Full Disclosure mailing list archives
Re: Full-Disclosure Digest, Vol 80, Issue 70
From: JW <mirage1228 () yahoo com>
Date: Wed, 19 Oct 2011 08:47:19 -0700
Unsubscribe Sent from my iPhone. On Oct 19, 2011, at 4:00 AM, full-disclosure-request () lists grok org uk wrote:
Send Full-Disclosure mailing list submissions to full-disclosure () lists grok org uk To subscribe or unsubscribe via the World Wide Web, visit https://lists.grok.org.uk/mailman/listinfo/full-disclosure or, via email, send a message with subject or body 'help' to full-disclosure-request () lists grok org uk You can reach the person managing the list at full-disclosure-owner () lists grok org uk When replying, please edit your Subject line so it is more specific than "Re: Contents of Full-Disclosure digest..." Note to digest recipients - when replying to digest posts, please trim your post appropriately. Thank you. Today's Topics: 1. Re: eurotax.com XSS (doc mombasa) 2. [ MDVSA-2011:156 ] tomcat5 (security () mandriva com) 3. [ GLSA 201110-13 ] Tor: Multiple vulnerabilities (Tim Sammut) 4. Verizon Wireless to Sell Customers' Data to Advertisers (Jeffrey Walton) 5. HackInTheBox Quartal Magazine - eZine Issue #007 (research () vulnerability-lab com) 6. Re: Verizon Wireless to Sell Customers' Data to Advertisers (Jeffrey Walton) 7. Airvpn makes statement regarding hidemyass proxy (Laurelai) 8. DNS Poisoning via Port Exhaustion (Roee Hay) 9. ZDI-11-295 : Apple QuickTime FlashPix JPEG Tables Selector Remote Code Execution Vulnerability (ZDI Disclosures) 10. Re: About reDuh (Bugtrace) ---------------------------------------------------------------------- Message: 1 Date: Tue, 18 Oct 2011 17:23:45 +0200 From: doc mombasa <doc.mombasa () gmail com> Subject: Re: [Full-disclosure] eurotax.com XSS To: DasKommandoPetraWolf () gmx net Cc: full-disclosure () lists grok org uk Message-ID: <CAFMAuHq=cKmCwtGcoUphMBpSDi-GKQQn1bU1n_TCs0Wtiz4upQ () mail gmail com> Content-Type: text/plain; charset="iso-8859-1" lol seriously? 2011/10/17 <DasKommandoPetraWolf () gmx net>Rotfront Genossen! Im revolutionaeren Kampf und auf der Suche nach Alternativen zu kapitalistischer Standardsoftware und Unternehmen hat "Das Kommando Petra Wolf" sogenannte angebliche Sicherheitsluecken in Form von XSS gefunden: http://wli-de.eurotax.com/wli/dede/entry/welcome.php?koop_id="><iframe src='' onload=alert('BorkBork')> Wir entschuldigen uns bei der Security Szene, dass wir uns nur damit ausweisen koennen. Es wird keine weiteren XSS Advisories geben. Der Wolf ist schwarz. gezeichnet Das Kommando Petra Wolf -- "Wir bringen Kommunismus nach Amerika" -- Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir belohnen Sie mit bis zu 50,- Euro! https://freundschaftswerbung.gmx.de _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/-------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20111018/c80de222/attachment-0001.html ------------------------------ Message: 2 Date: Tue, 18 Oct 2011 18:04:00 +0200 From: security () mandriva com Subject: [Full-disclosure] [ MDVSA-2011:156 ] tomcat5 To: full-disclosure () lists grok org uk Message-ID: <E1RGC92-0004yV-Ml () titan mandriva com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2011:156 http://www.mandriva.com/security/ _______________________________________________________________________ Package : tomcat5 Date : October 18, 2011 Affected: 2010.1, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been discovered and corrected in tomcat 5.5.x: The implementation of HTTP DIGEST authentication in tomcat was discovered to have several weaknesses (CVE-2011-1184). Apache Tomcat, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file (CVE-2011-2204). Apache Tomcat, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application (CVE-2011-2526). Certain AJP protocol connector implementations in Apache Tomcat allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request (CVE-2011-3190). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1184 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190 http://tomcat.apache.org/security-5.