|
Prev week |
Colapse all |
Post message
Re: [Full-disclosure] Flaw in Microsoft Domain Account CachingAllows Local Workstation Admins to Temporarily EscalatePrivileges andLogin as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 Michael Bauer (ravenmsb gmail com) Re: [Full-disclosure] Flaw in Microsoft Domain Account Caching Allows Local Workstation Admins to Temporarily Escalate Privileges and Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 Stefan Kanthak (stefan kanthak nexgo de) "Andrea Lee" <andrea (at) kattrap (dot) net [email concealed]> wrote: > I hope I'm not just feeding the troll... No. You just made a complete fool of yourself.-P Read the initial post again. CAREFULLY. Especially that part about unplugging from the network. > A local admin is an admin on one system. The domain admin is an ad [ more ] [ reply ] Re: Flaw in Microsoft Domain AccountCachingAllows Local Workstation Admins to TemporarilyEscalatePrivileges and Login as Cached Domain Admin Accounts(2010-M$-002) 2010-12-13 Stefan Kanthak (stefan kanthak nexgo de) "StenoPlasma @ ExploitDevelopment" <StenoPlasma (at) exploitdevelopment (dot) com [email concealed]> wrote: Your MUA is defective, it strips the "References:" header! > Stefan, > > For you information: > > Cached domain accounts on a local system are not stored in the SAM. They > are stored in the SECURITY registry hive. [ more ] [ reply ] Re: [Full-disclosure] Linux kernel exploit 2010-12-13 Ariel Biener (ariel post tau ac il) But he said that RedHat (and thus CentOS) doesn't have Econet enabled by default. --Ariel firebits (at) backtrack.com (dot) br [email concealed] wrote: > I tested it on a VM with CentOS 5.5 i386 updated and did not work. > > Last login: Tue Dec 13 12:48:54 2010 > [root@localhost~]#nano full-nelson.c > [root@localhost~]#gcc-o [ more ] [ reply ] USBsploit 0.5b - added: Railgun[only] - process migration - EXE, PDF, LNK replacements - split usbsploit.rb 2010-12-14 xpo xpo (smashxpo gmail com) PoC to generate Reverse TCP backdoors, malicious PDF or LNK files. But also running Auto[run|play] infections (EXE, PDF, LNK) and dumping all USB files remotely on multiple targets at the same time, a set of extensions to dump can be specified. All EXE, PDF and LNK already available on the USB targe [ more ] [ reply ] Honggfuzz 2010-12-14 Robert Å?wiÄ?cki (robert swiecki net) Hi, I've recently made publicly available "yet another fuzzer". It's simple, easy to use via command-line interface, providing nice analysis of software crashes in a simple form of file names. It has been used by me and some others to find a few, possibly exploitable, bugs in some major software p [ more ] [ reply ] VUPEN Security Research - RealPlayer RA5 Data Handling Heap Overflow Vulnerability (VUPEN-SR-2010-31) 2010-12-14 VUPEN Security Research (advisories vupen com) VUPEN Security Research - RealPlayer RA5 Data Handling Heap Overflow Vulnerability (VUPEN-SR-2010-31) http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "RealPlayer is a media player available to play, manage and download all your mp3, flash and video files" from rea [ more ] [ reply ] VUPEN Security Research - RealPlayer RealMedia Data Handling Heap Overflow Vulnerabilities (VUPEN-SR-2010-28, VUPEN-SR-2010-29, VUPEN-SR-2010-30) 2010-12-14 VUPEN Security Research (advisories vupen com) VUPEN Security Research - RealPlayer RealMedia Data Handling Heap Overflow Vulnerabilities (VUPEN-SR-2010-28, VUPEN-SR-2010-29, VUPEN-SR-2010-30) http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "RealPlayer is a media player available to play, manage and download al [ more ] [ reply ] VUPEN Security Research - RealPlayer Audio Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-003) 2010-12-14 VUPEN Security Research (advisories vupen com) VUPEN Security Research - RealPlayer Audio Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-003) http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "RealPlayer is a media player available to play, manage and download all your mp3, flash and video files" fro [ more ] [ reply ] VUPEN Security Research - RealPlayer AAC Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-005) 