Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-15 Thread Gynvael Coldwind
. Working exploits do. That's it from me. I'm looking forward to seeing the RCE exploits (be it client or server side). Kind regards, Gynvael Coldwind ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

Re: [Full-disclosure] [OT] pls ignore

2014-02-24 Thread Gynvael Coldwind
___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ -- Gynvael Coldwind ___ Full-Disclosure - We believe

Re: [Full-disclosure] [0 Day] XSS Persistent in Blogspot of Google

2013-01-25 Thread Gynvael Coldwind
attack an admin this way (unless you found some other way to execute that script in the context of blogger.com - in such case try reporting it again). Cheers, Gynvael Coldwind On Tue, Jan 22, 2013 at 1:11 AM, ANTRAX antrax...@gmail.com wrote: I know JZ, but this vulnerability is in the post

Re: [Full-disclosure] Google's robots.txt handling

2012-12-10 Thread Gynvael Coldwind
Hey, Here is an example: An admin has a public webservice running with folders containing sensitive informations. Enter these folders in his robots.txt and protect them from the indexing process of spiders. As he doesn't want the /admin/ gui to appear in the search results he also

Re: [Full-disclosure] Microsoft Windows Help program (WinHlp32.exe) memory corruption

2012-10-27 Thread Gynvael Coldwind
Hi Kaveh, Mario has a point. Why do you care about any bug in winhlp if by design you can embed a DLL file in the .hlp file and run arbitrary code? See e.g. Wikipedia http://en.wikipedia.org/wiki/WinHelp#WinHelp_appearance_and_features: A rather security critical feature is that one can also

Re: [Full-disclosure] DLL Hijacking Against Installers In Browser Download Folders for Phish and Profit

2012-08-13 Thread Gynvael Coldwind
Well, what can I say - your write up is accurate. Though last time I've seen it, around 5 years ago, it was still called DLL spoofing and not DLL hijacking, and was one of the arguments why carpet bombing (automatic download) in Safair/Chrome must be fixed :) E.g.

Re: [Full-disclosure] URL Spoofing vulnerability in different browsers

2011-07-22 Thread Gynvael Coldwind
Hey MustLive, I'm not sure if I understood your post correctly, so please correct me if I'm wrong. The thing you describe sounds similar to the thing described in the Browser Security Handbook (http://code.google.com/p/browsersec/wiki/Part3#HTTP_authentication): Amusingly, its ghost still haunts

Re: [Full-disclosure] Fuzzing and SEH

2010-11-05 Thread Gynvael Coldwind
Hey, (SEH -- I assume we're talking MS Windows) A debugger attached is one solution (since a debugger is notified of an exception before SEH is executed). PyDbg seems like a good idea, but it can be done easily using the debugger API of Win32API too (just forward all events except exceptions to

[Full-disclosure] GDT and LDT in Windows kernel vulnerability exploitation (paper)

2010-01-16 Thread Gynvael Coldwind
Hi, We've published a paper about using 1 or 4 byte write-what-where condition to convert a custom Data-Segment Descriptor entry in LDT of a process into a Call-Gate (with DPL set to 3 and RPL to 0). The paper also contains information about a possible LDT redirecting into user-land memory. The

Re: [Full-disclosure] Path disclosure in PHP 5.3.1

2009-12-28 Thread Gynvael Coldwind
Hi, I don't think this is a new vulnerability / warning. I saw it 3 months ago in a comment from an anonymous user (on my blog): English translation (by me, original was in Polish): 2009-09-24 10:39:34: not one but two well actually 3 :) I would like to say that as far as session start goes,