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.1: 773a5fc229b75a431546c24f560e8913 2010.1/i586/tomcat5-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 6164f8836446357d0c524706e74cfaac 2010.1/i586/tomcat5-admin-webapps-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 608020232619e313b1e5b78c925e3ec9 2010.1/i586/tomcat5-common-lib-5.5.28-0.5.0.3mdv2010.2.noarch.rpm a014466c79378815eea53bf71058a811 2010.1/i586/tomcat5-jasper-5.5.28-0.5.0.3mdv2010.2.noarch.rpm fc23df07e993d5563ba5ea6cc19c7faf 2010.1/i586/tomcat5-jasper-eclipse-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 1e293502cc60a9543a83241165668df1 2010.1/i586/tomcat5-jasper-javadoc-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 8bf104f92c4c365beea776a3e335dd74 2010.1/i586/tomcat5-jsp-2.0-api-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 34d375a720129c779a8396df0fea4332 2010.1/i586/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.3mdv2010.2.noarch.rpm f266c74edee028677a2b2ce0d907f194 2010.1/i586/tomcat5-server-lib-5.5.28-0.5.0.3mdv2010.2.noarch.rpm f290cdda12fe10cbd2131f769ac001c0 2010.1/i586/tomcat5-servlet-2.4-api-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 86065d9a174943936047a07e6ee44de8 2010.1/i586/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.3mdv2010.2.noarch.rpm eae685ce8ecee314b6d2221198eacc90 2010.1/i586/tomcat5-webapps-5.5.28-0.5.0.3mdv2010.2.noarch.rpm c5363a8910ef6f6ba395dc9222f66e42 2010.1/SRPMS/tomcat5-5.5.28-0.5.0.3mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 05f89a0bd05436ab648a2b6e7921cd7c 2010.1/x86_64/tomcat5-5.5.28-0.5.0.3mdv2010.2.noarch.rpm beb3f7bee12e2c3d27d2da45cd4d5cbf 2010.1/x86_64/tomcat5-admin-webapps-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 94f8860fdcc706d20e32f519a5f44e62 2010.1/x86_64/tomcat5-common-lib-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 1ae847ee8fccc93b0fbcd3caa20e3f4c 2010.1/x86_64/tomcat5-jasper-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 593df02d912d630bb580156d1352cee4 2010.1/x86_64/tomcat5-jasper-eclipse-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 00933232ea5411c8194b94caa2576365 2010.1/x86_64/tomcat5-jasper-javadoc-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 2bad11a52672af123cb464fbd5195650 2010.1/x86_64/tomcat5-jsp-2.0-api-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 3b31cfb99a68d45022fe09a34623b78d 2010.1/x86_64/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 8bfdc07d6a914edf7dac32e0641cbc0c 2010.1/x86_64/tomcat5-server-lib-5.5.28-0.5.0.3mdv2010.2.noarch.rpm c7667a661a3654750fc0069a1fa10289 2010.1/x86_64/tomcat5-servlet-2.4-api-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 51fb24de9c2cbbbbc10bad1a29d85709 2010.1/x86_64/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.3mdv2010.2.noarch.rpm 011186ea5ab76f3b4eac56e0ada5e080 2010.1/x86_64/tomcat5-webapps-5.5.28-0.5.0.3mdv2010.2.noarch.rpm c5363a8910ef6f6ba395dc9222f66e42 2010.1/SRPMS/tomcat5-5.5.28-0.5.0.3mdv2010.2.src.rpm Mandriva Enterprise Server 5: 125a7eb9dcc1683f8ac07af85ca76ec0 mes5/i586/tomcat5-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 24c7aa0d7ea2ca4d9e4e1d9544ea16f8 mes5/i586/tomcat5-admin-webapps-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 568879dcf8335d6bf98076170f052072 mes5/i586/tomcat5-common-lib-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 84e69e48ecd35f246d4fa6ed926efad9 mes5/i586/tomcat5-jasper-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 540440225e1f3ce5de895c8ed46f2443 mes5/i586/tomcat5-jasper-eclipse-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm a9ff3a61cd9708fb2ad6ba6fd9112aff mes5/i586/tomcat5-jasper-javadoc-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 1939ea1c2e62dc94a7835a6ac6dbf6e3 mes5/i586/tomcat5-jsp-2.0-api-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm d17ced8fe80f33f3007bc9dd8f7c446e mes5/i586/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 21ffcde63e835e3532d3383f9607c8b7 mes5/i586/tomcat5-server-lib-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 38f82d3d0cb274d8e3a8781f4087eff4 mes5/i586/tomcat5-servlet-2.4-api-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm f6d5fc18de6eb4eb64a4410514df3544 mes5/i586/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 57026e2da95e91b2a4140caa443afd1e mes5/i586/tomcat5-webapps-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm dc2118f7227a36e842cefaf417338a36 mes5/SRPMS/tomcat5-5.5.28-0.5.0.3mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 74e8a69d9970bd3fe07aa5014deed2d4 mes5/x86_64/tomcat5-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm febe57b644b0341a2abe88bc412d83d8 mes5/x86_64/tomcat5-admin-webapps-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 3045ba1b90c28c481b562946651dc0d2 mes5/x86_64/tomcat5-common-lib-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 3329413dde2923f317feacaac38ce303 mes5/x86_64/tomcat5-jasper-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm c689ea5d6a2305e98f17d2e62af54a65 mes5/x86_64/tomcat5-jasper-eclipse-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 4f9f1bdcdc48b702fcfbb72f5a0b0654 mes5/x86_64/tomcat5-jasper-javadoc-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm b054e07dda62cd976d426a787cc2cf8e