2010-12-14 VUPEN Security Research (advisories vupen com) VUPEN Security Research - RealPlayer AAC Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-005) http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "RealPlayer is a media player available to play, manage and download all your mp3, flash and video files" from [ more ] [ reply ] VUPEN Security Research - RealPlayer Sound Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-004) 2010-12-14 VUPEN Security Research (advisories vupen com) VUPEN Security Research - RealPlayer Sound Data Handling Buffer Overflow Vulnerability (VUPEN-SR-2010-004) http://www.vupen.com/english/research.php I. BACKGROUND --------------------- "RealPlayer is a media player available to play, manage and download all your mp3, flash and video files" fro [ more ] [ reply ] [SECURITY] [DSA-2133-1] New collectd packages fix denial of service 2010-12-14 Raphael Geissert (geissert debian org) Re: Linux kernel exploit 2010-12-13 Stefan Roas (sroas roath org) On Fri Dec 10, 2010 at 17:52:37, Wolf wrote: > Well, I'm a first time writer to Bugtraq, but this is interesting. I > commented out the call to clone(), and after it simply called > trigger(fildes), and apparently, it works. Only tested on a stock > install of Ubuntu 10.10, but I thought the bug was [ more ] [ reply ] Re: [Full-disclosure] Linux kernel exploit 2010-12-13 dan j rosenberg gmail com Please don't inundate me with e-mail because none of you bothered to read the exploit header. The exploit so far has a 100% success rate on the systems it was designed to work on. I don't think this is rocket science. If your distribution does not compile Econet, then the exploit obviously wo [ more ] [ reply ] Re: [Full-disclosure] Flaw in Microsoft Domain Account CachingAllows Local Workstation Admins to Temporarily Escalate Privilegesand Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 Ansgar Wiechers (bugtraq planetcobalt net) On 2010-12-13 Andrea Lee wrote: > A local admin is an admin on one system. The domain admin is an admin > on all systems in the domain, including mission critical Windows > servers. With temporary domain admin privs, the local admin could log > into the AD and change permissions / passwords for anot [ more ] [ reply ] RE: [Full-disclosure] Flaw in Microsoft Domain Account Caching Allows Local Workstation Admins to Temporarily Escalate Privileges and Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 Kurt Dillard (kurtdillard msn com) So far I agree with Thor. Did I miss something? Has anyone demonstrated using the locally cached credentials to access resources across the network? So far I haven't seen anything new or interesting in this thread: 1. StenoPlasma claims that a local admin can access and reuse the cached credentials [ more ] [ reply ] RE: [Full-disclosure] Flaw in Microsoft Domain Account Caching Allows Local Workstation Admins to Temporarily Escalate Privileges and Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 Thor (Hammer of God) (thor hammerofgod com) >-----Original Message----- >From: kattrap (at) gmail (dot) com [email concealed] [mailto:kattrap (at) gmail (dot) com [email concealed]] On Behalf Of Andrea >Lee >Sent: Monday, December 13, 2010 9:12 AM >To: Thor (Hammer of God) >Cc: George Carlson; bugtraq (at) securityfocus (dot) com [email concealed]; full- >disclosure (at) lists.grok.org (dot) uk [email concealed] >Subject: Re: [Full-disclosure] Flaw in Micr [ more ] [ reply ] www.eVuln.com : "url" BBCode XSS in slickMsg 2010-12-13 bt evuln com www.eVuln.com advisory: "url" BBCode XSS in slickMsg Summary: http://evuln.com/vulns/160/summary.html Details: http://evuln.com/vulns/160/description.html -----------Summary----------- eVuln ID: EV0160 Software: slickMsg Vendor: n/a Version: 0.7-alpha Critical Level: low Type: Cross Site Scriptin [ more ] [ reply ] RE: [Full-disclosure] Flaw in Microsoft Domain Account CachingAllowsLocal Workstation Admins to Temporarily EscalatePrivilegesandLogin as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 David Gillett (gillettdavid fhda edu) > If I take the domain admin out of my local