http://www.netgear.com Date: 15 June, 2009 Author: t...@tomneaves.co.uk t...@tomneaves.co.uk Original URL:

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Alaa El yazghi
I know and I understand. What I wanted to mean is that we can not eventually acces to the web interface of a netgear router remotely if we cannot localy. As for the DoS, it is simple to solve such attack from outside. We just disable receiving pings (There is actually an option in even the lowest

[Full-disclosure] [TZO-33-2009] Fprot generic bypass (TAR)

2009-06-16 Thread Thierry Zoller
From the low-hanging-fruit-department F-prot generic TAR bypass / evasion Shameless plug :

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Hanno Böck
Am Montag 15 Juni 2009 schrieb Tom Neaves: Within the /cgi-bin/ directory of the administrative web interface exists a file called firmwarecfg. This file is used for firmware upgrades. A HTTP POST request for this file causes the web server to hang. The web server will stop responding to

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Vladimir '3APA3A' Dubrovin
Dear Tom Neaves, It still can be exploited from Internet even if remote management is only accessible from local network. If you can trick user to visit Web page, you can place a form on this page which targets to router and request to router is issued from victim's browser. --Tuesday,

[Full-disclosure] [TZO-40-2009] Clamav generic bypass (RAR, CAB, ZIP)

2009-06-16 Thread Thierry Zoller
From the low-hanging-fruit-department Clamav generic evasion (RAR,CAB,ZIP) Shameless plug :

[Full-disclosure] [IVIZ-09-003] CA ARCserve Denial of Service

2009-06-16 Thread iViZ Security Advisories
--- -- [ iViZ Security Advisory 09-00316/06/2009 ] --- -- iViZ Techno Solutions Pvt. Ltd.

[Full-disclosure] [IVIZ-09-004] CA ARCserve Denial of Service

2009-06-16 Thread iViZ Security Advisories
--- [ iViZ Security Advisory 09-004                            16/06/2009 ] --- iViZ Techno Solutions Pvt. Ltd.                                            

[Full-disclosure] CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities

2009-06-16 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities CA Advisory Reference: CA20090615-01 CA Advisory Date: 2009-06-15 Reported By: iViZ Security Research Team Impact: A remote attacker can cause a denial

[Full-disclosure] CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities

2009-06-16 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: CA20090615-01: CA ARCserve Backup Message Engine Denial of Service Vulnerabilities CA Advisory Reference: CA20090615-01 CA Advisory Date: 2009-06-15 Reported By: iViZ Security Research Team Impact: A remote attacker can cause a denial

[Full-disclosure] CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability

2009-06-16 Thread Williams, James K
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Title: CA20090615-02: CA Service Desk Tomcat Cross Site Scripting Vulnerability CA Advisory Reference: CA20090615-02 CA Advisory Date: 2009-06-15 Impact: A remote attacker can inject arbitrary web script or HTML. Summary: The release of

[Full-disclosure] Official release of Keykeriki open source wireless keyboard sniffer

2009-06-16 Thread Max Moser
Hi everyone, i just like to announce officially the release of our wireless keyboard sniffer Keykeriki. An addition to the official press release; Website: http://www.remote-exploit.org/Keykeriki.html Video with some demonstration available on website as well Contact: hardh...@remote-exploit.org

[Full-disclosure] [ MDVSA-2009:133 ] irssi

2009-06-16 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:133 http://www.mandriva.com/security/

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread sr.
it could still be carried out remotely by obfuscating a link sent to the admin of the device. this would obviously rely on the admin clicking on the link, and is more of a phishing / social engineering style attack. this would also rely on the router being setup with all of the default internal

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Jeremi Gosney
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 and as previously stated, if you have 'remote management' enabled then you are truly vulnerable to outside threats. csrf works as well. but an attack carried out on the LAN would still be considered a remote attack; although, you'd likely be within

[Full-disclosure] WinAppDbg version 1.2 is out!

2009-06-16 Thread Mario Alejandro Vilas Jerez
What is WinAppDbg? == The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment. It uses ctypes to wrap many Win32 API calls related to debugging, and provides an object-oriented abstraction layer to manipulate

Re: [Full-disclosure] WinAppDbg version 1.2 is out!

2009-06-16 Thread Jared DeMott
Mario Alejandro Vilas Jerez wrote: What is WinAppDbg? == The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment. Can you compare/contrast with pydbg so I can understand why I might want to give it a try?

Re: [Full-disclosure] WinAppDbg version 1.2 is out!

2009-06-16 Thread Mario Alejandro Vilas Jerez
Basically it's got some different features than PyDbg and a more complete documentation. If you have an *existing* project built upon PyDbg it's probably not worth switching (unless you've hit some very bad problem with it) but I believe it's better for newer projects, as this new library is more

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Vladimir Dubrovin
Dear sr., clicking on the link can not produce POST request, only GET, unless there are some special conditions, like crossite scripting vulnerability in the router. --16.06.2009 19:16, you wrote [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability to

[Full-disclosure] ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability

2009-06-16 Thread ZDI Disclosures
ZDI-09-043: Apple Java CColorUIResource Pointer Derference Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-09-043 June 16, 2009 -- CVE ID: CVE-2009-1719 -- Affected Vendors: Apple -- Affected Products: Apple Java -- TippingPoint(TM) IPS Customer Protection:

[Full-disclosure] [DSF-02-2009] - Zoki Catalog SQL Injection

2009-06-16 Thread SmOk3
Ref. [DSF-02-2009] - Zoki Catalog SQL Injection Vendor: Zoki Soft (www.zokisoft.com) Status: Patched by vendor Original advisory: http://www.davidsopas.com/2009/06/15/zoki-catalog-sql-injection/ Zoki Catalog Smart Catalog is unique and convenient software. It is designed for many purposes

Re: [Full-disclosure] Things to do before vulnerability disclosure

2009-06-16 Thread epixoip
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ... really? so everyone who believes in full disclosure is a blackhat now? by your definition, even those who follow RFPolicy are blackhats as well. your ethics are severely flawed, and are malaligned with the philosophies that many security

[Full-disclosure] [SECURITY] [DSA 1816-1] New apache2 packages fix privilege escalation

2009-06-16 Thread Stefan Fritsch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1816-1 secur...@debian.org http://www.debian.org/security/ Stefan Fritsch June 16, 2009

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Jeremi Gosney
Vladimir: Where there is an open mind, there will always be a frontier. - Charles Kettering form method='post' action='http://192.168.1.1/cgi-bin/firmwarecfg' name='DoS' input type='hidden' value='' /form a href='http://www.google.com' onclick='document.DoS.submit();'Google/a

Re: [Full-disclosure] Netgear DG632 Router Remote DoS Vulnerability

2009-06-16 Thread Vladimir '3APA3A' Dubrovin
Adrian, If you can execute javascript - what is a reason to wait for user to click the link? The message I reply stated there is no need to force user to visit Web page and clicking the obfuscated link _sent_ to admin is enougth. I replied in this case only GET request is