mes5/x86_64/tomcat5-jsp-2.0-api-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 9c7a9d767e8f843413b749194f5edd33 mes5/x86_64/tomcat5-jsp-2.0-api-javadoc-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 1acee64bbbc9e257badcbf4a3dbbd8e5 mes5/x86_64/tomcat5-server-lib-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm a39d5bef79a400f012e41ffe7d1b17c8 mes5/x86_64/tomcat5-servlet-2.4-api-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm 6464fd323297c3d6619131c7b432c580 mes5/x86_64/tomcat5-servlet-2.4-api-javadoc-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm fffd75e85b90aba4b6a3a5c73cabb944 mes5/x86_64/tomcat5-webapps-5.5.28-0.5.0.3mdvmes5.2.noarch.rpm dc2118f7227a36e842cefaf417338a36 mes5/SRPMS/tomcat5-5.5.28-0.5.0.3mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iD8DBQFOnXa8mqjQ0CJFipgRAjmhAKDAS/US19egFVhiWmlS0O4FvKdFYACgiZbR bUKgLw+nMniLQoAxCSXVRac= =dh2c -----END PGP SIGNATURE----- ------------------------------ Message: 3 Date: Tue, 18 Oct 2011 11:38:11 -0700 From: Tim Sammut <underling () gentoo org> Subject: [Full-disclosure] [ GLSA 201110-13 ] Tor: Multiple vulnerabilities To: gentoo-announce () gentoo org Cc: full-disclosure () lists grok org uk, bugtraq () securityfocus com, security-alerts () linuxsecurity com Message-ID: <4E9DC793.9080107 () gentoo org> Content-Type: text/plain; charset="iso-8859-1" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201110-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Tor: Multiple vulnerabilities Date: October 18, 2011 Bugs: #351920, #359789 ID: 201110-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities were found in Tor, the most severe of which may allow a remote attacker to execute arbitrary code. Background ========== Tor is an implementation of second generation Onion Routing, a connection-oriented anonymizing communication service. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/tor < 0.2.1.30 >= 0.2.1.30 Description =========== Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details. Impact ====== A remote unauthenticated attacker may be able to execute arbitrary code with the privileges of the Tor process or create a Denial of Service. Workaround ========== There is no known workaround at this time. Resolution ========== All Tor users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.30" NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 2, 2011. It is likely that your system is already no longer affected by this issue. References ========== [ 1 ] CVE-2011-0015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0015 [ 2 ] CVE-2011-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0016 [ 3 ] CVE-2011-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0427 [ 4 ] CVE-2011-0490 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0490 [ 5 ] CVE-2011-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0491 [ 6 ] CVE-2011-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0492 [ 7 ] CVE-2011-0493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0493 [ 8 ] CVE-2011-1924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1924 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201110-13.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security () gentoo org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 230 bytes Desc: OpenPGP digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20111018/3ec29475/attachment-0001.bin ------------------------------ Message: 4 Date: Tue, 18 Oct 2011 15:00:38 -0400 From: Jeffrey Walton <noloader () gmail com> Subject: [Full-disclosure] Verizon Wireless to Sell Customers' Data to Advertisers To: FunSec List <funsec () linuxbox org>, Full Disclosure <full-disclosure () lists grok org uk> Message-ID: <CAH8yC8m+q=rKUFNMPFyn1EoVb0Dug+wZaQymR_E8XOyi3R4aDA () mail gmail com> Content-Type: text/plain; charset=ISO-8859-1 http://www.securitynewsdaily.com/verizon-wireless-sell-customers-data-to-advertisers-1249 Verizon Wireless will now collect phone users' information, including their GPS location and Web browsing history, and sell the data to third parties unless customers opt out of the tracking service. Verizon Wireless' (VZW) updated privacy policy permits the mobile giant to also track customers' app usage, device type, calling features and amount of phone use, as well as any search terms they type when browsing the Web on a VZW mobile device, and demographic information provided by other companies, such as gender and age. ... ------------------------------ Message: 5 Date: Tue, 18 Oct 2011 21:29:12 +0200 From: "research () vulnerability-lab com" <research () vulnerability-lab com> Subject: [Full-disclosure] HackInTheBox Quartal Magazine - eZine Issue #007 To: full-disclosure () lists grok org uk, submissions () packetstormsecurity org Message-ID: <4E9DD388.6020802 () vulnerability-lab com> Content-Type: text/plain; charset=ISO-8859-15 ;) Title: ====== HITB Quartal Magazine - eZine Issue 007 Date: ===== 2011-10-18 References: =========== Original: http://magazine.hackinthebox.org/issues/HITB-Ezine-Issue-007.pdf Article: http://magazine.hitb.org/ Mirror: http://www.vulnerability-lab.com/resources/documents/297.pdf Article: http://www.vulnerability-lab.com/get_content.php?id=297 VL-ID: ===== 297 Status: ======== Published Exploitation-Technique: ======================= Magazin Severity: ========= Critical Details: ======== Hello readers and welcome to issue #7. It has been a long journey since the first release of the magazine and we have seen a lot of changes and improvements overtime and still trying our best to do more. But as we grow, the amount of work and the time we need to spend working on the magazine have also increased, thus requiring us to recruit more people to join our small editorial team. So, if you think you would like to do something for the community and believe that we can have a great use of your talent - Feel free to drop us an email! As for issue #7, Jonathan Kent wrote a great piece of article about the current global crisis in the cyberspace while Aditya K. Sood and his team on the other hand wrote about extending SQL injection attacks through buffer overflow exploitation. We are also very happy to have Jonathan Brossard contributing an article introducing the readers to his newly released exploitation framework. We will leave you to explore the rest of the articles and we hope you enjoy them. Have fun reading this issue and more to come in issue #8!! Zarul Shahrin Suhaimi Editor-in-Chief, Hack in The Box Magazine Credits: ======== HackintheBox Team (HITB) - magazine.hitb.org Disclaimer: =========== The information provided in this document is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright ? 2011|Vulnerability-Lab -- Website: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com Contact: admin () vulnerability-lab com or support () vulnerability-lab com ------------------------------ Message: 6 Date: Tue, 18 Oct 2011 15:49:05 -0400 From: Jeffrey Walton <noloader () gmail com> Subject: Re: [Full-disclosure] Verizon Wireless to Sell Customers' Data to Advertisers To: FunSec List <funsec () linuxbox org>, Full Disclosure <full-disclosure () lists grok org uk> Message-ID: <CAH8yC8=iHKN1OXn6maLdmtgGR2vxcWGHO_DW+VpEwJo8h0sWSQ () mail gmail com> Content-Type: text/plain; charset=ISO-8859-1 On Tue, Oct 18, 2011 at 3:00 PM, Jeffrey Walton <noloader () gmail com> wrote:http://www.securitynewsdaily.com/verizon-wireless-sell-customers-data-to-advertisers-1249 Verizon Wireless will now collect phone users' information, including their GPS location and Web browsing history, and sell the data to third parties unless customers opt out of the tracking service. Verizon Wireless' (VZW) updated privacy policy permits the mobile giant to also track customers' app usage, device type, calling features and amount of phone use, as well as any search terms they type when browsing the Web on a VZW mobile device, and demographic information provided by other companies, such as gender and age.FTC Complaint 33055545, https://www.ftccomplaintassistant.gov/. FCC Complaint 11-C00340020, http://esupport.fcc.gov/complaints.htm. ------------------------------ Message: 7 Date: Tue, 18 Oct 2011 15:13:35 -0500 From: Laurelai <laurelai () oneechan org> Subject: [Full-disclosure] Airvpn makes statement regarding hidemyass proxy To: "full-disclosure () lists grok org uk" <full-disclosure () lists grok org uk> Message-ID: <4E9DDDEF.2080206 () oneechan org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed https://airvpn.org/index.php?option=com_kunena&Itemid=55&func=view&catid=2&id=891#891 <https://airvpn.org/index.php?option=com_kunena&Itemid=55&func=view&catid=2&id=891#891> ------------------------------ Message: 8 Date: Tue, 18 Oct 2011 22:39:25 +0200 From: Roee Hay <roeeh () il ibm com> Subject: [Full-disclosure] DNS Poisoning via Port Exhaustion To: bugtraq <bugtraq () securityfocus com>, full-disclosure () lists grok org uk, dailydave () lists immunityinc com Message-ID: <CAA4i3gYFah=XN7=VgHDybKOYE35FeSVkRf8cZEKVjRaX9EDnUA () mail gmail com> Content-Type: text/plain; charset=ISO-8859-1 Hey, Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers. It discloses two vulnerabilities: 1. A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass. 2. A