administrators, they can't do anything. Done. Back when I did AD/domain support, all domain user accounts got a profile that included a trivial script to re-add Domain Admins to the Local Admins group. So this kind of local removal shenanigans lasted [ more ] [ reply ] Re: [Full-disclosure] Flaw in Microsoft Domain Account Caching Allows Local Workstation Admins to Temporarily Escalate Privileges and Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 Andrea Lee (andrea kattrap net) I hope I'm not just feeding the troll... A local admin is an admin on one system. The domain admin is an admin on all systems in the domain, including mission critical Windows servers. With temporary domain admin privs, the local admin could log into the AD and change permissions / passwords for an [ more ] [ reply ] Re: Flaw in Microsoft Windows SAM Processing Allows Continued Administrative Access Using Hidden Regular User Masquerading After Compromise (2010-M$-001) 2010-12-13 Pavel Machek (pavel ucw cz) Hi! > > The reason I wrote this article was not to explain how to create a hidden > user account. I wrote the article to show you that you can modify the SAM > in real time in a way that is undetectable by ANYONE. This modification > allows you to masquerade any user account as the built-in Ad [ more ] [ reply ] RE: Flaw in Microsoft Domain Account CachingAllows Local Workstation Admins to Temporarily EscalatePrivileges and Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 Michael Wojcik (Michael Wojcik microfocus com) > From: Stefan Kanthak [mailto:stefan.kanthak (at) nexgo (dot) de [email concealed]] > Sent: Friday, 10 December, 2010 17:12 > > "George Carlson" <gcarlson (at) vccs (dot) edu [email concealed]> wrote: > > > Your objections are mostly true in a normal sense. > > However, it is not true when Group Policy is taken into account. > > Group Policies need an [ more ] [ reply ] [CORE-2010-0728] Symantec Intel Handler Service Remote Denial-of-Service 2010-12-13 Core Security Technologies Advisories (advisories coresecurity com) Re: Flaw in Microsoft Domain Account CachingAllows Local Workstation Admins to Temporarily EscalatePrivileges and Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-13 StenoPlasma @ ExploitDevelopment (StenoPlasma exploitdevelopment com) Stefan, For you information: Cached domain accounts on a local system are not stored in the SAM. They are stored in the SECURITY registry hive. When a cached domain user logs in to the system, they do not authenticate against the SAM (As you can see in my article, I am not editing the SAM). [ more ] [ reply ] Re: Flaw in Microsoft Domain Account Caching Allows Local Workstation Admins to Temporarily Escalate Privileges and Login as Cached Domain Admin Accounts (2010-M$-002) 2010-12-10 jcoyle winwholesale com You are completely missing the point.. Local admins become Domain Admins. From: "Stefan Kanthak" <stefan.kanthak (at) nexgo (dot) de [email concealed]> To: <bugtraq (at) securityfocus (dot) com [email concealed]>, <full-disclosure (at) lists.grok.org (dot) uk [email concealed]> Cc: <stenoplasma (at) exploitdevelopment (dot) com [email concealed]> Date: 12/10/2010 01:08 [ more ] [ reply ] Call for Papers -- BADGERS 2011 2010-12-13 Federico Maggi (federico maggi gmail com) [Apologies if you receive multiple copies] Call For Papers -- BADGERS 2011 ============================================= The Program Committee for the first EuroSys Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) invites you to submit your work. Pap [ more ] [ reply ] iDefense Security Advisory 12.10.10: RealNetworks RealPlayer RealAudio Codec Memory Corruption Vulnerability 2010-12-10 labs-no-reply (labs-no-reply ivcp vrsn com) iDefense Security Advisory 12.10.10 http://labs.idefense.com/intelligence/vulnerabilities/ Dec 10, 2010 I. BACKGROUND RealPlayer is RealNetworks's media player product used to render video and other media. For more information, visit http://www.real.com/. II. DESCRIPTION Remote exploitation of a [ more ] [ reply ] |
|
Privacy Statement |
This is more of a wakeup call to brush up on our understanding of permissions
[ more ] [ reply ]