|
Prev week |
Colapse all |
Post message
Re: Fire fox dos exploit 2006-05-31 Phil Trainor (ptrainor imperfectnetworks com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I was able to use this proof of concept code with the following results: With Firefox 1.0.8 (Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.13) Gecko/20060418 Fedora/1.0.8-1.1.fc4 Firefox/1.0.8) I was able to cause a resource exhaustion with firefox in [ more ] [ reply ] Re: Fire fox dos exploit 2006-05-31 Yannick von Arx (yannick vonarx yanux ch) Under Apple Mac OS X 10.4.6 (PPC) with Firefox 1.5.0.3 it's reproducible! Cheers, Yannick von Arx Am 31.05.2006 um 16:50 schrieb Josh Zlatin-Amishav: > On Tue, 30 May 2006, co296 (at) aol (dot) com [email concealed] wrote: > >> I have found a problem which causes denial of service on fire fox >> browser > > Can you give [ more ] [ reply ] Re: Fire fox dos exploit 2006-05-31 Ronald van den Blink (ronald securityview org) I told this guy all ready that it looks like WinXP is the problem. Mac OS X and Debian (Linux) does not hang! With regards, Ronald van den Blink Securityview.org On 31 May, 2006, at 16:50, Josh Zlatin-Amishav wrote: > On Tue, 30 May 2006, co296 (at) aol (dot) com [email concealed] wrote: > >> I have found a problem which [ more ] [ reply ] RE: Fire fox dos exploit 2006-05-31 Andy (andy nds uk com) Crashed my FF 1.5.0.3 straight away on a fully patched XP Pro Service Pack 2 Andy -----Original Message----- From: Josh Zlatin-Amishav [mailto:josh (at) tkos.co (dot) il [email concealed]] Sent: 31 May 2006 16:50 To: co296 (at) aol (dot) com [email concealed] Cc: bugtraq (at) securityfocus (dot) com [email concealed] Subject: Re: Fire fox dos exploit On Tue, 30 May 2006, co296@aol [ more ] [ reply ] Re: Fire fox dos exploit 2006-05-31 pagvac (unknown pentester gmail com) Successfully tested on Firefox 1.5.0.3. I had to kill my firefox.exe process after half a minute of freezing :-) On 30 May 2006 12:03:36 -0000, co296 (at) aol (dot) com [email concealed] <co296 (at) aol (dot) com [email concealed]> wrote: > I have found a problem which causes denial of service on fire fox browser > > > Creadit:to n00b for finding this bu [ more ] [ reply ] Re: [Info Disclosure] Diesel PHP Job Site Latest Version 2006-05-31 John F Flynn III (flynnj cs fiu edu) As a systems administrator, I must say that your methods are unacceptable. You are violating your customers' trust by doing this without their knowledge. You even made an effort to hide the code that sends the information! This is outright deceit and should not be tolerated by anyone. Regardles [ more ] [ reply ] LifeType <=1.0.4 'articleId' SQL injection 2006-06-03 rgod autistici org #!/usr/bin/php -q -d short_open_tag=on <? echo "LifeType <= 1.0.4_r3270 SQL injection / admin credentials disclosure\r\n"; echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n"; echo "site: http://retrogod.altervista.org\r\n"; echo "dork: \"Powered by LifeType\" \"RSS 0.90\" \"RSS 1.0\" \"RSS 2.0\" \"Valid XHT [ more ] [ reply ] DotClear <= 1.2.4 'blog_dc_path' (php5) arbitrary remote inclusion 2006-06-03 rgod autistici org #!/usr/bin/php -q -d short_open_tag=on <? echo "DotClear <= 1.2.4 prepend.php/'blog_dc_path' arbitrary remote inclusion\r\n"; echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n"; echo "site: http://retrogod.altervista.org\r\n\r\n"; echo "dork: \"propulsé par DotClear\" \"fil atom\" \"fil rss\" +commentaires\ [ more ] [ reply ] Re: New Snort Bypass - Patch - Bypass of Patch 2006-06-03 M. Dodge Mumford (dodge nfr net) [Sorry to reply to my own post, but...] M. Dodge Mumford said: > Sigint Consulting said: > > perl -e 'print "GET \x0d/index.php\x90\x90 HTTP/1.0\n\r\n"'|nc > > 192.168.1.3 80 > > > > No alert is generated from the string above. > > [...] > > > We are not sure how much this may buy an attacker as [ more ] [ reply ] [SECURITY] [DSA 1089-1] New freeradius packages fix arbitrary code execution 2006-06-03 joey infodrom org (Martin Schulze) [MajorSecurity #7]dotWidget CMS <= 1.0.6 - Remote File Include Vulnerability 2006-06-03 admin majorsecurity de [MajorSecurity #7]dotWidget CMS <= 1.0.6 - Remote File Include Vulnerability ------------------------------------------------------------------------ ------------- Software: dotWidget CMS Version: <=1.0.6 Type: Remote File Include Vulnerability Date: June, 2nd 2006 Vendor: dotWidget [ more ] [ reply ] phpBB2 (template.php) Remote File Inclusion 2006-06-03 canberx linuxmail org ******************************************************************** *Title: *phpBB2 Remote File Include * * *Credit: *Canberx * * *Thanx: *Forewer-Partizan * * *Mail: *canberx (at) linuxmail (dot) org [email concealed] www.canberx.tk * * *Google Dork: *Powered by phpBB © 2001, 2002 phpBB Group * * *Expl [ more ] [ reply ] LocazoList Classifieds <= v1.05e(viewmsg.asp) Remote SQL Injection Vulnerability 2006-06-03 ajannhwt hotmail com # Title : LocazoList Classifieds <= v1.05e(viewmsg.asp) Remote SQL Injection Vulnerability # Author : ajann #Vulnerability; $$$ http://[target]/[path]/viewmsg.asp?msgid= SQL TEXT $$$ Example: http://[target]/[path]/viewmsg.asp?msgid=-1%20union%20select%20epass,0,0 ,0,email,0,0,0,0,0 [ more ] [ reply ] Re: # MHG Security Team --- MyBloggie 2.1.1 version Remote File Include Vulnerabilit 2006-06-03 nukedx nukedx com This is not vulnerable,PHP-Nuke having a special in their files and when includes mainfile.php it overwrites the global variables and it caused to make an arbitrary file inclusion. But in MyBloggie there is no common vulnerability like it.I checked all files and all versions did not see any vulnera [ more ] [ reply ] Blackhat USA 2006 - Review , remarks and proposal agenda 2006-06-03 newslist (at) security-briefings (dot) com [email concealed] (newslist security-briefings com) the Blackhat agenda for USA 2006 session had just been published : URL <http://www.blackhat.com/html/bh-usa-06/bh-usa-06-schedule.html> The first remark is that this year, Blackhat USA, will be an incredible briefing ! There will be several Zero day announcements. For example: Brendan O'Connor [ more ] [ reply ] [SECURITY] [DSA 1088-1] New centericq packages fix arbitrary code execution 2006-06-03 joey infodrom org (Martin Schulze) Critical SQL Injection in CoolForum 2006-06-03 gmdarkfig gmail com Type: SQL Injection Risk: Critical Product: CoolForum <= 0.8.3 beta ******************************** Vulnerability ************* // File: editpost.php // Line 38 // if(isset($_REQUEST['post'])) $post = intval($_REQUEST['post']); else $post = 0; -- // Line 77 // $canedit = getrighte [ more ] [ reply ] [SECURITY] [DSA 1087-1] New PostgreSQL packages fix encoding vulnerabilities 2006-06-03 joey infodrom org (Martin Schulze) Pixelpost <= 1-5rc1-2 multiple vulnerabilities 2006-06-03 rgod autistici org #!/usr/bin/php -q -d short_open_tag=on <? echo "Pixelpost <= 1-5rc1-2 privilege escalation exploit\r\n"; echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n"; echo "site: http://retrogod.altervista.org\r\n"; echo "dork: pixelpost \"RSS 2.0\" \"ATOM feed\" \"Valid xHTML / Valid CSS\"\r\n\r\n"; /* works wit [ more ] [ reply ] Re: New Snort Bypass - Patch - Bypass of Patch 2006-06-02 M. Dodge Mumford (dodge nfr net) Sigint Consulting said: > However we can once again bypass this by including our CR character > before our string like so: > > perl -e 'print "GET \x0d/index.php\x90\x90 HTTP/1.0\n\r\n"'|nc > 192.168.1.3 80 > > No alert is generated from the string above. [...] > We are not sure how much this ma [ more ] [ reply ] Re: Re: # MHG Security Team --- PHP NUKE All version Remote File Inc. 2006-06-02 Steven M. Christey (coley mitre org) >include("../../../mainfile.php"); > >include($phpbb_root_path.'common.'.$phpEx); > >... > >in mainfile.php at lines 54-56 > >... > >import_request_variables('GPC'); Oh, OK - now that makes sense. This looks like one aspect of the "globals overwrite" problem as originally documented by Stefan E [ more ] [ reply ] rPSA-2006-0091-1 firefox thunderbird 2006-06-02 Justin M. Forbes (jmforbes rpath com) rPath Security Advisory: 2006-0091-1 Published: 2006-06-02 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Local User Deterministic Vulnerability Updated Versions: firefox=/conary.rpath.com@rpl:devel//1/1.5.0.4-1-0.1 thunderbird=/conary.rpath.com@rpl:devel//1/1.5.0.4 [ more ] [ reply ] [DRUPAL-SA-2006-006] Drupal 4.6.7 / 4.7.1 fixes arbitrary file execution issue 2006-06-02 Uwe Hermann (uwe hermann-uwe de) [DRUPAL-SA-2006-008] Drupal 4.6.8 / 4.7.2 fixes XSS issue 2006-06-02 Uwe Hermann (uwe hermann-uwe de) [DRUPAL-SA-2006-007] Drupal 4.6.8 / 4.7.2 fixes arbitrary file execution issue 2006-06-02 Uwe Hermann (uwe hermann-uwe de) |
|
Privacy Statement |
this does not seem to be easily exploitable. It is a simple stack buffer
overun issue. The problem seems to be in
inetcomm!CActiveUrlRequest::ParseUrl..... now inetcomm seemed to have been
gs flagged complied,hence the ovew
[ more ] [ reply ]