vulnerability in multiuser Windows environments which enables local DNS cache poisoning of arbitrary domains. This vulnerability can be triggered by a normal user (i.e. one with non-administrative rights) in order to attack other users of the system. A successful exploitation of this vulnerability may lead to information disclosure, privilege escalation, universal XSS and more. Whitepaper: http://bit.ly/q31wSq A blog post with video demos: http://bit.ly/qu4Ez7 Roee Hay <roeeh () il ibm com>, IBM Rational Application Security Research Group Yair Amit <yairam () gmail com> ------------------------------ Message: 9 Date: Tue, 18 Oct 2011 16:23:56 -0500 From: ZDI Disclosures <zdi-disclosures () tippingpoint com> Subject: [Full-disclosure] ZDI-11-295 : Apple QuickTime FlashPix JPEG Tables Selector Remote Code Execution Vulnerability To: full-disclosure () lists grok org uk, bugtraq () securityfocus com Message-ID: <4E9DEE6C.7000008 () hp com> Content-Type: text/plain; charset="iso-8859-1" ZDI-11-295 : Apple QuickTime FlashPix JPEG Tables Selector Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-11-295 October 18, 2011 -- CVE ID: CVE-2011-3222 -- CVSS: 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P -- Affected Vendors: Apple -- Affected Products: Apple Quicktime -- Vulnerability Details: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime handles flashpix files. When a flashpix contains a tile that has a Compression Type 0x2 (JPEG) and an 'JPEG tables selector' value that is bigger then the global stream property 'Maximum JPEG table index', Quicktime will write outside the global JPEG table. This corruption could lead to remote code execution under the context of the current user. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT5002 -- Disclosure Timeline: 2011-07-20 - Vulnerability reported to vendor 2011-10-18 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Damian Put -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 486 bytes Desc: OpenPGP digital signature Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20111018/d99dfb7b/attachment-0001.bin ------------------------------ Message: 10 Date: Wed, 19 Oct 2011 07:13:50 +0800 From: Bugtrace <bugtrace () gmail com> Subject: Re: [Full-disclosure] About reDuh To: full-disclosure <full-disclosure () lists grok org uk> Message-ID: <CABV4c6NiMsp9Uy77KS7kMEK=CUO9wmaxghqjmjjW4a4o8KSCUw () mail gmail com> Content-Type: text/plain; charset=GB2312 java -jar reDuhClient.jar Usage: java reDuhClient [URL-to-reDuh] <proxy-host:proxyport> e.g. (HTTP) : java reDuhClient http://www.compromised.com/reDuh.jsp e.g. (HTTPS): java reDuhClient https://www.compromised.com/reDuh.jsp e.g. (PROXY): java reDuhClient https://www.compromised.com/reDuh.jsp proxy-server:3128 2011/10/18 mezgani ali <handrix () gmail com>:Is there any version that support https ? 2009/2/8 seclists <seclists () 126 com>Thx for your kind help,bro. The jsp version of reDuh is powerful, so cool. ??2009-02-08 07:39:41??"Haroon Meer" <haroon () sensepost com> ??????Hi.. * seclists [seclists () 126 com] seemed to say:Hi,broThx For shareing reDuh. I have download reDuh(asp/php/jsp) and ReDuhClient from http://www.sensepost.com/research/reDuh.Then I have try it in my vmware,Reduh.jsp can work fine,But ReDuh.aspx can't.I type the commond "java reDuhClient 192.168.8.102 80 /reDuh.aspx", it return error.[Info]Querying remote JSP for usable remote RPC port[Error] Tried to find a remote RPC port in the range 42000 to 42050 but no attempts were successful. Sorry it didn't work out. What required for if let ReDuh.aspx work,please? My environment: windows 2003 Enterprise edition Sp2(Chinese) IIS 6.0 ASP.NET Version is 2.0.50727I seem to recall this exact error coming up in the past, and having been resolved by ian () sensepost com. He will send you an email early next week with a little note on how to fix it. Thanks for using it, and please let us know if you have any other questions.. Thanks /mh --Haroon Meer, SensePost Information Security |http://www.sensepost.com/blog/PGP: http://www.sensepost.com/pgp/haroon.txt | Tel: +27 83786 6637________________________________ ???????????????????????? _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/-- Ali MEZGANI Network Engineering/Security http://www.nativelabs.org/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/------------------------------ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ End of Full-Disclosure Digest, Vol 80, Issue 70 ***********************************************
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Full-Disclosure Digest, Vol 80, Issue 70 JW (Oct 19)