|
Prev week |
Colapse all |
Post message
RE: [Full-disclosure] COM Server-Based Binary Planting ProofOfConcept 2011-06-02 Mitja Kolsek (mitja kolsek acros si) RE: [Full-disclosure] COM Server-Based Binary Planting ProofOfConcept 2011-06-02 Mitja Kolsek (mitja kolsek acros si) Thor, the "Online Proof of Concept" section of the blog post points you to a *remote* exploit (without any warning) but let me repeat the link here: http://www.binaryplanting.com/demo/XP_2-click/test.html Visit this with IE8 on 32-bit Windows XP. Please find further information here: http://blo [ more ] [ reply ] RE: [Full-disclosure] COM Server-Based Binary Planting ProofOfConcept 2011-06-02 Thor (Hammer of God) (thor hammerofgod com) But it *is* worth mentioning that you have to create the malicious dll file, copy it to the system, create folders etc, and all the other mumbo jumbo to "exploit" this in the "default configuration." So, the answer to Dan's question is actually, "no, you can't." Which brings into question the act [ more ] [ reply ] RE: [Full-disclosure] COM Server-Based Binary Planting Proof OfConcept 2011-06-02 ACROS Security Lists (lists acros si) It would hardly be worth mentioning otherwise. Cheers, Mitja > -----Original Message----- > From: full-disclosure-bounces (at) lists.grok.org (dot) uk [email concealed] > [mailto:full-disclosure-bounces (at) lists.grok.org (dot) uk [email concealed]] On Behalf > Of Dan Kaminsky > Sent: Thursday, June 02, 2011 5:36 PM > To: security (at) acrossecurity (dot) com [email concealed] > [ more ] [ reply ] Re: [Full-disclosure] COM Server-Based Binary Planting Proof Of Concept 2011-06-02 Dan Kaminsky (dan doxpara com) Does this run code without prompting, on a reasonably default configuration? On Thu, Jun 2, 2011 at 7:52 AM, ACROS Security Lists <lists (at) acros (dot) si [email concealed]> wrote: > > We published a remote/local proof of concept for the COM Server-Based Binary Planting > exploit presented at the Hack in the Box conference i [ more ] [ reply ] COM Server-Based Binary Planting Proof Of Concept 2011-06-02 ACROS Security Lists (lists acros si) We published a remote/local proof of concept for the COM Server-Based Binary Planting exploit presented at the Hack in the Box conference in Amsterdam. Feel free to try it out online if WebDAV works through your firewall, or download it and test it in your local network or simply on your computer. [ more ] [ reply ] International PHP Conference - Call for Papers 2011-06-02 Carsten Eilers (ceilers-lists gmx de) SEE ENGLISH VERSION BELOW Auf der Zielgeraden zur IPC Spring möchten wir Euch schon jetzt einladen, Eure Themen, Ideen, Vorschläge für die International PHP Conference im Oktober einzureichen. Die International PHP Conference findet vom 9. bis 12. Oktober 2011 in der Rheingoldhalle in Mainz statt u [ more ] [ reply ] Re: Ra-Guard evasion (new Internet-Drafts) 2011-06-01 Fernando Gont (fernando gont com ar) Hi, Mark, On 06/01/2011 07:57 AM, Marc Heuse wrote: > this surprised me for two things. > > First: Cisco was not aware. I mentioned this issue to at least one guy @ PSIRT. Nevertheless, it has to tell what it takes for a vendor to be aware. I have had some experience in the past in which I noti [ more ] [ reply ] Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client 2011-06-01 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client Advisory ID: cisco-sa-20110601-ac Revision 1.0 For Public Release 2011 June 01 1600 UTC (GMT) +------------------------------------------------------------ [ more ] [ reply ] Cisco Security Advisory: Default Credentials for root Account on the Cisco Media Experience Engine 5600 2011-06-01 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Cisco Security Advisory: Default Credentials for root Account on the Cisco Media Experience Engine 5600 Advisory ID: cisco-sa-20110601-mxe Revision 1.0 For Public Release 2011 June 01 1600 UTC (GMT) +----------------------------------------------- [ more ] [ reply ] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series 2011-06-01 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series Advisory ID: cisco-sa-20110601-phone Revision 1.0 For Public Release 2011 June 1 1600 UTC (GMT) +------------------------------------------------------------- [ more ] [ reply ] Cisco Security Advisory: Default Credentials Vulnerability in Cisco Network Registrar 2011-06-01 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Cisco Security Advisory: Default Credentials Vulnerability in Cisco Network Registrar Advisory ID: cisco-sa-20110601-cnr Revision 1.0 For Public Release 2011 June 01 1600 UTC (GMT) +----------------------------------------------------------------- [ more ] [ reply ] HTB22997: XSS in A Really Simple Chat (ARSC) 2011-06-01 advisory htbridge ch Vulnerability ID: HTB22997 Reference: http://www.htbridge.ch/advisory/xss_in_a_really_simple_chat_arsc.html Product: A Really Simple Chat (ARSC) Vendor: http://www.reallysimplechat.org/ ( http://www.reallysimplechat.org/ ) Vulnerable Version: 3.3-rc2 Vendor Notification: 12 May 2011 Vulnerability [ more ] [ reply ] HTB22999: Multiple SQL Injections in A Really Simple Chat (ARSC) 2011-06-01 advisory htbridge ch Vulnerability ID: HTB22999 Reference: http://www.htbridge.ch/advisory/multiple_sql_injections_in_a_really_simp le_chat_arsc.html Product: A Really Simple Chat (ARSC) Vendor: http://www.reallysimplechat.org/ ( http://www.reallysimplechat.org/ ) Vulnerable Version: 3.3-rc2 Vendor Notification: 12 May [ more ] [ reply ] Re: Ra-Guard evasion (new Internet-Drafts) 2011-06-01 Marc Heuse (mh mh-sec de) Hi Fernando, to quote from your drafts: > As part of the project "Security Assessment of the Internet Protocol > version 6 (IPv6)" [CPNI-IPv6], we devised a number of techniques for > circumventing the RA-Guard protection, which are described in the > following sections of this document. These te [ more ] [ reply ] Post Revolution 0.8.0c Multiple Remote Vulnerabilities 2011-06-01 Javier Bassi (javierbassi gmail com) info ??????????? Name : Post Revolution 0.8.0c Multiple Remote Vulnerabilities Class: Design Error && Input Validation Error CVE: CVE-2011-1952, CVE-2011-1953, CVE-2011-1954 Remote: Yes Local: No Credit : Javier Bassi <javierbassi [at] gmail [dot] com> Vulnerable : All versions prior to and inclu [ more ] [ reply ] CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability 2011-05-31 robkraus solutionary com Vulnerability title: CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability CVSS Risk Rating: 3.9 (Low) Product: CodeMeter WebAdmin Application Vendor: Wibu-Systems Vendor URL: http://www.codemeter.de Public disclosure date: 5/30/2011 Discovered by: Rob Kraus and the Solutiona [ more ] [ reply ] IPv6 RA-Guard evasion (and neighbor discovery monitoring) vulnerabilities 2011-05-31 Fernando Gont (fernando gont gmail com) Folks, I've just published two new IETF Internet-Drafts, that document the problem of RA-Guard evasion, and propose mitigations. They are two Internet-Drafts: * "IPv6 Router Advertisement Guard (RA-Guard) Evasion", available at: http://tools.ietf.org/id/draft-gont-v6ops-ra-guard-evasion-00.txt * [ more ] [ reply ] ZDI-11-169: IBM Tivoli Endpoint lcfd.exe opts Argument Remote Code Execution Vulnerability 2011-05-31 ZDI Disclosures (zdi-disclosures tippingpoint com) ZDI-11-169: IBM Tivoli Endpoint lcfd.exe opts Argument Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-11-169 May 31, 2011 -- CVE ID: CVE-2011-1220 -- CVSS: 10, (AV:N/AC:L/Au:N/C:C/I:C/A:C) -- Affected Vendors: IBM -- Affected Products: IBM Tivoli Endpoint [ more ] [ reply ] Cross-Site Scripting vulnerability in Serendipity Plugin "serendipity_event_freetag" 2011-05-31 sschurtz t-online de Paranoia 2011: Call for papers 2011-05-30 paranoia watchcom no Call for papers for Paranoia 2011, November 10th. Link: http://paranoia.watchcom.no/index.php?page=40 Potential speakers are invited to submit topics and summary abstracts for the 6th annual PARANOIA conference in Oslo, Norway. This one-day event attracts 600+ attendees and vendors providing opp [ more ] [ reply ] |
|
Privacy Statement |
Thor, the "Online Proof of Concept" section of the blog post points you to a *remote*
exploit (without any warning) but let me repeat the link here:
http://www.binaryplanting.com/demo/XP_2-click/test.html
Visit this with IE8 on 32-bit Windows XP.
Please find further information here:
http://blo
[ more ] [ reply ]